Fix login redirect when not using https
This commit is contained in:
parent
078af59fd8
commit
cd54aec2f9
@ -111,8 +111,10 @@ export abstract class Server {
|
|||||||
protected readonly server: http.Server | https.Server;
|
protected readonly server: http.Server | https.Server;
|
||||||
protected rootPath = path.resolve(__dirname, "../../../..");
|
protected rootPath = path.resolve(__dirname, "../../../..");
|
||||||
private listenPromise: Promise<string> | undefined;
|
private listenPromise: Promise<string> | undefined;
|
||||||
|
private readonly protocol: string;
|
||||||
|
|
||||||
public constructor(public readonly options: ServerOptions) {
|
public constructor(public readonly options: ServerOptions) {
|
||||||
|
this.protocol = this.options.allowHttp ? "http" : "https";
|
||||||
if (this.options.cert && this.options.certKey) {
|
if (this.options.cert && this.options.certKey) {
|
||||||
useHttpsTransformer();
|
useHttpsTransformer();
|
||||||
const httpolyglot = require.__$__nodeRequire(path.resolve(__dirname, "../node_modules/httpolyglot/lib/index")) as typeof import("httpolyglot");
|
const httpolyglot = require.__$__nodeRequire(path.resolve(__dirname, "../node_modules/httpolyglot/lib/index")) as typeof import("httpolyglot");
|
||||||
@ -153,7 +155,7 @@ export abstract class Server {
|
|||||||
: (address.address === "::" ? "localhost" : address.address)
|
: (address.address === "::" ? "localhost" : address.address)
|
||||||
) + ":" + address.port
|
) + ":" + address.port
|
||||||
: address;
|
: address;
|
||||||
return `${this.options.allowHttp ? "http" : "https"}://${endpoint}`;
|
return `${this.protocol}://${endpoint}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected abstract handleRequest(
|
protected abstract handleRequest(
|
||||||
@ -173,7 +175,9 @@ export abstract class Server {
|
|||||||
response.writeHead(payload.redirect ? HttpCode.Redirect : payload.code || HttpCode.Ok, {
|
response.writeHead(payload.redirect ? HttpCode.Redirect : payload.code || HttpCode.Ok, {
|
||||||
"Cache-Control": "max-age=86400", // TODO: ETag?
|
"Cache-Control": "max-age=86400", // TODO: ETag?
|
||||||
"Content-Type": getMediaMime(payload.filePath),
|
"Content-Type": getMediaMime(payload.filePath),
|
||||||
...(payload.redirect ? { Location: payload.redirect } : {}),
|
...(payload.redirect ? {
|
||||||
|
Location: `${this.protocol}://${request.headers.host}${payload.redirect}`,
|
||||||
|
} : {}),
|
||||||
...payload.headers,
|
...payload.headers,
|
||||||
});
|
});
|
||||||
response.end(payload.content);
|
response.end(payload.content);
|
||||||
@ -189,7 +193,7 @@ export abstract class Server {
|
|||||||
private async preHandleRequest(request: http.IncomingMessage): Promise<Response> {
|
private async preHandleRequest(request: http.IncomingMessage): Promise<Response> {
|
||||||
const secure = (request.connection as tls.TLSSocket).encrypted;
|
const secure = (request.connection as tls.TLSSocket).encrypted;
|
||||||
if (!this.options.allowHttp && !secure) {
|
if (!this.options.allowHttp && !secure) {
|
||||||
return { redirect: "https://" + request.headers.host + request.url };
|
return { redirect: request.url };
|
||||||
}
|
}
|
||||||
|
|
||||||
const parsedUrl = url.parse(request.url || "", true);
|
const parsedUrl = url.parse(request.url || "", true);
|
||||||
@ -215,7 +219,7 @@ export abstract class Server {
|
|||||||
if (requestPath === "/favicon.ico") {
|
if (requestPath === "/favicon.ico") {
|
||||||
return this.getResource(path.join(this.rootPath, "/out/vs/server/src/favicon", requestPath));
|
return this.getResource(path.join(this.rootPath, "/out/vs/server/src/favicon", requestPath));
|
||||||
} else if (!this.authenticate(request)) {
|
} else if (!this.authenticate(request)) {
|
||||||
return { redirect: "https://" + request.headers.host + "/login" };
|
return { redirect: "/login" };
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case "/login":
|
case "/login":
|
||||||
@ -240,13 +244,13 @@ export abstract class Server {
|
|||||||
private async tryLogin(request: http.IncomingMessage): Promise<Response> {
|
private async tryLogin(request: http.IncomingMessage): Promise<Response> {
|
||||||
if (this.authenticate(request)) {
|
if (this.authenticate(request)) {
|
||||||
this.ensureGet(request);
|
this.ensureGet(request);
|
||||||
return { redirect: "https://" + request.headers.host + "/" };
|
return { redirect: "/" };
|
||||||
}
|
}
|
||||||
if (request.method === "POST") {
|
if (request.method === "POST") {
|
||||||
const data = await this.getData<LoginPayload>(request);
|
const data = await this.getData<LoginPayload>(request);
|
||||||
if (this.authenticate(request, data)) {
|
if (this.authenticate(request, data)) {
|
||||||
return {
|
return {
|
||||||
redirect: "https://" + request.headers.host + "/",
|
redirect: "/",
|
||||||
headers: {"Set-Cookie": `password=${data.password}` }
|
headers: {"Set-Cookie": `password=${data.password}` }
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
@ -384,12 +388,7 @@ export class MainServer extends Server {
|
|||||||
case "/node_modules":
|
case "/node_modules":
|
||||||
case "/out":
|
case "/out":
|
||||||
return this.getResource(path.join(this.rootPath, base, requestPath));
|
return this.getResource(path.join(this.rootPath, base, requestPath));
|
||||||
// TODO: this setup means you can't request anything from the root if it
|
// TODO: make this a /resources endpoint instead. Will require patching?
|
||||||
// starts with /node_modules or /out, although that's probably low risk.
|
|
||||||
// There doesn't seem to be a really good way to solve this since some
|
|
||||||
// resources are requested by the browser (like the extension icon) and
|
|
||||||
// some by the file provider (like the extension README). Maybe add a
|
|
||||||
// /resource prefix and a file provider that strips that prefix?
|
|
||||||
default: return this.getResource(path.join(base, requestPath));
|
default: return this.getResource(path.join(base, requestPath));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user