Initial commit

This commit is contained in:
Jamie Curnow
2017-12-21 09:02:37 +10:00
parent dc830df253
commit 6e7435c35d
140 changed files with 19554 additions and 0 deletions

View File

@ -0,0 +1,261 @@
'use strict';
const _ = require('lodash');
const fs = require('fs');
const batchflow = require('batchflow');
const db = require('../db');
const logger = require('../logger');
const internalNginx = require('./nginx');
const utils = require('../lib/utils');
const internalAccess = {
/**
* All Access Lists
*
* @returns {Promise}
*/
getAll: () => {
return new Promise((resolve/*, reject*/) => {
resolve(db.access.find());
})
.then(list => {
_.map(list, (list_item, idx) => {
list[idx] = internalAccess.maskItems(list_item);
list[idx].hosts = db.hosts.find({access_list_id: list_item._id});
});
return list;
});
},
/**
* Specific Access List
*
* @param {String} id
* @returns {Promise}
*/
get: id => {
return new Promise((resolve/*, reject*/) => {
resolve(db.access.findOne({_id: id}));
})
.then(list => {
if (list) {
return internalAccess.maskItems(list);
}
list.hosts = db.hosts.find({access_list_id: list._id});
return list;
});
},
/**
* Create a Access List
*
* @param {Object} payload
* @returns {Promise}
*/
create: payload => {
return new Promise((resolve/*, reject*/) => {
// Add list to db
resolve(db.access.save(payload));
})
.then(list => {
return internalAccess.build(list)
.then(() => {
return internalAccess.maskItems(list);
});
});
},
/**
* Update a Access List
*
* @param {String} id
* @param {Object} payload
* @returns {Promise}
*/
update: (id, payload) => {
return new Promise((resolve, reject) => {
// get existing list
let list = db.access.findOne({_id: id});
if (!list) {
reject(new error.ValidationError('Access List not found'));
} else {
if (typeof payload.name !== 'undefined') {
list.name = payload.name;
}
if (typeof payload.items !== 'undefined') {
// go through each of the items in the payload and assess how they apply to the original items
let new_items = [];
_.map(payload.items, (payload_item) => {
if (!payload_item.password) {
// try to find original item and use the password from there, this is essentially keeping existing users
let old = _.find(list.items, {username: payload_item.username});
if (old) {
new_items.push(old);
}
} else {
new_items.push(payload_item);
}
});
list.items = new_items;
}
db.access.update({_id: id}, list, {multi: false, upsert: false});
resolve(list);
}
})
.then(list => {
return internalAccess.build(list)
.then(() => {
return internalAccess.maskItems(list);
});
});
},
/**
* Deletes a Access List
*
* @param {String} id
* @returns {Promise}
*/
delete: id => {
const internalHost = require('./host');
let associated_hosts = db.hosts.find({access_list_id: id});
return new Promise((resolve/*, reject*/) => {
db.hosts.update({access_list_id: id}, {access_list_id: ''}, {multi: true, upsert: false});
if (associated_hosts.length) {
// regenerate config for these hosts
let promises = [];
_.map(associated_hosts, associated_host => {
promises.push(internalHost.configure(db.hosts.findOne({_id: associated_host._id})));
});
resolve(Promise.all(promises));
} else {
resolve();
}
})
.then(() => {
// restart nginx
if (associated_hosts.length) {
return internalNginx.reload();
}
})
.then(() => {
db.access.remove({_id: id}, false);
// delete access file
try {
fs.unlinkSync(internalAccess.getFilename(id));
} catch (err) {
// do nothing
}
return true;
});
},
/**
* @param {Object} list
* @returns {Object}
*/
maskItems: list => {
if (list && typeof list.items !== 'undefined') {
_.map(list.items, (val, idx) => {
list.items[idx].hint = val.password.charAt(0) + ('*').repeat(val.password.length - 1);
list.items[idx].password = '';
});
}
return list;
},
/**
* @param {String|Object} list
* @returns {String}
*/
getFilename: (list) => {
return '/config/access/' + (typeof list === 'string' ? list : list._id);
},
/**
* @param {Object} list
* @returns {Promise}
*/
build: list => {
logger.info('Building Access file for: ' + list.name);
return new Promise((resolve, reject) => {
if (typeof list._id !== 'undefined') {
let htpasswd_file = internalAccess.getFilename(list);
// 1. remove any existing access file
try {
fs.unlinkSync(htpasswd_file);
} catch (err) {
// do nothing
}
// 2. create empty access file
try {
fs.writeFileSync(htpasswd_file, '', {encoding: 'utf8'});
resolve(htpasswd_file);
} catch (err) {
reject(err);
}
} else {
reject(new Error('List does not have an _id'));
}
})
.then(htpasswd_file => {
// 3. generate password for each user
if (list.items.length) {
return new Promise((resolve, reject) => {
batchflow(list.items).sequential()
.each((i, item, next) => {
if (typeof item.password !== 'undefined' && item.password.length) {
logger.info('Adding: ' + item.username);
utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"')
.then((/*result*/) => {
next();
})
.catch(err => {
logger.error(err);
next(err);
});
}
})
.error(err => {
logger.error(err);
reject(err);
})
.end(results => {
logger.info('Built Access file for: ' + list.name);
resolve(results);
});
});
}
})
.then(() => {
// only reload nginx if any hosts are using this access
let hosts = db.hosts.find({access_list_id: list._id});
if (hosts && hosts.length) {
return internalNginx.reload();
}
});
}
};
module.exports = internalAccess;

View File

@ -0,0 +1,263 @@
'use strict';
const _ = require('lodash');
const db = require('../db');
const error = require('../lib/error');
const internalAccess = require('./access');
const internalSsl = require('./ssl');
const internalNginx = require('./nginx');
const timestamp = require('unix-timestamp');
timestamp.round = true;
const internalHost = {
/**
* All Hosts
*
* @returns {Promise}
*/
getAll: () => {
return new Promise((resolve/*, reject*/) => {
resolve(db.hosts.find());
})
.then(hosts => {
_.map(hosts, (host, idx) => {
if (typeof host.access_list_id !== 'undefined' && host.access_list_id) {
hosts[idx].access_list = internalAccess.maskItems(db.access.findOne({_id: host.access_list_id}));
} else {
hosts[idx].access_list_id = '';
hosts[idx].access_list = null;
}
});
return hosts;
});
},
/**
* Create a Host
*
* @param {Object} payload
* @returns {Promise}
*/
create: payload => {
return new Promise((resolve, reject) => {
// Enforce lowercase hostnames
payload.hostname = payload.hostname.toLowerCase();
// 1. Check that the hostname doesn't already exist
let existing_host = db.hosts.findOne({hostname: payload.hostname});
if (existing_host) {
reject(new error.ValidationError('Hostname already exists'));
} else {
// 2. Add host to db
let host = db.hosts.save(payload);
// 3. Fire the config generation for this host
internalHost.configure(host, true)
.then((/*result*/) => {
resolve(host);
})
.catch(err => {
reject(err);
});
}
})
.catch(err => {
// Remove host if the configuration failed
if (err instanceof error.ConfigurationError) {
db.hosts.remove({hostname: payload.hostname});
internalNginx.deleteConfig(payload);
internalSsl.deleteCerts(payload);
}
throw err;
});
},
/**
* Update a Host
*
* @param {String} id
* @param {Object} payload
* @returns {Promise}
*/
update: (id, payload) => {
return new Promise((resolve, reject) => {
let original_host = db.hosts.findOne({_id: id});
if (!original_host) {
reject(new error.ValidationError('Host not found'));
} else {
// Enforce lowercase hostnames
if (typeof payload.hostname !== 'undefined') {
payload.hostname = payload.hostname.toLowerCase();
}
// Check that the hostname doesn't already exist
let other_host = db.hosts.findOne({hostname: payload.hostname});
if (other_host && other_host._id !== id) {
reject(new error.ValidationError('Hostname already exists'));
} else {
// 2. Update host
db.hosts.update({_id: id}, payload, {multi: false, upsert: false});
let updated_host = db.hosts.findOne({_id: id});
resolve({
original: original_host,
updated: updated_host
});
}
}
})
.then(data => {
if (data.original.hostname !== data.updated.hostname) {
// Hostname has changed, delete the old file
return internalNginx.deleteConfig(data.original)
.then(() => {
return data;
});
}
return data;
})
.then(data => {
if (
(data.original.ssl && !data.updated.ssl) || // ssl was enabled and is now disabled
(data.original.ssl && data.original.hostname !== data.updated.hostname) // hostname was changed for a previously ssl-enabled host
) {
// SSL was turned off or hostname for ssl has changed so we should remove certs for the original
return internalSsl.deleteCerts(data.original)
.then(() => {
db.hosts.update({_id: data.updated._id}, {ssl_expires: 0}, {multi: false, upsert: false});
data.updated.ssl_expires = 0;
return data;
});
}
return data;
})
.then(data => {
// 3. Fire the config generation for this host
return internalHost.configure(data.updated, true)
.then((/*result*/) => {
return data.updated;
});
});
},
/**
* This will create the nginx config for the host and fire off letsencrypt duties if required
*
* @param {Object} host
* @param {Boolean} [reload_nginx]
* @param {Boolean} [force_ssl_renew]
* @returns {Promise}
*/
configure: (host, reload_nginx, force_ssl_renew) => {
return new Promise((resolve/*, reject*/) => {
resolve(internalNginx.deleteConfig(host));
})
.then(() => {
if (host.ssl && (force_ssl_renew || !internalSsl.hasValidSslCerts(host))) {
return internalSsl.configureSsl(host);
}
})
.then(() => {
return internalNginx.generateConfig(host);
})
.then(() => {
if (reload_nginx) {
return internalNginx.reload();
}
});
},
/**
* Deletes a Host
*
* @param {String} id
* @returns {Promise}
*/
delete: id => {
let existing_host = db.hosts.findOne({_id: id});
return new Promise((resolve, reject) => {
if (existing_host) {
db.hosts.update({_id: id}, {is_deleted: true}, {multi: true, upsert: false});
resolve(internalNginx.deleteConfig(existing_host));
} else {
reject(new error.ValidationError('Hostname does not exist'));
}
})
.then(() => {
if (existing_host.ssl) {
return internalSsl.deleteCerts(existing_host);
}
})
.then(() => {
db.hosts.remove({_id: id}, false);
return internalNginx.reload();
})
.then(() => {
return true;
});
},
/**
* Reconfigure a Host
*
* @param {String} id
* @returns {Promise}
*/
reconfigure: id => {
return new Promise((resolve, reject) => {
let host = db.hosts.findOne({_id: id});
if (!host) {
reject(new error.ValidationError('Host does not exist: ' + id));
} else {
// 3. Fire the config generation for this host
internalHost.configure(host, true)
.then((/*result*/) => {
resolve(host);
})
.catch(err => {
reject(err);
});
}
});
},
/**
* Renew SSL for a Host
*
* @param {String} id
* @returns {Promise}
*/
renew: id => {
return new Promise((resolve, reject) => {
let host = db.hosts.findOne({_id: id});
if (!host) {
reject(new error.ValidationError('Host does not exist'));
} else if (!host.ssl) {
reject(new error.ValidationError('Host does not have SSL enabled'));
} else {
// 3. Fire the ssl and config generation for this host, forcing ssl
internalHost.configure(host, true, true)
.then((/*result*/) => {
resolve(host);
})
.catch(err => {
reject(err);
});
}
});
}
};
module.exports = internalHost;

View File

@ -0,0 +1,78 @@
'use strict';
const fs = require('fs');
const ejs = require('ejs');
const logger = require('../logger');
const utils = require('../lib/utils');
const error = require('../lib/error');
const internalNginx = {
/**
* @returns {Promise}
*/
test: () => {
logger.info('Testing Nginx configuration');
return utils.exec('/usr/sbin/nginx -t');
},
/**
* @returns {Promise}
*/
reload: () => {
return internalNginx.test()
.then(() => {
logger.info('Reloading Nginx');
return utils.exec('/usr/sbin/nginx -s reload');
});
},
/**
* @param {Object} host
* @returns {String}
*/
getConfigName: host => {
return '/config/nginx/' + host.hostname + '.conf';
},
/**
* @param {Object} host
* @returns {Promise}
*/
generateConfig: host => {
return new Promise((resolve, reject) => {
let template = null;
let filename = internalNginx.getConfigName(host);
try {
template = fs.readFileSync(__dirname + '/../templates/host.conf.ejs', {encoding: 'utf8'});
let config_text = ejs.render(template, host);
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
resolve(true);
} catch (err) {
reject(new error.ConfigurationError(err.message));
}
});
},
/**
* @param {Object} host
* @param {Boolean} [throw_errors]
* @returns {Promise}
*/
deleteConfig: (host, throw_errors) => {
return new Promise((resolve, reject) => {
try {
fs.unlinkSync(internalNginx.getConfigName(host));
} catch (err) {
if (throw_errors) {
reject(err);
}
}
resolve();
});
}
};
module.exports = internalNginx;

View File

@ -0,0 +1,151 @@
'use strict';
const _ = require('lodash');
const fs = require('fs');
const ejs = require('ejs');
const timestamp = require('unix-timestamp');
const batchflow = require('batchflow');
const internalNginx = require('./nginx');
const logger = require('../logger');
const db = require('../db');
const utils = require('../lib/utils');
const error = require('../lib/error');
timestamp.round = true;
const internalSsl = {
interval_timeout: 60 * 1000,
interval: null,
interval_processing: false,
initTimer: () => {
internalSsl.interval = setInterval(internalSsl.processExpiringHosts, internalSsl.interval_timeout);
},
/**
* Triggered by a timer, this will check for expiring hosts and renew their ssl certs if required
*/
processExpiringHosts: () => {
if (!internalSsl.interval_processing) {
let hosts = db.hosts.find();
if (hosts && hosts.length) {
internalSsl.interval_processing = true;
batchflow(hosts).sequential()
.each((i, host, next) => {
if ((typeof host.is_deleted === 'undefined' || !host.is_deleted) && host.ssl && typeof host.ssl_expires !== 'undefined' && !internalSsl.hasValidSslCerts(host)) {
// This host is due to expire in 1 day, time to renew
logger.info('Host ' + host.hostname + ' is due for SSL renewal');
internalSsl.configureSsl(host)
.then(() => {
return internalNginx.generateConfig(host);
})
.then(internalNginx.reload)
.then(next)
.catch(err => {
logger.error(err);
next(err);
});
} else {
next();
}
})
.error(err => {
logger.error(err);
internalSsl.interval_processing = false;
})
.end((/*results*/) => {
internalSsl.interval_processing = false;
});
}
}
},
/**
* @param {Object} host
* @returns {Boolean}
*/
hasValidSslCerts: host => {
return fs.existsSync('/etc/letsencrypt/live/' + host.hostname + '/fullchain.pem') &&
fs.existsSync('/etc/letsencrypt/live/' + host.hostname + '/privkey.pem') &&
host.ssl_expires > timestamp.now('+1d');
},
/**
* @param {Object} host
* @returns {Promise}
*/
requestSsl: host => {
logger.info('Requesting SSL certificates for ' + host.hostname);
return utils.exec('/usr/bin/letsencrypt certonly --agree-tos --email "' + host.letsencrypt_email + '" -n -a webroot --webroot-path=' + host.root_path + ' -d "' + host.hostname + '"')
.then(result => {
logger.info(result);
return result;
});
},
/**
* @param {Object} host
* @returns {Promise}
*/
deleteCerts: host => {
logger.info('Deleting SSL certificates for ' + host.hostname);
return utils.exec('/usr/bin/letsencrypt delete -n --cert-name "' + host.hostname + '"')
.then(result => {
logger.info(result);
})
.catch(err => {
logger.error(err);
});
},
/**
* @param {Object} host
* @returns {Promise}
*/
generateSslSetupConfig: host => {
let template = null;
let filename = internalNginx.getConfigName(host);
let template_data = host;
template_data.root_path = '/tmp/' + host.hostname;
return utils.exec('mkdir -p ' + template_data.root_path)
.then(() => {
try {
template = fs.readFileSync(__dirname + '/../templates/letsencrypt.conf.ejs', {encoding: 'utf8'});
let config_text = ejs.render(template, template_data);
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
return template_data;
} catch (err) {
throw new error.ConfigurationError(err.message);
}
});
},
/**
* @param {Object} host
* @returns {Promise}
*/
configureSsl: host => {
return internalSsl.generateSslSetupConfig(host)
.then(data => {
return internalNginx.reload()
.then(() => {
return internalSsl.requestSsl(data);
});
})
.then(() => {
// Certificate was requested ok, update the timestamp on the host
db.hosts.update({_id: host._id}, {ssl_expires: timestamp.now('+90d')}, {multi: false, upsert: false});
});
}
};
module.exports = internalSsl;