123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245 |
- use std::path::{Path, PathBuf};
- use rocket::{
- fs::NamedFile,
- http::ContentType,
- response::{content::RawCss as Css, content::RawHtml as Html, Redirect},
- serde::json::Json,
- Catcher, Route,
- };
- use serde_json::Value;
- use crate::{
- api::{core::now, ApiResult, EmptyResult},
- auth::decode_file_download,
- db::models::{AttachmentId, CipherId},
- error::Error,
- util::Cached,
- CONFIG,
- };
- pub fn routes() -> Vec<Route> {
- // If adding more routes here, consider also adding them to
- // crate::utils::LOGGED_ROUTES to make sure they appear in the log
- let mut routes = routes![attachments, alive, alive_head, static_files];
- if CONFIG.web_vault_enabled() {
- routes.append(&mut routes![web_index, web_index_direct, web_index_head, app_id, web_files, vaultwarden_css]);
- }
- #[cfg(debug_assertions)]
- if CONFIG.reload_templates() {
- routes.append(&mut routes![_static_files_dev]);
- }
- routes
- }
- pub fn catchers() -> Vec<Catcher> {
- if CONFIG.web_vault_enabled() {
- catchers![not_found]
- } else {
- catchers![]
- }
- }
- #[catch(404)]
- fn not_found() -> ApiResult<Html<String>> {
- // Return the page
- let json = json!({
- "urlpath": CONFIG.domain_path()
- });
- let text = CONFIG.render_template("404", &json)?;
- Ok(Html(text))
- }
- #[get("/css/vaultwarden.css")]
- fn vaultwarden_css() -> Cached<Css<String>> {
- let css_options = json!({
- "emergency_access_allowed": CONFIG.emergency_access_allowed(),
- "load_user_scss": true,
- "mail_2fa_enabled": CONFIG._enable_email_2fa(),
- "mail_enabled": CONFIG.mail_enabled(),
- "sends_allowed": CONFIG.sends_allowed(),
- "signup_disabled": CONFIG.is_signup_disabled(),
- "sso_disabled": !CONFIG.sso_enabled(),
- "sso_only": CONFIG.sso_enabled() && CONFIG.sso_only(),
- "yubico_enabled": CONFIG._enable_yubico() && CONFIG.yubico_client_id().is_some() && CONFIG.yubico_secret_key().is_some(),
- });
- let scss = match CONFIG.render_template("scss/vaultwarden.scss", &css_options) {
- Ok(t) => t,
- Err(e) => {
- // Something went wrong loading the template. Use the fallback
- warn!("Loading scss/vaultwarden.scss.hbs or scss/user.vaultwarden.scss.hbs failed. {e}");
- CONFIG
- .render_fallback_template("scss/vaultwarden.scss", &css_options)
- .expect("Fallback scss/vaultwarden.scss.hbs to render")
- }
- };
- let css = match grass_compiler::from_string(
- scss,
- &grass_compiler::Options::default().style(grass_compiler::OutputStyle::Compressed),
- ) {
- Ok(css) => css,
- Err(e) => {
- // Something went wrong compiling the scss. Use the fallback
- warn!("Compiling the Vaultwarden SCSS styles failed. {e}");
- let mut css_options = css_options;
- css_options["load_user_scss"] = json!(false);
- let scss = CONFIG
- .render_fallback_template("scss/vaultwarden.scss", &css_options)
- .expect("Fallback scss/vaultwarden.scss.hbs to render");
- grass_compiler::from_string(
- scss,
- &grass_compiler::Options::default().style(grass_compiler::OutputStyle::Compressed),
- )
- .expect("SCSS to compile")
- }
- };
- // Cache for one day should be enough and not too much
- Cached::ttl(Css(css), 86_400, false)
- }
- #[get("/")]
- async fn web_index() -> Cached<Option<NamedFile>> {
- Cached::short(NamedFile::open(Path::new(&CONFIG.web_vault_folder()).join("index.html")).await.ok(), false)
- }
- // Make sure that `/index.html` redirect to actual domain path.
- // If not, this might cause issues with the web-vault
- #[get("/index.html")]
- fn web_index_direct() -> Redirect {
- Redirect::to(format!("{}/", CONFIG.domain_path()))
- }
- #[head("/")]
- fn web_index_head() -> EmptyResult {
- // Add an explicit HEAD route to prevent uptime monitoring services from
- // generating "No matching routes for HEAD /" error messages.
- //
- // Rocket automatically implements a HEAD route when there's a matching GET
- // route, but relying on this behavior also means a spurious error gets
- // logged due to <https://github.com/SergioBenitez/Rocket/issues/1098>.
- Ok(())
- }
- #[get("/app-id.json")]
- fn app_id() -> Cached<(ContentType, Json<Value>)> {
- let content_type = ContentType::new("application", "fido.trusted-apps+json");
- Cached::long(
- (
- content_type,
- Json(json!({
- "trustedFacets": [
- {
- "version": { "major": 1, "minor": 0 },
- "ids": [
- // Per <https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-appid-and-facets-v2.0-id-20180227.html#determining-the-facetid-of-a-calling-application>:
- //
- // "In the Web case, the FacetID MUST be the Web Origin [RFC6454]
- // of the web page triggering the FIDO operation, written as
- // a URI with an empty path. Default ports are omitted and any
- // path component is ignored."
- //
- // This leaves it unclear as to whether the path must be empty,
- // or whether it can be non-empty and will be ignored. To be on
- // the safe side, use a proper web origin (with empty path).
- &CONFIG.domain_origin(),
- "ios:bundle-id:com.8bit.bitwarden",
- "android:apk-key-hash:dUGFzUzf3lmHSLBDBIv+WaFyZMI" ]
- }]
- })),
- ),
- true,
- )
- }
- #[get("/<p..>", rank = 10)] // Only match this if the other routes don't match
- async fn web_files(p: PathBuf) -> Cached<Option<NamedFile>> {
- Cached::long(NamedFile::open(Path::new(&CONFIG.web_vault_folder()).join(p)).await.ok(), true)
- }
- #[get("/attachments/<cipher_id>/<file_id>?<token>")]
- async fn attachments(cipher_id: CipherId, file_id: AttachmentId, token: String) -> Option<NamedFile> {
- let Ok(claims) = decode_file_download(&token) else {
- return None;
- };
- if claims.sub != cipher_id || claims.file_id != file_id {
- return None;
- }
- NamedFile::open(Path::new(&CONFIG.attachments_folder()).join(cipher_id.as_ref()).join(file_id.as_ref())).await.ok()
- }
- // We use DbConn here to let the alive healthcheck also verify the database connection.
- use crate::db::DbConn;
- #[get("/alive")]
- fn alive(_conn: DbConn) -> Json<String> {
- now()
- }
- #[head("/alive")]
- fn alive_head(_conn: DbConn) -> EmptyResult {
- // Avoid logging spurious "No matching routes for HEAD /alive" errors
- // due to <https://github.com/SergioBenitez/Rocket/issues/1098>.
- Ok(())
- }
- // This endpoint/function is used during development and development only.
- // It allows to easily develop the admin interface by always loading the files from disk instead from a slice of bytes
- // This will only be active during a debug build and only when `RELOAD_TEMPLATES` is set to `true`
- // NOTE: Do not forget to add any new files added to the `static_files` function below!
- #[cfg(debug_assertions)]
- #[get("/vw_static/<filename>", rank = 1)]
- pub async fn _static_files_dev(filename: PathBuf) -> Option<NamedFile> {
- warn!("LOADING STATIC FILES FROM DISK");
- let file = filename.to_str().unwrap_or_default();
- let ext = filename.extension().unwrap_or_default();
- let path = if ext == "png" || ext == "svg" {
- tokio::fs::canonicalize(Path::new(file!()).parent().unwrap().join("../static/images/").join(file)).await
- } else {
- tokio::fs::canonicalize(Path::new(file!()).parent().unwrap().join("../static/scripts/").join(file)).await
- };
- if let Ok(path) = path {
- return NamedFile::open(path).await.ok();
- };
- None
- }
- #[get("/vw_static/<filename>", rank = 2)]
- pub fn static_files(filename: &str) -> Result<(ContentType, &'static [u8]), Error> {
- match filename {
- "404.png" => Ok((ContentType::PNG, include_bytes!("../static/images/404.png"))),
- "mail-github.png" => Ok((ContentType::PNG, include_bytes!("../static/images/mail-github.png"))),
- "logo-gray.png" => Ok((ContentType::PNG, include_bytes!("../static/images/logo-gray.png"))),
- "error-x.svg" => Ok((ContentType::SVG, include_bytes!("../static/images/error-x.svg"))),
- "hibp.png" => Ok((ContentType::PNG, include_bytes!("../static/images/hibp.png"))),
- "vaultwarden-icon.png" => Ok((ContentType::PNG, include_bytes!("../static/images/vaultwarden-icon.png"))),
- "vaultwarden-favicon.png" => Ok((ContentType::PNG, include_bytes!("../static/images/vaultwarden-favicon.png"))),
- "404.css" => Ok((ContentType::CSS, include_bytes!("../static/scripts/404.css"))),
- "admin.css" => Ok((ContentType::CSS, include_bytes!("../static/scripts/admin.css"))),
- "admin.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/admin.js"))),
- "admin_settings.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/admin_settings.js"))),
- "admin_users.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/admin_users.js"))),
- "admin_organizations.js" => {
- Ok((ContentType::JavaScript, include_bytes!("../static/scripts/admin_organizations.js")))
- }
- "admin_diagnostics.js" => {
- Ok((ContentType::JavaScript, include_bytes!("../static/scripts/admin_diagnostics.js")))
- }
- "bootstrap.css" => Ok((ContentType::CSS, include_bytes!("../static/scripts/bootstrap.css"))),
- "bootstrap.bundle.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/bootstrap.bundle.js"))),
- "jdenticon-3.3.0.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/jdenticon-3.3.0.js"))),
- "datatables.js" => Ok((ContentType::JavaScript, include_bytes!("../static/scripts/datatables.js"))),
- "datatables.css" => Ok((ContentType::CSS, include_bytes!("../static/scripts/datatables.css"))),
- "jquery-3.7.1.slim.js" => {
- Ok((ContentType::JavaScript, include_bytes!("../static/scripts/jquery-3.7.1.slim.js")))
- }
- _ => err!(format!("Static file not found: {filename}")),
- }
- }
|