// FIXME: https://github.com/nodejs/node/pull/16853
-import { VideosCaptionCache } from './server/lib/cache/videos-caption-cache'
-
require('tls').DEFAULT_ECDH_CURVE = 'auto'
import { isTestInstance } from './server/helpers/core-utils'
import * as cors from 'cors'
import * as cookieParser from 'cookie-parser'
import * as helmet from 'helmet'
+import * as useragent from 'useragent'
+import * as anonymize from 'ip-anonymize'
+import * as cli from 'commander'
process.title = 'peertube'
const app = express()
// ----------- Core checker -----------
-import { checkMissedConfig, checkFFmpeg, checkConfig, checkActivityPubUrls } from './server/initializers/checker'
+import { checkMissedConfig, checkFFmpeg } from './server/initializers/checker-before-init'
// Do not use barrels because we don't want to load all modules here (we need to initialize database first)
import { logger } from './server/helpers/logger'
-import { API_VERSION, CONFIG, STATIC_PATHS, CACHE } from './server/initializers/constants'
+import { API_VERSION, CONFIG, CACHE, HTTP_SIGNATURE } from './server/initializers/constants'
const missed = checkMissedConfig()
if (missed.length !== 0) {
process.exit(-1)
})
+import { checkConfig, checkActivityPubUrls } from './server/initializers/checker-after-init'
+
const errorMessage = checkConfig()
if (errorMessage !== null) {
throw new Error(errorMessage)
// Trust our proxy (IP forwarding...)
app.set('trust proxy', CONFIG.TRUST_PROXY)
-// Security middlewares
+// Security middleware
app.use(helmet({
frameguard: {
action: 'deny' // we only allow it for /videos/embed, see server/controllers/client.ts
},
- dnsPrefetchControl: {
- allow: true
- },
- contentSecurityPolicy: {
- directives: {
- defaultSrc: ['*', 'data:', 'wss:', 'https:'],
- fontSrc: ["'self'", 'data:'],
- frameSrc: ["'none'"],
- mediaSrc: ['*', 'https:'],
- objectSrc: ["'none'"],
- scriptSrc: ["'self'", "'unsafe-inline'", "'unsafe-eval'"],
- styleSrc: ["'self'", "'unsafe-inline'"],
- upgradeInsecureRequests: true
- },
- browserSniff: false // assumes a modern browser, but allows CDN in front
- },
- referrerPolicy: {
- policy: 'strict-origin-when-cross-origin'
- }
+ hsts: false
}))
-app.use((_, res, next) => {
- [
- "vibrate 'none'",
- "geolocation 'none'",
- "camera 'none'",
- "microphone 'none'",
- "magnetometer 'none'",
- "payment 'none'",
- "accelerometer 'none'"
- ].forEach(e => res.append('Feature-Policy', e + ';'))
- next()
-})
// ----------- Database -----------
import { installApplication } from './server/initializers'
import { Emailer } from './server/lib/emailer'
import { JobQueue } from './server/lib/job-queue'
-import { VideosPreviewCache } from './server/lib/cache'
+import { VideosPreviewCache, VideosCaptionCache } from './server/lib/cache'
import {
activityPubRouter,
apiRouter,
trackerRouter,
createWebsocketServer
} from './server/controllers'
+import { advertiseDoNotTrack } from './server/middlewares/dnt'
import { Redis } from './server/lib/redis'
import { BadActorFollowScheduler } from './server/lib/schedulers/bad-actor-follow-scheduler'
import { RemoveOldJobsScheduler } from './server/lib/schedulers/remove-old-jobs-scheduler'
import { UpdateVideosScheduler } from './server/lib/schedulers/update-videos-scheduler'
+import { YoutubeDlUpdateScheduler } from './server/lib/schedulers/youtube-dl-update-scheduler'
+import { VideosRedundancyScheduler } from './server/lib/schedulers/videos-redundancy-scheduler'
+import { isHTTPSignatureDigestValid } from './server/helpers/peertube-crypto'
// ----------- Command line -----------
+cli
+ .option('--no-client', 'Start PeerTube without client interface')
+ .parse(process.argv)
+
// ----------- App -----------
// Enable CORS for develop
credentials: true
}))
}
-
// For the logger
+morgan.token('remote-addr', req => {
+ return (req.get('DNT') === '1') ?
+ anonymize(req.ip || (req.connection && req.connection.remoteAddress) || undefined,
+ 16, // bitmask for IPv4
+ 16 // bitmask for IPv6
+ ) :
+ req.ip
+})
+morgan.token('user-agent', req => (req.get('DNT') === '1') ?
+ useragent.parse(req.get('user-agent')).family : req.get('user-agent'))
app.use(morgan('combined', {
stream: { write: logger.info.bind(logger) }
}))
app.use(bodyParser.urlencoded({ extended: false }))
app.use(bodyParser.json({
type: [ 'application/json', 'application/*+json' ],
- limit: '500kb'
+ limit: '500kb',
+ verify: (req: express.Request, _, buf: Buffer, encoding: string) => {
+ const valid = isHTTPSignatureDigestValid(buf, req)
+ if (valid !== true) throw new Error('Invalid digest')
+ }
}))
// Cookies
app.use(cookieParser())
+// W3C DNT Tracking Status
+app.use(advertiseDoNotTrack)
// ----------- Views, routes and static files -----------
app.use('/', staticRouter)
// Client files, last valid routes!
-app.use('/', clientsRouter)
+if (cli.client) app.use('/', clientsRouter)
// ----------- Errors -----------
error = err.stack || err.message || err
}
- logger.error('Error in controller.', { error })
+ // Sequelize error
+ const sql = err.parent ? err.parent.sql : undefined
+
+ logger.error('Error in controller.', { err: error, sql })
return res.status(err.status || 500).end()
})
BadActorFollowScheduler.Instance.enable()
RemoveOldJobsScheduler.Instance.enable()
UpdateVideosScheduler.Instance.enable()
+ YoutubeDlUpdateScheduler.Instance.enable()
+ VideosRedundancyScheduler.Instance.enable()
// Redis initialization
Redis.Instance.init()
logger.info('Server listening on %s:%d', hostname, port)
logger.info('Web server: %s', CONFIG.WEBSERVER.URL)
})
+
+ process.on('exit', () => {
+ JobQueue.Instance.terminate()
+ })
+
+ process.on('SIGINT', () => process.exit(0))
}