mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-10-31 15:53:33 +00:00 
			
		
		
		
	Compare commits
	
		
			457 Commits
		
	
	
		
			2145df0dfb
			...
			openidc
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | fdb22e467b | ||
|  | 694d8a0f21 | ||
|  | 63d06da8a8 | ||
|  | b5a0d74654 | ||
|  | 99cce7e2b0 | ||
|  | 120d50e5c0 | ||
|  | 5454fd61b3 | ||
|  | b33012705b | ||
|  | e948b60194 | ||
|  | 7913c9a07d | ||
|  | d1c23b6286 | ||
|  | c7e2946dbf | ||
|  | 8936402229 | ||
|  | 001c77e686 | ||
|  | 5578e825b1 | ||
|  | c93656a7a1 | ||
|  | 50aeae234f | ||
|  | a5c06c1a34 | ||
|  | 51414ced3a | ||
|  | 5e35e538af | ||
|  | 13fec42d1f | ||
|  | b4560d7dde | ||
|  | 6f9eed8a61 | ||
|  | d66e4e03e6 | ||
|  | 1d19c29bb0 | ||
|  | e20a11de4a | ||
|  | d3a654b546 | ||
|  | bed387ebd4 | ||
|  | 6ac9a82279 | ||
|  | ef23e796ec | ||
|  | 3754a569ba | ||
|  | b383f46656 | ||
|  | 3ce477d350 | ||
|  | 516b4d991c | ||
|  | 12d77e3ab6 | ||
|  | 8d80af3a26 | ||
|  | 1f45e6a5e9 | ||
|  | dcb9628c36 | ||
|  | 029b184398 | ||
|  | 2422587530 | ||
|  | 4ee940d3dc | ||
|  | 47dddc548b | ||
|  | 256a667e2c | ||
|  | 79cd0c5294 | ||
|  | 09a03edfd7 | ||
|  | 35f0fe745d | ||
|  | f1e433714e | ||
|  | 035eaed0a4 | ||
|  | 4b100a384d | ||
|  | c5c5fa0a5a | ||
|  | 280bac8b43 | ||
|  | 02aefa50cd | ||
|  | 4d91cfc397 | ||
|  | 79a453f2fe | ||
|  | c62c09569d | ||
|  | 09bcf4010c | ||
|  | 6aeade6c98 | ||
|  | 8655b7d2db | ||
|  | 2d929dffa8 | ||
|  | 52eaa042d8 | ||
|  | b35aa50b88 | ||
|  | c575a706b5 | ||
|  | 587b97c2d3 | ||
|  | 317003beda | ||
|  | 5a761236c5 | ||
|  | b135527347 | ||
|  | abca9cc89c | ||
|  | 6721923601 | ||
|  | a88f77c1a5 | ||
|  | a5b21d0306 | ||
|  | 8eab8d71f2 | ||
|  | d06572bb5f | ||
|  | d40f9e06fc | ||
|  | 69ec017a53 | ||
|  | fa67f257ef | ||
|  | 0dcd648c9d | ||
|  | c989a282e3 | ||
|  | 5aff969c04 | ||
|  | bfbf7519ec | ||
|  | bf36c7966a | ||
|  | 63cd9ba08f | ||
|  | e3d4882c3d | ||
|  | 3e1b73143e | ||
|  | 10ece3548d | ||
|  | 0503a6af75 | ||
|  | 55d765e785 | ||
|  | 1fb9a75a33 | ||
|  | 9c2e838d61 | ||
|  | c55e47aacf | ||
|  | 40d81d6e44 | ||
|  | 1c84eaac02 | ||
|  | 577954ef8c | ||
|  | f0c75641d8 | ||
|  | e42e2acf12 | ||
|  | eaa11fe460 | ||
|  | 5b53825ccb | ||
|  | a94660120f | ||
|  | 39f4836485 | ||
|  | aec30207da | ||
|  | 209c1b3334 | ||
|  | 58138fbac4 | ||
|  | da820db4e1 | ||
|  | 47b868bfc6 | ||
|  | 89a405f60c | ||
|  | 0353051436 | ||
|  | a3630a6286 | ||
|  | 10d9760242 | ||
|  | c722eb1cea | ||
|  | 0472abacd2 | ||
|  | a2e85ceed8 | ||
|  | cddd6fb985 | ||
|  | db23c9a52f | ||
|  | 8646cb5a19 | ||
|  | fe0c04610f | ||
|  | 9f16dae2ff | ||
|  | 00264bcfb2 | ||
|  | 834fb1a361 | ||
|  | 1be87f48c1 | ||
|  | 9c54d1b718 | ||
|  | f7d1c490b3 | ||
|  | fe4bd9fed6 | ||
|  | 58ef9a688e | ||
|  | d19ebf5925 | ||
|  | 96fc6a20bb | ||
|  | e69684919c | ||
|  | be39253a6f | ||
|  | 30772a48bd | ||
|  | 33c867895c | ||
|  | a7fe687bae | ||
|  | 4028120f55 | ||
|  | d1119ec63f | ||
|  | 4c906283df | ||
|  | 8ec0c76f51 | ||
|  | c70f65d349 | ||
|  | 883a272b0a | ||
|  | 6aee2bbcba | ||
|  | 025fc9776b | ||
|  | b699f05f47 | ||
|  | f7c87f63bd | ||
|  | e4ef095254 | ||
|  | 09d5e2c94f | ||
|  | 459b7a2223 | ||
|  | 9c813bcce3 | ||
|  | b8596ac01c | ||
|  | 082c4e1008 | ||
|  | 2273eae6ee | ||
|  | 997e9d431b | ||
|  | b3564b6d4b | ||
|  | 4e27cdabc4 | ||
|  | 965873adc5 | ||
|  | 5de95a8c90 | ||
|  | fa557d8159 | ||
|  | bc8211a6a9 | ||
|  | 1c498f84ad | ||
|  | ea6e9757e3 | ||
|  | 1308ae42c2 | ||
|  | 7be548575b | ||
|  | c6aab8d4e6 | ||
|  | da55e93183 | ||
|  | af475ab5d4 | ||
|  | 7d85463dae | ||
|  | 13d4f98fdb | ||
|  | 388fff84f2 | ||
|  | 49a765516c | ||
|  | 27bc8c4e33 | ||
|  | 881a067aff | ||
|  | 1975e4a151 | ||
|  | 4704bd6a38 | ||
|  | ca56e0483f | ||
|  | 3b8cb86d72 | ||
|  | 5165de4a91 | ||
|  | 1ab3575c68 | ||
|  | ccf9cce825 | ||
|  | 3ad2188f78 | ||
|  | 33dbffb974 | ||
|  | 289e438c59 | ||
|  | e08a4d4490 | ||
|  | d1d1819677 | ||
|  | 4e0768d56c | ||
|  | 3666364418 | ||
|  | 9052502a17 | ||
|  | b608d3392d | ||
|  | edb81ecce0 | ||
|  | e24181936f | ||
|  | 940d06cac9 | ||
|  | 134902d127 | ||
|  | 2df4620d05 | ||
|  | f41b1069ae | ||
|  | 004a93fbc3 | ||
|  | 2d9f04edcd | ||
|  | 53dbe258a5 | ||
|  | e4ba22f0f8 | ||
|  | 3197de41de | ||
|  | 0f7be7987b | ||
|  | 853c48dff6 | ||
|  | 410c3484ab | ||
|  | 44e9f377f9 | ||
|  | 0f3b76f607 | ||
|  | f426e64569 | ||
|  | 4867db078c | ||
|  | 6b565e628f | ||
|  | 881d70502b | ||
|  | 62e4edddf0 | ||
|  | 4b9c02cc0c | ||
|  | 5af834e40b | ||
|  | 6f8db95249 | ||
|  | fe93cb3474 | ||
|  | fa851b61da | ||
|  | 3333a32612 | ||
|  | 9a79fce498 | ||
|  | b1180f5077 | ||
|  | 5454352fe5 | ||
|  | aee93a2f6f | ||
|  | f38cb5b500 | ||
|  | f1b7156c89 | ||
|  | 98465cf1b0 | ||
|  | 137e865b66 | ||
|  | e740fb4064 | ||
|  | f91f0ee8db | ||
|  | 1c9f751512 | ||
|  | a602bdd514 | ||
|  | f7b2be68cc | ||
|  | ab4586fc6b | ||
|  | a984a68065 | ||
|  | 52875fca6e | ||
|  | 63b50fcd95 | ||
|  | 5ab4aea03f | ||
|  | d73135378e | ||
|  | e19d685cb6 | ||
|  | c8caaa56d9 | ||
|  | 11a98f4c12 | ||
|  | 4a85d4ac4e | ||
|  | 3138ba46ce | ||
|  | cdd0b2e6d3 | ||
|  | f458730d87 | ||
|  | d20873dcbb | ||
|  | d1e9407e4d | ||
|  | 63ee69f432 | ||
|  | f39e527680 | ||
|  | 2dd4434ceb | ||
|  | 81054631f9 | ||
|  | 53d61bd626 | ||
|  | 847e879b3f | ||
|  | 4c59400731 | ||
|  | 824c837a38 | ||
|  | 2a06384a4a | ||
|  | 05307aa253 | ||
|  | 3d2406ac3d | ||
|  | 0127dc7f03 | ||
|  | 4349d42636 | ||
|  | 4b6f9d9419 | ||
|  | c3f019c911 | ||
|  | ecf0290203 | ||
|  | 4f41fe0c95 | ||
|  | c3735fdbbb | ||
|  | c432c34fb3 | ||
|  | a1245bc161 | ||
|  | db4ab1d548 | ||
|  | 86ddd9c83c | ||
|  | 67208e43cc | ||
|  | ddf80302c6 | ||
|  | 5f2576946d | ||
|  | 9fe07fa6c3 | ||
|  | d9b9af543e | ||
|  | eb2e2e0478 | ||
|  | 9225d5d442 | ||
|  | 308a7149ed | ||
|  | 8a4a7d0caf | ||
|  | 5d03ede100 | ||
|  | 4a86bb42cc | ||
|  | dad8561ea1 | ||
|  | 56a92e5c0e | ||
|  | 9d672f5813 | ||
|  | d5ed70dbb6 | ||
|  | c197e66d62 | ||
|  | 91cf3c8873 | ||
|  | 7f5e0414ac | ||
|  | d179887c15 | ||
|  | 35abb4d7ae | ||
|  | 61b290e220 | ||
|  | e1bcef6e5c | ||
|  | 81f51f9e2d | ||
|  | 661953db25 | ||
|  | 065c2dac42 | ||
|  | 2926844cbe | ||
|  | c1960f3793 | ||
|  | 11a29a8b67 | ||
|  | c40e48e678 | ||
|  | 124cb18e17 | ||
|  | 5ac9dc0758 | ||
|  | 9a799d51ce | ||
|  | 77eb618758 | ||
|  | 79fedfcea4 | ||
|  | 8fdb8ac853 | ||
|  | 4fdc80be01 | ||
|  | f8e6c8d018 | ||
|  | c3469de61b | ||
|  | ea61b15a40 | ||
|  | 60175e6d8c | ||
|  | 2a07445005 | ||
|  | dad3e1da7c | ||
|  | 82d9452001 | ||
|  | 095bc8f676 | ||
|  | 8c15340b83 | ||
|  | a13f7c3792 | ||
|  | 6748985669 | ||
|  | e2957f070b | ||
|  | fccbde1371 | ||
|  | fec36834f7 | ||
|  | 00aeef75b6 | ||
|  | 5b7682f13c | ||
|  | b30fcb50c8 | ||
|  | 100c56ad10 | ||
|  | 44bebf366a | ||
|  | 6a28701242 | ||
|  | 09d1d3744c | ||
|  | 84e0b30f8d | ||
|  | 546ce8d4bc | ||
|  | 9b40bb288d | ||
|  | c812b674b6 | ||
|  | 86e63197f6 | ||
|  | c371b2e953 | ||
|  | 2142e25029 | ||
|  | 30076a0e66 | ||
|  | 42bd39163a | ||
|  | cc4891d9ec | ||
|  | 40c26839f5 | ||
|  | 2ff66ee238 | ||
|  | 9d60b4a756 | ||
|  | d2becc0681 | ||
|  | 579c32a724 | ||
|  | b08ef17894 | ||
|  | 589ab8757e | ||
|  | abdaac8584 | ||
|  | d5c950a231 | ||
|  | d9a1701927 | ||
|  | 6e500c35dc | ||
|  | a06e96061f | ||
|  | f0513d34f9 | ||
|  | 09349efbbe | ||
|  | 06453e9668 | ||
|  | b1e904df84 | ||
|  | 5f435b6325 | ||
|  | 7b48488c29 | ||
|  | 3f6ad0d807 | ||
|  | edba369ae8 | ||
|  | b77d916bdd | ||
|  | 2706454635 | ||
|  | 32a3bb1d6d | ||
|  | 95665ca378 | ||
|  | 09d6cf7c48 | ||
|  | 2addc48a9b | ||
|  | ebf07a7912 | ||
|  | abe6493244 | ||
|  | 9f192ab275 | ||
|  | 52e013d289 | ||
|  | 331da3841e | ||
|  | e227f4177b | ||
|  | 88fa7cdfff | ||
|  | f3b3072711 | ||
|  | cf6cc7dcc5 | ||
|  | 448c8a2dd5 | ||
|  | 634cfe13f1 | ||
|  | 7597515c20 | ||
|  | 93f57aece5 | ||
|  | ef6da1bbe1 | ||
|  | 4ad9e68886 | ||
|  | 9b35e7c188 | ||
|  | 2aa6e55d6b | ||
|  | 1ac28410ff | ||
|  | b0fd976b97 | ||
|  | 7fe7e94fbd | ||
|  | 8864960eb4 | ||
|  | 23326895b2 | ||
|  | d2f707b76d | ||
|  | a7f0c3b730 | ||
|  | a9e84f1750 | ||
|  | 7ca3a9e7a6 | ||
|  | c80d099193 | ||
|  | 35aba13122 | ||
|  | b69e493c54 | ||
|  | 99d73a2da8 | ||
|  | 3c23aa935e | ||
|  | 8dee139810 | ||
|  | 6349cb6094 | ||
|  | 452838b04a | ||
|  | fd30cfe98b | ||
|  | 6f281fef42 | ||
|  | 5920b0cf5e | ||
|  | 41bbfcf165 | ||
|  | 80a93e17fa | ||
|  | 4a1eebc54b | ||
|  | 264ba71462 | ||
|  | e229fa89f8 | ||
|  | d3b72ae07d | ||
|  | b62b6b5112 | ||
|  | c44f8c6155 | ||
|  | 0dfa3d9ca3 | ||
|  | 8c7c84906b | ||
|  | 662143cf21 | ||
|  | c60fc7926e | ||
|  | cfbdc6c340 | ||
|  | 2f6d8257ec | ||
|  | b9a6b5d4f5 | ||
|  | 32f77dbcee | ||
|  | 052cb8f12d | ||
|  | 03b544023b | ||
|  | 5070499cfd | ||
|  | e77b13d36e | ||
|  | 4bb237d7c2 | ||
|  | aa5a7faa94 | ||
|  | 837f4dcbd4 | ||
|  | d73a246b66 | ||
|  | f85e82973d | ||
|  | 84afec567c | ||
|  | e1525e5d56 | ||
|  | d2688cf08c | ||
|  | 7372319568 | ||
|  | 60ffec5c64 | ||
|  | 23c88f6955 | ||
|  | dd14207b63 | ||
|  | 103adfbb57 | ||
|  | b673ebe2ca | ||
|  | 0e0c3df0cd | ||
|  | 8dbd482e08 | ||
|  | ab5f7c0f26 | ||
|  | 191f493eb9 | ||
|  | d1f4640a9c | ||
|  | 3d97f4578d | ||
|  | fb0ef08fd8 | ||
|  | 0de78205b5 | ||
|  | e0821bd927 | ||
|  | e5966b54a8 | ||
|  | d2f6b09901 | ||
|  | 5c8aa8517b | ||
|  | 1e5916db28 | ||
|  | a3ae6956e2 | ||
|  | 518b84b38b | ||
|  | 932dc4bf02 | ||
|  | bdc3a555b6 | ||
|  | d4dcb61ee6 | ||
|  | cce73beb2d | ||
|  | 063ac4619f | ||
|  | edf369a3d4 | ||
|  | 4251157ffa | ||
|  | 9866eec21c | ||
|  | a91dcb144d | ||
|  | e7f7be2a2b | ||
|  | 076d89b5b5 | ||
|  | 8539930f89 | ||
|  | 87d9babbd3 | ||
|  | 9f2d3a1737 | ||
|  | daf399163c | ||
|  | cdf702e545 | ||
|  | 5811345050 | ||
|  | 53792a5cf7 | ||
|  | 8e10b7da37 | 
							
								
								
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,21 @@ | |||||||
|  | name: 'Close stale issues and PRs' | ||||||
|  | on: | ||||||
|  |   schedule: | ||||||
|  |     - cron: '30 1 * * *' | ||||||
|  |   workflow_dispatch: | ||||||
|  |  | ||||||
|  | jobs: | ||||||
|  |   stale: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |       - uses: actions/stale@v9 | ||||||
|  |         with: | ||||||
|  |           stale-issue-label: 'stale' | ||||||
|  |           stale-pr-label: 'stale' | ||||||
|  |           stale-issue-message: 'Issue is now considered stale. If you want to keep it open, please comment :+1:' | ||||||
|  |           stale-pr-message: 'PR is now considered stale. If you want to keep it open, please comment :+1:' | ||||||
|  |           close-issue-message: 'Issue was closed due to inactivity.' | ||||||
|  |           close-pr-message: 'PR was closed due to inactivity.' | ||||||
|  |           days-before-stale: 182 | ||||||
|  |           days-before-close: 365 | ||||||
|  |           operations-per-run: 50 | ||||||
							
								
								
									
										4
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -3,3 +3,7 @@ | |||||||
| ._* | ._* | ||||||
| .vscode | .vscode | ||||||
| certbot-help.txt | certbot-help.txt | ||||||
|  | test/node_modules | ||||||
|  | */node_modules | ||||||
|  | docker/dev/dnsrouter-config.json.tmp | ||||||
|  | docker/dev/resolv.conf | ||||||
|   | |||||||
							
								
								
									
										216
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										216
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							| @@ -1,3 +1,9 @@ | |||||||
|  | import groovy.transform.Field | ||||||
|  |  | ||||||
|  | @Field | ||||||
|  | def shOutput = "" | ||||||
|  | def buildxPushTags = "" | ||||||
|  |  | ||||||
| pipeline { | pipeline { | ||||||
| 	agent { | 	agent { | ||||||
| 		label 'docker-multiarch' | 		label 'docker-multiarch' | ||||||
| @@ -8,14 +14,12 @@ pipeline { | |||||||
| 		ansiColor('xterm') | 		ansiColor('xterm') | ||||||
| 	} | 	} | ||||||
| 	environment { | 	environment { | ||||||
| 		IMAGE                      = "nginx-proxy-manager" | 		IMAGE                      = 'nginx-proxy-manager' | ||||||
| 		BUILD_VERSION              = getVersion() | 		BUILD_VERSION              = getVersion() | ||||||
| 		MAJOR_VERSION              = "2" | 		MAJOR_VERSION              = '2' | ||||||
| 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('/', '-')}" | 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('\\\\', '-').replaceAll('/', '-').replaceAll('\\.', '-')}" | ||||||
| 		COMPOSE_PROJECT_NAME       = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | 		BUILDX_NAME                = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | ||||||
| 		COMPOSE_FILE               = 'docker/docker-compose.ci.yml' |  | ||||||
| 		COMPOSE_INTERACTIVE_NO_CLI = 1 | 		COMPOSE_INTERACTIVE_NO_CLI = 1 | ||||||
| 		BUILDX_NAME                = "${COMPOSE_PROJECT_NAME}" |  | ||||||
| 	} | 	} | ||||||
| 	stages { | 	stages { | ||||||
| 		stage('Environment') { | 		stage('Environment') { | ||||||
| @@ -26,7 +30,7 @@ pipeline { | |||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 						script { | 						script { | ||||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | 							buildxPushTags = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| @@ -39,7 +43,7 @@ pipeline { | |||||||
| 					steps { | 					steps { | ||||||
| 						script { | 						script { | ||||||
| 							// Defaults to the Branch name, which is applies to all branches AND pr's | 							// Defaults to the Branch name, which is applies to all branches AND pr's | ||||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}" | 							buildxPushTags = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}" | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| @@ -54,106 +58,96 @@ pipeline { | |||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 		stage('Frontend') { | 		stage('Builds') { | ||||||
|  | 			parallel { | ||||||
|  | 				stage('Project') { | ||||||
| 					steps { | 					steps { | ||||||
| 				sh './scripts/frontend-build' | 						script { | ||||||
|  | 							// Frontend and Backend | ||||||
|  | 							def shStatusCode = sh(label: 'Checking and Building', returnStatus: true, script: ''' | ||||||
|  | 								set -e | ||||||
|  | 								./scripts/ci/frontend-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||||
|  | 								./scripts/ci/test-and-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||||
|  | 							''') | ||||||
|  | 							shOutput = readFile "${env.WORKSPACE}/tmp-sh-build" | ||||||
|  | 							if (shStatusCode != 0) { | ||||||
|  | 								error "${shOutput}" | ||||||
| 							} | 							} | ||||||
| 						} | 						} | ||||||
| 		stage('Backend') { |  | ||||||
| 			steps { |  | ||||||
| 				echo 'Checking Syntax ...' |  | ||||||
| 				sh 'docker pull nginxproxymanager/nginx-full:certbot-node' |  | ||||||
| 				// See: https://github.com/yarnpkg/yarn/issues/3254 |  | ||||||
| 				sh '''docker run --rm \\ |  | ||||||
| 					-v "$(pwd)/backend:/app" \\ |  | ||||||
| 					-v "$(pwd)/global:/app/global" \\ |  | ||||||
| 					-w /app \\ |  | ||||||
| 					nginxproxymanager/nginx-full:certbot-node \\ |  | ||||||
| 					sh -c "yarn install && yarn eslint . && rm -rf node_modules" |  | ||||||
| 				''' |  | ||||||
|  |  | ||||||
| 				echo 'Docker Build ...' |  | ||||||
| 				sh '''docker build --pull --no-cache --squash --compress \\ |  | ||||||
| 					-t "${IMAGE}:ci-${BUILD_NUMBER}" \\ |  | ||||||
| 					-f docker/Dockerfile \\ |  | ||||||
| 					--build-arg TARGETPLATFORM=linux/amd64 \\ |  | ||||||
| 					--build-arg BUILDPLATFORM=linux/amd64 \\ |  | ||||||
| 					--build-arg BUILD_VERSION="${BUILD_VERSION}" \\ |  | ||||||
| 					--build-arg BUILD_COMMIT="${BUILD_COMMIT}" \\ |  | ||||||
| 					--build-arg BUILD_DATE="$(date '+%Y-%m-%d %T %Z')" \\ |  | ||||||
| 					. |  | ||||||
| 				''' |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
| 		stage('Integration Tests Sqlite') { |  | ||||||
| 			steps { |  | ||||||
| 				// Bring up a stack |  | ||||||
| 				sh 'docker-compose up -d fullstack-sqlite' |  | ||||||
| 				sh './scripts/wait-healthy $(docker-compose ps -q fullstack-sqlite) 120' |  | ||||||
|  |  | ||||||
| 				// Run tests |  | ||||||
| 				sh 'rm -rf test/results' |  | ||||||
| 				sh 'docker-compose up cypress-sqlite' |  | ||||||
| 				// Get results |  | ||||||
| 				sh 'docker cp -L "$(docker-compose ps -q cypress-sqlite):/test/results" test/' |  | ||||||
| 					} | 					} | ||||||
| 					post { | 					post { | ||||||
| 						always { | 						always { | ||||||
| 					// Dumps to analyze later | 							sh 'rm -f ${WORKSPACE}/tmp-sh-build' | ||||||
| 					sh 'mkdir -p debug' |  | ||||||
| 					sh 'docker-compose logs fullstack-sqlite | gzip > debug/docker_fullstack_sqlite.log.gz' |  | ||||||
| 					sh 'docker-compose logs db | gzip > debug/docker_db.log.gz' |  | ||||||
| 					// Cypress videos and screenshot artifacts |  | ||||||
| 					dir(path: 'test/results') { |  | ||||||
| 						archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml' |  | ||||||
| 						} | 						} | ||||||
| 					junit 'test/results/junit/*' | 						failure { | ||||||
| 				} | 							npmGithubPrComment("CI Error:\n\n```\n${shOutput}\n```", true) | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
| 		stage('Integration Tests Mysql') { |  | ||||||
| 			steps { |  | ||||||
| 				// Bring up a stack |  | ||||||
| 				sh 'docker-compose up -d fullstack-mysql' |  | ||||||
| 				sh './scripts/wait-healthy $(docker-compose ps -q fullstack-mysql) 120' |  | ||||||
|  |  | ||||||
| 				// Run tests |  | ||||||
| 				sh 'rm -rf test/results' |  | ||||||
| 				sh 'docker-compose up cypress-mysql' |  | ||||||
| 				// Get results |  | ||||||
| 				sh 'docker cp -L "$(docker-compose ps -q cypress-mysql):/test/results" test/' |  | ||||||
| 			} |  | ||||||
| 			post { |  | ||||||
| 				always { |  | ||||||
| 					// Dumps to analyze later |  | ||||||
| 					sh 'mkdir -p debug' |  | ||||||
| 					sh 'docker-compose logs fullstack-mysql | gzip > debug/docker_fullstack_mysql.log.gz' |  | ||||||
| 					sh 'docker-compose logs db | gzip > debug/docker_db.log.gz' |  | ||||||
| 					// Cypress videos and screenshot artifacts |  | ||||||
| 					dir(path: 'test/results') { |  | ||||||
| 						archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml' |  | ||||||
| 					} |  | ||||||
| 					junit 'test/results/junit/*' |  | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 				stage('Docs') { | 				stage('Docs') { | ||||||
|  | 					steps { | ||||||
|  | 						dir(path: 'docs') { | ||||||
|  | 							sh 'yarn install' | ||||||
|  | 							sh 'yarn build' | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 		stage('Test Sqlite') { | ||||||
|  | 			environment { | ||||||
|  | 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_sqlite" | ||||||
|  | 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.sqlite.yml' | ||||||
|  | 			} | ||||||
| 			when { | 			when { | ||||||
| 				not { | 				not { | ||||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 			steps { | 			steps { | ||||||
| 				dir(path: 'docs') { | 				sh 'rm -rf ./test/results/junit/*' | ||||||
| 					sh 'yarn install' | 				sh './scripts/ci/fulltest-cypress' | ||||||
| 					sh 'yarn build' |  | ||||||
| 			} | 			} | ||||||
|  | 			post { | ||||||
| 				dir(path: 'docs/.vuepress/dist') { | 				always { | ||||||
| 					sh 'tar -czf ../../docs.tgz *' | 					// Dumps to analyze later | ||||||
|  | 					sh 'mkdir -p debug/sqlite' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1' | ||||||
|  | 					junit 'test/results/junit/*' | ||||||
|  | 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 		stage('Test Mysql') { | ||||||
|  | 			environment { | ||||||
|  | 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_mysql" | ||||||
|  | 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.mysql.yml' | ||||||
|  | 			} | ||||||
|  | 			when { | ||||||
|  | 				not { | ||||||
|  | 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 			steps { | ||||||
|  | 				sh 'rm -rf ./test/results/junit/*' | ||||||
|  | 				sh './scripts/ci/fulltest-cypress' | ||||||
|  | 			} | ||||||
|  | 			post { | ||||||
|  | 				always { | ||||||
|  | 					// Dumps to analyze later | ||||||
|  | 					sh 'mkdir -p debug/mysql' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1' | ||||||
|  | 					junit 'test/results/junit/*' | ||||||
|  | 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				archiveArtifacts(artifacts: 'docs/docs.tgz', allowEmptyArchive: false) |  | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 		stage('MultiArch Build') { | 		stage('MultiArch Build') { | ||||||
| @@ -164,43 +158,24 @@ pipeline { | |||||||
| 			} | 			} | ||||||
| 			steps { | 			steps { | ||||||
| 				withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { | 				withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { | ||||||
| 					// Docker Login | 					sh 'docker login -u "${duser}" -p "${dpass}"' | ||||||
| 					sh "docker login -u '${duser}' -p '${dpass}'" | 					sh "./scripts/buildx --push ${buildxPushTags}" | ||||||
| 					// Buildx with push from cache |  | ||||||
| 					sh "./scripts/buildx --push ${BUILDX_PUSH_TAGS}" |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 		stage('Docs Deploy') { | 		stage('Docs / Comment') { | ||||||
|  | 			parallel { | ||||||
|  | 				stage('Docs Job') { | ||||||
| 					when { | 					when { | ||||||
| 						allOf { | 						allOf { | ||||||
| 					branch 'master' | 							branch pattern: "^(develop|master)\$", comparator: "REGEXP" | ||||||
| 							not { | 							not { | ||||||
| 								equals expected: 'UNSTABLE', actual: currentBuild.result | 								equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
| 							} | 							} | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 				withCredentials([[$class: 'AmazonWebServicesCredentialsBinding', accessKeyVariable: 'AWS_ACCESS_KEY_ID', credentialsId: 'npm-s3-docs', secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']]) { | 						build wait: false, job: 'nginx-proxy-manager-docs', parameters: [string(name: 'docs_branch', value: "$BRANCH_NAME")] | ||||||
| 					sh """docker run --rm \\ |  | ||||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-upload \\ |  | ||||||
| 						-e S3_BUCKET=jc21-npm-site \\ |  | ||||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ |  | ||||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ |  | ||||||
| 						-v \$(pwd):/app \\ |  | ||||||
| 						-w /app \\ |  | ||||||
| 						jc21/ci-tools \\ |  | ||||||
| 						scripts/docs-upload /app/docs/.vuepress/dist/ |  | ||||||
| 					""" |  | ||||||
|  |  | ||||||
| 					sh """docker run --rm \\ |  | ||||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-invalidate \\ |  | ||||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ |  | ||||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ |  | ||||||
| 						jc21/ci-tools \\ |  | ||||||
| 						aws cloudfront create-invalidation --distribution-id EN1G6DEWZUTDT --paths '/*' |  | ||||||
| 					""" |  | ||||||
| 				} |  | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 				stage('PR Comment') { | 				stage('PR Comment') { | ||||||
| @@ -214,28 +189,29 @@ pipeline { | |||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 						script { | 						script { | ||||||
| 					def comment = pullRequest.comment("This is an automated message from CI:\n\nDocker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`\n\n**Note:** ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes.") | 							npmGithubPrComment("Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`\n\n**Note:** ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes.", true) | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	post { | 	post { | ||||||
| 		always { | 		always { | ||||||
| 			sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30' |  | ||||||
| 			sh 'echo Reverting ownership' | 			sh 'echo Reverting ownership' | ||||||
| 			sh 'docker run --rm -v $(pwd):/data jc21/ci-tools chown -R $(id -u):$(id -g) /data' | 			sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data' | ||||||
| 		} | 		} | ||||||
| 		success { | 		success { | ||||||
| 			juxtapose event: 'success' | 			juxtapose event: 'success' | ||||||
| 			sh 'figlet "SUCCESS"' | 			sh 'figlet "SUCCESS"' | ||||||
| 		} | 		} | ||||||
| 		failure { | 		failure { | ||||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||||
| 			juxtapose event: 'failure' | 			juxtapose event: 'failure' | ||||||
| 			sh 'figlet "FAILURE"' | 			sh 'figlet "FAILURE"' | ||||||
| 		} | 		} | ||||||
| 		unstable { | 		unstable { | ||||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||||
| 			juxtapose event: 'unstable' | 			juxtapose event: 'unstable' | ||||||
| 			sh 'figlet "UNSTABLE"' | 			sh 'figlet "UNSTABLE"' | ||||||
| 		} | 		} | ||||||
|   | |||||||
							
								
								
									
										468
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										468
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,19 +1,13 @@ | |||||||
| <p align="center"> | <p align="center"> | ||||||
| 	<img src="https://nginxproxymanager.com/github.png"> | 	<img src="https://nginxproxymanager.com/github.png"> | ||||||
| 	<br><br> | 	<br><br> | ||||||
| 	<img src="https://img.shields.io/badge/version-2.9.18-green.svg?style=for-the-badge"> | 	<img src="https://img.shields.io/badge/version-2.11.3-green.svg?style=for-the-badge"> | ||||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||||
| 		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | 		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||||
| 	</a> | 	</a> | ||||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||||
| 		<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | 		<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||||
| 	</a> | 	</a> | ||||||
| 	<a href="https://gitter.im/nginx-proxy-manager/community"> |  | ||||||
| 		<img alt="Gitter" src="https://img.shields.io/gitter/room/nginx-proxy-manager/community?style=for-the-badge"> |  | ||||||
| 	</a> |  | ||||||
| 	<a href="https://reddit.com/r/nginxproxymanager"> |  | ||||||
| 		<img alt="Reddit" src="https://img.shields.io/reddit/subreddit-subscribers/nginxproxymanager?label=Reddit%20Community&style=for-the-badge"> |  | ||||||
| 	</a> |  | ||||||
| </p> | </p> | ||||||
|  |  | ||||||
| This project comes as a pre-built docker image that enables you to easily forward to your websites | This project comes as a pre-built docker image that enables you to easily forward to your websites | ||||||
| @@ -25,7 +19,7 @@ running at home or otherwise, including free SSL, without having to know too muc | |||||||
|  |  | ||||||
| ## Project Goal | ## Project Goal | ||||||
|  |  | ||||||
| I created this project to fill a personal need to provide users with a easy way to accomplish reverse | I created this project to fill a personal need to provide users with an easy way to accomplish reverse | ||||||
| proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed. | proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed. | ||||||
| While there might be advanced options they are optional and the project should be as simple as possible | While there might be advanced options they are optional and the project should be as simple as possible | ||||||
| so that the barrier for entry here is low. | so that the barrier for entry here is low. | ||||||
| @@ -62,10 +56,9 @@ I won't go in to too much detail here but here are the basics for someone new to | |||||||
| 2. Create a docker-compose.yml file similar to this: | 2. Create a docker-compose.yml file similar to this: | ||||||
|  |  | ||||||
| ```yml | ```yml | ||||||
| version: '3' |  | ||||||
| services: | services: | ||||||
|   app: |   app: | ||||||
|     image: 'jc21/nginx-proxy-manager:latest' |     image: 'docker.io/jc21/nginx-proxy-manager:latest' | ||||||
|     restart: unless-stopped |     restart: unless-stopped | ||||||
|     ports: |     ports: | ||||||
|       - '80:80' |       - '80:80' | ||||||
| @@ -76,10 +69,16 @@ services: | |||||||
|       - ./letsencrypt:/etc/letsencrypt |       - ./letsencrypt:/etc/letsencrypt | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
|  | This is the bare minimum configuration required. See the [documentation](https://nginxproxymanager.com/setup/) for more. | ||||||
|  |  | ||||||
| 3. Bring up your stack by running | 3. Bring up your stack by running | ||||||
|  |  | ||||||
| ```bash | ```bash | ||||||
| docker-compose up -d | docker-compose up -d | ||||||
|  |  | ||||||
|  | # If using docker-compose-plugin | ||||||
|  | docker compose up -d | ||||||
|  |  | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| 4. Log in to the Admin UI | 4. Log in to the Admin UI | ||||||
| @@ -98,435 +97,24 @@ Password: changeme | |||||||
| Immediately after logging in with this default user you will be asked to modify your details and change your password. | Immediately after logging in with this default user you will be asked to modify your details and change your password. | ||||||
|  |  | ||||||
|  |  | ||||||
| ## Contributors | ## Contributing | ||||||
|  |  | ||||||
| Special thanks to the following contributors: | All are welcome to create pull requests for this project, against the `develop` branch. Official releases are created from the `master` branch. | ||||||
|  |  | ||||||
| <!-- prettier-ignore-start --> | CI is used in this project. All PR's must pass before being considered. After passing, | ||||||
| <!-- markdownlint-disable --> | docker builds for PR's are available on dockerhub for manual verifications. | ||||||
| <table> |  | ||||||
| 	<tr> | Documentation within the `develop` branch is available for preview at | ||||||
| 		<td align="center"> | [https://develop.nginxproxymanager.com](https://develop.nginxproxymanager.com) | ||||||
| 			<a href="https://github.com/chaptergy"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/26956711?s=460&u=7d9adebabb6b4e7af7cb05d98d751087a372304b&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>chaptergy</b></sub> | ### Contributors | ||||||
| 			</a> |  | ||||||
| 		</td> | Special thanks to [all of our contributors](https://github.com/NginxProxyManager/nginx-proxy-manager/graphs/contributors). | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Indemnity83"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/35218?s=460&u=7082004ff35138157c868d7d9c683ccebfce5968&v=4" width="80" alt=""/> | ## Getting Support | ||||||
| 				<br /><sub><b>Kyle Klaus</b></sub> |  | ||||||
| 			</a> | 1. [Found a bug?](https://github.com/NginxProxyManager/nginx-proxy-manager/issues) | ||||||
| 		</td> | 2. [Discussions](https://github.com/NginxProxyManager/nginx-proxy-manager/discussions) | ||||||
| 		<td align="center"> | 3. [Reddit](https://reddit.com/r/nginxproxymanager) | ||||||
| 			<a href="https://github.com/theraw"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/32969774?s=460&u=6b359971e15685fb0359e6a8c065a399b40dc228&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>ƬHE ЯAW</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/spalger"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/1329312?s=400&u=565223e38f1c052afb4c5dcca3fcf1c63ba17ae7&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Spencer</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Xantios"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/1507836?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Xantios Krugor</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/dpanesso"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/2687121?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>David Panesso</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/IronTooch"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/27360514?s=460&u=69bf854a6647c55725f62ecb8d39249c6c0b2602&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>IronTooch</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/damianog"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/2786682?s=460&u=76c6136fae797abb76b951cd8a246dcaecaf21af&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Damiano</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/tfmm"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/6880538?s=460&u=ce0160821cc4aa802df8395200f2d4956a5bc541&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Russ</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/margaale"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/20794934?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Marcelo Castagna</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Steven-Harris"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/7720242?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Steven Harris</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/jlesage"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/1791123?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Jocelyn Le Sage</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/cmer"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/412?s=460&u=67dd8b2e3661bfd6f68ec1eaa5b9821bd8a321cd&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Carl Mercier</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/the1ts"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/84956?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Paul Mansfield</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/OhHeyAlan"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/11955126?s=460&u=fbaa5a1a4f73ef8960132c703349bfd037fe2630&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>OhHeyAlan</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/dogmatic69"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/94674?s=460&u=ca7647de53145c6283b6373ade5dc94ba99347db&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Carl Sutton</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/tg44"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/31839?s=460&u=ad32f4cadfef5e5fb09cdfa4b7b7b36a99ba6811&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Gergő Törcsvári</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/vrenjith"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/2093241?s=460&u=96ce93a9bebabdd0a60a2dc96cd093a41d5edaba&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>vrenjith</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/duhruh"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/1133969?s=460&u=c0691e6131ec6d516416c1c6fcedb5034f877bbe&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>David Rivera</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/jipjan"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/1384618?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Jaap-Jan de Wit</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/jmwebslave"> |  | ||||||
| 				<img src="https://avatars2.githubusercontent.com/u/6118262?s=460&u=7db409c47135b1e141c366bbb03ed9fae6ac2638&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>James Morgan</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Subv"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/357072?s=460&u=d8adcdc91d749ae53e177973ed9b6bb6c4c894a3&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Sebastian Valle</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Philip-Mooney"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/48624631?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Philip Mooney</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/WaterCalm"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/23502129?s=400&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>WaterCalm</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/lebrou34"> |  | ||||||
| 				<img src="https://avatars1.githubusercontent.com/u/16373103?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>lebrou34</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/lightglitch"> |  | ||||||
| 				<img src="https://avatars0.githubusercontent.com/u/196953?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Mário Franco</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/klutchell"> |  | ||||||
| 				<img src="https://avatars3.githubusercontent.com/u/20458272?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Kyle Harding</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ahgraber"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/24922003?s=460&u=8376c9f00af9b6057ba4d2fb03b4f1b20a75277f&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Alex Graber</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/MooBaloo"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/9493496?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>MooBaloo</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Shuro"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/944030?s=460&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Shuro</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/lorisbergeron"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/51918567?s=460&u=778e4ff284b7d7304450f98421c99f79298371fb&v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Loris Bergeron</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/hepelayo"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/8243119?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>hepelayo</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/jonasled"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/46790650?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Jonas Leder</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/stegmannb"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/12850482?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Bastian Stegmann</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Stealthii"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/998920?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Stealthii</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/thegamingninja"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/8020534?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>THEGamingninja</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/italobb"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/1801687?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Italo Borssatto</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/GurjinderSingh"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/3470709?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Gurjinder Singh</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/phantomski77"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/69464125?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>David Dosoudil</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ijaron"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/5156472?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>ijaron</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/nielscil"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/9073152?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Niels Bouma</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ogarai"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/2949572?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Orko Garai</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/baruffaldi"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/36949?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Filippo Baruffaldi</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/bikram990"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/6782131?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Bikramjeet Singh</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/razvanstoica89"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/28236583?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Razvan Stoica</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/psharma04"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/22587474?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>RBXII3</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/demize"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/264914?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>demize</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/PUP-Loki"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/75944209?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>PUP-Loki</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/DSorlov"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/8133650?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Daniel Sörlöv</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Theyooo"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/58510131?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Theyooo</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/mrdink"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/514751?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Justin Peacock</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ChrisTracy"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/58871574?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Chris Tracy</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/Fuechslein"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/15112818?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Fuechslein</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/nightah"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/3339418?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Amir Zarrinkafsh</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/gabbe"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/156397?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>gabbe</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/bmbvenom"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/20530371?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>bmbvenom</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/FMeinicke"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/42121639?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Florian Meinicke</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ssrahul96"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/15570570?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Rahul Somasundaram</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/BjoernAkAManf"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/833043?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Björn Heinrichs</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/realJoshByrnes"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/204185?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Josh Byrnes</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/bergi9"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/5556750?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>bergi9</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/luoweihua7"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/3157520?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>luoweihua7</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/TobiasKneidl"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/26301707?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Tobias Kneidl</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| 	<tr> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/piuswalter"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/64539242?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Pius Walter</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/troykelly"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/4564803?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Troy Kelly</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/ivankristianto"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/656006?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Ivan Kristianto</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 		<td align="center"> |  | ||||||
| 			<a href="https://github.com/omercnet"> |  | ||||||
| 				<img src="https://avatars.githubusercontent.com/u/639682?v=4" width="80" alt=""/> |  | ||||||
| 				<br /><sub><b>Omer Cohen</b></sub> |  | ||||||
| 			</a> |  | ||||||
| 		</td> |  | ||||||
| 	</tr> |  | ||||||
| </table> |  | ||||||
| <!-- markdownlint-enable --> |  | ||||||
| <!-- prettier-ignore-end --> |  | ||||||
|   | |||||||
| @@ -2,6 +2,7 @@ const express     = require('express'); | |||||||
| const bodyParser  = require('body-parser'); | const bodyParser  = require('body-parser'); | ||||||
| const fileUpload  = require('express-fileupload'); | const fileUpload  = require('express-fileupload'); | ||||||
| const compression = require('compression'); | const compression = require('compression'); | ||||||
|  | const config      = require('./lib/config'); | ||||||
| const log         = require('./logger').express; | const log         = require('./logger').express; | ||||||
|  |  | ||||||
| /** | /** | ||||||
| @@ -24,7 +25,7 @@ app.enable('trust proxy', ['loopback', 'linklocal', 'uniquelocal']); | |||||||
| app.enable('strict routing'); | app.enable('strict routing'); | ||||||
|  |  | ||||||
| // pretty print JSON when not live | // pretty print JSON when not live | ||||||
| if (process.env.NODE_ENV !== 'production') { | if (config.debug()) { | ||||||
| 	app.set('json spaces', 2); | 	app.set('json spaces', 2); | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -65,7 +66,7 @@ app.use(function (err, req, res, next) { | |||||||
| 		} | 		} | ||||||
| 	}; | 	}; | ||||||
|  |  | ||||||
| 	if (process.env.NODE_ENV === 'development' || (req.baseUrl + req.path).includes('nginx/certificates')) { | 	if (config.debug() || (req.baseUrl + req.path).includes('nginx/certificates')) { | ||||||
| 		payload.debug = { | 		payload.debug = { | ||||||
| 			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null, | 			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null, | ||||||
| 			previous: err.previous | 			previous: err.previous | ||||||
| @@ -74,7 +75,7 @@ app.use(function (err, req, res, next) { | |||||||
|  |  | ||||||
| 	// Not every error is worth logging - but this is good for now until it gets annoying. | 	// Not every error is worth logging - but this is good for now until it gets annoying. | ||||||
| 	if (typeof err.stack !== 'undefined' && err.stack) { | 	if (typeof err.stack !== 'undefined' && err.stack) { | ||||||
| 		if (process.env.NODE_ENV === 'development' || process.env.DEBUG) { | 		if (config.debug()) { | ||||||
| 			log.debug(err.stack); | 			log.debug(err.stack); | ||||||
| 		} else if (typeof err.public == 'undefined' || !err.public) { | 		} else if (typeof err.public == 'undefined' || !err.public) { | ||||||
| 			log.warn(err.message); | 			log.warn(err.message); | ||||||
|   | |||||||
| @@ -1,21 +1,22 @@ | |||||||
| const config = require('config'); | const config = require('./lib/config'); | ||||||
|  |  | ||||||
| if (!config.has('database')) { | if (!config.has('database')) { | ||||||
| 	throw new Error('Database config does not exist! Please read the instructions: https://github.com/jc21/nginx-proxy-manager/blob/master/doc/INSTALL.md'); | 	throw new Error('Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/'); | ||||||
| } | } | ||||||
|  |  | ||||||
| function generateDbConfig() { | function generateDbConfig() { | ||||||
| 	if (config.database.engine === 'knex-native') { | 	const cfg = config.get('database'); | ||||||
| 		return config.database.knex; | 	if (cfg.engine === 'knex-native') { | ||||||
| 	} else | 		return cfg.knex; | ||||||
|  | 	} | ||||||
| 	return { | 	return { | ||||||
| 			client:     config.database.engine, | 		client:     cfg.engine, | ||||||
| 		connection: { | 		connection: { | ||||||
| 				host:     config.database.host, | 			host:     cfg.host, | ||||||
| 				user:     config.database.user, | 			user:     cfg.user, | ||||||
| 				password: config.database.password, | 			password: cfg.password, | ||||||
| 				database: config.database.name, | 			database: cfg.name, | ||||||
| 				port:     config.database.port | 			port:     cfg.port | ||||||
| 		}, | 		}, | ||||||
| 		migrations: { | 		migrations: { | ||||||
| 			tableName: 'migrations' | 			tableName: 'migrations' | ||||||
| @@ -23,11 +24,4 @@ function generateDbConfig() { | |||||||
| 	}; | 	}; | ||||||
| } | } | ||||||
|  |  | ||||||
|  | module.exports = require('knex')(generateDbConfig()); | ||||||
| let data = generateDbConfig(); |  | ||||||
|  |  | ||||||
| if (typeof config.database.version !== 'undefined') { |  | ||||||
| 	data.version = config.database.version; |  | ||||||
| } |  | ||||||
|  |  | ||||||
| module.exports = require('knex')(data); |  | ||||||
|   | |||||||
| @@ -40,6 +40,210 @@ | |||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, | 		}, | ||||||
|  | 		"/nginx/proxy-hosts": { | ||||||
|  | 			"get": { | ||||||
|  | 				"operationId": "getProxyHosts", | ||||||
|  | 				"summary": "Get all proxy hosts", | ||||||
|  | 				"tags": ["Proxy Hosts"], | ||||||
|  | 				"security": [ | ||||||
|  | 					{ | ||||||
|  | 						"BearerAuth": ["users"] | ||||||
|  | 					} | ||||||
|  | 				], | ||||||
|  | 				"parameters": [ | ||||||
|  | 					{ | ||||||
|  | 						"in": "query", | ||||||
|  | 						"name": "expand", | ||||||
|  | 						"description": "Expansions", | ||||||
|  | 						"schema": { | ||||||
|  | 							"type": "string", | ||||||
|  | 							"enum": ["access_list", "owner", "certificate"] | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				], | ||||||
|  | 				"responses": { | ||||||
|  | 					"200": { | ||||||
|  | 						"description": "200 response", | ||||||
|  | 						"content": { | ||||||
|  | 							"application/json": { | ||||||
|  | 								"examples": { | ||||||
|  | 									"default": { | ||||||
|  | 										"value": [ | ||||||
|  | 											{ | ||||||
|  | 												"id": 1, | ||||||
|  | 												"created_on": "2023-03-30T01:12:23.000Z", | ||||||
|  | 												"modified_on": "2023-03-30T02:15:40.000Z", | ||||||
|  | 												"owner_user_id": 1, | ||||||
|  | 												"domain_names": ["aasdasdad"], | ||||||
|  | 												"forward_host": "asdasd", | ||||||
|  | 												"forward_port": 80, | ||||||
|  | 												"access_list_id": 0, | ||||||
|  | 												"certificate_id": 0, | ||||||
|  | 												"ssl_forced": 0, | ||||||
|  | 												"caching_enabled": 0, | ||||||
|  | 												"block_exploits": 0, | ||||||
|  | 												"advanced_config": "sdfsdfsdf", | ||||||
|  | 												"meta": { | ||||||
|  | 													"letsencrypt_agree": false, | ||||||
|  | 													"dns_challenge": false, | ||||||
|  | 													"nginx_online": false, | ||||||
|  | 													"nginx_err": "Command failed: /usr/sbin/nginx -t -g \"error_log off;\"\nnginx: [emerg] unknown directive \"sdfsdfsdf\" in /data/nginx/proxy_host/1.conf:37\nnginx: configuration file /etc/nginx/nginx.conf test failed\n" | ||||||
|  | 												}, | ||||||
|  | 												"allow_websocket_upgrade": 0, | ||||||
|  | 												"http2_support": 0, | ||||||
|  | 												"forward_scheme": "http", | ||||||
|  | 												"enabled": 1, | ||||||
|  | 												"locations": [], | ||||||
|  | 												"hsts_enabled": 0, | ||||||
|  | 												"hsts_subdomains": 0, | ||||||
|  | 												"owner": { | ||||||
|  | 													"id": 1, | ||||||
|  | 													"created_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 													"modified_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 													"is_deleted": 0, | ||||||
|  | 													"is_disabled": 0, | ||||||
|  | 													"email": "admin@example.com", | ||||||
|  | 													"name": "Administrator", | ||||||
|  | 													"nickname": "Admin", | ||||||
|  | 													"avatar": "", | ||||||
|  | 													"roles": ["admin"] | ||||||
|  | 												}, | ||||||
|  | 												"access_list": null, | ||||||
|  | 												"certificate": null | ||||||
|  | 											}, | ||||||
|  | 											{ | ||||||
|  | 												"id": 2, | ||||||
|  | 												"created_on": "2023-03-30T02:11:49.000Z", | ||||||
|  | 												"modified_on": "2023-03-30T02:11:49.000Z", | ||||||
|  | 												"owner_user_id": 1, | ||||||
|  | 												"domain_names": ["test.example.com"], | ||||||
|  | 												"forward_host": "1.1.1.1", | ||||||
|  | 												"forward_port": 80, | ||||||
|  | 												"access_list_id": 0, | ||||||
|  | 												"certificate_id": 0, | ||||||
|  | 												"ssl_forced": 0, | ||||||
|  | 												"caching_enabled": 0, | ||||||
|  | 												"block_exploits": 0, | ||||||
|  | 												"advanced_config": "", | ||||||
|  | 												"meta": { | ||||||
|  | 													"letsencrypt_agree": false, | ||||||
|  | 													"dns_challenge": false, | ||||||
|  | 													"nginx_online": true, | ||||||
|  | 													"nginx_err": null | ||||||
|  | 												}, | ||||||
|  | 												"allow_websocket_upgrade": 0, | ||||||
|  | 												"http2_support": 0, | ||||||
|  | 												"forward_scheme": "http", | ||||||
|  | 												"enabled": 1, | ||||||
|  | 												"locations": [], | ||||||
|  | 												"hsts_enabled": 0, | ||||||
|  | 												"hsts_subdomains": 0, | ||||||
|  | 												"owner": { | ||||||
|  | 													"id": 1, | ||||||
|  | 													"created_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 													"modified_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 													"is_deleted": 0, | ||||||
|  | 													"is_disabled": 0, | ||||||
|  | 													"email": "admin@example.com", | ||||||
|  | 													"name": "Administrator", | ||||||
|  | 													"nickname": "Admin", | ||||||
|  | 													"avatar": "", | ||||||
|  | 													"roles": ["admin"] | ||||||
|  | 												}, | ||||||
|  | 												"access_list": null, | ||||||
|  | 												"certificate": null | ||||||
|  | 											} | ||||||
|  | 										] | ||||||
|  | 									} | ||||||
|  | 								}, | ||||||
|  | 								"schema": { | ||||||
|  | 									"$ref": "#/components/schemas/ProxyHostsList" | ||||||
|  | 								} | ||||||
|  | 							} | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			}, | ||||||
|  | 			"post": { | ||||||
|  | 				"operationId": "createProxyHost", | ||||||
|  | 				"summary": "Create a Proxy Host", | ||||||
|  | 				"tags": ["Proxy Hosts"], | ||||||
|  | 				"security": [ | ||||||
|  | 					{ | ||||||
|  | 						"BearerAuth": ["users"] | ||||||
|  | 					} | ||||||
|  | 				], | ||||||
|  | 				"parameters": [ | ||||||
|  | 					{ | ||||||
|  | 						"in": "body", | ||||||
|  | 						"name": "proxyhost", | ||||||
|  | 						"description": "Proxy Host Payload", | ||||||
|  | 						"required": true, | ||||||
|  | 						"schema": { | ||||||
|  | 							"$ref": "#/components/schemas/ProxyHostObject" | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				], | ||||||
|  | 				"responses": { | ||||||
|  | 					"201": { | ||||||
|  | 						"description": "201 response", | ||||||
|  | 						"content": { | ||||||
|  | 							"application/json": { | ||||||
|  | 								"examples": { | ||||||
|  | 									"default": { | ||||||
|  | 										"value": { | ||||||
|  | 											"id": 3, | ||||||
|  | 											"created_on": "2023-03-30T02:31:27.000Z", | ||||||
|  | 											"modified_on": "2023-03-30T02:31:27.000Z", | ||||||
|  | 											"owner_user_id": 1, | ||||||
|  | 											"domain_names": ["test2.example.com"], | ||||||
|  | 											"forward_host": "1.1.1.1", | ||||||
|  | 											"forward_port": 80, | ||||||
|  | 											"access_list_id": 0, | ||||||
|  | 											"certificate_id": 0, | ||||||
|  | 											"ssl_forced": 0, | ||||||
|  | 											"caching_enabled": 0, | ||||||
|  | 											"block_exploits": 0, | ||||||
|  | 											"advanced_config": "", | ||||||
|  | 											"meta": { | ||||||
|  | 												"letsencrypt_agree": false, | ||||||
|  | 												"dns_challenge": false | ||||||
|  | 											}, | ||||||
|  | 											"allow_websocket_upgrade": 0, | ||||||
|  | 											"http2_support": 0, | ||||||
|  | 											"forward_scheme": "http", | ||||||
|  | 											"enabled": 1, | ||||||
|  | 											"locations": [], | ||||||
|  | 											"hsts_enabled": 0, | ||||||
|  | 											"hsts_subdomains": 0, | ||||||
|  | 											"certificate": null, | ||||||
|  | 											"owner": { | ||||||
|  | 												"id": 1, | ||||||
|  | 												"created_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 												"modified_on": "2023-03-30T01:11:50.000Z", | ||||||
|  | 												"is_deleted": 0, | ||||||
|  | 												"is_disabled": 0, | ||||||
|  | 												"email": "admin@example.com", | ||||||
|  | 												"name": "Administrator", | ||||||
|  | 												"nickname": "Admin", | ||||||
|  | 												"avatar": "", | ||||||
|  | 												"roles": ["admin"] | ||||||
|  | 											}, | ||||||
|  | 											"access_list": null, | ||||||
|  | 											"use_default_location": true, | ||||||
|  | 											"ipv6": true | ||||||
|  | 										} | ||||||
|  | 									} | ||||||
|  | 								}, | ||||||
|  | 								"schema": { | ||||||
|  | 									"$ref": "#/components/schemas/ProxyHostObject" | ||||||
|  | 								} | ||||||
|  | 							} | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
| 		"/schema": { | 		"/schema": { | ||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "schema", | 				"operationId": "schema", | ||||||
| @@ -55,14 +259,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "refreshToken", | 				"operationId": "refreshToken", | ||||||
| 				"summary": "Refresh your access token", | 				"summary": "Refresh your access token", | ||||||
| 				"tags": [ | 				"tags": ["Tokens"], | ||||||
| 					"Tokens" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["tokens"] | ||||||
| 							"tokens" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"responses": { | 				"responses": { | ||||||
| @@ -104,19 +304,14 @@ | |||||||
| 								"scope": { | 								"scope": { | ||||||
| 									"minLength": 1, | 									"minLength": 1, | ||||||
| 									"type": "string", | 									"type": "string", | ||||||
| 									"enum": [ | 									"enum": ["user"] | ||||||
| 										"user" |  | ||||||
| 									] |  | ||||||
| 								}, | 								}, | ||||||
| 								"secret": { | 								"secret": { | ||||||
| 									"minLength": 1, | 									"minLength": 1, | ||||||
| 									"type": "string" | 									"type": "string" | ||||||
| 								} | 								} | ||||||
| 							}, | 							}, | ||||||
| 							"required": [ | 							"required": ["identity", "secret"], | ||||||
| 								"identity", |  | ||||||
| 								"secret" |  | ||||||
| 							], |  | ||||||
| 							"type": "object" | 							"type": "object" | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| @@ -144,23 +339,17 @@ | |||||||
| 					} | 					} | ||||||
| 				}, | 				}, | ||||||
| 				"summary": "Request a new access token from credentials", | 				"summary": "Request a new access token from credentials", | ||||||
| 				"tags": [ | 				"tags": ["Tokens"] | ||||||
| 					"Tokens" |  | ||||||
| 				] |  | ||||||
| 			} | 			} | ||||||
| 		}, | 		}, | ||||||
| 		"/settings": { | 		"/settings": { | ||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "getSettings", | 				"operationId": "getSettings", | ||||||
| 				"summary": "Get all settings", | 				"summary": "Get all settings", | ||||||
| 				"tags": [ | 				"tags": ["Settings"], | ||||||
| 					"Settings" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["settings"] | ||||||
| 							"settings" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"responses": { | 				"responses": { | ||||||
| @@ -194,14 +383,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "getSetting", | 				"operationId": "getSetting", | ||||||
| 				"summary": "Get a setting", | 				"summary": "Get a setting", | ||||||
| 				"tags": [ | 				"tags": ["Settings"], | ||||||
| 					"Settings" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["settings"] | ||||||
| 							"settings" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -244,14 +429,10 @@ | |||||||
| 			"put": { | 			"put": { | ||||||
| 				"operationId": "updateSetting", | 				"operationId": "updateSetting", | ||||||
| 				"summary": "Update a setting", | 				"summary": "Update a setting", | ||||||
| 				"tags": [ | 				"tags": ["Settings"], | ||||||
| 					"Settings" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["settings"] | ||||||
| 							"settings" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -305,14 +486,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "getUsers", | 				"operationId": "getUsers", | ||||||
| 				"summary": "Get all users", | 				"summary": "Get all users", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -322,9 +499,7 @@ | |||||||
| 						"description": "Expansions", | 						"description": "Expansions", | ||||||
| 						"schema": { | 						"schema": { | ||||||
| 							"type": "string", | 							"type": "string", | ||||||
| 							"enum": [ | 							"enum": ["permissions"] | ||||||
| 								"permissions" |  | ||||||
| 							] |  | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| @@ -345,9 +520,7 @@ | |||||||
| 												"name": "Jamie Curnow", | 												"name": "Jamie Curnow", | ||||||
| 												"nickname": "James", | 												"nickname": "James", | ||||||
| 												"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | 												"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | ||||||
| 												"roles": [ | 												"roles": ["admin"] | ||||||
| 													"admin" |  | ||||||
| 												] |  | ||||||
| 											} | 											} | ||||||
| 										] | 										] | ||||||
| 									}, | 									}, | ||||||
| @@ -362,9 +535,7 @@ | |||||||
| 												"name": "Jamie Curnow", | 												"name": "Jamie Curnow", | ||||||
| 												"nickname": "James", | 												"nickname": "James", | ||||||
| 												"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | 												"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | ||||||
| 												"roles": [ | 												"roles": ["admin"], | ||||||
| 													"admin" |  | ||||||
| 												], |  | ||||||
| 												"permissions": { | 												"permissions": { | ||||||
| 													"visibility": "all", | 													"visibility": "all", | ||||||
| 													"proxy_hosts": "manage", | 													"proxy_hosts": "manage", | ||||||
| @@ -389,14 +560,10 @@ | |||||||
| 			"post": { | 			"post": { | ||||||
| 				"operationId": "createUser", | 				"operationId": "createUser", | ||||||
| 				"summary": "Create a User", | 				"summary": "Create a User", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -426,9 +593,7 @@ | |||||||
| 											"name": "Jamie Curnow", | 											"name": "Jamie Curnow", | ||||||
| 											"nickname": "James", | 											"nickname": "James", | ||||||
| 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | ||||||
| 											"roles": [ | 											"roles": ["admin"], | ||||||
| 												"admin" |  | ||||||
| 											], |  | ||||||
| 											"permissions": { | 											"permissions": { | ||||||
| 												"visibility": "all", | 												"visibility": "all", | ||||||
| 												"proxy_hosts": "manage", | 												"proxy_hosts": "manage", | ||||||
| @@ -454,14 +619,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "getUser", | 				"operationId": "getUser", | ||||||
| 				"summary": "Get a user", | 				"summary": "Get a user", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -501,9 +662,7 @@ | |||||||
| 											"name": "Jamie Curnow", | 											"name": "Jamie Curnow", | ||||||
| 											"nickname": "James", | 											"nickname": "James", | ||||||
| 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | ||||||
| 											"roles": [ | 											"roles": ["admin"] | ||||||
| 												"admin" |  | ||||||
| 											] |  | ||||||
| 										} | 										} | ||||||
| 									} | 									} | ||||||
| 								}, | 								}, | ||||||
| @@ -518,14 +677,10 @@ | |||||||
| 			"put": { | 			"put": { | ||||||
| 				"operationId": "updateUser", | 				"operationId": "updateUser", | ||||||
| 				"summary": "Update a User", | 				"summary": "Update a User", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -574,9 +729,7 @@ | |||||||
| 											"name": "Jamie Curnow", | 											"name": "Jamie Curnow", | ||||||
| 											"nickname": "James", | 											"nickname": "James", | ||||||
| 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | 											"avatar": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm", | ||||||
| 											"roles": [ | 											"roles": ["admin"] | ||||||
| 												"admin" |  | ||||||
| 											] |  | ||||||
| 										} | 										} | ||||||
| 									} | 									} | ||||||
| 								}, | 								}, | ||||||
| @@ -591,14 +744,10 @@ | |||||||
| 			"delete": { | 			"delete": { | ||||||
| 				"operationId": "deleteUser", | 				"operationId": "deleteUser", | ||||||
| 				"summary": "Delete a User", | 				"summary": "Delete a User", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -637,14 +786,10 @@ | |||||||
| 			"put": { | 			"put": { | ||||||
| 				"operationId": "updateUserAuth", | 				"operationId": "updateUserAuth", | ||||||
| 				"summary": "Update a User's Authentication", | 				"summary": "Update a User's Authentication", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -700,14 +845,10 @@ | |||||||
| 			"put": { | 			"put": { | ||||||
| 				"operationId": "updateUserPermissions", | 				"operationId": "updateUserPermissions", | ||||||
| 				"summary": "Update a User's Permissions", | 				"summary": "Update a User's Permissions", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -755,14 +896,10 @@ | |||||||
| 			"put": { | 			"put": { | ||||||
| 				"operationId": "loginAsUser", | 				"operationId": "loginAsUser", | ||||||
| 				"summary": "Login as this user", | 				"summary": "Login as this user", | ||||||
| 				"tags": [ | 				"tags": ["Users"], | ||||||
| 					"Users" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["users"] | ||||||
| 							"users" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"parameters": [ | 				"parameters": [ | ||||||
| @@ -797,9 +934,7 @@ | |||||||
| 												"name": "Jamie Curnow", | 												"name": "Jamie Curnow", | ||||||
| 												"nickname": "James", | 												"nickname": "James", | ||||||
| 												"avatar": "//www.gravatar.com/avatar/3c8d73f45fd8763f827b964c76e6032a?default=mm", | 												"avatar": "//www.gravatar.com/avatar/3c8d73f45fd8763f827b964c76e6032a?default=mm", | ||||||
| 												"roles": [ | 												"roles": ["admin"] | ||||||
| 													"admin" |  | ||||||
| 												] |  | ||||||
| 											} | 											} | ||||||
| 										} | 										} | ||||||
| 									} | 									} | ||||||
| @@ -807,11 +942,7 @@ | |||||||
| 								"schema": { | 								"schema": { | ||||||
| 									"type": "object", | 									"type": "object", | ||||||
| 									"description": "Login object", | 									"description": "Login object", | ||||||
| 									"required": [ | 									"required": ["expires", "token", "user"], | ||||||
| 										"expires", |  | ||||||
| 										"token", |  | ||||||
| 										"user" |  | ||||||
| 									], |  | ||||||
| 									"additionalProperties": false, | 									"additionalProperties": false, | ||||||
| 									"properties": { | 									"properties": { | ||||||
| 										"expires": { | 										"expires": { | ||||||
| @@ -840,14 +971,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "reportsHosts", | 				"operationId": "reportsHosts", | ||||||
| 				"summary": "Report on Host Statistics", | 				"summary": "Report on Host Statistics", | ||||||
| 				"tags": [ | 				"tags": ["Reports"], | ||||||
| 					"Reports" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["reports"] | ||||||
| 							"reports" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"responses": { | 				"responses": { | ||||||
| @@ -878,14 +1005,10 @@ | |||||||
| 			"get": { | 			"get": { | ||||||
| 				"operationId": "getAuditLog", | 				"operationId": "getAuditLog", | ||||||
| 				"summary": "Get Audit Log", | 				"summary": "Get Audit Log", | ||||||
| 				"tags": [ | 				"tags": ["Audit Log"], | ||||||
| 					"Audit Log" |  | ||||||
| 				], |  | ||||||
| 				"security": [ | 				"security": [ | ||||||
| 					{ | 					{ | ||||||
| 						"BearerAuth": [ | 						"BearerAuth": ["audit-log"] | ||||||
| 							"audit-log" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				], | 				], | ||||||
| 				"responses": { | 				"responses": { | ||||||
| @@ -925,10 +1048,7 @@ | |||||||
| 				"type": "object", | 				"type": "object", | ||||||
| 				"description": "Health object", | 				"description": "Health object", | ||||||
| 				"additionalProperties": false, | 				"additionalProperties": false, | ||||||
| 				"required": [ | 				"required": ["status", "version"], | ||||||
| 					"status", |  | ||||||
| 					"version" |  | ||||||
| 				], |  | ||||||
| 				"properties": { | 				"properties": { | ||||||
| 					"status": { | 					"status": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| @@ -944,11 +1064,7 @@ | |||||||
| 							"revision": 0 | 							"revision": 0 | ||||||
| 						}, | 						}, | ||||||
| 						"additionalProperties": false, | 						"additionalProperties": false, | ||||||
| 						"required": [ | 						"required": ["major", "minor", "revision"], | ||||||
| 							"major", |  | ||||||
| 							"minor", |  | ||||||
| 							"revision" |  | ||||||
| 						], |  | ||||||
| 						"properties": { | 						"properties": { | ||||||
| 							"major": { | 							"major": { | ||||||
| 								"type": "integer", | 								"type": "integer", | ||||||
| @@ -969,10 +1085,7 @@ | |||||||
| 			"TokenObject": { | 			"TokenObject": { | ||||||
| 				"type": "object", | 				"type": "object", | ||||||
| 				"description": "Token object", | 				"description": "Token object", | ||||||
| 				"required": [ | 				"required": ["expires", "token"], | ||||||
| 					"expires", |  | ||||||
| 					"token" |  | ||||||
| 				], |  | ||||||
| 				"additionalProperties": false, | 				"additionalProperties": false, | ||||||
| 				"properties": { | 				"properties": { | ||||||
| 					"expires": { | 					"expires": { | ||||||
| @@ -988,16 +1101,147 @@ | |||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
|  | 			"ProxyHostObject": { | ||||||
|  | 				"type": "object", | ||||||
|  | 				"description": "Proxy Host object", | ||||||
|  | 				"required": [ | ||||||
|  | 					"id", | ||||||
|  | 					"created_on", | ||||||
|  | 					"modified_on", | ||||||
|  | 					"owner_user_id", | ||||||
|  | 					"domain_names", | ||||||
|  | 					"forward_host", | ||||||
|  | 					"forward_port", | ||||||
|  | 					"access_list_id", | ||||||
|  | 					"certificate_id", | ||||||
|  | 					"ssl_forced", | ||||||
|  | 					"caching_enabled", | ||||||
|  | 					"block_exploits", | ||||||
|  | 					"advanced_config", | ||||||
|  | 					"meta", | ||||||
|  | 					"allow_websocket_upgrade", | ||||||
|  | 					"http2_support", | ||||||
|  | 					"forward_scheme", | ||||||
|  | 					"enabled", | ||||||
|  | 					"locations", | ||||||
|  | 					"hsts_enabled", | ||||||
|  | 					"hsts_subdomains", | ||||||
|  | 					"certificate", | ||||||
|  | 					"use_default_location", | ||||||
|  | 					"ipv6" | ||||||
|  | 				], | ||||||
|  | 				"additionalProperties": false, | ||||||
|  | 				"properties": { | ||||||
|  | 					"id": { | ||||||
|  | 						"type": "integer", | ||||||
|  | 						"description": "Proxy Host ID", | ||||||
|  | 						"minimum": 1, | ||||||
|  | 						"example": 1 | ||||||
|  | 					}, | ||||||
|  | 					"created_on": { | ||||||
|  | 						"type": "string", | ||||||
|  | 						"description": "Created Date", | ||||||
|  | 						"example": "2020-01-30T09:36:08.000Z" | ||||||
|  | 					}, | ||||||
|  | 					"modified_on": { | ||||||
|  | 						"type": "string", | ||||||
|  | 						"description": "Modified Date", | ||||||
|  | 						"example": "2020-01-30T09:41:04.000Z" | ||||||
|  | 					}, | ||||||
|  | 					"owner_user_id": { | ||||||
|  | 						"type": "integer", | ||||||
|  | 						"minimum": 1, | ||||||
|  | 						"example": 1 | ||||||
|  | 					}, | ||||||
|  | 					"domain_names": { | ||||||
|  | 						"type": "array", | ||||||
|  | 						"minItems": 1, | ||||||
|  | 						"items": { | ||||||
|  | 							"type": "string", | ||||||
|  | 							"minLength": 1 | ||||||
|  | 						} | ||||||
|  | 					}, | ||||||
|  | 					"forward_host": { | ||||||
|  | 						"type": "string", | ||||||
|  | 						"minLength": 1 | ||||||
|  | 					}, | ||||||
|  | 					"forward_port": { | ||||||
|  | 						"type": "integer", | ||||||
|  | 						"minimum": 1 | ||||||
|  | 					}, | ||||||
|  | 					"access_list_id": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"certificate_id": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"ssl_forced": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"caching_enabled": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"block_exploits": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"advanced_config": { | ||||||
|  | 						"type": "string" | ||||||
|  | 					}, | ||||||
|  | 					"meta": { | ||||||
|  | 						"type": "object" | ||||||
|  | 					}, | ||||||
|  | 					"allow_websocket_upgrade": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"http2_support": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"forward_scheme": { | ||||||
|  | 						"type": "string" | ||||||
|  | 					}, | ||||||
|  | 					"enabled": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"locations": { | ||||||
|  | 						"type": "array" | ||||||
|  | 					}, | ||||||
|  | 					"hsts_enabled": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"hsts_subdomains": { | ||||||
|  | 						"type": "integer" | ||||||
|  | 					}, | ||||||
|  | 					"certificate": { | ||||||
|  | 						"type": "object", | ||||||
|  | 						"nullable": true | ||||||
|  | 					}, | ||||||
|  | 					"owner": { | ||||||
|  | 						"type": "object", | ||||||
|  | 						"nullable": true | ||||||
|  | 					}, | ||||||
|  | 					"access_list": { | ||||||
|  | 						"type": "object", | ||||||
|  | 						"nullable": true | ||||||
|  | 					}, | ||||||
|  | 					"use_default_location": { | ||||||
|  | 						"type": "boolean" | ||||||
|  | 					}, | ||||||
|  | 					"ipv6": { | ||||||
|  | 						"type": "boolean" | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			}, | ||||||
|  | 			"ProxyHostsList": { | ||||||
|  | 				"type": "array", | ||||||
|  | 				"description": "Proxyn Hosts list", | ||||||
|  | 				"items": { | ||||||
|  | 					"$ref": "#/components/schemas/ProxyHostObject" | ||||||
|  | 				} | ||||||
|  | 			}, | ||||||
| 			"SettingObject": { | 			"SettingObject": { | ||||||
| 				"type": "object", | 				"type": "object", | ||||||
| 				"description": "Setting object", | 				"description": "Setting object", | ||||||
| 				"required": [ | 				"required": ["id", "name", "description", "value", "meta"], | ||||||
| 					"id", |  | ||||||
| 					"name", |  | ||||||
| 					"description", |  | ||||||
| 					"value", |  | ||||||
| 					"meta" |  | ||||||
| 				], |  | ||||||
| 				"additionalProperties": false, | 				"additionalProperties": false, | ||||||
| 				"properties": { | 				"properties": { | ||||||
| 					"id": { | 					"id": { | ||||||
| @@ -1057,17 +1301,7 @@ | |||||||
| 			"UserObject": { | 			"UserObject": { | ||||||
| 				"type": "object", | 				"type": "object", | ||||||
| 				"description": "User object", | 				"description": "User object", | ||||||
| 				"required": [ | 				"required": ["id", "created_on", "modified_on", "is_disabled", "email", "name", "nickname", "avatar", "roles"], | ||||||
| 					"id", |  | ||||||
| 					"created_on", |  | ||||||
| 					"modified_on", |  | ||||||
| 					"is_disabled", |  | ||||||
| 					"email", |  | ||||||
| 					"name", |  | ||||||
| 					"nickname", |  | ||||||
| 					"avatar", |  | ||||||
| 					"roles" |  | ||||||
| 				], |  | ||||||
| 				"additionalProperties": false, | 				"additionalProperties": false, | ||||||
| 				"properties": { | 				"properties": { | ||||||
| 					"id": { | 					"id": { | ||||||
| @@ -1117,9 +1351,7 @@ | |||||||
| 					}, | 					}, | ||||||
| 					"roles": { | 					"roles": { | ||||||
| 						"description": "Roles applied", | 						"description": "Roles applied", | ||||||
| 						"example": [ | 						"example": ["admin"], | ||||||
| 							"admin" |  | ||||||
| 						], |  | ||||||
| 						"type": "array", | 						"type": "array", | ||||||
| 						"items": { | 						"items": { | ||||||
| 							"type": "string" | 							"type": "string" | ||||||
| @@ -1137,10 +1369,7 @@ | |||||||
| 			"AuthObject": { | 			"AuthObject": { | ||||||
| 				"type": "object", | 				"type": "object", | ||||||
| 				"description": "Authentication Object", | 				"description": "Authentication Object", | ||||||
| 				"required": [ | 				"required": ["type", "secret"], | ||||||
| 					"type", |  | ||||||
| 					"secret" |  | ||||||
| 				], |  | ||||||
| 				"properties": { | 				"properties": { | ||||||
| 					"type": { | 					"type": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| @@ -1167,64 +1396,37 @@ | |||||||
| 					"visibility": { | 					"visibility": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Visibility Type", | 						"description": "Visibility Type", | ||||||
| 						"enum": [ | 						"enum": ["all", "user"] | ||||||
| 							"all", |  | ||||||
| 							"user" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"access_lists": { | 					"access_lists": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Access Lists Permissions", | 						"description": "Access Lists Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"dead_hosts": { | 					"dead_hosts": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "404 Hosts Permissions", | 						"description": "404 Hosts Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"proxy_hosts": { | 					"proxy_hosts": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Proxy Hosts Permissions", | 						"description": "Proxy Hosts Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"redirection_hosts": { | 					"redirection_hosts": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Redirection Permissions", | 						"description": "Redirection Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"streams": { | 					"streams": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Streams Permissions", | 						"description": "Streams Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					}, | 					}, | ||||||
| 					"certificates": { | 					"certificates": { | ||||||
| 						"type": "string", | 						"type": "string", | ||||||
| 						"description": "Certificates Permissions", | 						"description": "Certificates Permissions", | ||||||
| 						"enum": [ | 						"enum": ["hidden", "view", "manage"] | ||||||
| 							"hidden", |  | ||||||
| 							"view", |  | ||||||
| 							"manage" |  | ||||||
| 						] |  | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
|   | |||||||
| @@ -3,9 +3,6 @@ | |||||||
| const logger = require('./logger').global; | const logger = require('./logger').global; | ||||||
|  |  | ||||||
| async function appStart () { | async function appStart () { | ||||||
| 	// Create config file db settings if environment variables have been set |  | ||||||
| 	await createDbConfigFromEnvironment(); |  | ||||||
|  |  | ||||||
| 	const migrate             = require('./migrate'); | 	const migrate             = require('./migrate'); | ||||||
| 	const setup               = require('./setup'); | 	const setup               = require('./setup'); | ||||||
| 	const app                 = require('./app'); | 	const app                 = require('./app'); | ||||||
| @@ -42,90 +39,6 @@ async function appStart () { | |||||||
| 		}); | 		}); | ||||||
| } | } | ||||||
|  |  | ||||||
| async function createDbConfigFromEnvironment() { |  | ||||||
| 	return new Promise((resolve, reject) => { |  | ||||||
| 		const envMysqlHost = process.env.DB_MYSQL_HOST || null; |  | ||||||
| 		const envMysqlPort = process.env.DB_MYSQL_PORT || null; |  | ||||||
| 		const envMysqlUser = process.env.DB_MYSQL_USER || null; |  | ||||||
| 		const envMysqlName = process.env.DB_MYSQL_NAME || null; |  | ||||||
| 		let envSqliteFile  = process.env.DB_SQLITE_FILE || null; |  | ||||||
|  |  | ||||||
| 		const fs       = require('fs'); |  | ||||||
| 		const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json'; |  | ||||||
| 		let configData = {}; |  | ||||||
|  |  | ||||||
| 		try { |  | ||||||
| 			configData = require(filename); |  | ||||||
| 		} catch (err) { |  | ||||||
| 			// do nothing |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if (configData.database && configData.database.engine && !configData.database.fromEnv) { |  | ||||||
| 			logger.info('Manual db configuration already exists, skipping config creation from environment variables'); |  | ||||||
| 			resolve(); |  | ||||||
| 			return; |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if ((!envMysqlHost || !envMysqlPort || !envMysqlUser || !envMysqlName) && !envSqliteFile){ |  | ||||||
| 			envSqliteFile = '/data/database.sqlite'; |  | ||||||
| 			logger.info(`No valid environment variables for database provided, using default SQLite file '${envSqliteFile}'`); |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if (envMysqlHost && envMysqlPort && envMysqlUser && envMysqlName) { |  | ||||||
| 			const newConfig = { |  | ||||||
| 				fromEnv:  true, |  | ||||||
| 				engine:   'mysql', |  | ||||||
| 				host:     envMysqlHost, |  | ||||||
| 				port:     envMysqlPort, |  | ||||||
| 				user:     envMysqlUser, |  | ||||||
| 				password: process.env.DB_MYSQL_PASSWORD, |  | ||||||
| 				name:     envMysqlName, |  | ||||||
| 			}; |  | ||||||
|  |  | ||||||
| 			if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) { |  | ||||||
| 				// Config is unchanged, skip overwrite |  | ||||||
| 				resolve(); |  | ||||||
| 				return; |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			logger.info('Generating MySQL knex configuration from environment variables'); |  | ||||||
| 			configData.database = newConfig; |  | ||||||
|  |  | ||||||
| 		} else { |  | ||||||
| 			const newConfig = { |  | ||||||
| 				fromEnv: true, |  | ||||||
| 				engine:  'knex-native', |  | ||||||
| 				knex:    { |  | ||||||
| 					client:     'sqlite3', |  | ||||||
| 					connection: { |  | ||||||
| 						filename: envSqliteFile |  | ||||||
| 					}, |  | ||||||
| 					useNullAsDefault: true |  | ||||||
| 				} |  | ||||||
| 			}; |  | ||||||
| 			if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) { |  | ||||||
| 				// Config is unchanged, skip overwrite |  | ||||||
| 				resolve(); |  | ||||||
| 				return; |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			logger.info('Generating SQLite knex configuration'); |  | ||||||
| 			configData.database = newConfig; |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		// Write config |  | ||||||
| 		fs.writeFile(filename, JSON.stringify(configData, null, 2), (err) => { |  | ||||||
| 			if (err) { |  | ||||||
| 				logger.error('Could not write db config to config file: ' + filename); |  | ||||||
| 				reject(err); |  | ||||||
| 			} else { |  | ||||||
| 				logger.debug('Wrote db configuration to config file: ' + filename); |  | ||||||
| 				resolve(); |  | ||||||
| 			} |  | ||||||
| 		}); |  | ||||||
| 	}); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| try { | try { | ||||||
| 	appStart(); | 	appStart(); | ||||||
| } catch (err) { | } catch (err) { | ||||||
|   | |||||||
| @@ -3,13 +3,13 @@ const fs                    = require('fs'); | |||||||
| const batchflow             = require('batchflow'); | const batchflow             = require('batchflow'); | ||||||
| const logger                = require('../logger').access; | const logger                = require('../logger').access; | ||||||
| const error                 = require('../lib/error'); | const error                 = require('../lib/error'); | ||||||
|  | const utils                 = require('../lib/utils'); | ||||||
| const accessListModel       = require('../models/access_list'); | const accessListModel       = require('../models/access_list'); | ||||||
| const accessListAuthModel   = require('../models/access_list_auth'); | const accessListAuthModel   = require('../models/access_list_auth'); | ||||||
| const accessListClientModel = require('../models/access_list_client'); | const accessListClientModel = require('../models/access_list_client'); | ||||||
| const proxyHostModel        = require('../models/proxy_host'); | const proxyHostModel        = require('../models/proxy_host'); | ||||||
| const internalAuditLog      = require('./audit-log'); | const internalAuditLog      = require('./audit-log'); | ||||||
| const internalNginx         = require('./nginx'); | const internalNginx         = require('./nginx'); | ||||||
| const utils                 = require('../lib/utils'); |  | ||||||
|  |  | ||||||
| function omissions () { | function omissions () { | ||||||
| 	return ['is_deleted']; | 	return ['is_deleted']; | ||||||
| @@ -27,13 +27,13 @@ const internalAccessList = { | |||||||
| 			.then((/*access_data*/) => { | 			.then((/*access_data*/) => { | ||||||
| 				return accessListModel | 				return accessListModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.insertAndFetch({ | 					.insertAndFetch({ | ||||||
| 						name:          data.name, | 						name:          data.name, | ||||||
| 						satisfy_any:   data.satisfy_any, | 						satisfy_any:   data.satisfy_any, | ||||||
| 						pass_auth:     data.pass_auth, | 						pass_auth:     data.pass_auth, | ||||||
| 						owner_user_id: access.token.getUserId(1) | 						owner_user_id: access.token.getUserId(1) | ||||||
| 					}); | 					}) | ||||||
|  | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				data.id = row.id; | 				data.id = row.id; | ||||||
| @@ -204,7 +204,6 @@ const internalAccessList = { | |||||||
| 						}); | 						}); | ||||||
| 				} | 				} | ||||||
| 			}) | 			}) | ||||||
| 			.then(internalNginx.reload) |  | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// Add to audit log | 				// Add to audit log | ||||||
| 				return internalAuditLog.add(access, { | 				return internalAuditLog.add(access, { | ||||||
| @@ -218,7 +217,7 @@ const internalAccessList = { | |||||||
| 				// re-fetch with expansions | 				// re-fetch with expansions | ||||||
| 				return internalAccessList.get(access, { | 				return internalAccessList.get(access, { | ||||||
| 					id:     data.id, | 					id:     data.id, | ||||||
| 					expand: ['owner', 'items', 'clients', 'proxy_hosts.access_list.[clients,items]'] | 					expand: ['owner', 'items', 'clients', 'proxy_hosts.[certificate,access_list.[clients,items]]'] | ||||||
| 				}, true /* <- skip masking */); | 				}, true /* <- skip masking */); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| @@ -227,7 +226,7 @@ const internalAccessList = { | |||||||
| 						if (row.proxy_host_count) { | 						if (row.proxy_host_count) { | ||||||
| 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | ||||||
| 						} | 						} | ||||||
| 					}) | 					}).then(internalNginx.reload) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						return internalAccessList.maskItems(row); | 						return internalAccessList.maskItems(row); | ||||||
| 					}); | 					}); | ||||||
| @@ -256,35 +255,31 @@ const internalAccessList = { | |||||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||||
| 					.where('access_list.is_deleted', 0) | 					.where('access_list.is_deleted', 0) | ||||||
| 					.andWhere('access_list.id', data.id) | 					.andWhere('access_list.id', data.id) | ||||||
| 					.allowEager('[owner,items,clients,proxy_hosts.[*, access_list.[clients,items]]]') | 					.allowGraph('[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]') | ||||||
| 					.omit(['access_list.is_deleted']) |  | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
|  | 					throw new error.ItemNotFoundError(data.id); | ||||||
|  | 				} | ||||||
| 				if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | 				if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | ||||||
| 					row = internalAccessList.maskItems(row); | 					row = internalAccessList.maskItems(row); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
| 					return _.omit(row, omissions()); | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
| 				} else { | 					row = _.omit(row, data.omit); | ||||||
| 					throw new error.ItemNotFoundError(data.id); |  | ||||||
| 				} | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -381,8 +376,7 @@ const internalAccessList = { | |||||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||||
| 					.where('access_list.is_deleted', 0) | 					.where('access_list.is_deleted', 0) | ||||||
| 					.groupBy('access_list.id') | 					.groupBy('access_list.id') | ||||||
| 					.omit(['access_list.is_deleted']) | 					.allowGraph('[owner,items,clients]') | ||||||
| 					.allowEager('[owner,items,clients]') |  | ||||||
| 					.orderBy('access_list.name', 'ASC'); | 					.orderBy('access_list.name', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -397,10 +391,10 @@ const internalAccessList = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (rows) { | 				if (rows) { | ||||||
| @@ -507,7 +501,7 @@ const internalAccessList = { | |||||||
| 								if (typeof item.password !== 'undefined' && item.password.length) { | 								if (typeof item.password !== 'undefined' && item.password.length) { | ||||||
| 									logger.info('Adding: ' + item.username); | 									logger.info('Adding: ' + item.username); | ||||||
|  |  | ||||||
| 									utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"') | 									utils.execFile('/usr/bin/htpasswd', ['-b', htpasswd_file, item.username, item.password]) | ||||||
| 										.then((/*result*/) => { | 										.then((/*result*/) => { | ||||||
| 											next(); | 											next(); | ||||||
| 										}) | 										}) | ||||||
|   | |||||||
| @@ -19,7 +19,7 @@ const internalAuditLog = { | |||||||
| 					.orderBy('created_on', 'DESC') | 					.orderBy('created_on', 'DESC') | ||||||
| 					.orderBy('id', 'DESC') | 					.orderBy('id', 'DESC') | ||||||
| 					.limit(100) | 					.limit(100) | ||||||
| 					.allowEager('[user]'); | 					.allowGraph('[user]'); | ||||||
|  |  | ||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| 				if (typeof search_query === 'string') { | 				if (typeof search_query === 'string') { | ||||||
| @@ -29,7 +29,7 @@ const internalAuditLog = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query; | ||||||
|   | |||||||
| @@ -4,20 +4,24 @@ const https              = require('https'); | |||||||
| const tempWrite        = require('temp-write'); | const tempWrite        = require('temp-write'); | ||||||
| const moment           = require('moment'); | const moment           = require('moment'); | ||||||
| const logger           = require('../logger').ssl; | const logger           = require('../logger').ssl; | ||||||
|  | const config           = require('../lib/config'); | ||||||
| const error            = require('../lib/error'); | const error            = require('../lib/error'); | ||||||
| const utils            = require('../lib/utils'); | const utils            = require('../lib/utils'); | ||||||
| const certificateModel = require('../models/certificate'); | const certificateModel = require('../models/certificate'); | ||||||
| const dnsPlugins         = require('../global/certbot-dns-plugins'); | const tokenModel       = require('../models/token'); | ||||||
|  | const dnsPlugins       = require('../global/certbot-dns-plugins.json'); | ||||||
| const internalAuditLog = require('./audit-log'); | const internalAuditLog = require('./audit-log'); | ||||||
| const internalNginx    = require('./nginx'); | const internalNginx    = require('./nginx'); | ||||||
| const internalHost     = require('./host'); | const internalHost     = require('./host'); | ||||||
| const letsencryptStaging = process.env.NODE_ENV !== 'production'; | const certbot          = require('../lib/certbot'); | ||||||
| const letsencryptConfig  = '/etc/letsencrypt.ini'; |  | ||||||
| const certbotCommand     = 'certbot'; |  | ||||||
| const archiver         = require('archiver'); | const archiver         = require('archiver'); | ||||||
| const path             = require('path'); | const path             = require('path'); | ||||||
| const { isArray }      = require('lodash'); | const { isArray }      = require('lodash'); | ||||||
|  |  | ||||||
|  | const letsencryptStaging = config.useLetsencryptStaging(); | ||||||
|  | const letsencryptConfig  = '/etc/letsencrypt.ini'; | ||||||
|  | const certbotCommand     = 'certbot'; | ||||||
|  |  | ||||||
| function omissions() { | function omissions() { | ||||||
| 	return ['is_deleted']; | 	return ['is_deleted']; | ||||||
| } | } | ||||||
| @@ -28,6 +32,7 @@ const internalCertificate = { | |||||||
| 	intervalTimeout:         1000 * 60 * 60, // 1 hour | 	intervalTimeout:         1000 * 60 * 60, // 1 hour | ||||||
| 	interval:                null, | 	interval:                null, | ||||||
| 	intervalProcessing:      false, | 	intervalProcessing:      false, | ||||||
|  | 	renewBeforeExpirationBy: [30, 'days'], | ||||||
|  |  | ||||||
| 	initTimer: () => { | 	initTimer: () => { | ||||||
| 		logger.info('Let\'s Encrypt Renewal Timer initialized'); | 		logger.info('Let\'s Encrypt Renewal Timer initialized'); | ||||||
| @@ -42,60 +47,51 @@ const internalCertificate = { | |||||||
| 	processExpiringHosts: () => { | 	processExpiringHosts: () => { | ||||||
| 		if (!internalCertificate.intervalProcessing) { | 		if (!internalCertificate.intervalProcessing) { | ||||||
| 			internalCertificate.intervalProcessing = true; | 			internalCertificate.intervalProcessing = true; | ||||||
| 			logger.info('Renewing SSL certs close to expiry...'); | 			logger.info('Renewing SSL certs expiring within ' + internalCertificate.renewBeforeExpirationBy[0] + ' ' + internalCertificate.renewBeforeExpirationBy[1] + ' ...'); | ||||||
|  |  | ||||||
| 			const cmd = certbotCommand + ' renew --non-interactive --quiet ' + | 			const expirationThreshold = moment().add(internalCertificate.renewBeforeExpirationBy[0], internalCertificate.renewBeforeExpirationBy[1]).format('YYYY-MM-DD HH:mm:ss'); | ||||||
| 				'--config "' + letsencryptConfig + '" ' + |  | ||||||
| 				'--preferred-challenges "dns,http" ' + |  | ||||||
| 				'--disable-hook-validation ' + |  | ||||||
| 				(letsencryptStaging ? '--staging' : ''); |  | ||||||
|  |  | ||||||
| 			return utils.exec(cmd) | 			// Fetch all the letsencrypt certs from the db that will expire within the configured threshold | ||||||
| 				.then((result) => { | 			certificateModel | ||||||
| 					if (result) { |  | ||||||
| 						logger.info('Renew Result: ' + result); |  | ||||||
| 					} |  | ||||||
|  |  | ||||||
| 					return internalNginx.reload() |  | ||||||
| 						.then(() => { |  | ||||||
| 							logger.info('Renew Complete'); |  | ||||||
| 							return result; |  | ||||||
| 						}); |  | ||||||
| 				}) |  | ||||||
| 				.then(() => { |  | ||||||
| 					// Now go and fetch all the letsencrypt certs from the db and query the files and update expiry times |  | ||||||
| 					return certificateModel |  | ||||||
| 				.query() | 				.query() | ||||||
| 				.where('is_deleted', 0) | 				.where('is_deleted', 0) | ||||||
| 				.andWhere('provider', 'letsencrypt') | 				.andWhere('provider', 'letsencrypt') | ||||||
|  | 				.andWhere('expires_on', '<', expirationThreshold) | ||||||
| 				.then((certificates) => { | 				.then((certificates) => { | ||||||
| 							if (certificates && certificates.length) { | 					if (!certificates || !certificates.length) { | ||||||
| 								let promises = []; | 						return null; | ||||||
|  | 					} | ||||||
|  |  | ||||||
| 								certificates.map(function (certificate) { | 					/** | ||||||
| 									promises.push( | 					 * Renews must be run sequentially or we'll get an error 'Another | ||||||
| 										internalCertificate.getCertificateInfoFromFile('/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem') | 					 * instance of Certbot is already running.' | ||||||
| 											.then((cert_info) => { | 					 */ | ||||||
| 												return certificateModel | 					let sequence = Promise.resolve(); | ||||||
| 													.query() |  | ||||||
| 													.where('id', certificate.id) | 					certificates.forEach(function (certificate) { | ||||||
| 													.andWhere('provider', 'letsencrypt') | 						sequence = sequence.then(() => | ||||||
| 													.patch({ | 							internalCertificate | ||||||
| 														expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss') | 								.renew( | ||||||
| 													}); | 									{ | ||||||
| 											}) | 										can: () => | ||||||
|  | 											Promise.resolve({ | ||||||
|  | 												permission_visibility: 'all', | ||||||
|  | 											}), | ||||||
|  | 										token: new tokenModel(), | ||||||
|  | 									}, | ||||||
|  | 									{ id: certificate.id }, | ||||||
|  | 								) | ||||||
| 								.catch((err) => { | 								.catch((err) => { | ||||||
| 									// Don't want to stop the train here, just log the error | 									// Don't want to stop the train here, just log the error | ||||||
| 									logger.error(err.message); | 									logger.error(err.message); | ||||||
| 											}) | 								}), | ||||||
| 						); | 						); | ||||||
| 					}); | 					}); | ||||||
|  |  | ||||||
| 								return Promise.all(promises); | 					return sequence; | ||||||
| 							} |  | ||||||
| 						}); |  | ||||||
| 				}) | 				}) | ||||||
| 				.then(() => { | 				.then(() => { | ||||||
|  | 					logger.info('Completed SSL cert renew process'); | ||||||
| 					internalCertificate.intervalProcessing = false; | 					internalCertificate.intervalProcessing = false; | ||||||
| 				}) | 				}) | ||||||
| 				.catch((err) => { | 				.catch((err) => { | ||||||
| @@ -121,8 +117,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 				return certificateModel | 				return certificateModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((certificate) => { | 			.then((certificate) => { | ||||||
| 				if (certificate.provider === 'letsencrypt') { | 				if (certificate.provider === 'letsencrypt') { | ||||||
| @@ -269,8 +265,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 				return certificateModel | 				return certificateModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(row.id, data) | 					.patchAndFetchById(row.id, data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						saved_row.meta = internalCertificate.cleanMeta(saved_row.meta); | 						saved_row.meta = internalCertificate.cleanMeta(saved_row.meta); | ||||||
| 						data.meta      = internalCertificate.cleanMeta(data.meta); | 						data.meta      = internalCertificate.cleanMeta(data.meta); | ||||||
| @@ -288,7 +284,7 @@ const internalCertificate = { | |||||||
| 							meta:        _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw | 							meta:        _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}); | 			}); | ||||||
| @@ -313,30 +309,28 @@ const internalCertificate = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner]') | 					.allowGraph('[owner]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -466,8 +460,7 @@ const internalCertificate = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner]') | ||||||
| 					.allowEager('[owner]') |  | ||||||
| 					.orderBy('nice_name', 'ASC'); | 					.orderBy('nice_name', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -482,10 +475,10 @@ const internalCertificate = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -662,7 +655,6 @@ const internalCertificate = { | |||||||
| 							meta:         _.clone(row.meta) // Prevent the update method from changing this value that we'll use later | 							meta:         _.clone(row.meta) // Prevent the update method from changing this value that we'll use later | ||||||
| 						}) | 						}) | ||||||
| 							.then((certificate) => { | 							.then((certificate) => { | ||||||
| 								console.log('ROWMETA:', row.meta); |  | ||||||
| 								certificate.meta = row.meta; | 								certificate.meta = row.meta; | ||||||
| 								return internalCertificate.writeCustomCert(certificate); | 								return internalCertificate.writeCustomCert(certificate); | ||||||
| 							}); | 							}); | ||||||
| @@ -837,6 +829,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 		const cmd = certbotCommand + ' certonly ' + | 		const cmd = certbotCommand + ' certonly ' + | ||||||
| 			'--config "' + letsencryptConfig + '" ' + | 			'--config "' + letsencryptConfig + '" ' + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			'--cert-name "npm-' + certificate.id + '" ' + | ||||||
| 			'--agree-tos ' + | 			'--agree-tos ' + | ||||||
| 			'--authenticator webroot ' + | 			'--authenticator webroot ' + | ||||||
| @@ -856,44 +850,40 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {Object}         certificate          the certificate row | 	 * @param   {Object}         certificate          the certificate row | ||||||
| 	 * @param   {String}         dns_provider         the dns provider name (key used in `certbot-dns-plugins.js`) | 	 * @param   {String}         dns_provider         the dns provider name (key used in `certbot-dns-plugins.json`) | ||||||
| 	 * @param   {String | null}  credentials          the content of this providers credentials file | 	 * @param   {String | null}  credentials          the content of this providers credentials file | ||||||
| 	 * @param   {String}         propagation_seconds  the cloudflare api token | 	 * @param   {String}         propagation_seconds | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	requestLetsEncryptSslWithDnsChallenge: (certificate) => { | 	requestLetsEncryptSslWithDnsChallenge: async (certificate) => { | ||||||
| 		const dns_plugin = dnsPlugins[certificate.meta.dns_provider]; | 		await certbot.installPlugin(certificate.meta.dns_provider); | ||||||
|  | 		const dnsPlugin = dnsPlugins[certificate.meta.dns_provider]; | ||||||
| 		if (!dns_plugin) { | 		logger.info(`Requesting Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); | ||||||
| 			throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`); |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		logger.info(`Requesting Let'sEncrypt certificates via ${dns_plugin.display_name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); |  | ||||||
|  |  | ||||||
| 		const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | 		const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | ||||||
| 		// Escape single quotes and backslashes | 		fs.mkdirSync('/etc/letsencrypt/credentials', { recursive: true }); | ||||||
| 		const escapedCredentials = certificate.meta.dns_provider_credentials.replaceAll('\'', '\\\'').replaceAll('\\', '\\\\'); | 		fs.writeFileSync(credentialsLocation, certificate.meta.dns_provider_credentials, {mode: 0o600}); | ||||||
| 		const credentialsCmd     = 'mkdir -p /etc/letsencrypt/credentials 2> /dev/null; echo \'' + escapedCredentials + '\' > \'' + credentialsLocation + '\' && chmod 600 \'' + credentialsLocation + '\''; |  | ||||||
| 		const prepareCmd         = 'pip install ' + dns_plugin.package_name + (dns_plugin.version_requirement || '') + ' ' + dns_plugin.dependencies; |  | ||||||
|  |  | ||||||
| 		// Whether the plugin has a --<name>-credentials argument | 		// Whether the plugin has a --<name>-credentials argument | ||||||
| 		const hasConfigArg = certificate.meta.dns_provider !== 'route53'; | 		const hasConfigArg = certificate.meta.dns_provider !== 'route53'; | ||||||
|  |  | ||||||
| 		let mainCmd = certbotCommand + ' certonly ' + | 		let mainCmd = certbotCommand + ' certonly ' + | ||||||
| 			'--config "' + letsencryptConfig + '" ' + | 			'--config "' + letsencryptConfig + '" ' + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			'--cert-name "npm-' + certificate.id + '" ' + | ||||||
| 			'--agree-tos ' + | 			'--agree-tos ' + | ||||||
| 			'--email "' + certificate.meta.letsencrypt_email + '" ' + | 			'--email "' + certificate.meta.letsencrypt_email + '" ' + | ||||||
| 			'--domains "' + certificate.domain_names.join(',') + '" ' + | 			'--domains "' + certificate.domain_names.join(',') + '" ' + | ||||||
| 			'--authenticator ' + dns_plugin.full_plugin_name + ' ' + | 			'--authenticator ' + dnsPlugin.full_plugin_name + ' ' + | ||||||
| 			( | 			( | ||||||
| 				hasConfigArg | 				hasConfigArg | ||||||
| 					? '--' + dns_plugin.full_plugin_name + '-credentials "' + credentialsLocation + '"' | 					? '--' + dnsPlugin.full_plugin_name + '-credentials "' + credentialsLocation + '"' | ||||||
| 					: '' | 					: '' | ||||||
| 			) + | 			) + | ||||||
| 			( | 			( | ||||||
| 				certificate.meta.propagation_seconds !== undefined | 				certificate.meta.propagation_seconds !== undefined | ||||||
| 					? ' --' + dns_plugin.full_plugin_name + '-propagation-seconds ' + certificate.meta.propagation_seconds | 					? ' --' + dnsPlugin.full_plugin_name + '-propagation-seconds ' + certificate.meta.propagation_seconds | ||||||
| 					: '' | 					: '' | ||||||
| 			) + | 			) + | ||||||
| 			(letsencryptStaging ? ' --staging' : ''); | 			(letsencryptStaging ? ' --staging' : ''); | ||||||
| @@ -903,24 +893,21 @@ const internalCertificate = { | |||||||
| 			mainCmd = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd; | 			mainCmd = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd; | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		logger.info('Command:', `${credentialsCmd} && ${prepareCmd} && ${mainCmd}`); | 		if (certificate.meta.dns_provider === 'duckdns') { | ||||||
|  | 			mainCmd = mainCmd + ' --dns-duckdns-no-txt-restore'; | ||||||
|  | 		} | ||||||
|  |  | ||||||
| 		return utils.exec(credentialsCmd) | 		logger.info('Command:', mainCmd); | ||||||
| 			.then(() => { |  | ||||||
| 				return utils.exec(prepareCmd) | 		try { | ||||||
| 					.then(() => { | 			const result = await utils.exec(mainCmd); | ||||||
| 						return utils.exec(mainCmd) |  | ||||||
| 							.then(async (result) => { |  | ||||||
| 			logger.info(result); | 			logger.info(result); | ||||||
| 			return result; | 			return result; | ||||||
| 							}); | 		} catch (err) { | ||||||
| 					}); | 			// Don't fail if file does not exist, so no need for action in the callback | ||||||
| 			}).catch(async (err) => { | 			fs.unlink(credentialsLocation, () => {}); | ||||||
| 				// Don't fail if file does not exist |  | ||||||
| 				const delete_credentialsCmd = `rm -f '${credentialsLocation}' || true`; |  | ||||||
| 				await utils.exec(delete_credentialsCmd); |  | ||||||
| 			throw err; | 			throw err; | ||||||
| 			}); | 		} | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  |  | ||||||
| @@ -977,6 +964,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 		const cmd = certbotCommand + ' renew --force-renewal ' + | 		const cmd = certbotCommand + ' renew --force-renewal ' + | ||||||
| 			'--config "' + letsencryptConfig + '" ' + | 			'--config "' + letsencryptConfig + '" ' + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			'--cert-name "npm-' + certificate.id + '" ' + | ||||||
| 			'--preferred-challenges "dns,http" ' + | 			'--preferred-challenges "dns,http" ' + | ||||||
| 			'--no-random-sleep-on-renew ' + | 			'--no-random-sleep-on-renew ' + | ||||||
| @@ -997,16 +986,18 @@ const internalCertificate = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	renewLetsEncryptSslWithDnsChallenge: (certificate) => { | 	renewLetsEncryptSslWithDnsChallenge: (certificate) => { | ||||||
| 		const dns_plugin = dnsPlugins[certificate.meta.dns_provider]; | 		const dnsPlugin = dnsPlugins[certificate.meta.dns_provider]; | ||||||
|  |  | ||||||
| 		if (!dns_plugin) { | 		if (!dnsPlugin) { | ||||||
| 			throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`); | 			throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		logger.info(`Renewing Let'sEncrypt certificates via ${dns_plugin.display_name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); | 		logger.info(`Renewing Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); | ||||||
|  |  | ||||||
| 		let mainCmd = certbotCommand + ' renew ' + | 		let mainCmd = certbotCommand + ' renew --force-renewal ' + | ||||||
| 			'--config "' + letsencryptConfig + '" ' + | 			'--config "' + letsencryptConfig + '" ' + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			'--cert-name "npm-' + certificate.id + '" ' + | ||||||
| 			'--disable-hook-validation ' + | 			'--disable-hook-validation ' + | ||||||
| 			'--no-random-sleep-on-renew ' + | 			'--no-random-sleep-on-renew ' + | ||||||
| @@ -1037,6 +1028,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 		const mainCmd = certbotCommand + ' revoke ' + | 		const mainCmd = certbotCommand + ' revoke ' + | ||||||
| 			'--config "' + letsencryptConfig + '" ' + | 			'--config "' + letsencryptConfig + '" ' + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
| 			'--cert-path "/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem" ' + | 			'--cert-path "/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem" ' + | ||||||
| 			'--delete-after-revoke ' + | 			'--delete-after-revoke ' + | ||||||
| 			(letsencryptStaging ? '--staging' : ''); | 			(letsencryptStaging ? '--staging' : ''); | ||||||
| @@ -1154,6 +1147,7 @@ const internalCertificate = { | |||||||
| 			const options  = { | 			const options  = { | ||||||
| 				method:  'POST', | 				method:  'POST', | ||||||
| 				headers: { | 				headers: { | ||||||
|  | 					'User-Agent':     'Mozilla/5.0', | ||||||
| 					'Content-Type':   'application/x-www-form-urlencoded', | 					'Content-Type':   'application/x-www-form-urlencoded', | ||||||
| 					'Content-Length': Buffer.byteLength(formBody) | 					'Content-Length': Buffer.byteLength(formBody) | ||||||
| 				} | 				} | ||||||
| @@ -1166,12 +1160,22 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 					res.on('data', (chunk) => responseBody = responseBody + chunk); | 					res.on('data', (chunk) => responseBody = responseBody + chunk); | ||||||
| 					res.on('end', function () { | 					res.on('end', function () { | ||||||
|  | 						try { | ||||||
| 							const parsedBody = JSON.parse(responseBody + ''); | 							const parsedBody = JSON.parse(responseBody + ''); | ||||||
| 							if (res.statusCode !== 200) { | 							if (res.statusCode !== 200) { | ||||||
| 							logger.warn(`Failed to test HTTP challenge for domain ${domain}`, res); | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned: ${parsedBody.message}`); | ||||||
|  | 								resolve(undefined); | ||||||
|  | 							} else { | ||||||
|  | 								resolve(parsedBody); | ||||||
|  | 							} | ||||||
|  | 						} catch (err) { | ||||||
|  | 							if (res.statusCode !== 200) { | ||||||
|  | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned`); | ||||||
|  | 							} else { | ||||||
|  | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because response failed to be parsed: ${err.message}`); | ||||||
|  | 							} | ||||||
| 							resolve(undefined); | 							resolve(undefined); | ||||||
| 						} | 						} | ||||||
| 						resolve(parsedBody); |  | ||||||
| 					}); | 					}); | ||||||
| 				}); | 				}); | ||||||
|  |  | ||||||
| @@ -1185,6 +1189,9 @@ const internalCertificate = { | |||||||
| 			if (!result) { | 			if (!result) { | ||||||
| 				// Some error occurred while trying to get the data | 				// Some error occurred while trying to get the data | ||||||
| 				return 'failed'; | 				return 'failed'; | ||||||
|  | 			} else if (result.error) { | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} because error was returned: ${result.error.msg}`); | ||||||
|  | 				return `other:${result.error.msg}`; | ||||||
| 			} else if (`${result.responsecode}` === '200' && result.htmlresponse === 'Success') { | 			} else if (`${result.responsecode}` === '200' && result.htmlresponse === 'Success') { | ||||||
| 				// Server exists and has responded with the correct data | 				// Server exists and has responded with the correct data | ||||||
| 				return 'ok'; | 				return 'ok'; | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const deadHostModel       = require('../models/dead_host'); | const deadHostModel       = require('../models/dead_host'); | ||||||
| const internalHost        = require('./host'); | const internalHost        = require('./host'); | ||||||
| const internalNginx       = require('./nginx'); | const internalNginx       = require('./nginx'); | ||||||
| @@ -49,8 +50,8 @@ const internalDeadHost = { | |||||||
|  |  | ||||||
| 				return deadHostModel | 				return deadHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -218,31 +219,28 @@ const internalDeadHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,certificate]') | 					.allowGraph('[owner,certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -404,8 +402,7 @@ const internalDeadHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,certificate]') | ||||||
| 					.allowEager('[owner,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -420,10 +417,10 @@ const internalDeadHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -2,8 +2,8 @@ const https         = require('https'); | |||||||
| const fs            = require('fs'); | const fs            = require('fs'); | ||||||
| const logger        = require('../logger').ip_ranges; | const logger        = require('../logger').ip_ranges; | ||||||
| const error         = require('../lib/error'); | const error         = require('../lib/error'); | ||||||
|  | const utils         = require('../lib/utils'); | ||||||
| const internalNginx = require('./nginx'); | const internalNginx = require('./nginx'); | ||||||
| const { Liquid }    = require('liquidjs'); |  | ||||||
|  |  | ||||||
| const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json'; | const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json'; | ||||||
| const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4'; | const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4'; | ||||||
| @@ -119,10 +119,7 @@ const internalIpRanges = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateConfig: (ip_ranges) => { | 	generateConfig: (ip_ranges) => { | ||||||
| 		let renderEngine = new Liquid({ | 		const renderEngine = utils.getRenderEngine(); | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| 			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf'; | 			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf'; | ||||||
|   | |||||||
| @@ -1,10 +1,9 @@ | |||||||
| const _      = require('lodash'); | const _      = require('lodash'); | ||||||
| const fs     = require('fs'); | const fs     = require('fs'); | ||||||
| const logger = require('../logger').nginx; | const logger = require('../logger').nginx; | ||||||
|  | const config = require('../lib/config'); | ||||||
| const utils  = require('../lib/utils'); | const utils  = require('../lib/utils'); | ||||||
| const error  = require('../lib/error'); | const error  = require('../lib/error'); | ||||||
| const { Liquid } = require('liquidjs'); |  | ||||||
| const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG; |  | ||||||
|  |  | ||||||
| const internalNginx = { | const internalNginx = { | ||||||
|  |  | ||||||
| @@ -29,7 +28,9 @@ const internalNginx = { | |||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// Nginx is OK | 				// Nginx is OK | ||||||
| 				// We're deleting this config regardless. | 				// We're deleting this config regardless. | ||||||
| 				return internalNginx.deleteConfig(host_type, host); // Don't throw errors, as the file may not exist at all | 				// Don't throw errors, as the file may not exist at all | ||||||
|  | 				// Delete the .err file too | ||||||
|  | 				return internalNginx.deleteConfig(host_type, host, false, true); | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalNginx.generateConfig(host_type, host); | 				return internalNginx.generateConfig(host_type, host); | ||||||
| @@ -64,7 +65,7 @@ const internalNginx = { | |||||||
| 							} | 							} | ||||||
| 						}); | 						}); | ||||||
|  |  | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.error('Nginx test failed:', valid_lines.join('\n')); | 							logger.error('Nginx test failed:', valid_lines.join('\n')); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -80,6 +81,9 @@ const internalNginx = { | |||||||
| 							.patch({ | 							.patch({ | ||||||
| 								meta: combined_meta | 								meta: combined_meta | ||||||
| 							}) | 							}) | ||||||
|  | 							.then(() => { | ||||||
|  | 								internalNginx.renameConfigAsError(host_type, host); | ||||||
|  | 							}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return internalNginx.deleteConfig(host_type, host, true); | 								return internalNginx.deleteConfig(host_type, host, true); | ||||||
| 							}); | 							}); | ||||||
| @@ -97,7 +101,7 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	test: () => { | 	test: () => { | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Testing Nginx configuration'); | 			logger.info('Testing Nginx configuration'); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| @@ -121,13 +125,10 @@ const internalNginx = { | |||||||
| 	 * @returns {String} | 	 * @returns {String} | ||||||
| 	 */ | 	 */ | ||||||
| 	getConfigName: (host_type, host_id) => { | 	getConfigName: (host_type, host_id) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); |  | ||||||
|  |  | ||||||
| 		if (host_type === 'default') { | 		if (host_type === 'default') { | ||||||
| 			return '/data/nginx/default_host/site.conf'; | 			return '/data/nginx/default_host/site.conf'; | ||||||
| 		} | 		} | ||||||
|  | 		return '/data/nginx/' + internalNginx.getFileFriendlyHostType(host_type) + '/' + host_id + '.conf'; | ||||||
| 		return '/data/nginx/' + host_type + '/' + host_id + '.conf'; |  | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| @@ -136,8 +137,6 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	renderLocations: (host) => { | 	renderLocations: (host) => { | ||||||
|  |  | ||||||
| 		//logger.info('host = ' + JSON.stringify(host, null, 2)); |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template; | 			let template; | ||||||
|  |  | ||||||
| @@ -148,9 +147,7 @@ const internalNginx = { | |||||||
| 				return; | 				return; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			let renderer          = new Liquid({ | 			const renderEngine    = utils.getRenderEngine(); | ||||||
| 				root: __dirname + '/../templates/' |  | ||||||
| 			}); |  | ||||||
| 			let renderedLocations = ''; | 			let renderedLocations = ''; | ||||||
|  |  | ||||||
| 			const locationRendering = async () => { | 			const locationRendering = async () => { | ||||||
| @@ -168,10 +165,8 @@ const internalNginx = { | |||||||
| 						locationCopy.forward_path = `/${splitted.join('/')}`; | 						locationCopy.forward_path = `/${splitted.join('/')}`; | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 					//logger.info('locationCopy = ' + JSON.stringify(locationCopy, null, 2)); |  | ||||||
|  |  | ||||||
| 					// eslint-disable-next-line | 					// eslint-disable-next-line | ||||||
| 					renderedLocations += await renderer.parseAndRender(template, locationCopy); | 					renderedLocations += await renderEngine.parseAndRender(template, locationCopy); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 			}; | 			}; | ||||||
| @@ -187,24 +182,20 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateConfig: (host_type, host) => { | 	generateConfig: (host_type, host) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | 		const nice_host_type = internalNginx.getFileFriendlyHostType(host_type); | ||||||
|  |  | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Generating ' + host_type + ' Config:', host); | 			logger.info('Generating ' + nice_host_type + ' Config:', JSON.stringify(host, null, 2)); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		// logger.info('host = ' + JSON.stringify(host, null, 2)); | 		const renderEngine = utils.getRenderEngine(); | ||||||
|  |  | ||||||
| 		let renderEngine = new Liquid({ |  | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| 			let filename = internalNginx.getConfigName(host_type, host.id); | 			let filename = internalNginx.getConfigName(nice_host_type, host.id); | ||||||
|  |  | ||||||
| 			try { | 			try { | ||||||
| 				template = fs.readFileSync(__dirname + '/../templates/' + host_type + '.conf', {encoding: 'utf8'}); | 				template = fs.readFileSync(__dirname + '/../templates/' + nice_host_type + '.conf', {encoding: 'utf8'}); | ||||||
| 			} catch (err) { | 			} catch (err) { | ||||||
| 				reject(new error.ConfigurationError(err.message)); | 				reject(new error.ConfigurationError(err.message)); | ||||||
| 				return; | 				return; | ||||||
| @@ -214,7 +205,7 @@ const internalNginx = { | |||||||
| 			let origLocations; | 			let origLocations; | ||||||
|  |  | ||||||
| 			// Manipulate the data a bit before sending it to the template | 			// Manipulate the data a bit before sending it to the template | ||||||
| 			if (host_type !== 'default') { | 			if (nice_host_type !== 'default') { | ||||||
| 				host.use_default_location = true; | 				host.use_default_location = true; | ||||||
| 				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) { | 				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) { | ||||||
| 					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config); | 					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config); | ||||||
| @@ -248,7 +239,7 @@ const internalNginx = { | |||||||
| 					.then((config_text) => { | 					.then((config_text) => { | ||||||
| 						fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | 						fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||||
|  |  | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.success('Wrote config:', filename, config_text); | 							logger.success('Wrote config:', filename, config_text); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -258,7 +249,7 @@ const internalNginx = { | |||||||
| 						resolve(true); | 						resolve(true); | ||||||
| 					}) | 					}) | ||||||
| 					.catch((err) => { | 					.catch((err) => { | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.warn('Could not write ' + filename + ':', err.message); | 							logger.warn('Could not write ' + filename + ':', err.message); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -277,13 +268,11 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateLetsEncryptRequestConfig: (certificate) => { | 	generateLetsEncryptRequestConfig: (certificate) => { | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Generating LetsEncrypt Request Config:', certificate); | 			logger.info('Generating LetsEncrypt Request Config:', certificate); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		let renderEngine = new Liquid({ | 		const renderEngine = utils.getRenderEngine(); | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| @@ -303,14 +292,14 @@ const internalNginx = { | |||||||
| 				.then((config_text) => { | 				.then((config_text) => { | ||||||
| 					fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | 					fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||||
|  |  | ||||||
| 					if (debug_mode) { | 					if (config.debug()) { | ||||||
| 						logger.success('Wrote config:', filename, config_text); | 						logger.success('Wrote config:', filename, config_text); | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 					resolve(true); | 					resolve(true); | ||||||
| 				}) | 				}) | ||||||
| 				.catch((err) => { | 				.catch((err) => { | ||||||
| 					if (debug_mode) { | 					if (config.debug()) { | ||||||
| 						logger.warn('Could not write ' + filename + ':', err.message); | 						logger.warn('Could not write ' + filename + ':', err.message); | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| @@ -319,33 +308,39 @@ const internalNginx = { | |||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * A simple wrapper around unlinkSync that writes to the logger | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {String}  filename | ||||||
|  | 	 */ | ||||||
|  | 	deleteFile: (filename) => { | ||||||
|  | 		logger.debug('Deleting file: ' + filename); | ||||||
|  | 		try { | ||||||
|  | 			fs.unlinkSync(filename); | ||||||
|  | 		} catch (err) { | ||||||
|  | 			logger.debug('Could not delete file:', JSON.stringify(err, null, 2)); | ||||||
|  | 		} | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {String} host_type | ||||||
|  | 	 * @returns String | ||||||
|  | 	 */ | ||||||
|  | 	getFileFriendlyHostType: (host_type) => { | ||||||
|  | 		return host_type.replace(new RegExp('-', 'g'), '_'); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig` | 	 * This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig` | ||||||
| 	 * | 	 * | ||||||
| 	 * @param   {Object}  certificate | 	 * @param   {Object}  certificate | ||||||
| 	 * @param   {Boolean} [throw_errors] |  | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	deleteLetsEncryptRequestConfig: (certificate, throw_errors) => { | 	deleteLetsEncryptRequestConfig: (certificate) => { | ||||||
| 		return new Promise((resolve, reject) => { | 		const config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | ||||||
| 			try { | 		return new Promise((resolve/*, reject*/) => { | ||||||
| 				let config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | 			internalNginx.deleteFile(config_file); | ||||||
|  |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Deleting nginx config: ' + config_file); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				fs.unlinkSync(config_file); |  | ||||||
| 			} catch (err) { |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Could not delete config:', err.message); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (throw_errors) { |  | ||||||
| 					reject(err); |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			resolve(); | 			resolve(); | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
| @@ -353,35 +348,42 @@ const internalNginx = { | |||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Object}  [host] | 	 * @param   {Object}  [host] | ||||||
| 	 * @param   {Boolean} [throw_errors] | 	 * @param   {Boolean} [delete_err_file] | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	deleteConfig: (host_type, host, throw_errors) => { | 	deleteConfig: (host_type, host, delete_err_file) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||||
|  | 		const config_file_err = config_file + '.err'; | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve/*, reject*/) => { | ||||||
| 			try { | 			internalNginx.deleteFile(config_file); | ||||||
| 				let config_file = internalNginx.getConfigName(host_type, typeof host === 'undefined' ? 0 : host.id); | 			if (delete_err_file) { | ||||||
|  | 				internalNginx.deleteFile(config_file_err); | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Deleting nginx config: ' + config_file); |  | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 				fs.unlinkSync(config_file); |  | ||||||
| 			} catch (err) { |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Could not delete config:', err.message); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (throw_errors) { |  | ||||||
| 					reject(err); |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			resolve(); | 			resolve(); | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param   {String}  host_type | ||||||
|  | 	 * @param   {Object}  [host] | ||||||
|  | 	 * @returns {Promise} | ||||||
|  | 	 */ | ||||||
|  | 	renameConfigAsError: (host_type, host) => { | ||||||
|  | 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||||
|  | 		const config_file_err = config_file + '.err'; | ||||||
|  |  | ||||||
|  | 		return new Promise((resolve/*, reject*/) => { | ||||||
|  | 			fs.unlink(config_file, () => { | ||||||
|  | 				// ignore result, continue | ||||||
|  | 				fs.rename(config_file, config_file_err, () => { | ||||||
|  | 					// also ignore result, as this is a debugging informative file anyway | ||||||
|  | 					resolve(); | ||||||
|  | 				}); | ||||||
|  | 			}); | ||||||
|  | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Array}   hosts | 	 * @param   {Array}   hosts | ||||||
| @@ -399,13 +401,12 @@ const internalNginx = { | |||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Array}   hosts | 	 * @param   {Array}   hosts | ||||||
| 	 * @param   {Boolean} [throw_errors] |  | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	bulkDeleteConfigs: (host_type, hosts, throw_errors) => { | 	bulkDeleteConfigs: (host_type, hosts) => { | ||||||
| 		let promises = []; | 		let promises = []; | ||||||
| 		hosts.map(function (host) { | 		hosts.map(function (host) { | ||||||
| 			promises.push(internalNginx.deleteConfig(host_type, host, throw_errors)); | 			promises.push(internalNginx.deleteConfig(host_type, host, true)); | ||||||
| 		}); | 		}); | ||||||
|  |  | ||||||
| 		return Promise.all(promises); | 		return Promise.all(promises); | ||||||
| @@ -415,8 +416,8 @@ const internalNginx = { | |||||||
| 	 * @param   {string}  config | 	 * @param   {string}  config | ||||||
| 	 * @returns {boolean} | 	 * @returns {boolean} | ||||||
| 	 */ | 	 */ | ||||||
| 	advancedConfigHasDefaultLocation: function (config) { | 	advancedConfigHasDefaultLocation: function (cfg) { | ||||||
| 		return !!config.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im); | 		return !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const proxyHostModel      = require('../models/proxy_host'); | const proxyHostModel      = require('../models/proxy_host'); | ||||||
| const internalHost        = require('./host'); | const internalHost        = require('./host'); | ||||||
| const internalNginx       = require('./nginx'); | const internalNginx       = require('./nginx'); | ||||||
| @@ -49,8 +50,8 @@ const internalProxyHost = { | |||||||
|  |  | ||||||
| 				return proxyHostModel | 				return proxyHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -170,6 +171,7 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where({id: data.id}) | 					.where({id: data.id}) | ||||||
| 					.patch(data) | 					.patch(data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						// Add to audit log | 						// Add to audit log | ||||||
| 						return internalAuditLog.add(access, { | 						return internalAuditLog.add(access, { | ||||||
| @@ -179,7 +181,7 @@ const internalProxyHost = { | |||||||
| 							meta:        data | 							meta:        data | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}) | 			}) | ||||||
| @@ -223,31 +225,29 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,access_list,access_list.[clients,items],certificate]') | 					.allowGraph('[owner,access_list.[clients,items],certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				row = internalHost.cleanRowCertificateMeta(row); | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -409,8 +409,7 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,access_list,certificate]') | ||||||
| 					.allowEager('[owner,access_list,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -425,10 +424,10 @@ const internalProxyHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                    = require('lodash'); | const _                    = require('lodash'); | ||||||
| const error                = require('../lib/error'); | const error                = require('../lib/error'); | ||||||
|  | const utils                = require('../lib/utils'); | ||||||
| const redirectionHostModel = require('../models/redirection_host'); | const redirectionHostModel = require('../models/redirection_host'); | ||||||
| const internalHost         = require('./host'); | const internalHost         = require('./host'); | ||||||
| const internalNginx        = require('./nginx'); | const internalNginx        = require('./nginx'); | ||||||
| @@ -49,8 +50,8 @@ const internalRedirectionHost = { | |||||||
|  |  | ||||||
| 				return redirectionHostModel | 				return redirectionHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -65,9 +66,8 @@ const internalRedirectionHost = { | |||||||
| 						.then(() => { | 						.then(() => { | ||||||
| 							return row; | 							return row; | ||||||
| 						}); | 						}); | ||||||
| 				} else { |  | ||||||
| 					return row; |  | ||||||
| 				} | 				} | ||||||
|  | 				return row; | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				// re-fetch with cert | 				// re-fetch with cert | ||||||
| @@ -218,31 +218,29 @@ const internalRedirectionHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,certificate]') | 					.allowGraph('[owner,certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				row = internalHost.cleanRowCertificateMeta(row); | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -404,8 +402,7 @@ const internalRedirectionHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,certificate]') | ||||||
| 					.allowEager('[owner,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -420,10 +417,10 @@ const internalRedirectionHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                = require('lodash'); | const _                = require('lodash'); | ||||||
| const error            = require('../lib/error'); | const error            = require('../lib/error'); | ||||||
|  | const utils            = require('../lib/utils'); | ||||||
| const streamModel      = require('../models/stream'); | const streamModel      = require('../models/stream'); | ||||||
| const internalNginx    = require('./nginx'); | const internalNginx    = require('./nginx'); | ||||||
| const internalAuditLog = require('./audit-log'); | const internalAuditLog = require('./audit-log'); | ||||||
| @@ -27,8 +28,8 @@ const internalStream = { | |||||||
|  |  | ||||||
| 				return streamModel | 				return streamModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				// Configure nginx | 				// Configure nginx | ||||||
| @@ -71,8 +72,8 @@ const internalStream = { | |||||||
|  |  | ||||||
| 				return streamModel | 				return streamModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(row.id, data) | 					.patchAndFetchById(row.id, data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						return internalNginx.configure(streamModel, 'stream', saved_row) | 						return internalNginx.configure(streamModel, 'stream', saved_row) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| @@ -88,7 +89,7 @@ const internalStream = { | |||||||
| 							meta:        data | 							meta:        data | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}); | 			}); | ||||||
| @@ -113,30 +114,28 @@ const internalStream = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner]') | 					.allowGraph('[owner]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -298,8 +297,7 @@ const internalStream = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner]') | ||||||
| 					.allowEager('[owner]') |  | ||||||
| 					.orderBy('incoming_port', 'ASC'); | 					.orderBy('incoming_port', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -314,10 +312,10 @@ const internalStream = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|   | |||||||
| @@ -24,7 +24,7 @@ module.exports = { | |||||||
|  |  | ||||||
| 		return userModel | 		return userModel | ||||||
| 			.query() | 			.query() | ||||||
| 			.where('email', data.identity) | 			.where('email', data.identity.toLowerCase().trim()) | ||||||
| 			.andWhere('is_deleted', 0) | 			.andWhere('is_deleted', 0) | ||||||
| 			.andWhere('is_disabled', 0) | 			.andWhere('is_disabled', 0) | ||||||
| 			.first() | 			.first() | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const userModel           = require('../models/user'); | const userModel           = require('../models/user'); | ||||||
| const userPermissionModel = require('../models/user_permission'); | const userPermissionModel = require('../models/user_permission'); | ||||||
| const authModel           = require('../models/auth'); | const authModel           = require('../models/auth'); | ||||||
| @@ -35,8 +36,8 @@ const internalUser = { | |||||||
|  |  | ||||||
| 				return userModel | 				return userModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((user) => { | 			.then((user) => { | ||||||
| 				if (auth) { | 				if (auth) { | ||||||
| @@ -140,11 +141,8 @@ const internalUser = { | |||||||
|  |  | ||||||
| 				return userModel | 				return userModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(user.id, data) | 					.patchAndFetchById(user.id, data) | ||||||
| 					.then((saved_user) => { | 					.then(utils.omitRow(omissions())); | ||||||
| 						return _.omit(saved_user, omissions()); |  | ||||||
| 					}); |  | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalUser.get(access, {id: data.id}); | 				return internalUser.get(access, {id: data.id}); | ||||||
| @@ -186,26 +184,24 @@ const internalUser = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[permissions]') | 					.allowGraph('[permissions]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -322,8 +318,7 @@ const internalUser = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[permissions]') | ||||||
| 					.allowEager('[permissions]') |  | ||||||
| 					.orderBy('name', 'ASC'); | 					.orderBy('name', 'ASC'); | ||||||
|  |  | ||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| @@ -335,10 +330,10 @@ const internalUser = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|   | |||||||
| @@ -55,8 +55,8 @@ module.exports = function (token_string) { | |||||||
| 								.where('id', token_data.attrs.id) | 								.where('id', token_data.attrs.id) | ||||||
| 								.andWhere('is_deleted', 0) | 								.andWhere('is_deleted', 0) | ||||||
| 								.andWhere('is_disabled', 0) | 								.andWhere('is_disabled', 0) | ||||||
| 								.allowEager('[permissions]') | 								.allowGraph('[permissions]') | ||||||
| 								.eager('[permissions]') | 								.withGraphFetched('[permissions]') | ||||||
| 								.first() | 								.first() | ||||||
| 								.then((user) => { | 								.then((user) => { | ||||||
| 									if (user) { | 									if (user) { | ||||||
|   | |||||||
							
								
								
									
										78
									
								
								backend/lib/certbot.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								backend/lib/certbot.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,78 @@ | |||||||
|  | const dnsPlugins = require('../global/certbot-dns-plugins.json'); | ||||||
|  | const utils      = require('./utils'); | ||||||
|  | const error      = require('./error'); | ||||||
|  | const logger     = require('../logger').certbot; | ||||||
|  | const batchflow  = require('batchflow'); | ||||||
|  |  | ||||||
|  | const CERTBOT_VERSION_REPLACEMENT = '$(certbot --version | grep -Eo \'[0-9](\\.[0-9]+)+\')'; | ||||||
|  |  | ||||||
|  | const certbot = { | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param {array} pluginKeys | ||||||
|  | 	 */ | ||||||
|  | 	installPlugins: async function (pluginKeys) { | ||||||
|  | 		let hasErrors = false; | ||||||
|  |  | ||||||
|  | 		return new Promise((resolve, reject) => { | ||||||
|  | 			if (pluginKeys.length === 0) { | ||||||
|  | 				resolve(); | ||||||
|  | 				return; | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			batchflow(pluginKeys).sequential() | ||||||
|  | 				.each((i, pluginKey, next) => { | ||||||
|  | 					certbot.installPlugin(pluginKey) | ||||||
|  | 						.then(() => { | ||||||
|  | 							next(); | ||||||
|  | 						}) | ||||||
|  | 						.catch((err) => { | ||||||
|  | 							hasErrors = true; | ||||||
|  | 							next(err); | ||||||
|  | 						}); | ||||||
|  | 				}) | ||||||
|  | 				.error((err) => { | ||||||
|  | 					logger.error(err.message); | ||||||
|  | 				}) | ||||||
|  | 				.end(() => { | ||||||
|  | 					if (hasErrors) { | ||||||
|  | 						reject(new error.CommandError('Some plugins failed to install. Please check the logs above', 1)); | ||||||
|  | 					} else { | ||||||
|  | 						resolve(); | ||||||
|  | 					} | ||||||
|  | 				}); | ||||||
|  | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Installs a cerbot plugin given the key for the object from | ||||||
|  | 	 * ../global/certbot-dns-plugins.json | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {string}  pluginKey | ||||||
|  | 	 * @returns {Object} | ||||||
|  | 	 */ | ||||||
|  | 	installPlugin: async function (pluginKey) { | ||||||
|  | 		if (typeof dnsPlugins[pluginKey] === 'undefined') { | ||||||
|  | 			// throw Error(`Certbot plugin ${pluginKey} not found`); | ||||||
|  | 			throw new error.ItemNotFoundError(pluginKey); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		const plugin = dnsPlugins[pluginKey]; | ||||||
|  | 		logger.start(`Installing ${pluginKey}...`); | ||||||
|  |  | ||||||
|  | 		plugin.version      = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||||
|  | 		plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||||
|  |  | ||||||
|  | 		const cmd = '. /opt/certbot/bin/activate && pip install --no-cache-dir ' + plugin.dependencies + ' ' + plugin.package_name + plugin.version + ' ' + ' && deactivate'; | ||||||
|  | 		return utils.exec(cmd) | ||||||
|  | 			.then((result) => { | ||||||
|  | 				logger.complete(`Installed ${pluginKey}`); | ||||||
|  | 				return result; | ||||||
|  | 			}) | ||||||
|  | 			.catch((err) => { | ||||||
|  | 				throw err; | ||||||
|  | 			}); | ||||||
|  | 	}, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | module.exports = certbot; | ||||||
							
								
								
									
										184
									
								
								backend/lib/config.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										184
									
								
								backend/lib/config.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,184 @@ | |||||||
|  | const fs      = require('fs'); | ||||||
|  | const NodeRSA = require('node-rsa'); | ||||||
|  | const logger  = require('../logger').global; | ||||||
|  |  | ||||||
|  | const keysFile = '/data/keys.json'; | ||||||
|  |  | ||||||
|  | let instance = null; | ||||||
|  |  | ||||||
|  | // 1. Load from config file first (not recommended anymore) | ||||||
|  | // 2. Use config env variables next | ||||||
|  | const configure = () => { | ||||||
|  | 	const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json'; | ||||||
|  | 	if (fs.existsSync(filename)) { | ||||||
|  | 		let configData; | ||||||
|  | 		try { | ||||||
|  | 			configData = require(filename); | ||||||
|  | 		} catch (err) { | ||||||
|  | 			// do nothing | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if (configData && configData.database) { | ||||||
|  | 			logger.info(`Using configuration from file: ${filename}`); | ||||||
|  | 			instance      = configData; | ||||||
|  | 			instance.keys = getKeys(); | ||||||
|  | 			return; | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	const envMysqlHost = process.env.DB_MYSQL_HOST || null; | ||||||
|  | 	const envMysqlUser = process.env.DB_MYSQL_USER || null; | ||||||
|  | 	const envMysqlName = process.env.DB_MYSQL_NAME || null; | ||||||
|  | 	if (envMysqlHost && envMysqlUser && envMysqlName) { | ||||||
|  | 		// we have enough mysql creds to go with mysql | ||||||
|  | 		logger.info('Using MySQL configuration'); | ||||||
|  | 		instance = { | ||||||
|  | 			database: { | ||||||
|  | 				engine:   'mysql', | ||||||
|  | 				host:     envMysqlHost, | ||||||
|  | 				port:     process.env.DB_MYSQL_PORT || 3306, | ||||||
|  | 				user:     envMysqlUser, | ||||||
|  | 				password: process.env.DB_MYSQL_PASSWORD, | ||||||
|  | 				name:     envMysqlName, | ||||||
|  | 			}, | ||||||
|  | 			keys: getKeys(), | ||||||
|  | 		}; | ||||||
|  | 		return; | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	const envSqliteFile = process.env.DB_SQLITE_FILE || '/data/database.sqlite'; | ||||||
|  | 	logger.info(`Using Sqlite: ${envSqliteFile}`); | ||||||
|  | 	instance = { | ||||||
|  | 		database: { | ||||||
|  | 			engine: 'knex-native', | ||||||
|  | 			knex:   { | ||||||
|  | 				client:     'sqlite3', | ||||||
|  | 				connection: { | ||||||
|  | 					filename: envSqliteFile | ||||||
|  | 				}, | ||||||
|  | 				useNullAsDefault: true | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
|  | 		keys: getKeys(), | ||||||
|  | 	}; | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | const getKeys = () => { | ||||||
|  | 	// Get keys from file | ||||||
|  | 	if (!fs.existsSync(keysFile)) { | ||||||
|  | 		generateKeys(); | ||||||
|  | 	} else if (process.env.DEBUG) { | ||||||
|  | 		logger.info('Keys file exists OK'); | ||||||
|  | 	} | ||||||
|  | 	try { | ||||||
|  | 		return require(keysFile); | ||||||
|  | 	} catch (err) { | ||||||
|  | 		logger.error('Could not read JWT key pair from config file: ' + keysFile, err); | ||||||
|  | 		process.exit(1); | ||||||
|  | 	} | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | const generateKeys = () => { | ||||||
|  | 	logger.info('Creating a new JWT key pair...'); | ||||||
|  | 	// Now create the keys and save them in the config. | ||||||
|  | 	const key = new NodeRSA({ b: 2048 }); | ||||||
|  | 	key.generateKeyPair(); | ||||||
|  |  | ||||||
|  | 	const keys = { | ||||||
|  | 		key: key.exportKey('private').toString(), | ||||||
|  | 		pub: key.exportKey('public').toString(), | ||||||
|  | 	}; | ||||||
|  |  | ||||||
|  | 	// Write keys config | ||||||
|  | 	try { | ||||||
|  | 		fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2)); | ||||||
|  | 	} catch (err) { | ||||||
|  | 		logger.error('Could not write JWT key pair to config file: ' + keysFile + ': ' + err.message); | ||||||
|  | 		process.exit(1); | ||||||
|  | 	} | ||||||
|  | 	logger.info('Wrote JWT key pair to config file: ' + keysFile); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | module.exports = { | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {string}  key   ie: 'database' or 'database.engine' | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	has: function(key) { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		const keys = key.split('.'); | ||||||
|  | 		let level  = instance; | ||||||
|  | 		let has    = true; | ||||||
|  | 		keys.forEach((keyItem) =>{ | ||||||
|  | 			if (typeof level[keyItem] === 'undefined') { | ||||||
|  | 				has = false; | ||||||
|  | 			} else { | ||||||
|  | 				level = level[keyItem]; | ||||||
|  | 			} | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		return has; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Gets a specific key from the top level | ||||||
|  | 	 * | ||||||
|  | 	 * @param {string} key | ||||||
|  | 	 * @returns {*} | ||||||
|  | 	 */ | ||||||
|  | 	get: function (key) { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		if (key && typeof instance[key] !== 'undefined') { | ||||||
|  | 			return instance[key]; | ||||||
|  | 		} | ||||||
|  | 		return instance; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Is this a sqlite configuration? | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	isSqlite: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.database.knex && instance.database.knex.client === 'sqlite3'; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Are we running in debug mdoe? | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	debug: function () { | ||||||
|  | 		return !!process.env.DEBUG; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Returns a public key | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {string} | ||||||
|  | 	 */ | ||||||
|  | 	getPublicKey: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.keys.pub; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Returns a private key | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {string} | ||||||
|  | 	 */ | ||||||
|  | 	getPrivateKey: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.keys.key; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	useLetsencryptStaging: function () { | ||||||
|  | 		return !!process.env.LE_STAGING; | ||||||
|  | 	} | ||||||
|  | }; | ||||||
| @@ -82,7 +82,16 @@ module.exports = { | |||||||
| 		this.message  = message; | 		this.message  = message; | ||||||
| 		this.public   = false; | 		this.public   = false; | ||||||
| 		this.status   = 400; | 		this.status   = 400; | ||||||
| 	} | 	}, | ||||||
|  |  | ||||||
|  | 	CommandError: function (stdErr, code, previous) { | ||||||
|  | 		Error.captureStackTrace(this, this.constructor); | ||||||
|  | 		this.name     = this.constructor.name; | ||||||
|  | 		this.previous = previous; | ||||||
|  | 		this.message  = stdErr; | ||||||
|  | 		this.code     = code; | ||||||
|  | 		this.public   = false; | ||||||
|  | 	}, | ||||||
| }; | }; | ||||||
|  |  | ||||||
| _.forEach(module.exports, function (error) { | _.forEach(module.exports, function (error) { | ||||||
|   | |||||||
| @@ -1,14 +1,41 @@ | |||||||
|  | const _          = require('lodash'); | ||||||
| const exec       = require('child_process').exec; | const exec       = require('child_process').exec; | ||||||
|  | const execFile   = require('child_process').execFile; | ||||||
|  | const { Liquid } = require('liquidjs'); | ||||||
|  | const logger     = require('../logger').global; | ||||||
|  | const error      = require('./error'); | ||||||
|  |  | ||||||
| module.exports = { | module.exports = { | ||||||
|  |  | ||||||
|  | 	exec: async function(cmd, options = {}) { | ||||||
|  | 		logger.debug('CMD:', cmd); | ||||||
|  |  | ||||||
|  | 		const { stdout, stderr } = await new Promise((resolve, reject) => { | ||||||
|  | 			const child = exec(cmd, options, (isError, stdout, stderr) => { | ||||||
|  | 				if (isError) { | ||||||
|  | 					reject(new error.CommandError(stderr, isError)); | ||||||
|  | 				} else { | ||||||
|  | 					resolve({ stdout, stderr }); | ||||||
|  | 				} | ||||||
|  | 			}); | ||||||
|  |  | ||||||
|  | 			child.on('error', (e) => { | ||||||
|  | 				reject(new error.CommandError(stderr, 1, e)); | ||||||
|  | 			}); | ||||||
|  | 		}); | ||||||
|  | 		return stdout; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String} cmd | 	 * @param   {String} cmd | ||||||
|  | 	 * @param   {Array}  args | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	exec: function (cmd) { | 	execFile: function (cmd, args) { | ||||||
|  | 		// logger.debug('CMD: ' + cmd + ' ' + (args ? args.join(' ') : '')); | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			exec(cmd, function (err, stdout, /*stderr*/) { | 			execFile(cmd, args, function (err, stdout, /*stderr*/) { | ||||||
| 				if (err && typeof err === 'object') { | 				if (err && typeof err === 'object') { | ||||||
| 					reject(err); | 					reject(err); | ||||||
| 				} else { | 				} else { | ||||||
| @@ -16,5 +43,64 @@ module.exports = { | |||||||
| 				} | 				} | ||||||
| 			}); | 			}); | ||||||
| 		}); | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Used in objection query builder | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {Array}  omissions | ||||||
|  | 	 * @returns {Function} | ||||||
|  | 	 */ | ||||||
|  | 	omitRow: function (omissions) { | ||||||
|  | 		/** | ||||||
|  | 		 * @param   {Object} row | ||||||
|  | 		 * @returns {Object} | ||||||
|  | 		 */ | ||||||
|  | 		return (row) => { | ||||||
|  | 			return _.omit(row, omissions); | ||||||
|  | 		}; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Used in objection query builder | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {Array}  omissions | ||||||
|  | 	 * @returns {Function} | ||||||
|  | 	 */ | ||||||
|  | 	omitRows: function (omissions) { | ||||||
|  | 		/** | ||||||
|  | 		 * @param   {Array} rows | ||||||
|  | 		 * @returns {Object} | ||||||
|  | 		 */ | ||||||
|  | 		return (rows) => { | ||||||
|  | 			rows.forEach((row, idx) => { | ||||||
|  | 				rows[idx] = _.omit(row, omissions); | ||||||
|  | 			}); | ||||||
|  | 			return rows; | ||||||
|  | 		}; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {Object} Liquid render engine | ||||||
|  | 	 */ | ||||||
|  | 	getRenderEngine: function () { | ||||||
|  | 		const renderEngine = new Liquid({ | ||||||
|  | 			root: __dirname + '/../templates/' | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		/** | ||||||
|  | 		 * nginxAccessRule expects the object given to have 2 properties: | ||||||
|  | 		 * | ||||||
|  | 		 * directive  string | ||||||
|  | 		 * address    string | ||||||
|  | 		 */ | ||||||
|  | 		renderEngine.registerFilter('nginxAccessRule', (v) => { | ||||||
|  | 			if (typeof v.directive !== 'undefined' && typeof v.address !== 'undefined' && v.directive && v.address) { | ||||||
|  | 				return `${v.directive} ${v.address};`; | ||||||
|  | 			} | ||||||
|  | 			return ''; | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		return renderEngine; | ||||||
| 	} | 	} | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -5,7 +5,7 @@ const definitions = require('../../schema/definitions.json'); | |||||||
| RegExp.prototype.toJSON = RegExp.prototype.toString; | RegExp.prototype.toJSON = RegExp.prototype.toString; | ||||||
|  |  | ||||||
| const ajv = require('ajv')({ | const ajv = require('ajv')({ | ||||||
| 	verbose:     true, //process.env.NODE_ENV === 'development', | 	verbose:     true, | ||||||
| 	allErrors:   true, | 	allErrors:   true, | ||||||
| 	format:      'full',  // strict regexes for format checks | 	format:      'full',  // strict regexes for format checks | ||||||
| 	coerceTypes: true, | 	coerceTypes: true, | ||||||
|   | |||||||
| @@ -7,6 +7,7 @@ module.exports = { | |||||||
| 	access:    new Signale({scope: 'Access   '}), | 	access:    new Signale({scope: 'Access   '}), | ||||||
| 	nginx:     new Signale({scope: 'Nginx    '}), | 	nginx:     new Signale({scope: 'Nginx    '}), | ||||||
| 	ssl:       new Signale({scope: 'SSL      '}), | 	ssl:       new Signale({scope: 'SSL      '}), | ||||||
|  | 	certbot:   new Signale({scope: 'Certbot  '}), | ||||||
| 	import:    new Signale({scope: 'Importer '}), | 	import:    new Signale({scope: 'Importer '}), | ||||||
| 	setup:     new Signale({scope: 'Setup    '}), | 	setup:     new Signale({scope: 'Setup    '}), | ||||||
| 	ip_ranges: new Signale({scope: 'IP Ranges'}) | 	ip_ranges: new Signale({scope: 'IP Ranges'}) | ||||||
|   | |||||||
							
								
								
									
										48
									
								
								backend/migrations/20200522113248_openid_connect.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										48
									
								
								backend/migrations/20200522113248_openid_connect.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,48 @@ | |||||||
|  | const migrate_name = 'openid_connect'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('proxy_host', function (proxy_host) { | ||||||
|  | 		proxy_host.integer('openidc_enabled').notNull().unsigned().defaultTo(0); | ||||||
|  | 		proxy_host.text('openidc_redirect_uri').notNull().defaultTo(''); | ||||||
|  | 		proxy_host.text('openidc_discovery').notNull().defaultTo(''); | ||||||
|  | 		proxy_host.text('openidc_auth_method').notNull().defaultTo(''); | ||||||
|  | 		proxy_host.text('openidc_client_id').notNull().defaultTo(''); | ||||||
|  | 		proxy_host.text('openidc_client_secret').notNull().defaultTo(''); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] proxy_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	return knex.schema.table('proxy_host', function (proxy_host) { | ||||||
|  | 		proxy_host.dropColumn('openidc_enabled'); | ||||||
|  | 		proxy_host.dropColumn('openidc_redirect_uri'); | ||||||
|  | 		proxy_host.dropColumn('openidc_discovery'); | ||||||
|  | 		proxy_host.dropColumn('openidc_auth_method'); | ||||||
|  | 		proxy_host.dropColumn('openidc_client_id'); | ||||||
|  | 		proxy_host.dropColumn('openidc_client_secret'); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] proxy_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										40
									
								
								backend/migrations/20200522144240_openid_allowed_users.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								backend/migrations/20200522144240_openid_allowed_users.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,40 @@ | |||||||
|  | const migrate_name = 'openid_allowed_users'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('proxy_host', function (proxy_host) { | ||||||
|  | 		proxy_host.integer('openidc_restrict_users_enabled').notNull().unsigned().defaultTo(0); | ||||||
|  | 		proxy_host.json('openidc_allowed_users').notNull().defaultTo([]); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] proxy_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	return knex.schema.table('proxy_host', function (proxy_host) { | ||||||
|  | 		proxy_host.dropColumn('openidc_restrict_users_enabled'); | ||||||
|  | 		proxy_host.dropColumn('openidc_allowed_users'); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] proxy_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
| @@ -50,7 +50,6 @@ class AccessList extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			items: { | 			items: { | ||||||
| @@ -59,9 +58,6 @@ class AccessList extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'access_list.id', | 					from: 'access_list.id', | ||||||
| 					to:   'access_list_auth.access_list_id' | 					to:   'access_list_auth.access_list_id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			clients: { | 			clients: { | ||||||
| @@ -70,9 +66,6 @@ class AccessList extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'access_list.id', | 					from: 'access_list.id', | ||||||
| 					to:   'access_list_client.access_list_id' | 					to:   'access_list_client.access_list_id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			proxy_hosts: { | 			proxy_hosts: { | ||||||
| @@ -84,19 +77,10 @@ class AccessList extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('proxy_host.is_deleted', 0); | 					qb.where('proxy_host.is_deleted', 0); | ||||||
| 					qb.omit(['is_deleted', 'meta']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	get satisfy() { |  | ||||||
| 		return this.satisfy_any ? 'satisfy any' : 'satisfy all'; |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	get passauth() { |  | ||||||
| 		return this.pass_auth ? '' : 'proxy_set_header Authorization "";'; |  | ||||||
| 	} |  | ||||||
| } | } | ||||||
|  |  | ||||||
| module.exports = AccessList; | module.exports = AccessList; | ||||||
|   | |||||||
| @@ -45,7 +45,6 @@ class AccessListAuth extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('access_list.is_deleted', 0); | 					qb.where('access_list.is_deleted', 0); | ||||||
| 					qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -45,15 +45,10 @@ class AccessListClient extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('access_list.is_deleted', 0); | 					qb.where('access_list.is_deleted', 0); | ||||||
| 					qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	get rule() { |  | ||||||
| 		return `${this.directive} ${this.address}`; |  | ||||||
| 	} |  | ||||||
| } | } | ||||||
|  |  | ||||||
| module.exports = AccessListClient; | module.exports = AccessListClient; | ||||||
|   | |||||||
| @@ -43,9 +43,6 @@ class AuditLog extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'audit_log.user_id', | 					from: 'audit_log.user_id', | ||||||
| 					to:   'user.id' | 					to:   'user.id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -74,9 +74,6 @@ class Auth extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				filter: { | 				filter: { | ||||||
| 					is_deleted: 0 | 					is_deleted: 0 | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -63,7 +63,6 @@ class Certificate extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -59,7 +59,6 @@ class DeadHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -71,7 +70,6 @@ class DeadHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -1,13 +1,13 @@ | |||||||
| const db     = require('../db'); | const db     = require('../db'); | ||||||
| const config = require('config'); | const config = require('../lib/config'); | ||||||
| const Model  = require('objection').Model; | const Model  = require('objection').Model; | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
| module.exports = function () { | module.exports = function () { | ||||||
| 	if (config.database.knex && config.database.knex.client === 'sqlite3') { | 	if (config.isSqlite()) { | ||||||
| 		return Model.raw('datetime(\'now\',\'localtime\')'); | 		// eslint-disable-next-line | ||||||
| 	} else { | 		return Model.raw("datetime('now','localtime')"); | ||||||
| 		return Model.raw('NOW()'); |  | ||||||
| 	} | 	} | ||||||
|  | 	return Model.raw('NOW()'); | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -20,12 +20,23 @@ class ProxyHost extends Model { | |||||||
| 			this.domain_names = []; | 			this.domain_names = []; | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		// Default for openidc_allowed_users | ||||||
|  | 		if (typeof this.openidc_allowed_users === 'undefined') { | ||||||
|  | 			this.openidc_allowed_users = []; | ||||||
|  | 		} | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| 			this.meta = {}; | 			this.meta = {}; | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		// Openidc defaults | ||||||
|  | 		if (typeof this.openidc_auth_method === 'undefined') { | ||||||
|  | 			this.openidc_auth_method = 'client_secret_post'; | ||||||
|  | 		} | ||||||
|  |  | ||||||
| 		this.domain_names.sort(); | 		this.domain_names.sort(); | ||||||
|  | 		this.openidc_allowed_users.sort(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| @@ -35,6 +46,11 @@ class ProxyHost extends Model { | |||||||
| 		if (typeof this.domain_names !== 'undefined') { | 		if (typeof this.domain_names !== 'undefined') { | ||||||
| 			this.domain_names.sort(); | 			this.domain_names.sort(); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		// Sort openidc_allowed_users | ||||||
|  | 		if (typeof this.openidc_allowed_users !== 'undefined') { | ||||||
|  | 			this.openidc_allowed_users.sort(); | ||||||
|  | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -46,7 +62,7 @@ class ProxyHost extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get jsonAttributes () { | 	static get jsonAttributes () { | ||||||
| 		return ['domain_names', 'meta', 'locations']; | 		return ['domain_names', 'meta', 'locations', 'openidc_allowed_users']; | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get relationMappings () { | 	static get relationMappings () { | ||||||
| @@ -60,7 +76,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			access_list: { | 			access_list: { | ||||||
| @@ -72,7 +87,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('access_list.is_deleted', 0); | 					qb.where('access_list.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -84,7 +98,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -1,3 +1,4 @@ | |||||||
|  |  | ||||||
| // Objection Docs: | // Objection Docs: | ||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| @@ -59,7 +60,6 @@ class RedirectionHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -71,7 +71,6 @@ class RedirectionHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -46,7 +46,6 @@ class Stream extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -6,44 +6,36 @@ | |||||||
| const _      = require('lodash'); | const _      = require('lodash'); | ||||||
| const jwt    = require('jsonwebtoken'); | const jwt    = require('jsonwebtoken'); | ||||||
| const crypto = require('crypto'); | const crypto = require('crypto'); | ||||||
|  | const config = require('../lib/config'); | ||||||
| const error  = require('../lib/error'); | const error  = require('../lib/error'); | ||||||
|  | const logger = require('../logger').global; | ||||||
| const ALGO   = 'RS256'; | const ALGO   = 'RS256'; | ||||||
|  |  | ||||||
| let public_key  = null; |  | ||||||
| let private_key = null; |  | ||||||
|  |  | ||||||
| function checkJWTKeyPair() { |  | ||||||
| 	if (!public_key || !private_key) { |  | ||||||
| 		let config  = require('config'); |  | ||||||
| 		public_key  = config.get('jwt.pub'); |  | ||||||
| 		private_key = config.get('jwt.key'); |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  |  | ||||||
| module.exports = function () { | module.exports = function () { | ||||||
|  |  | ||||||
| 	let token_data = {}; | 	let token_data = {}; | ||||||
|  |  | ||||||
| 	let self = { | 	const self = { | ||||||
| 		/** | 		/** | ||||||
| 		 * @param {Object}  payload | 		 * @param {Object}  payload | ||||||
| 		 * @returns {Promise} | 		 * @returns {Promise} | ||||||
| 		 */ | 		 */ | ||||||
| 		create: (payload) => { | 		create: (payload) => { | ||||||
|  | 			if (!config.getPrivateKey()) { | ||||||
|  | 				logger.error('Private key is empty!'); | ||||||
|  | 			} | ||||||
| 			// sign with RSA SHA256 | 			// sign with RSA SHA256 | ||||||
| 			let options = { | 			const options = { | ||||||
| 				algorithm: ALGO, | 				algorithm: ALGO, | ||||||
| 				expiresIn: payload.expiresIn || '1d' | 				expiresIn: payload.expiresIn || '1d' | ||||||
| 			}; | 			}; | ||||||
|  |  | ||||||
| 			payload.jti = crypto.randomBytes(12) | 			payload.jti = crypto.randomBytes(12) | ||||||
| 				.toString('base64') | 				.toString('base64') | ||||||
| 				.substr(-8); | 				.substring(-8); | ||||||
|  |  | ||||||
| 			checkJWTKeyPair(); |  | ||||||
|  |  | ||||||
| 			return new Promise((resolve, reject) => { | 			return new Promise((resolve, reject) => { | ||||||
| 				jwt.sign(payload, private_key, options, (err, token) => { | 				jwt.sign(payload, config.getPrivateKey(), options, (err, token) => { | ||||||
| 					if (err) { | 					if (err) { | ||||||
| 						reject(err); | 						reject(err); | ||||||
| 					} else { | 					} else { | ||||||
| @@ -62,13 +54,15 @@ module.exports = function () { | |||||||
| 		 * @returns {Promise} | 		 * @returns {Promise} | ||||||
| 		 */ | 		 */ | ||||||
| 		load: function (token) { | 		load: function (token) { | ||||||
|  | 			if (!config.getPublicKey()) { | ||||||
|  | 				logger.error('Public key is empty!'); | ||||||
|  | 			} | ||||||
| 			return new Promise((resolve, reject) => { | 			return new Promise((resolve, reject) => { | ||||||
| 				checkJWTKeyPair(); |  | ||||||
| 				try { | 				try { | ||||||
| 					if (!token || token === null || token === 'null') { | 					if (!token || token === null || token === 'null') { | ||||||
| 						reject(new error.AuthError('Empty token')); | 						reject(new error.AuthError('Empty token')); | ||||||
| 					} else { | 					} else { | ||||||
| 						jwt.verify(token, public_key, {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | 						jwt.verify(token, config.getPublicKey(), {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | ||||||
| 							if (err) { | 							if (err) { | ||||||
|  |  | ||||||
| 								if (err.name === 'TokenExpiredError') { | 								if (err.name === 'TokenExpiredError') { | ||||||
| @@ -83,8 +77,6 @@ module.exports = function () { | |||||||
| 								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'. | 								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'. | ||||||
| 								// For 30 days at least, we need to replace 'all' with user. | 								// For 30 days at least, we need to replace 'all' with user. | ||||||
| 								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) { | 								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) { | ||||||
| 									//console.log('Warning! Replacing "all" scope with "user"'); |  | ||||||
|  |  | ||||||
| 									token_data.scope = ['user']; | 									token_data.scope = ['user']; | ||||||
| 								} | 								} | ||||||
|  |  | ||||||
| @@ -134,7 +126,7 @@ module.exports = function () { | |||||||
| 		 * @returns {Integer} | 		 * @returns {Integer} | ||||||
| 		 */ | 		 */ | ||||||
| 		getUserId: (default_value) => { | 		getUserId: (default_value) => { | ||||||
| 			let attrs = self.get('attrs'); | 			const attrs = self.get('attrs'); | ||||||
| 			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) { | 			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) { | ||||||
| 				return attrs.id; | 				return attrs.id; | ||||||
| 			} | 			} | ||||||
|   | |||||||
| @@ -43,9 +43,6 @@ class User extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'user.id', | 					from: 'user.id', | ||||||
| 					to:   'user_permission.user_id' | 					to:   'user_permission.user_id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'user_id']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -10,23 +10,21 @@ | |||||||
| 		"bcrypt": "^5.0.0", | 		"bcrypt": "^5.0.0", | ||||||
| 		"body-parser": "^1.19.0", | 		"body-parser": "^1.19.0", | ||||||
| 		"compression": "^1.7.4", | 		"compression": "^1.7.4", | ||||||
| 		"config": "^3.3.1", | 		"express": "^4.19.2", | ||||||
| 		"express": "^4.17.1", |  | ||||||
| 		"express-fileupload": "^1.1.9", | 		"express-fileupload": "^1.1.9", | ||||||
| 		"gravatar": "^1.8.0", | 		"gravatar": "^1.8.0", | ||||||
| 		"json-schema-ref-parser": "^8.0.0", | 		"json-schema-ref-parser": "^8.0.0", | ||||||
| 		"jsonwebtoken": "^8.5.1", | 		"jsonwebtoken": "^9.0.0", | ||||||
| 		"knex": "^0.20.13", | 		"knex": "2.4.2", | ||||||
| 		"liquidjs": "^9.11.10", | 		"liquidjs": "10.6.1", | ||||||
| 		"lodash": "^4.17.21", | 		"lodash": "^4.17.21", | ||||||
| 		"moment": "^2.24.0", | 		"moment": "^2.29.4", | ||||||
| 		"mysql": "^2.18.1", | 		"mysql": "^2.18.1", | ||||||
| 		"node-rsa": "^1.0.8", | 		"node-rsa": "^1.0.8", | ||||||
| 		"nodemon": "^2.0.2", | 		"objection": "3.0.1", | ||||||
| 		"objection": "^2.2.16", |  | ||||||
| 		"path": "^0.12.7", | 		"path": "^0.12.7", | ||||||
| 		"signale": "^1.4.0", | 		"signale": "1.4.0", | ||||||
| 		"sqlite3": "^4.1.1", | 		"sqlite3": "5.1.6", | ||||||
| 		"temp-write": "^4.0.0" | 		"temp-write": "^4.0.0" | ||||||
| 	}, | 	}, | ||||||
| 	"signale": { | 	"signale": { | ||||||
| @@ -36,8 +34,9 @@ | |||||||
| 	"author": "Jamie Curnow <jc@jc21.com>", | 	"author": "Jamie Curnow <jc@jc21.com>", | ||||||
| 	"license": "MIT", | 	"license": "MIT", | ||||||
| 	"devDependencies": { | 	"devDependencies": { | ||||||
| 		"eslint": "^6.8.0", | 		"eslint": "^8.36.0", | ||||||
| 		"eslint-plugin-align-assignments": "^1.1.2", | 		"eslint-plugin-align-assignments": "^1.1.2", | ||||||
|  | 		"nodemon": "^2.0.2", | ||||||
| 		"prettier": "^2.0.4" | 		"prettier": "^2.0.4" | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|   | |||||||
| @@ -172,7 +172,7 @@ | |||||||
|       "description": "Domain Names separated by a comma", |       "description": "Domain Names separated by a comma", | ||||||
|       "example": "*.jc21.com,blog.jc21.com", |       "example": "*.jc21.com,blog.jc21.com", | ||||||
|       "type": "array", |       "type": "array", | ||||||
|       "maxItems": 15, |       "maxItems": 100, | ||||||
|       "uniqueItems": true, |       "uniqueItems": true, | ||||||
|       "items": { |       "items": { | ||||||
|         "type": "string", |         "type": "string", | ||||||
| @@ -235,6 +235,43 @@ | |||||||
|       "description": "Should we cache assets", |       "description": "Should we cache assets", | ||||||
|       "example": true, |       "example": true, | ||||||
|       "type": "boolean" |       "type": "boolean" | ||||||
|  |     }, | ||||||
|  |     "openidc_enabled": { | ||||||
|  |       "description": "Is OpenID Connect authentication enabled", | ||||||
|  |       "example": true, | ||||||
|  |       "type": "boolean" | ||||||
|  |     }, | ||||||
|  |     "openidc_redirect_uri": { | ||||||
|  |       "type": "string" | ||||||
|  |     }, | ||||||
|  |     "openidc_discovery": { | ||||||
|  |       "type": "string" | ||||||
|  |     }, | ||||||
|  |     "openidc_auth_method": { | ||||||
|  |       "type": "string", | ||||||
|  |       "pattern": "^(client_secret_basic|client_secret_post)$" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_id": { | ||||||
|  |       "type": "string" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_secret": { | ||||||
|  |       "type": "string" | ||||||
|  |     }, | ||||||
|  |     "openidc_restrict_users_enabled": { | ||||||
|  |       "description": "Only allow a specific set of OpenID Connect emails to access the resource", | ||||||
|  |       "example": true, | ||||||
|  |       "type": "boolean" | ||||||
|  |     }, | ||||||
|  |     "openidc_allowed_users": { | ||||||
|  |       "type": "array", | ||||||
|  |       "minItems": 0, | ||||||
|  |       "items": { | ||||||
|  |         "type": "string", | ||||||
|  |         "description": "Email Address", | ||||||
|  |         "example": "john@example.com", | ||||||
|  |         "format": "email", | ||||||
|  |         "minLength": 1 | ||||||
|  |       } | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -64,6 +64,30 @@ | |||||||
|     "advanced_config": { |     "advanced_config": { | ||||||
|       "type": "string" |       "type": "string" | ||||||
|     }, |     }, | ||||||
|  |     "openidc_enabled": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_enabled" | ||||||
|  |     }, | ||||||
|  |     "openidc_redirect_uri": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_redirect_uri" | ||||||
|  |     }, | ||||||
|  |     "openidc_discovery": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_discovery" | ||||||
|  |     }, | ||||||
|  |     "openidc_auth_method": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_auth_method" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_id": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_client_id" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_secret": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_client_secret" | ||||||
|  |     }, | ||||||
|  |     "openidc_restrict_users_enabled": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_restrict_users_enabled" | ||||||
|  |     }, | ||||||
|  |     "openidc_allowed_users": { | ||||||
|  |       "$ref": "../definitions.json#/definitions/openidc_allowed_users" | ||||||
|  |     }, | ||||||
|     "enabled": { |     "enabled": { | ||||||
|       "$ref": "../definitions.json#/definitions/enabled" |       "$ref": "../definitions.json#/definitions/enabled" | ||||||
|     }, |     }, | ||||||
| @@ -161,6 +185,30 @@ | |||||||
|     "advanced_config": { |     "advanced_config": { | ||||||
|       "$ref": "#/definitions/advanced_config" |       "$ref": "#/definitions/advanced_config" | ||||||
|     }, |     }, | ||||||
|  |     "openidc_enabled": { | ||||||
|  |       "$ref": "#/definitions/openidc_enabled" | ||||||
|  |     }, | ||||||
|  |     "openidc_redirect_uri": { | ||||||
|  |       "$ref": "#/definitions/openidc_redirect_uri" | ||||||
|  |     }, | ||||||
|  |     "openidc_discovery": { | ||||||
|  |       "$ref": "#/definitions/openidc_discovery" | ||||||
|  |     }, | ||||||
|  |     "openidc_auth_method": { | ||||||
|  |       "$ref": "#/definitions/openidc_auth_method" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_id": { | ||||||
|  |       "$ref": "#/definitions/openidc_client_id" | ||||||
|  |     }, | ||||||
|  |     "openidc_client_secret": { | ||||||
|  |       "$ref": "#/definitions/openidc_client_secret" | ||||||
|  |     }, | ||||||
|  |     "openidc_restrict_users_enabled": { | ||||||
|  |       "$ref": "#/definitions/openidc_restrict_users_enabled" | ||||||
|  |     }, | ||||||
|  |     "openidc_allowed_users": { | ||||||
|  |       "$ref": "#/definitions/openidc_allowed_users" | ||||||
|  |     }, | ||||||
|     "enabled": { |     "enabled": { | ||||||
|       "$ref": "#/definitions/enabled" |       "$ref": "#/definitions/enabled" | ||||||
|     }, |     }, | ||||||
| @@ -251,6 +299,30 @@ | |||||||
|           "advanced_config": { |           "advanced_config": { | ||||||
|             "$ref": "#/definitions/advanced_config" |             "$ref": "#/definitions/advanced_config" | ||||||
|           }, |           }, | ||||||
|  |           "openidc_enabled": { | ||||||
|  |             "$ref": "#/definitions/openidc_enabled" | ||||||
|  |           }, | ||||||
|  |           "openidc_redirect_uri": { | ||||||
|  |             "$ref": "#/definitions/openidc_redirect_uri" | ||||||
|  |           }, | ||||||
|  |           "openidc_discovery": { | ||||||
|  |             "$ref": "#/definitions/openidc_discovery" | ||||||
|  |           }, | ||||||
|  |           "openidc_auth_method": { | ||||||
|  |             "$ref": "#/definitions/openidc_auth_method" | ||||||
|  |           }, | ||||||
|  |           "openidc_client_id": { | ||||||
|  |             "$ref": "#/definitions/openidc_client_id" | ||||||
|  |           }, | ||||||
|  |           "openidc_client_secret": { | ||||||
|  |             "$ref": "#/definitions/openidc_client_secret" | ||||||
|  |           }, | ||||||
|  |           "openidc_restrict_users_enabled": { | ||||||
|  |             "$ref": "#/definitions/openidc_restrict_users_enabled" | ||||||
|  |           }, | ||||||
|  |           "openidc_allowed_users": { | ||||||
|  |             "$ref": "#/definitions/openidc_allowed_users" | ||||||
|  |           }, | ||||||
|           "enabled": { |           "enabled": { | ||||||
|             "$ref": "#/definitions/enabled" |             "$ref": "#/definitions/enabled" | ||||||
|           }, |           }, | ||||||
| @@ -324,6 +396,30 @@ | |||||||
|           "advanced_config": { |           "advanced_config": { | ||||||
|             "$ref": "#/definitions/advanced_config" |             "$ref": "#/definitions/advanced_config" | ||||||
|           }, |           }, | ||||||
|  |           "openidc_enabled": { | ||||||
|  |             "$ref": "#/definitions/openidc_enabled" | ||||||
|  |           }, | ||||||
|  |           "openidc_redirect_uri": { | ||||||
|  |             "$ref": "#/definitions/openidc_redirect_uri" | ||||||
|  |           }, | ||||||
|  |           "openidc_discovery": { | ||||||
|  |             "$ref": "#/definitions/openidc_discovery" | ||||||
|  |           }, | ||||||
|  |           "openidc_auth_method": { | ||||||
|  |             "$ref": "#/definitions/openidc_auth_method" | ||||||
|  |           }, | ||||||
|  |           "openidc_client_id": { | ||||||
|  |             "$ref": "#/definitions/openidc_client_id" | ||||||
|  |           }, | ||||||
|  |           "openidc_client_secret": { | ||||||
|  |             "$ref": "#/definitions/openidc_client_secret" | ||||||
|  |           }, | ||||||
|  |           "openidc_restrict_users_enabled": { | ||||||
|  |             "$ref": "#/definitions/openidc_restrict_users_enabled" | ||||||
|  |           }, | ||||||
|  |           "openidc_allowed_users": { | ||||||
|  |             "$ref": "#/definitions/openidc_allowed_users" | ||||||
|  |           }, | ||||||
|           "enabled": { |           "enabled": { | ||||||
|             "$ref": "#/definitions/enabled" |             "$ref": "#/definitions/enabled" | ||||||
|           }, |           }, | ||||||
|   | |||||||
							
								
								
									
										49
									
								
								backend/scripts/install-certbot-plugins
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										49
									
								
								backend/scripts/install-certbot-plugins
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,49 @@ | |||||||
|  | #!/usr/bin/node | ||||||
|  |  | ||||||
|  | // Usage: | ||||||
|  | //   Install all plugins defined in `certbot-dns-plugins.json`: | ||||||
|  | //    ./install-certbot-plugins | ||||||
|  | //   Install one or more specific plugins: | ||||||
|  | //    ./install-certbot-plugins route53 cloudflare | ||||||
|  | // | ||||||
|  | // Usage with a running docker container: | ||||||
|  | //    docker exec npm_core /command/s6-setuidgid 1000:1000 bash -c "/app/scripts/install-certbot-plugins" | ||||||
|  | // | ||||||
|  |  | ||||||
|  | const dnsPlugins = require('../global/certbot-dns-plugins.json'); | ||||||
|  | const certbot    = require('../lib/certbot'); | ||||||
|  | const logger     = require('../logger').certbot; | ||||||
|  | const batchflow  = require('batchflow'); | ||||||
|  |  | ||||||
|  | let hasErrors      = false; | ||||||
|  | let failingPlugins = []; | ||||||
|  |  | ||||||
|  | let pluginKeys = Object.keys(dnsPlugins); | ||||||
|  | if (process.argv.length > 2) { | ||||||
|  | 	pluginKeys = process.argv.slice(2); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | batchflow(pluginKeys).sequential() | ||||||
|  | 	.each((i, pluginKey, next) => { | ||||||
|  | 		certbot.installPlugin(pluginKey) | ||||||
|  | 			.then(() => { | ||||||
|  | 				next(); | ||||||
|  | 			}) | ||||||
|  | 			.catch((err) => { | ||||||
|  | 				hasErrors = true; | ||||||
|  | 				failingPlugins.push(pluginKey); | ||||||
|  | 				next(err); | ||||||
|  | 			}); | ||||||
|  | 	}) | ||||||
|  | 	.error((err) => { | ||||||
|  | 		logger.error(err.message); | ||||||
|  | 	}) | ||||||
|  | 	.end(() => { | ||||||
|  | 		if (hasErrors) { | ||||||
|  | 			logger.error('Some plugins failed to install. Please check the logs above. Failing plugins: ' + '\n - ' + failingPlugins.join('\n - ')); | ||||||
|  | 			process.exit(1); | ||||||
|  | 		} else { | ||||||
|  | 			logger.complete('Plugins installed successfully'); | ||||||
|  | 			process.exit(0); | ||||||
|  | 		} | ||||||
|  | 	}); | ||||||
| @@ -1,6 +1,4 @@ | |||||||
| const fs                  = require('fs'); | const config              = require('./lib/config'); | ||||||
| const NodeRSA             = require('node-rsa'); |  | ||||||
| const config              = require('config'); |  | ||||||
| const logger              = require('./logger').setup; | const logger              = require('./logger').setup; | ||||||
| const certificateModel    = require('./models/certificate'); | const certificateModel    = require('./models/certificate'); | ||||||
| const userModel           = require('./models/user'); | const userModel           = require('./models/user'); | ||||||
| @@ -8,64 +6,7 @@ const userPermissionModel = require('./models/user_permission'); | |||||||
| const utils               = require('./lib/utils'); | const utils               = require('./lib/utils'); | ||||||
| const authModel           = require('./models/auth'); | const authModel           = require('./models/auth'); | ||||||
| const settingModel        = require('./models/setting'); | const settingModel        = require('./models/setting'); | ||||||
| const dns_plugins         = require('./global/certbot-dns-plugins'); | const certbot             = require('./lib/certbot'); | ||||||
| const debug_mode          = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG; |  | ||||||
|  |  | ||||||
| /** |  | ||||||
|  * Creates a new JWT RSA Keypair if not alread set on the config |  | ||||||
|  * |  | ||||||
|  * @returns {Promise} |  | ||||||
|  */ |  | ||||||
| const setupJwt = () => { |  | ||||||
| 	return new Promise((resolve, reject) => { |  | ||||||
| 		// Now go and check if the jwt gpg keys have been created and if not, create them |  | ||||||
| 		if (!config.has('jwt') || !config.has('jwt.key') || !config.has('jwt.pub')) { |  | ||||||
| 			logger.info('Creating a new JWT key pair...'); |  | ||||||
|  |  | ||||||
| 			// jwt keys are not configured properly |  | ||||||
| 			const filename  = config.util.getEnv('NODE_CONFIG_DIR') + '/' + (config.util.getEnv('NODE_ENV') || 'default') + '.json'; |  | ||||||
| 			let config_data = {}; |  | ||||||
|  |  | ||||||
| 			try { |  | ||||||
| 				config_data = require(filename); |  | ||||||
| 			} catch (err) { |  | ||||||
| 				// do nothing |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.debug(filename + ' config file could not be required'); |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			// Now create the keys and save them in the config. |  | ||||||
| 			let key = new NodeRSA({ b: 2048 }); |  | ||||||
| 			key.generateKeyPair(); |  | ||||||
|  |  | ||||||
| 			config_data.jwt = { |  | ||||||
| 				key: key.exportKey('private').toString(), |  | ||||||
| 				pub: key.exportKey('public').toString(), |  | ||||||
| 			}; |  | ||||||
|  |  | ||||||
| 			// Write config |  | ||||||
| 			fs.writeFile(filename, JSON.stringify(config_data, null, 2), (err) => { |  | ||||||
| 				if (err) { |  | ||||||
| 					logger.error('Could not write JWT key pair to config file: ' + filename); |  | ||||||
| 					reject(err); |  | ||||||
| 				} else { |  | ||||||
| 					logger.info('Wrote JWT key pair to config file: ' + filename); |  | ||||||
| 					delete require.cache[require.resolve('config')]; |  | ||||||
| 					resolve(); |  | ||||||
| 				} |  | ||||||
| 			}); |  | ||||||
| 		} else { |  | ||||||
| 			// JWT key pair exists |  | ||||||
| 			if (debug_mode) { |  | ||||||
| 				logger.debug('JWT Keypair already exists'); |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			resolve(); |  | ||||||
| 		} |  | ||||||
| 	}); |  | ||||||
| }; |  | ||||||
|  |  | ||||||
| /** | /** | ||||||
|  * Creates a default admin users if one doesn't already exist in the database |  * Creates a default admin users if one doesn't already exist in the database | ||||||
|  * |  * | ||||||
| @@ -80,11 +21,14 @@ const setupDefaultUser = () => { | |||||||
| 		.then((row) => { | 		.then((row) => { | ||||||
| 			if (!row.count) { | 			if (!row.count) { | ||||||
| 				// Create a new user and set password | 				// Create a new user and set password | ||||||
| 				logger.info('Creating a new user: admin@example.com with password: changeme'); | 				let email    = process.env.INITIAL_ADMIN_EMAIL || 'admin@example.com'; | ||||||
|  | 				let password = process.env.INITIAL_ADMIN_PASSWORD || 'changeme'; | ||||||
|  | 				 | ||||||
|  | 				logger.info('Creating a new user: ' + email + ' with password: ' + password); | ||||||
|  |  | ||||||
| 				let data = { | 				let data = { | ||||||
| 					is_deleted: 0, | 					is_deleted: 0, | ||||||
| 					email:      'admin@example.com', | 					email:      email, | ||||||
| 					name:       'Administrator', | 					name:       'Administrator', | ||||||
| 					nickname:   'Admin', | 					nickname:   'Admin', | ||||||
| 					avatar:     '', | 					avatar:     '', | ||||||
| @@ -100,7 +44,7 @@ const setupDefaultUser = () => { | |||||||
| 							.insert({ | 							.insert({ | ||||||
| 								user_id: user.id, | 								user_id: user.id, | ||||||
| 								type:    'password', | 								type:    'password', | ||||||
| 								secret:  'changeme', | 								secret:  password, | ||||||
| 								meta:    {}, | 								meta:    {}, | ||||||
| 							}) | 							}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| @@ -119,8 +63,8 @@ const setupDefaultUser = () => { | |||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						logger.info('Initial admin setup completed'); | 						logger.info('Initial admin setup completed'); | ||||||
| 					}); | 					}); | ||||||
| 			} else if (debug_mode) { | 			} else if (config.debug()) { | ||||||
| 				logger.debug('Admin user setup not required'); | 				logger.info('Admin user setup not required'); | ||||||
| 			} | 			} | ||||||
| 		}); | 		}); | ||||||
| }; | }; | ||||||
| @@ -151,8 +95,8 @@ const setupDefaultSettings = () => { | |||||||
| 						logger.info('Default settings added'); | 						logger.info('Default settings added'); | ||||||
| 					}); | 					}); | ||||||
| 			} | 			} | ||||||
| 			if (debug_mode) { | 			if (config.debug()) { | ||||||
| 				logger.debug('Default setting setup not required'); | 				logger.info('Default setting setup not required'); | ||||||
| 			} | 			} | ||||||
| 		}); | 		}); | ||||||
| }; | }; | ||||||
| @@ -174,10 +118,9 @@ const setupCertbotPlugins = () => { | |||||||
|  |  | ||||||
| 				certificates.map(function (certificate) { | 				certificates.map(function (certificate) { | ||||||
| 					if (certificate.meta && certificate.meta.dns_challenge === true) { | 					if (certificate.meta && certificate.meta.dns_challenge === true) { | ||||||
| 						const dns_plugin          = dns_plugins[certificate.meta.dns_provider]; | 						if (plugins.indexOf(certificate.meta.dns_provider) === -1) { | ||||||
| 						const packages_to_install = `${dns_plugin.package_name}${dns_plugin.version_requirement || ''} ${dns_plugin.dependencies}`; | 							plugins.push(certificate.meta.dns_provider); | ||||||
|  | 						} | ||||||
| 						if (plugins.indexOf(packages_to_install) === -1) plugins.push(packages_to_install); |  | ||||||
|  |  | ||||||
| 						// Make sure credentials file exists | 						// Make sure credentials file exists | ||||||
| 						const credentials_loc = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | 						const credentials_loc = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | ||||||
| @@ -188,17 +131,15 @@ const setupCertbotPlugins = () => { | |||||||
| 					} | 					} | ||||||
| 				}); | 				}); | ||||||
|  |  | ||||||
| 				if (plugins.length) { | 				return certbot.installPlugins(plugins) | ||||||
| 					const install_cmd = 'pip install ' + plugins.join(' '); | 					.then(() => { | ||||||
| 					promises.push(utils.exec(install_cmd)); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 						if (promises.length) { | 						if (promises.length) { | ||||||
| 							return Promise.all(promises) | 							return Promise.all(promises) | ||||||
| 								.then(() => { | 								.then(() => { | ||||||
| 									logger.info('Added Certbot plugins ' + plugins.join(', ')); | 									logger.info('Added Certbot plugins ' + plugins.join(', ')); | ||||||
| 								}); | 								}); | ||||||
| 						} | 						} | ||||||
|  | 					}); | ||||||
| 			} | 			} | ||||||
| 		}); | 		}); | ||||||
| }; | }; | ||||||
| @@ -225,8 +166,7 @@ const setupLogrotation = () => { | |||||||
| }; | }; | ||||||
|  |  | ||||||
| module.exports = function () { | module.exports = function () { | ||||||
| 	return setupJwt() | 	return setupDefaultUser() | ||||||
| 		.then(setupDefaultUser) |  | ||||||
| 		.then(setupDefaultSettings) | 		.then(setupDefaultSettings) | ||||||
| 		.then(setupCertbotPlugins) | 		.then(setupCertbotPlugins) | ||||||
| 		.then(setupLogrotation); | 		.then(setupLogrotation); | ||||||
|   | |||||||
							
								
								
									
										25
									
								
								backend/templates/_access.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								backend/templates/_access.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,25 @@ | |||||||
|  | {% if access_list_id > 0 %} | ||||||
|  |     {% if access_list.items.length > 0 %} | ||||||
|  |     # Authorization | ||||||
|  |     auth_basic            "Authorization required"; | ||||||
|  |     auth_basic_user_file  /data/access/{{ access_list_id }}; | ||||||
|  |  | ||||||
|  |     {% if access_list.pass_auth == 0 %} | ||||||
|  |     proxy_set_header Authorization ""; | ||||||
|  |     {% endif %} | ||||||
|  |  | ||||||
|  |     {% endif %} | ||||||
|  |  | ||||||
|  |     # Access Rules: {{ access_list.clients | size }} total | ||||||
|  |     {% for client in access_list.clients %} | ||||||
|  |     {{client | nginxAccessRule}} | ||||||
|  |     {% endfor %} | ||||||
|  |     deny all; | ||||||
|  |  | ||||||
|  |     # Access checks must... | ||||||
|  |     {% if access_list.satisfy_any == 1 %} | ||||||
|  |     satisfy any; | ||||||
|  |     {% else %} | ||||||
|  |     satisfy all; | ||||||
|  |     {% endif %} | ||||||
|  | {% endif %} | ||||||
| @@ -2,7 +2,7 @@ | |||||||
| {% if ssl_forced == 1 or ssl_forced == true %} | {% if ssl_forced == 1 or ssl_forced == true %} | ||||||
| {% if hsts_enabled == 1 or hsts_enabled == true %} | {% if hsts_enabled == 1 or hsts_enabled == true %} | ||||||
|   # HSTS (ngx_http_headers_module is required) (63072000 seconds = 2 years) |   # HSTS (ngx_http_headers_module is required) (63072000 seconds = 2 years) | ||||||
|   add_header Strict-Transport-Security "max-age=63072000;{% if hsts_subdomains == 1 or hsts_subdomains == true -%} includeSubDomains;{% endif %} preload" always; |   add_header Strict-Transport-Security $hsts_header always; | ||||||
| {% endif %} | {% endif %} | ||||||
| {% endif %} | {% endif %} | ||||||
| {% endif %} | {% endif %} | ||||||
|   | |||||||
							
								
								
									
										3
									
								
								backend/templates/_hsts_map.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								backend/templates/_hsts_map.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | |||||||
|  | map $scheme $hsts_header { | ||||||
|  |     https   "max-age=63072000;{% if hsts_subdomains == 1 or hsts_subdomains == true -%} includeSubDomains;{% endif %} preload"; | ||||||
|  | } | ||||||
| @@ -5,9 +5,9 @@ | |||||||
|   #listen [::]:80; |   #listen [::]:80; | ||||||
| {% endif %} | {% endif %} | ||||||
| {% if certificate -%} | {% if certificate -%} | ||||||
|   listen 443 ssl{% if http2_support %} http2{% endif %}; |   listen 443 ssl{% if http2_support == 1 or http2_support == true %} http2{% endif %}; | ||||||
| {% if ipv6 -%} | {% if ipv6 -%} | ||||||
|   listen [::]:443 ssl{% if http2_support %} http2{% endif %}; |   listen [::]:443 ssl{% if http2_support == 1 or http2_support == true %} http2{% endif %}; | ||||||
| {% else -%} | {% else -%} | ||||||
|   #listen [::]:443; |   #listen [::]:443; | ||||||
| {% endif %} | {% endif %} | ||||||
|   | |||||||
| @@ -1,4 +1,6 @@ | |||||||
|   location {{ path }} { |   location {{ path }} { | ||||||
|  |     {{ advanced_config }} | ||||||
|  |  | ||||||
|     proxy_set_header Host $host; |     proxy_set_header Host $host; | ||||||
|     proxy_set_header X-Forwarded-Scheme $scheme; |     proxy_set_header X-Forwarded-Scheme $scheme; | ||||||
|     proxy_set_header X-Forwarded-Proto  $scheme; |     proxy_set_header X-Forwarded-Proto  $scheme; | ||||||
| @@ -6,30 +8,9 @@ | |||||||
|     proxy_set_header X-Real-IP		$remote_addr; |     proxy_set_header X-Real-IP		$remote_addr; | ||||||
|     proxy_pass       {{ forward_scheme }}://{{ forward_host }}:{{ forward_port }}{{ forward_path }}; |     proxy_pass       {{ forward_scheme }}://{{ forward_host }}:{{ forward_port }}{{ forward_path }}; | ||||||
|  |  | ||||||
|     {% if access_list_id > 0 %} |     {% include "_access.conf" %} | ||||||
|     {% if access_list.items.length > 0 %} |  | ||||||
|     # Authorization |  | ||||||
|     auth_basic            "Authorization required"; |  | ||||||
|     auth_basic_user_file  /data/access/{{ access_list_id }}; |  | ||||||
|   |  | ||||||
|     {{ access_list.passauth }} |  | ||||||
|     {% endif %} |  | ||||||
|   |  | ||||||
|     # Access Rules |  | ||||||
|     {% for client in access_list.clients %} |  | ||||||
|     {{- client.rule -}}; |  | ||||||
|     {% endfor %}deny all; |  | ||||||
|   |  | ||||||
|     # Access checks must... |  | ||||||
|     {% if access_list.satisfy %} |  | ||||||
|     {{ access_list.satisfy }}; |  | ||||||
|     {% endif %} |  | ||||||
|   |  | ||||||
|     {% endif %} |  | ||||||
|  |  | ||||||
|     {% include "_assets.conf" %} |     {% include "_assets.conf" %} | ||||||
|     {% include "_exploits.conf" %} |     {% include "_exploits.conf" %} | ||||||
|  |  | ||||||
|     {% include "_forced_ssl.conf" %} |     {% include "_forced_ssl.conf" %} | ||||||
|     {% include "_hsts.conf" %} |     {% include "_hsts.conf" %} | ||||||
|  |  | ||||||
| @@ -38,8 +19,5 @@ | |||||||
|     proxy_set_header Connection $http_connection; |     proxy_set_header Connection $http_connection; | ||||||
|     proxy_http_version 1.1; |     proxy_http_version 1.1; | ||||||
|     {% endif %} |     {% endif %} | ||||||
|  |  | ||||||
|  |  | ||||||
|     {{ advanced_config }} |  | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										47
									
								
								backend/templates/_openid_connect.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										47
									
								
								backend/templates/_openid_connect.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,47 @@ | |||||||
|  | {% if openidc_enabled == 1 or openidc_enabled == true -%} | ||||||
|  |     access_by_lua_block { | ||||||
|  | 	    local openidc = require("resty.openidc") | ||||||
|  |         local opts = { | ||||||
|  |             redirect_uri = "{{- openidc_redirect_uri -}}", | ||||||
|  |             discovery = "{{- openidc_discovery -}}", | ||||||
|  |             token_endpoint_auth_method = "{{- openidc_auth_method -}}", | ||||||
|  |             client_id = "{{- openidc_client_id -}}", | ||||||
|  |             client_secret = "{{- openidc_client_secret -}}", | ||||||
|  |             scope = "openid email profile" | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |         local res, err = openidc.authenticate(opts) | ||||||
|  |  | ||||||
|  |         if err then | ||||||
|  |             ngx.status = 500 | ||||||
|  |             ngx.say(err) | ||||||
|  |             ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR) | ||||||
|  |         end | ||||||
|  |  | ||||||
|  |         {% if openidc_restrict_users_enabled == 1 or openidc_restrict_users_enabled == true -%} | ||||||
|  |         local function contains(table, val) | ||||||
|  |             for i=1,#table do | ||||||
|  |                 if table[i] == val then  | ||||||
|  |                     return true | ||||||
|  |                 end | ||||||
|  |             end | ||||||
|  |             return false | ||||||
|  |         end | ||||||
|  |  | ||||||
|  |         local allowed_users = { | ||||||
|  |             {% for user in openidc_allowed_users %} | ||||||
|  |                 "{{ user }}", | ||||||
|  |             {% endfor %} | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |         if not contains(allowed_users, res.id_token.email) then | ||||||
|  |             ngx.exit(ngx.HTTP_FORBIDDEN) | ||||||
|  |         end | ||||||
|  |         {% endif -%} | ||||||
|  |          | ||||||
|  |  | ||||||
|  |         ngx.req.set_header("X-OIDC-SUB", res.id_token.sub) | ||||||
|  |         ngx.req.set_header("X-OIDC-EMAIL", res.id_token.email) | ||||||
|  |         ngx.req.set_header("X-OIDC-NAME", res.id_token.name) | ||||||
|  |     } | ||||||
|  | {% endif %} | ||||||
| @@ -1,6 +1,9 @@ | |||||||
| {% include "_header_comment.conf" %} | {% include "_header_comment.conf" %} | ||||||
|  |  | ||||||
| {% if enabled %} | {% if enabled %} | ||||||
|  |  | ||||||
|  | {% include "_hsts_map.conf" %} | ||||||
|  |  | ||||||
| server { | server { | ||||||
| {% include "_listen.conf" %} | {% include "_listen.conf" %} | ||||||
| {% include "_certificates.conf" %} | {% include "_certificates.conf" %} | ||||||
|   | |||||||
| @@ -24,6 +24,12 @@ server { | |||||||
|   } |   } | ||||||
| {% endif %} | {% endif %} | ||||||
|  |  | ||||||
|  | {%- if value == "444" %} | ||||||
|  |   location / { | ||||||
|  |     return 444; | ||||||
|  |   } | ||||||
|  | {% endif %} | ||||||
|  |  | ||||||
| {%- if value == "redirect" %} | {%- if value == "redirect" %} | ||||||
|   location / { |   location / { | ||||||
|     return 301 {{ meta.redirect }}; |     return 301 {{ meta.redirect }}; | ||||||
|   | |||||||
| @@ -1,6 +1,9 @@ | |||||||
| {% include "_header_comment.conf" %} | {% include "_header_comment.conf" %} | ||||||
|  |  | ||||||
| {% if enabled %} | {% if enabled %} | ||||||
|  |  | ||||||
|  | {% include "_hsts_map.conf" %} | ||||||
|  |  | ||||||
| server { | server { | ||||||
|   set $forward_scheme {{ forward_scheme }}; |   set $forward_scheme {{ forward_scheme }}; | ||||||
|   set $server         "{{ forward_host }}"; |   set $server         "{{ forward_host }}"; | ||||||
| @@ -51,7 +54,9 @@ proxy_http_version 1.1; | |||||||
|  |  | ||||||
|     {% endif %} |     {% endif %} | ||||||
|  |  | ||||||
| {% include "_hsts.conf" %} |     {% include "_openid_connect.conf" %} | ||||||
|  |     {% include "_access.conf" %} | ||||||
|  |     {% include "_hsts.conf" %} | ||||||
|  |  | ||||||
|     {% if allow_websocket_upgrade == 1 or allow_websocket_upgrade == true %} |     {% if allow_websocket_upgrade == 1 or allow_websocket_upgrade == true %} | ||||||
|     proxy_set_header Upgrade $http_upgrade; |     proxy_set_header Upgrade $http_upgrade; | ||||||
|   | |||||||
| @@ -1,6 +1,9 @@ | |||||||
| {% include "_header_comment.conf" %} | {% include "_header_comment.conf" %} | ||||||
|  |  | ||||||
| {% if enabled %} | {% if enabled %} | ||||||
|  |  | ||||||
|  | {% include "_hsts_map.conf" %} | ||||||
|  |  | ||||||
| server { | server { | ||||||
| {% include "_listen.conf" %} | {% include "_listen.conf" %} | ||||||
| {% include "_certificates.conf" %} | {% include "_certificates.conf" %} | ||||||
|   | |||||||
							
								
								
									
										2782
									
								
								backend/yarn.lock
									
									
									
									
									
								
							
							
						
						
									
										2782
									
								
								backend/yarn.lock
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -10,13 +10,18 @@ ARG BUILD_VERSION | |||||||
| ARG BUILD_COMMIT | ARG BUILD_COMMIT | ||||||
| ARG BUILD_DATE | ARG BUILD_DATE | ||||||
|  |  | ||||||
|  | # See: https://github.com/just-containers/s6-overlay/blob/master/README.md | ||||||
| ENV SUPPRESS_NO_CONFIG_WARNING=1 \ | ENV SUPPRESS_NO_CONFIG_WARNING=1 \ | ||||||
| 	S6_FIX_ATTRS_HIDDEN=1 \ |  | ||||||
| 	S6_BEHAVIOUR_IF_STAGE2_FAILS=1 \ | 	S6_BEHAVIOUR_IF_STAGE2_FAILS=1 \ | ||||||
|  | 	S6_CMD_WAIT_FOR_SERVICES_MAXTIME=0 \ | ||||||
|  | 	S6_FIX_ATTRS_HIDDEN=1 \ | ||||||
|  | 	S6_KILL_FINISH_MAXTIME=10000 \ | ||||||
|  | 	S6_VERBOSITY=1 \ | ||||||
| 	NODE_ENV=production \ | 	NODE_ENV=production \ | ||||||
| 	NPM_BUILD_VERSION="${BUILD_VERSION}" \ | 	NPM_BUILD_VERSION="${BUILD_VERSION}" \ | ||||||
| 	NPM_BUILD_COMMIT="${BUILD_COMMIT}" \ | 	NPM_BUILD_COMMIT="${BUILD_COMMIT}" \ | ||||||
| 	NPM_BUILD_DATE="${BUILD_DATE}" | 	NPM_BUILD_DATE="${BUILD_DATE}" \ | ||||||
|  | 	NODE_OPTIONS="--openssl-legacy-provider" | ||||||
|  |  | ||||||
| RUN echo "fs.file-max = 65535" > /etc/sysctl.conf \ | RUN echo "fs.file-max = 65535" > /etc/sysctl.conf \ | ||||||
| 	&& apt-get update \ | 	&& apt-get update \ | ||||||
| @@ -25,7 +30,7 @@ RUN echo "fs.file-max = 65535" > /etc/sysctl.conf \ | |||||||
| 	&& rm -rf /var/lib/apt/lists/* | 	&& rm -rf /var/lib/apt/lists/* | ||||||
|  |  | ||||||
| # s6 overlay | # s6 overlay | ||||||
| COPY scripts/install-s6 /tmp/install-s6 | COPY docker/scripts/install-s6 /tmp/install-s6 | ||||||
| RUN /tmp/install-s6 "${TARGETPLATFORM}" && rm -f /tmp/install-s6 | RUN /tmp/install-s6 "${TARGETPLATFORM}" && rm -f /tmp/install-s6 | ||||||
|  |  | ||||||
| EXPOSE 80 81 443 | EXPOSE 80 81 443 | ||||||
| @@ -35,23 +40,17 @@ COPY frontend/dist /app/frontend | |||||||
| COPY global        /app/global | COPY global        /app/global | ||||||
|  |  | ||||||
| WORKDIR /app | WORKDIR /app | ||||||
| RUN yarn install | RUN yarn install \ | ||||||
|  | 	&& yarn cache clean | ||||||
|  |  | ||||||
| # add late to limit cache-busting by modifications | # add late to limit cache-busting by modifications | ||||||
| COPY docker/rootfs / | COPY docker/rootfs / | ||||||
|  |  | ||||||
| # Remove frontend service not required for prod, dev nginx config as well | # Remove frontend service not required for prod, dev nginx config as well | ||||||
| RUN rm -rf /etc/services.d/frontend /etc/nginx/conf.d/dev.conf | RUN rm -rf /etc/s6-overlay/s6-rc.d/user/contents.d/frontend /etc/nginx/conf.d/dev.conf \ | ||||||
|  | 	&& chmod 644 /etc/logrotate.d/nginx-proxy-manager | ||||||
|  |  | ||||||
| # Change permission of logrotate config file | VOLUME [ "/data" ] | ||||||
| RUN chmod 644 /etc/logrotate.d/nginx-proxy-manager |  | ||||||
|  |  | ||||||
| # fix for pip installs |  | ||||||
| # https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1769 |  | ||||||
| RUN pip uninstall --yes setuptools \ |  | ||||||
| 	&& pip install "setuptools==58.0.0" |  | ||||||
|  |  | ||||||
| VOLUME [ "/data", "/etc/letsencrypt" ] |  | ||||||
| ENTRYPOINT [ "/init" ] | ENTRYPOINT [ "/init" ] | ||||||
|  |  | ||||||
| LABEL org.label-schema.schema-version="1.0" \ | LABEL org.label-schema.schema-version="1.0" \ | ||||||
|   | |||||||
| @@ -1,13 +1,18 @@ | |||||||
| FROM nginxproxymanager/nginx-full:certbot-node | FROM nginxproxymanager/nginx-full:certbot-node | ||||||
| LABEL maintainer="Jamie Curnow <jc@jc21.com>" | LABEL maintainer="Jamie Curnow <jc@jc21.com>" | ||||||
|  |  | ||||||
| ENV S6_LOGGING=0 \ | # See: https://github.com/just-containers/s6-overlay/blob/master/README.md | ||||||
| 	SUPPRESS_NO_CONFIG_WARNING=1 \ | ENV SUPPRESS_NO_CONFIG_WARNING=1 \ | ||||||
| 	S6_FIX_ATTRS_HIDDEN=1 | 	S6_BEHAVIOUR_IF_STAGE2_FAILS=1 \ | ||||||
|  | 	S6_CMD_WAIT_FOR_SERVICES_MAXTIME=0 \ | ||||||
|  | 	S6_FIX_ATTRS_HIDDEN=1 \ | ||||||
|  | 	S6_KILL_FINISH_MAXTIME=10000 \ | ||||||
|  | 	S6_VERBOSITY=2 \ | ||||||
|  | 	NODE_OPTIONS="--openssl-legacy-provider" | ||||||
|  |  | ||||||
| RUN echo "fs.file-max = 65535" > /etc/sysctl.conf \ | RUN echo "fs.file-max = 65535" > /etc/sysctl.conf \ | ||||||
| 	&& apt-get update \ | 	&& apt-get update \ | ||||||
| 	&& apt-get install -y certbot jq python3-pip logrotate \ | 	&& apt-get install -y jq python3-pip logrotate \ | ||||||
| 	&& apt-get clean \ | 	&& apt-get clean \ | ||||||
| 	&& rm -rf /var/lib/apt/lists/* | 	&& rm -rf /var/lib/apt/lists/* | ||||||
|  |  | ||||||
| @@ -21,9 +26,8 @@ RUN rm -f /etc/nginx/conf.d/production.conf | |||||||
| RUN chmod 644 /etc/logrotate.d/nginx-proxy-manager | RUN chmod 644 /etc/logrotate.d/nginx-proxy-manager | ||||||
|  |  | ||||||
| # s6 overlay | # s6 overlay | ||||||
| RUN curl -L -o /tmp/s6-overlay-amd64.tar.gz "https://github.com/just-containers/s6-overlay/releases/download/v1.22.1.0/s6-overlay-amd64.tar.gz" \ | COPY scripts/install-s6 /tmp/install-s6 | ||||||
| 	&& tar -xzf /tmp/s6-overlay-amd64.tar.gz -C / | RUN /tmp/install-s6 "${TARGETPLATFORM}" && rm -f /tmp/install-s6 | ||||||
|  |  | ||||||
| EXPOSE 80 81 443 | EXPOSE 80 81 443 | ||||||
| ENTRYPOINT [ "/init" ] | ENTRYPOINT [ "/init" ] | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										28
									
								
								docker/dev/dnsrouter-config.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								docker/dev/dnsrouter-config.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,28 @@ | |||||||
|  | { | ||||||
|  |     "log": { | ||||||
|  |         "format": "nice", | ||||||
|  |         "level": "debug" | ||||||
|  |     }, | ||||||
|  |     "servers": [ | ||||||
|  |         { | ||||||
|  |             "host": "0.0.0.0", | ||||||
|  |             "port": 53, | ||||||
|  |             "upstreams": [ | ||||||
|  |                 { | ||||||
|  |                     "regex": "website[0-9]+.example\\.com", | ||||||
|  |                     "upstream": "127.0.0.11" | ||||||
|  |                 }, | ||||||
|  |                 { | ||||||
|  |                     "regex": ".*\\.example\\.com", | ||||||
|  |                     "upstream": "1.1.1.1" | ||||||
|  |                 }, | ||||||
|  |                 { | ||||||
|  |                     "regex": "local", | ||||||
|  |                     "nxdomain": true | ||||||
|  |                 } | ||||||
|  |             ], | ||||||
|  |             "internal": null, | ||||||
|  |             "default_upstream": "127.0.0.11" | ||||||
|  |         } | ||||||
|  |     ] | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								docker/dev/letsencrypt.ini
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								docker/dev/letsencrypt.ini
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | text = True | ||||||
|  | non-interactive = True | ||||||
|  | webroot-path = /data/letsencrypt-acme-challenge | ||||||
|  | key-type = ecdsa | ||||||
|  | elliptic-curve = secp384r1 | ||||||
|  | preferred-chain = ISRG Root X1 | ||||||
|  | server = | ||||||
							
								
								
									
										255
									
								
								docker/dev/pdns-db.sql
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										255
									
								
								docker/dev/pdns-db.sql
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,255 @@ | |||||||
|  | /* | ||||||
|  |  | ||||||
|  | How this was generated: | ||||||
|  | 1. bring up an empty pdns stack | ||||||
|  | 2. use api to create a zone ... | ||||||
|  |  | ||||||
|  | curl -X POST \ | ||||||
|  |   'http://npm.dev:8081/api/v1/servers/localhost/zones' \ | ||||||
|  |   --header 'X-API-Key: npm' \ | ||||||
|  |   --header 'Content-Type: application/json' \ | ||||||
|  |   --data-raw '{ | ||||||
|  |   "name": "example.com.", | ||||||
|  |   "kind": "Native", | ||||||
|  |   "masters": [], | ||||||
|  |   "nameservers": [ | ||||||
|  |     "ns1.pdns.", | ||||||
|  |     "ns2.pdns." | ||||||
|  |   ] | ||||||
|  | }' | ||||||
|  |  | ||||||
|  | 3. Dump sql: | ||||||
|  |  | ||||||
|  | docker exec -ti npm.pdns.db mysqldump -u pdns -p pdns | ||||||
|  |  | ||||||
|  | */ | ||||||
|  |  | ||||||
|  | ---------------------------------------------------------------------- | ||||||
|  |  | ||||||
|  | /*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */; | ||||||
|  | /*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */; | ||||||
|  | /*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */; | ||||||
|  | /*!40101 SET NAMES utf8mb4 */; | ||||||
|  | /*!40103 SET @OLD_TIME_ZONE=@@TIME_ZONE */; | ||||||
|  | /*!40103 SET TIME_ZONE='+00:00' */; | ||||||
|  | /*!40014 SET @OLD_UNIQUE_CHECKS=@@UNIQUE_CHECKS, UNIQUE_CHECKS=0 */; | ||||||
|  | /*!40014 SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0 */; | ||||||
|  | /*!40101 SET @OLD_SQL_MODE=@@SQL_MODE, SQL_MODE='NO_AUTO_VALUE_ON_ZERO' */; | ||||||
|  | /*!40111 SET @OLD_SQL_NOTES=@@SQL_NOTES, SQL_NOTES=0 */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `comments` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `comments`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `comments` ( | ||||||
|  |   `id` int(11) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `domain_id` int(11) NOT NULL, | ||||||
|  |   `name` varchar(255) NOT NULL, | ||||||
|  |   `type` varchar(10) NOT NULL, | ||||||
|  |   `modified_at` int(11) NOT NULL, | ||||||
|  |   `account` varchar(40) CHARACTER SET utf8mb3 DEFAULT NULL, | ||||||
|  |   `comment` text CHARACTER SET utf8mb3 NOT NULL, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   KEY `comments_name_type_idx` (`name`,`type`), | ||||||
|  |   KEY `comments_order_idx` (`domain_id`,`modified_at`) | ||||||
|  | ) ENGINE=InnoDB DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `comments` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `comments` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `comments` DISABLE KEYS */; | ||||||
|  | /*!40000 ALTER TABLE `comments` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `cryptokeys` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `cryptokeys`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `cryptokeys` ( | ||||||
|  |   `id` int(11) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `domain_id` int(11) NOT NULL, | ||||||
|  |   `flags` int(11) NOT NULL, | ||||||
|  |   `active` tinyint(1) DEFAULT NULL, | ||||||
|  |   `published` tinyint(1) DEFAULT 1, | ||||||
|  |   `content` text DEFAULT NULL, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   KEY `domainidindex` (`domain_id`) | ||||||
|  | ) ENGINE=InnoDB DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `cryptokeys` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `cryptokeys` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `cryptokeys` DISABLE KEYS */; | ||||||
|  | /*!40000 ALTER TABLE `cryptokeys` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `domainmetadata` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `domainmetadata`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `domainmetadata` ( | ||||||
|  |   `id` int(11) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `domain_id` int(11) NOT NULL, | ||||||
|  |   `kind` varchar(32) DEFAULT NULL, | ||||||
|  |   `content` text DEFAULT NULL, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   KEY `domainmetadata_idx` (`domain_id`,`kind`) | ||||||
|  | ) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `domainmetadata` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `domainmetadata` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `domainmetadata` DISABLE KEYS */; | ||||||
|  | INSERT INTO `domainmetadata` VALUES | ||||||
|  | (1,1,'SOA-EDIT-API','DEFAULT'); | ||||||
|  | /*!40000 ALTER TABLE `domainmetadata` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `domains` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `domains`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `domains` ( | ||||||
|  |   `id` int(11) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `name` varchar(255) NOT NULL, | ||||||
|  |   `master` varchar(128) DEFAULT NULL, | ||||||
|  |   `last_check` int(11) DEFAULT NULL, | ||||||
|  |   `type` varchar(8) NOT NULL, | ||||||
|  |   `notified_serial` int(10) unsigned DEFAULT NULL, | ||||||
|  |   `account` varchar(40) CHARACTER SET utf8mb3 DEFAULT NULL, | ||||||
|  |   `options` varchar(64000) DEFAULT NULL, | ||||||
|  |   `catalog` varchar(255) DEFAULT NULL, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   UNIQUE KEY `name_index` (`name`), | ||||||
|  |   KEY `catalog_idx` (`catalog`) | ||||||
|  | ) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `domains` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `domains` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `domains` DISABLE KEYS */; | ||||||
|  | INSERT INTO `domains` VALUES | ||||||
|  | (1,'example.com','',NULL,'NATIVE',NULL,'',NULL,NULL); | ||||||
|  | /*!40000 ALTER TABLE `domains` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `records` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `records`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `records` ( | ||||||
|  |   `id` bigint(20) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `domain_id` int(11) DEFAULT NULL, | ||||||
|  |   `name` varchar(255) DEFAULT NULL, | ||||||
|  |   `type` varchar(10) DEFAULT NULL, | ||||||
|  |   `content` varchar(64000) DEFAULT NULL, | ||||||
|  |   `ttl` int(11) DEFAULT NULL, | ||||||
|  |   `prio` int(11) DEFAULT NULL, | ||||||
|  |   `disabled` tinyint(1) DEFAULT 0, | ||||||
|  |   `ordername` varchar(255) CHARACTER SET latin1 COLLATE latin1_bin DEFAULT NULL, | ||||||
|  |   `auth` tinyint(1) DEFAULT 1, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   KEY `nametype_index` (`name`,`type`), | ||||||
|  |   KEY `domain_id` (`domain_id`), | ||||||
|  |   KEY `ordername` (`ordername`) | ||||||
|  | ) ENGINE=InnoDB AUTO_INCREMENT=4 DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `records` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `records` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `records` DISABLE KEYS */; | ||||||
|  | INSERT INTO `records` VALUES | ||||||
|  | (1,1,'example.com','NS','ns1.pdns',1500,0,0,NULL,1), | ||||||
|  | (2,1,'example.com','NS','ns2.pdns',1500,0,0,NULL,1), | ||||||
|  | (3,1,'example.com','SOA','a.misconfigured.dns.server.invalid hostmaster.example.com 2023030501 10800 3600 604800 3600',1500,0,0,NULL,1); | ||||||
|  | /*!40000 ALTER TABLE `records` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `supermasters` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `supermasters`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `supermasters` ( | ||||||
|  |   `ip` varchar(64) NOT NULL, | ||||||
|  |   `nameserver` varchar(255) NOT NULL, | ||||||
|  |   `account` varchar(40) CHARACTER SET utf8mb3 NOT NULL, | ||||||
|  |   PRIMARY KEY (`ip`,`nameserver`) | ||||||
|  | ) ENGINE=InnoDB DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `supermasters` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `supermasters` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `supermasters` DISABLE KEYS */; | ||||||
|  | /*!40000 ALTER TABLE `supermasters` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Table structure for table `tsigkeys` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | DROP TABLE IF EXISTS `tsigkeys`; | ||||||
|  | /*!40101 SET @saved_cs_client     = @@character_set_client */; | ||||||
|  | /*!40101 SET character_set_client = utf8 */; | ||||||
|  | CREATE TABLE `tsigkeys` ( | ||||||
|  |   `id` int(11) NOT NULL AUTO_INCREMENT, | ||||||
|  |   `name` varchar(255) DEFAULT NULL, | ||||||
|  |   `algorithm` varchar(50) DEFAULT NULL, | ||||||
|  |   `secret` varchar(255) DEFAULT NULL, | ||||||
|  |   PRIMARY KEY (`id`), | ||||||
|  |   UNIQUE KEY `namealgoindex` (`name`,`algorithm`) | ||||||
|  | ) ENGINE=InnoDB DEFAULT CHARSET=latin1; | ||||||
|  | /*!40101 SET character_set_client = @saved_cs_client */; | ||||||
|  |  | ||||||
|  | -- | ||||||
|  | -- Dumping data for table `tsigkeys` | ||||||
|  | -- | ||||||
|  |  | ||||||
|  | LOCK TABLES `tsigkeys` WRITE; | ||||||
|  | /*!40000 ALTER TABLE `tsigkeys` DISABLE KEYS */; | ||||||
|  | /*!40000 ALTER TABLE `tsigkeys` ENABLE KEYS */; | ||||||
|  | UNLOCK TABLES; | ||||||
|  | /*!40103 SET TIME_ZONE=@OLD_TIME_ZONE */; | ||||||
|  |  | ||||||
|  | /*!40101 SET SQL_MODE=@OLD_SQL_MODE */; | ||||||
|  | /*!40014 SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS */; | ||||||
|  | /*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; | ||||||
|  | /*!40101 SET CHARACTER_SET_CLIENT=@OLD_CHARACTER_SET_CLIENT */; | ||||||
|  | /*!40101 SET CHARACTER_SET_RESULTS=@OLD_CHARACTER_SET_RESULTS */; | ||||||
|  | /*!40101 SET COLLATION_CONNECTION=@OLD_COLLATION_CONNECTION */; | ||||||
|  | /*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; | ||||||
							
								
								
									
										12
									
								
								docker/dev/pebble-config.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								docker/dev/pebble-config.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,12 @@ | |||||||
|  | { | ||||||
|  | 	"pebble": { | ||||||
|  | 		"listenAddress": "0.0.0.0:443", | ||||||
|  | 		"managementListenAddress": "0.0.0.0:15000", | ||||||
|  | 		"certificate": "test/certs/localhost/cert.pem", | ||||||
|  | 		"privateKey": "test/certs/localhost/key.pem", | ||||||
|  | 		"httpPort": 80, | ||||||
|  | 		"tlsPort": 443, | ||||||
|  | 		"ocspResponderURL": "", | ||||||
|  | 		"externalAccountBindingRequired": false | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										27
									
								
								docker/docker-compose.ci.mysql.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								docker/docker-compose.ci.mysql.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,27 @@ | |||||||
|  | # WARNING: This is a CI docker-compose file used for building and testing of the entire app, it should not be used for production. | ||||||
|  | services: | ||||||
|  |  | ||||||
|  |   fullstack: | ||||||
|  |     environment: | ||||||
|  |       DB_MYSQL_HOST: 'db-mysql' | ||||||
|  |       DB_MYSQL_PORT: '3306' | ||||||
|  |       DB_MYSQL_USER: 'npm' | ||||||
|  |       DB_MYSQL_PASSWORD: 'npmpass' | ||||||
|  |       DB_MYSQL_NAME: 'npm' | ||||||
|  |     depends_on: | ||||||
|  |       - db-mysql | ||||||
|  |  | ||||||
|  |   db-mysql: | ||||||
|  |     image: jc21/mariadb-aria | ||||||
|  |     environment: | ||||||
|  |       MYSQL_ROOT_PASSWORD: 'npm' | ||||||
|  |       MYSQL_DATABASE: 'npm' | ||||||
|  |       MYSQL_USER: 'npm' | ||||||
|  |       MYSQL_PASSWORD: 'npmpass' | ||||||
|  |     volumes: | ||||||
|  |       - mysql_vol:/var/lib/mysql | ||||||
|  |     networks: | ||||||
|  |       - fulltest | ||||||
|  |  | ||||||
|  | volumes: | ||||||
|  |   mysql_vol: | ||||||
							
								
								
									
										9
									
								
								docker/docker-compose.ci.sqlite.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								docker/docker-compose.ci.sqlite.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,9 @@ | |||||||
|  | # WARNING: This is a CI docker-compose file used for building and testing of the entire app, it should not be used for production. | ||||||
|  | services: | ||||||
|  |  | ||||||
|  |   fullstack: | ||||||
|  |     environment: | ||||||
|  |       DB_SQLITE_FILE: '/data/mydb.sqlite' | ||||||
|  |       PUID: 1000 | ||||||
|  |       PGID: 1000 | ||||||
|  |       DISABLE_IPV6: 'true' | ||||||
| @@ -1,80 +1,110 @@ | |||||||
| # WARNING: This is a CI docker-compose file used for building and testing of the entire app, it should not be used for production. | # WARNING: This is a CI docker-compose file used for building | ||||||
| version: "3" | # and testing of the entire app, it should not be used for production. | ||||||
|  | # This is a base compose file, it should be extended with a | ||||||
|  | # docker-compose.ci.*.yml file | ||||||
| services: | services: | ||||||
|  |  | ||||||
|   fullstack-mysql: |   fullstack: | ||||||
|     image: ${IMAGE}:ci-${BUILD_NUMBER} |     image: "${IMAGE}:${BRANCH_LOWER}-ci-${BUILD_NUMBER}" | ||||||
|     environment: |     environment: | ||||||
|       NODE_ENV: "development" |       DEBUG: 'true' | ||||||
|       FORCE_COLOR: 1 |       FORCE_COLOR: 1 | ||||||
|       DB_MYSQL_HOST: "db" |  | ||||||
|       DB_MYSQL_PORT: 3306 |  | ||||||
|       DB_MYSQL_USER: "npm" |  | ||||||
|       DB_MYSQL_PASSWORD: "npm" |  | ||||||
|       DB_MYSQL_NAME: "npm" |  | ||||||
|     volumes: |     volumes: | ||||||
|       - npm_data:/data |       - 'npm_data_ci:/data' | ||||||
|     expose: |       - 'npm_le_ci:/etc/letsencrypt' | ||||||
|       - 81 |       - './dev/letsencrypt.ini:/etc/letsencrypt.ini:ro' | ||||||
|       - 80 |       - './dev/resolv.conf:/etc/resolv.conf:ro' | ||||||
|       - 443 |       - '/etc/localtime:/etc/localtime:ro' | ||||||
|  |     healthcheck: | ||||||
|  |       test: ["CMD", "/usr/bin/check-health"] | ||||||
|  |       interval: 10s | ||||||
|  |       timeout: 3s | ||||||
|  |     networks: | ||||||
|  |       fulltest: | ||||||
|  |         aliases: | ||||||
|  |           - website1.example.com | ||||||
|  |           - website2.example.com | ||||||
|  |           - website3.example.com | ||||||
|  |  | ||||||
|  |   stepca: | ||||||
|  |     image: jc21/testca | ||||||
|  |     volumes: | ||||||
|  |       - './dev/resolv.conf:/etc/resolv.conf:ro' | ||||||
|  |       - '/etc/localtime:/etc/localtime:ro' | ||||||
|  |     networks: | ||||||
|  |       fulltest: | ||||||
|  |         aliases: | ||||||
|  |           - ca.internal | ||||||
|  |  | ||||||
|  |   pdns: | ||||||
|  |     image: pschiffe/pdns-mysql | ||||||
|  |     volumes: | ||||||
|  |       - '/etc/localtime:/etc/localtime:ro' | ||||||
|  |     environment: | ||||||
|  |       PDNS_master: 'yes' | ||||||
|  |       PDNS_api: 'yes' | ||||||
|  |       PDNS_api_key: 'npm' | ||||||
|  |       PDNS_webserver: 'yes' | ||||||
|  |       PDNS_webserver_address: '0.0.0.0' | ||||||
|  |       PDNS_webserver_password: 'npm' | ||||||
|  |       PDNS_webserver-allow-from: '127.0.0.0/8,192.0.0.0/8,10.0.0.0/8,172.0.0.0/8' | ||||||
|  |       PDNS_version_string: 'anonymous' | ||||||
|  |       PDNS_default_ttl: 1500 | ||||||
|  |       PDNS_allow_axfr_ips: '127.0.0.0/8,192.0.0.0/8,10.0.0.0/8,172.0.0.0/8' | ||||||
|  |       PDNS_gmysql_host: pdns-db | ||||||
|  |       PDNS_gmysql_port: 3306 | ||||||
|  |       PDNS_gmysql_user: pdns | ||||||
|  |       PDNS_gmysql_password: pdns | ||||||
|  |       PDNS_gmysql_dbname: pdns | ||||||
|     depends_on: |     depends_on: | ||||||
|       - db |       - pdns-db | ||||||
|     healthcheck: |     networks: | ||||||
|       test: ["CMD", "/bin/check-health"] |       fulltest: | ||||||
|       interval: 10s |         aliases: | ||||||
|       timeout: 3s |           - ns1.pdns | ||||||
|  |           - ns2.pdns | ||||||
|  |  | ||||||
|   fullstack-sqlite: |   pdns-db: | ||||||
|     image: ${IMAGE}:ci-${BUILD_NUMBER} |     image: mariadb | ||||||
|     environment: |     environment: | ||||||
|       NODE_ENV: "development" |       MYSQL_ROOT_PASSWORD: 'pdns' | ||||||
|       FORCE_COLOR: 1 |       MYSQL_DATABASE: 'pdns' | ||||||
|       DB_SQLITE_FILE: "/data/database.sqlite" |       MYSQL_USER: 'pdns' | ||||||
|  |       MYSQL_PASSWORD: 'pdns' | ||||||
|     volumes: |     volumes: | ||||||
|       - npm_data:/data |       - 'pdns_mysql_vol:/var/lib/mysql' | ||||||
|     expose: |       - '/etc/localtime:/etc/localtime:ro' | ||||||
|       - 81 |       - './dev/pdns-db.sql:/docker-entrypoint-initdb.d/01_init.sql:ro' | ||||||
|       - 80 |     networks: | ||||||
|       - 443 |       - fulltest | ||||||
|     healthcheck: |  | ||||||
|       test: ["CMD", "/bin/check-health"] |  | ||||||
|       interval: 10s |  | ||||||
|       timeout: 3s |  | ||||||
|  |  | ||||||
|   db: |   dnsrouter: | ||||||
|     image: jc21/mariadb-aria |     image: jc21/dnsrouter | ||||||
|     environment: |  | ||||||
|       MYSQL_ROOT_PASSWORD: "npm" |  | ||||||
|       MYSQL_DATABASE: "npm" |  | ||||||
|       MYSQL_USER: "npm" |  | ||||||
|       MYSQL_PASSWORD: "npm" |  | ||||||
|     volumes: |     volumes: | ||||||
|       - db_data:/var/lib/mysql |       - ./dev/dnsrouter-config.json.tmp:/dnsrouter-config.json:ro | ||||||
|  |     networks: | ||||||
|  |       - fulltest | ||||||
|  |  | ||||||
|   cypress-mysql: |   cypress: | ||||||
|     image: ${IMAGE}-cypress:ci-${BUILD_NUMBER} |     image: "${IMAGE}-cypress:ci-${BUILD_NUMBER}" | ||||||
|     build: |     build: | ||||||
|       context: ../test/ |       context: ../ | ||||||
|       dockerfile: cypress/Dockerfile |       dockerfile: test/cypress/Dockerfile | ||||||
|     environment: |     environment: | ||||||
|       CYPRESS_baseUrl: "http://fullstack-mysql:81" |       CYPRESS_baseUrl: 'http://fullstack:81' | ||||||
|     volumes: |     volumes: | ||||||
|       - cypress-logs:/results |       - 'cypress_logs:/results' | ||||||
|     command: cypress run --browser chrome --config-file=${CYPRESS_CONFIG:-cypress/config/ci.json} |       - './dev/resolv.conf:/etc/resolv.conf:ro' | ||||||
|  |     command: cypress run --browser chrome --config-file=cypress/config/ci.js | ||||||
|   cypress-sqlite: |     networks: | ||||||
|     image: ${IMAGE}-cypress:ci-${BUILD_NUMBER} |       - fulltest | ||||||
|     build: |  | ||||||
|       context: ../test/ |  | ||||||
|       dockerfile: cypress/Dockerfile |  | ||||||
|     environment: |  | ||||||
|       CYPRESS_baseUrl: "http://fullstack-sqlite:81" |  | ||||||
|     volumes: |  | ||||||
|       - cypress-logs:/results |  | ||||||
|     command: cypress run --browser chrome --config-file=${CYPRESS_CONFIG:-cypress/config/ci.json} |  | ||||||
|  |  | ||||||
| volumes: | volumes: | ||||||
|   cypress-logs: |   cypress_logs: | ||||||
|   npm_data: |   npm_data_ci: | ||||||
|   db_data: |   npm_le_ci: | ||||||
|  |   pdns_mysql_vol: | ||||||
|  |  | ||||||
|  | networks: | ||||||
|  |   fulltest: | ||||||
|  |     name: "npm-${BRANCH_LOWER}-ci-${BUILD_NUMBER}" | ||||||
|   | |||||||
| @@ -1,6 +1,6 @@ | |||||||
| # WARNING: This is a DEVELOPMENT docker-compose file, it should not be used for production. | # WARNING: This is a DEVELOPMENT docker-compose file, it should not be used for production. | ||||||
| version: "3.5" |  | ||||||
| services: | services: | ||||||
|  |  | ||||||
|   npm: |   npm: | ||||||
|     image: nginxproxymanager:dev |     image: nginxproxymanager:dev | ||||||
|     container_name: npm_core |     container_name: npm_core | ||||||
| @@ -14,14 +14,19 @@ services: | |||||||
|     networks: |     networks: | ||||||
|       - nginx_proxy_manager |       - nginx_proxy_manager | ||||||
|     environment: |     environment: | ||||||
|       NODE_ENV: "development" |       PUID: 1000 | ||||||
|  |       PGID: 1000 | ||||||
|       FORCE_COLOR: 1 |       FORCE_COLOR: 1 | ||||||
|       DEVELOPMENT: "true" |       # specifically for dev: | ||||||
|       DB_MYSQL_HOST: "db" |       DEBUG: 'true' | ||||||
|       DB_MYSQL_PORT: 3306 |       DEVELOPMENT: 'true' | ||||||
|       DB_MYSQL_USER: "npm" |       LE_STAGING: 'true' | ||||||
|       DB_MYSQL_PASSWORD: "npm" |       # db: | ||||||
|       DB_MYSQL_NAME: "npm" |       DB_MYSQL_HOST: 'db' | ||||||
|  |       DB_MYSQL_PORT: '3306' | ||||||
|  |       DB_MYSQL_USER: 'npm' | ||||||
|  |       DB_MYSQL_PASSWORD: 'npm' | ||||||
|  |       DB_MYSQL_NAME: 'npm' | ||||||
|       # DB_SQLITE_FILE: "/data/database.sqlite" |       # DB_SQLITE_FILE: "/data/database.sqlite" | ||||||
|       # DISABLE_IPV6: "true" |       # DISABLE_IPV6: "true" | ||||||
|     volumes: |     volumes: | ||||||
| @@ -42,10 +47,10 @@ services: | |||||||
|     networks: |     networks: | ||||||
|       - nginx_proxy_manager |       - nginx_proxy_manager | ||||||
|     environment: |     environment: | ||||||
|       MYSQL_ROOT_PASSWORD: "npm" |       MYSQL_ROOT_PASSWORD: 'npm' | ||||||
|       MYSQL_DATABASE: "npm" |       MYSQL_DATABASE: 'npm' | ||||||
|       MYSQL_USER: "npm" |       MYSQL_USER: 'npm' | ||||||
|       MYSQL_PASSWORD: "npm" |       MYSQL_PASSWORD: 'npm' | ||||||
|     volumes: |     volumes: | ||||||
|       - db_data:/var/lib/mysql |       - db_data:/var/lib/mysql | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,46 +0,0 @@ | |||||||
| #!/bin/bash |  | ||||||
|  |  | ||||||
| # This command reads the `DISABLE_IPV6` env var and will either enable |  | ||||||
| # or disable ipv6 in all nginx configs based on this setting. |  | ||||||
|  |  | ||||||
| # Lowercase |  | ||||||
| DISABLE_IPV6=$(echo "${DISABLE_IPV6:-}" | tr '[:upper:]' '[:lower:]') |  | ||||||
|  |  | ||||||
| CYAN='\E[1;36m' |  | ||||||
| BLUE='\E[1;34m' |  | ||||||
| YELLOW='\E[1;33m' |  | ||||||
| RED='\E[1;31m' |  | ||||||
| RESET='\E[0m' |  | ||||||
|  |  | ||||||
| FOLDER=$1 |  | ||||||
| if [ "$FOLDER" == "" ]; then |  | ||||||
| 	echo -e "${RED}❯ $0 requires a absolute folder path as the first argument!${RESET}" |  | ||||||
| 	echo -e "${YELLOW}  ie: $0 /data/nginx${RESET}" |  | ||||||
| 	exit 1 |  | ||||||
| fi |  | ||||||
|  |  | ||||||
| FILES=$(find "$FOLDER" -type f -name "*.conf") |  | ||||||
| if [ "$DISABLE_IPV6" == "true" ] || [ "$DISABLE_IPV6" == "on" ] || [ "$DISABLE_IPV6" == "1" ] || [ "$DISABLE_IPV6" == "yes" ]; then |  | ||||||
| 	# IPV6 is disabled |  | ||||||
| 	echo "Disabling IPV6 in hosts" |  | ||||||
| 	echo -e "${BLUE}❯ ${CYAN}Disabling IPV6 in hosts: ${YELLOW}${FOLDER}${RESET}" |  | ||||||
|  |  | ||||||
| 	# Iterate over configs and run the regex |  | ||||||
| 	for FILE in $FILES |  | ||||||
| 	do |  | ||||||
| 		echo -e "  ${BLUE}❯ ${YELLOW}${FILE}${RESET}" |  | ||||||
| 		sed -E -i 's/^([^#]*)listen \[::\]/\1#listen [::]/g' "$FILE" |  | ||||||
| 	done |  | ||||||
|  |  | ||||||
| else |  | ||||||
| 	# IPV6 is enabled |  | ||||||
| 	echo -e "${BLUE}❯ ${CYAN}Enabling IPV6 in hosts: ${YELLOW}${FOLDER}${RESET}" |  | ||||||
|  |  | ||||||
| 	# Iterate over configs and run the regex |  | ||||||
| 	for FILE in $FILES |  | ||||||
| 	do |  | ||||||
| 		echo -e "  ${BLUE}❯ ${YELLOW}${FILE}${RESET}" |  | ||||||
| 		sed -E -i 's/^(\s*)#listen \[::\]/\1listen [::]/g' "$FILE" |  | ||||||
| 	done |  | ||||||
|  |  | ||||||
| fi |  | ||||||
							
								
								
									
										2
									
								
								docker/rootfs/etc/cont-finish.d/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								docker/rootfs/etc/cont-finish.d/.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,2 +0,0 @@ | |||||||
| * |  | ||||||
| !.gitignore |  | ||||||
							
								
								
									
										3
									
								
								docker/rootfs/etc/cont-init.d/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								docker/rootfs/etc/cont-init.d/.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,3 +0,0 @@ | |||||||
| * |  | ||||||
| !.gitignore |  | ||||||
| !*.sh |  | ||||||
| @@ -1,7 +0,0 @@ | |||||||
| #!/usr/bin/with-contenv bash |  | ||||||
| set -e |  | ||||||
|  |  | ||||||
| mkdir -p /data/logs |  | ||||||
| echo "Changing ownership of /data/logs to $(id -u):$(id -g)" |  | ||||||
| chown -R "$(id -u):$(id -g)" /data/logs |  | ||||||
|  |  | ||||||
| @@ -1,29 +0,0 @@ | |||||||
| #!/usr/bin/with-contenv bash |  | ||||||
| # ref: https://github.com/linuxserver/docker-baseimage-alpine/blob/master/root/etc/cont-init.d/01-envfile |  | ||||||
|  |  | ||||||
| # in s6, environmental variables are written as text files for s6 to monitor |  | ||||||
| # seach through full-path filenames for files ending in "__FILE" |  | ||||||
| for FILENAME in $(find /var/run/s6/container_environment/ | grep "__FILE$"); do |  | ||||||
|     echo "[secret-init] Evaluating ${FILENAME##*/} ..." |  | ||||||
|  |  | ||||||
|     # set SECRETFILE to the contents of the full-path textfile |  | ||||||
|     SECRETFILE=$(cat ${FILENAME}) |  | ||||||
|     # SECRETFILE=${FILENAME} |  | ||||||
|     # echo "[secret-init] Set SECRETFILE to ${SECRETFILE}"  # DEBUG - rm for prod! |  | ||||||
|  |  | ||||||
|     # if SECRETFILE exists / is not null |  | ||||||
|     if [[ -f ${SECRETFILE} ]]; then |  | ||||||
|         # strip the appended "__FILE" from environmental variable name ... |  | ||||||
|         STRIPFILE=$(echo ${FILENAME} | sed "s/__FILE//g")  |  | ||||||
|         # echo "[secret-init] Set STRIPFILE to ${STRIPFILE}"  # DEBUG - rm for prod! |  | ||||||
|          |  | ||||||
|         # ... and set value to contents of secretfile |  | ||||||
|         # since s6 uses text files, this is effectively "export ..." |  | ||||||
|         printf $(cat ${SECRETFILE}) > ${STRIPFILE} |  | ||||||
|         # echo "[secret-init] Set ${STRIPFILE##*/} to $(cat ${STRIPFILE})"  # DEBUG - rm for prod!" |  | ||||||
|         echo "[secret-init] Success! ${STRIPFILE##*/} set from ${FILENAME##*/}" |  | ||||||
|  |  | ||||||
|     else |  | ||||||
|         echo "[secret-init] cannot find secret in ${FILENAME}" |  | ||||||
|     fi |  | ||||||
| done |  | ||||||
							
								
								
									
										2
									
								
								docker/rootfs/etc/fix-attrs.d/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								docker/rootfs/etc/fix-attrs.d/.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -1,2 +0,0 @@ | |||||||
| * |  | ||||||
| !.gitignore |  | ||||||
| @@ -1,5 +1,6 @@ | |||||||
| /data/logs/*_access.log /data/logs/*/access.log { | /data/logs/*_access.log /data/logs/*/access.log { | ||||||
|     create 0644 root root |     su npm npm | ||||||
|  |     create 0644 | ||||||
|     weekly |     weekly | ||||||
|     rotate 4 |     rotate 4 | ||||||
|     missingok |     missingok | ||||||
| @@ -12,7 +13,8 @@ | |||||||
| } | } | ||||||
|  |  | ||||||
| /data/logs/*_error.log /data/logs/*/error.log { | /data/logs/*_error.log /data/logs/*/error.log { | ||||||
|     create 0644 root root |     su npm npm | ||||||
|  |     create 0644 | ||||||
|     weekly |     weekly | ||||||
|     rotate 10 |     rotate 10 | ||||||
|     missingok |     missingok | ||||||
|   | |||||||
| @@ -32,9 +32,8 @@ server { | |||||||
| 	server_name localhost; | 	server_name localhost; | ||||||
| 	access_log /data/logs/fallback_access.log standard; | 	access_log /data/logs/fallback_access.log standard; | ||||||
| 	error_log /dev/null crit; | 	error_log /dev/null crit; | ||||||
| 	ssl_certificate /data/nginx/dummycert.pem; |  | ||||||
| 	ssl_certificate_key /data/nginx/dummykey.pem; |  | ||||||
| 	include conf.d/include/ssl-ciphers.conf; | 	include conf.d/include/ssl-ciphers.conf; | ||||||
|  | 	ssl_reject_handshake on; | ||||||
|  |  | ||||||
| 	return 444; | 	return 444; | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,4 +1,4 @@ | |||||||
| location ~* ^.*\.(css|js|jpe?g|gif|png|woff|eot|ttf|svg|ico|css\.map|js\.map)$ { | location ~* ^.*\.(css|js|jpe?g|gif|png|webp|woff|eot|ttf|svg|ico|css\.map|js\.map)$ { | ||||||
| 	if_modified_since off; | 	if_modified_since off; | ||||||
|  |  | ||||||
| 	# use the public cache | 	# use the public cache | ||||||
|   | |||||||
| @@ -1,3 +1,10 @@ | |||||||
|  | set $test ""; | ||||||
| if ($scheme = "http") { | if ($scheme = "http") { | ||||||
|  | 	set $test "H"; | ||||||
|  | } | ||||||
|  | if ($request_uri = /.well-known/acme-challenge/test-challenge) { | ||||||
|  | 	set $test "${test}T"; | ||||||
|  | } | ||||||
|  | if ($test = H) { | ||||||
| 	return 301 https://$host$request_uri; | 	return 301 https://$host$request_uri; | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										4
									
								
								docker/rootfs/etc/nginx/conf.d/include/log.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								docker/rootfs/etc/nginx/conf.d/include/log.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | |||||||
|  | log_format proxy '[$time_local] $upstream_cache_status $upstream_status $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] [Sent-to $server] "$http_user_agent" "$http_referer"'; | ||||||
|  | log_format standard '[$time_local] $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] "$http_user_agent" "$http_referer"'; | ||||||
|  |  | ||||||
|  | access_log /data/logs/fallback_access.log proxy; | ||||||
| @@ -2,7 +2,7 @@ add_header       X-Served-By $host; | |||||||
| proxy_set_header Host $host; | proxy_set_header Host $host; | ||||||
| proxy_set_header X-Forwarded-Scheme $scheme; | proxy_set_header X-Forwarded-Scheme $scheme; | ||||||
| proxy_set_header X-Forwarded-Proto  $scheme; | proxy_set_header X-Forwarded-Proto  $scheme; | ||||||
| proxy_set_header X-Forwarded-For    $remote_addr; | proxy_set_header X-Forwarded-For    $proxy_add_x_forwarded_for; | ||||||
| proxy_set_header X-Real-IP          $remote_addr; | proxy_set_header X-Real-IP          $remote_addr; | ||||||
| proxy_pass       $forward_scheme://$server:$port$request_uri; | proxy_pass       $forward_scheme://$server:$port$request_uri; | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,7 +1,7 @@ | |||||||
| # run nginx in foreground | # run nginx in foreground | ||||||
| daemon off; | daemon off; | ||||||
|  | pid /run/nginx/nginx.pid; | ||||||
| user root; | user npm; | ||||||
|  |  | ||||||
| # Set number of worker processes automatically based on number of CPU cores. | # Set number of worker processes automatically based on number of CPU cores. | ||||||
| worker_processes auto; | worker_processes auto; | ||||||
| @@ -14,8 +14,11 @@ error_log /data/logs/fallback_error.log warn; | |||||||
| # Includes files with directives to load dynamic modules. | # Includes files with directives to load dynamic modules. | ||||||
| include /etc/nginx/modules/*.conf; | include /etc/nginx/modules/*.conf; | ||||||
|  |  | ||||||
|  | # Custom | ||||||
|  | include /data/nginx/custom/root_top[.]conf; | ||||||
|  |  | ||||||
| events { | events { | ||||||
| 	worker_connections  1024; | 	include /data/nginx/custom/events[.]conf; | ||||||
| } | } | ||||||
|  |  | ||||||
| http { | http { | ||||||
| @@ -43,11 +46,23 @@ http { | |||||||
| 	proxy_cache_path              /var/lib/nginx/cache/public  levels=1:2 keys_zone=public-cache:30m max_size=192m; | 	proxy_cache_path              /var/lib/nginx/cache/public  levels=1:2 keys_zone=public-cache:30m max_size=192m; | ||||||
| 	proxy_cache_path              /var/lib/nginx/cache/private levels=1:2 keys_zone=private-cache:5m max_size=1024m; | 	proxy_cache_path              /var/lib/nginx/cache/private levels=1:2 keys_zone=private-cache:5m max_size=1024m; | ||||||
|  |  | ||||||
|  | 	lua_package_path '~/lua/?.lua;;'; | ||||||
|  |  | ||||||
|  | 	lua_ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt; | ||||||
|  | 	lua_ssl_verify_depth 5; | ||||||
|  |  | ||||||
|  | 	# cache for discovery metadata documents | ||||||
|  | 	lua_shared_dict discovery 1m; | ||||||
|  | 	# cache for JWKs | ||||||
|  | 	lua_shared_dict jwks 1m; | ||||||
|  |  | ||||||
| 	log_format proxy '[$time_local] $upstream_cache_status $upstream_status $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] [Sent-to $server] "$http_user_agent" "$http_referer"'; | 	log_format proxy '[$time_local] $upstream_cache_status $upstream_status $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] [Sent-to $server] "$http_user_agent" "$http_referer"'; | ||||||
| 	log_format standard '[$time_local] $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] "$http_user_agent" "$http_referer"'; | 	log_format standard '[$time_local] $status - $request_method $scheme $host "$request_uri" [Client $remote_addr] [Length $body_bytes_sent] [Gzip $gzip_ratio] "$http_user_agent" "$http_referer"'; | ||||||
|  |  | ||||||
| 	access_log /data/logs/fallback_access.log proxy; | 	access_log /data/logs/fallback_access.log proxy; | ||||||
|  |  | ||||||
|  | 	include /etc/nginx/conf.d/include/log.conf; | ||||||
|  |  | ||||||
| 	# Dynamically generated resolvers file | 	# Dynamically generated resolvers file | ||||||
| 	include /etc/nginx/conf.d/include/resolvers.conf; | 	include /etc/nginx/conf.d/include/resolvers.conf; | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										21
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/backend/run
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										21
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/backend/run
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,21 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | . /usr/bin/common.sh | ||||||
|  |  | ||||||
|  | cd /app || exit 1 | ||||||
|  |  | ||||||
|  | log_info 'Starting backend ...' | ||||||
|  |  | ||||||
|  | if [ "${DEVELOPMENT:-}" = 'true' ]; then | ||||||
|  | 	s6-setuidgid "$PUID:$PGID" yarn install | ||||||
|  | 	exec s6-setuidgid "$PUID:$PGID" bash -c "export HOME=$NPMHOME;node --max_old_space_size=250 --abort_on_uncaught_exception node_modules/nodemon/bin/nodemon.js" | ||||||
|  | else | ||||||
|  | 	while : | ||||||
|  | 	do | ||||||
|  | 		s6-setuidgid "$PUID:$PGID" bash -c "export HOME=$NPMHOME;node --abort_on_uncaught_exception --max_old_space_size=250 index.js" | ||||||
|  | 		sleep 1 | ||||||
|  | 	done | ||||||
|  | fi | ||||||
							
								
								
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/backend/type
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/backend/type
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | |||||||
|  | longrun | ||||||
							
								
								
									
										21
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/frontend/run
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										21
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/frontend/run
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,21 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | # This service is DEVELOPMENT only. | ||||||
|  |  | ||||||
|  | if [ "$DEVELOPMENT" = 'true' ]; then | ||||||
|  | 	. /usr/bin/common.sh | ||||||
|  | 	cd /app/frontend || exit 1 | ||||||
|  | 	HOME=$NPMHOME | ||||||
|  | 	export HOME | ||||||
|  | 	mkdir -p /app/frontend/dist | ||||||
|  | 	chown -R "$PUID:$PGID" /app/frontend/dist | ||||||
|  |  | ||||||
|  | 	log_info 'Starting frontend ...' | ||||||
|  | 	s6-setuidgid "$PUID:$PGID" yarn install | ||||||
|  | 	exec s6-setuidgid "$PUID:$PGID" yarn watch | ||||||
|  | else | ||||||
|  | 	exit 0 | ||||||
|  | fi | ||||||
							
								
								
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/frontend/type
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/frontend/type
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | |||||||
|  | longrun | ||||||
							
								
								
									
										9
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/nginx/run
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										9
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/nginx/run
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,9 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | . /usr/bin/common.sh | ||||||
|  |  | ||||||
|  | log_info 'Starting nginx ...' | ||||||
|  | exec s6-setuidgid "$PUID:$PGID" nginx | ||||||
							
								
								
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/nginx/type
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/nginx/type
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | |||||||
|  | longrun | ||||||
							
								
								
									
										22
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/00-all.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										22
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/00-all.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,22 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | . /usr/bin/common.sh | ||||||
|  |  | ||||||
|  | if [ "$(id -u)" != "0" ]; then | ||||||
|  | 	log_fatal "This docker container must be run as root, do not specify a user.\nYou can specify PUID and PGID env vars to run processes as that user and group after initialization." | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | if [ "$DEBUG" = "true" ]; then | ||||||
|  | 	set -x | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/10-usergroup.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/20-paths.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/30-ownership.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/40-dynamic.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/50-ipv6.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/60-secrets.sh | ||||||
|  | . /etc/s6-overlay/s6-rc.d/prepare/90-banner.sh | ||||||
							
								
								
									
										40
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/10-usergroup.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										40
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/10-usergroup.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,40 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | log_info "Configuring $NPMUSER user ..." | ||||||
|  |  | ||||||
|  | if id -u "$NPMUSER" 2>/dev/null; then | ||||||
|  | 	# user already exists | ||||||
|  | 	usermod -u "$PUID" "$NPMUSER" | ||||||
|  | else | ||||||
|  | 	# Add user | ||||||
|  | 	useradd -o -u "$PUID" -U -d "$NPMHOME" -s /bin/false "$NPMUSER" | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | log_info "Configuring $NPMGROUP group ..." | ||||||
|  | if [ "$(get_group_id "$NPMGROUP")" = '' ]; then | ||||||
|  | 	# Add group. This will not set the id properly if it's already taken | ||||||
|  | 	groupadd -f -g "$PGID" "$NPMGROUP" | ||||||
|  | else | ||||||
|  | 	groupmod -o -g "$PGID" "$NPMGROUP" | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | # Set the group ID and check it | ||||||
|  | groupmod -o -g "$PGID" "$NPMGROUP" | ||||||
|  | if [ "$(get_group_id "$NPMGROUP")" != "$PGID" ]; then | ||||||
|  | 	echo "ERROR: Unable to set group id properly" | ||||||
|  | 	exit 1 | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | # Set the group against the user and check it | ||||||
|  | usermod -G "$PGID" "$NPMGROUP" | ||||||
|  | if [ "$(id -g "$NPMUSER")" != "$PGID" ] ; then | ||||||
|  | 	echo "ERROR: Unable to set group against the user properly" | ||||||
|  | 	exit 1 | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | # Home for user | ||||||
|  | mkdir -p "$NPMHOME" | ||||||
|  | chown -R "$PUID:$PGID" "$NPMHOME" | ||||||
							
								
								
									
										41
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/20-paths.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										41
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/20-paths.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | log_info 'Checking paths ...' | ||||||
|  |  | ||||||
|  | # Ensure /data is mounted | ||||||
|  | if [ ! -d '/data' ]; then | ||||||
|  | 	log_fatal '/data is not mounted! Check your docker configuration.' | ||||||
|  | fi | ||||||
|  | # Ensure /etc/letsencrypt is mounted | ||||||
|  | if [ ! -d '/etc/letsencrypt' ]; then | ||||||
|  | 	log_fatal '/etc/letsencrypt is not mounted! Check your docker configuration.' | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | # Create required folders | ||||||
|  | mkdir -p \ | ||||||
|  | 	/data/nginx \ | ||||||
|  | 	/data/custom_ssl \ | ||||||
|  | 	/data/logs \ | ||||||
|  | 	/data/access \ | ||||||
|  | 	/data/nginx/default_host \ | ||||||
|  | 	/data/nginx/default_www \ | ||||||
|  | 	/data/nginx/proxy_host \ | ||||||
|  | 	/data/nginx/redirection_host \ | ||||||
|  | 	/data/nginx/stream \ | ||||||
|  | 	/data/nginx/dead_host \ | ||||||
|  | 	/data/nginx/temp \ | ||||||
|  | 	/data/letsencrypt-acme-challenge \ | ||||||
|  | 	/run/nginx \ | ||||||
|  | 	/tmp/nginx/body \ | ||||||
|  | 	/var/log/nginx \ | ||||||
|  | 	/var/lib/nginx/cache/public \ | ||||||
|  | 	/var/lib/nginx/cache/private \ | ||||||
|  | 	/var/cache/nginx/proxy_temp | ||||||
|  |  | ||||||
|  | touch /var/log/nginx/error.log || true | ||||||
|  | chmod 777 /var/log/nginx/error.log || true | ||||||
|  | chmod -R 777 /var/cache/nginx || true | ||||||
|  | chmod 644 /etc/logrotate.d/nginx-proxy-manager | ||||||
							
								
								
									
										28
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/30-ownership.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										28
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/30-ownership.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,28 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | log_info 'Setting ownership ...' | ||||||
|  |  | ||||||
|  | # root | ||||||
|  | chown root /tmp/nginx | ||||||
|  |  | ||||||
|  | # npm user and group | ||||||
|  | chown -R "$PUID:$PGID" /data | ||||||
|  | chown -R "$PUID:$PGID" /etc/letsencrypt | ||||||
|  | chown -R "$PUID:$PGID" /run/nginx | ||||||
|  | chown -R "$PUID:$PGID" /tmp/nginx | ||||||
|  | chown -R "$PUID:$PGID" /var/cache/nginx | ||||||
|  | chown -R "$PUID:$PGID" /var/lib/logrotate | ||||||
|  | chown -R "$PUID:$PGID" /var/lib/nginx | ||||||
|  | chown -R "$PUID:$PGID" /var/log/nginx | ||||||
|  |  | ||||||
|  | # Don't chown entire /etc/nginx folder as this causes crashes on some systems | ||||||
|  | chown -R "$PUID:$PGID" /etc/nginx/nginx | ||||||
|  | chown -R "$PUID:$PGID" /etc/nginx/nginx.conf | ||||||
|  | chown -R "$PUID:$PGID" /etc/nginx/conf.d | ||||||
|  |  | ||||||
|  | # Prevents errors when installing python certbot plugins when non-root | ||||||
|  | chown "$PUID:$PGID" /opt/certbot /opt/certbot/bin | ||||||
|  | find /opt/certbot/lib/python*/site-packages -not -user "$PUID" -execdir chown "$PUID:$PGID" {} \+ | ||||||
							
								
								
									
										17
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/40-dynamic.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										17
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/40-dynamic.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,17 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | log_info 'Dynamic resolvers ...' | ||||||
|  |  | ||||||
|  | DISABLE_IPV6=$(echo "${DISABLE_IPV6:-}" | tr '[:upper:]' '[:lower:]') | ||||||
|  |  | ||||||
|  | # Dynamically generate resolvers file, if resolver is IPv6, enclose in `[]` | ||||||
|  | # thanks @tfmm | ||||||
|  | if [ "$DISABLE_IPV6" == "true" ] || [ "$DISABLE_IPV6" == "on" ] || [ "$DISABLE_IPV6" == "1" ] || [ "$DISABLE_IPV6" == "yes" ]; | ||||||
|  | then | ||||||
|  | 	echo resolver "$(awk 'BEGIN{ORS=" "} $1=="nameserver" { sub(/%.*$/,"",$2); print ($2 ~ ":")? "["$2"]": $2}' /etc/resolv.conf) ipv6=off valid=10s;" > /etc/nginx/conf.d/include/resolvers.conf | ||||||
|  | else | ||||||
|  | 	echo resolver "$(awk 'BEGIN{ORS=" "} $1=="nameserver" { sub(/%.*$/,"",$2); print ($2 ~ ":")? "["$2"]": $2}' /etc/resolv.conf) valid=10s;" > /etc/nginx/conf.d/include/resolvers.conf | ||||||
|  | fi | ||||||
							
								
								
									
										39
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/50-ipv6.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										39
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/50-ipv6.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,39 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | # This command reads the `DISABLE_IPV6` env var and will either enable | ||||||
|  | # or disable ipv6 in all nginx configs based on this setting. | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | log_info 'IPv6 ...' | ||||||
|  |  | ||||||
|  | # Lowercase | ||||||
|  | DISABLE_IPV6=$(echo "${DISABLE_IPV6:-}" | tr '[:upper:]' '[:lower:]') | ||||||
|  |  | ||||||
|  | process_folder () { | ||||||
|  | 	FILES=$(find "$1" -type f -name "*.conf") | ||||||
|  | 	SED_REGEX= | ||||||
|  |  | ||||||
|  | 	if [ "$DISABLE_IPV6" == "true" ] || [ "$DISABLE_IPV6" == "on" ] || [ "$DISABLE_IPV6" == "1" ] || [ "$DISABLE_IPV6" == "yes" ]; then | ||||||
|  | 		# IPV6 is disabled | ||||||
|  | 		echo "Disabling IPV6 in hosts in: $1" | ||||||
|  | 		SED_REGEX='s/^([^#]*)listen \[::\]/\1#listen [::]/g' | ||||||
|  | 	else | ||||||
|  | 		# IPV6 is enabled | ||||||
|  | 		echo "Enabling IPV6 in hosts in: $1" | ||||||
|  | 		SED_REGEX='s/^(\s*)#listen \[::\]/\1listen [::]/g' | ||||||
|  | 	fi | ||||||
|  |  | ||||||
|  | 	for FILE in $FILES | ||||||
|  | 	do | ||||||
|  | 		echo "- ${FILE}" | ||||||
|  | 		echo "$(sed -E "$SED_REGEX" "$FILE")" > $FILE | ||||||
|  | 	done | ||||||
|  |  | ||||||
|  | 	# ensure the files are still owned by the npm user | ||||||
|  | 	chown -R "$PUID:$PGID" "$1" | ||||||
|  | } | ||||||
|  |  | ||||||
|  | process_folder /etc/nginx/conf.d | ||||||
|  | process_folder /data/nginx | ||||||
							
								
								
									
										30
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/60-secrets.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										30
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/60-secrets.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,30 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | # in s6, environmental variables are written as text files for s6 to monitor | ||||||
|  | # search through full-path filenames for files ending in "__FILE" | ||||||
|  | log_info 'Docker secrets ...' | ||||||
|  |  | ||||||
|  | for FILENAME in $(find /var/run/s6/container_environment/ | grep "__FILE$"); do | ||||||
|  | 	echo "[secret-init] Evaluating ${FILENAME##*/} ..." | ||||||
|  |  | ||||||
|  | 	# set SECRETFILE to the contents of the full-path textfile | ||||||
|  | 	SECRETFILE=$(cat "${FILENAME}") | ||||||
|  | 	# if SECRETFILE exists / is not null | ||||||
|  | 	if [[ -f "${SECRETFILE}" ]]; then | ||||||
|  | 		# strip the appended "__FILE" from environmental variable name ... | ||||||
|  | 		STRIPFILE=$(echo "${FILENAME}" | sed "s/__FILE//g") | ||||||
|  | 		# echo "[secret-init] Set STRIPFILE to ${STRIPFILE}"  # DEBUG - rm for prod! | ||||||
|  |  | ||||||
|  | 		# ... and set value to contents of secretfile | ||||||
|  | 		# since s6 uses text files, this is effectively "export ..." | ||||||
|  | 		printf $(cat "${SECRETFILE}") > "${STRIPFILE}" | ||||||
|  | 		# echo "[secret-init] Set ${STRIPFILE##*/} to $(cat ${STRIPFILE})"  # DEBUG - rm for prod!" | ||||||
|  | 		echo "Success: ${STRIPFILE##*/} set from ${FILENAME##*/}" | ||||||
|  |  | ||||||
|  | 	else | ||||||
|  | 		echo "Cannot find secret in ${FILENAME}" | ||||||
|  | 	fi | ||||||
|  | done | ||||||
							
								
								
									
										18
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/90-banner.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										18
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/90-banner.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,18 @@ | |||||||
|  | #!/command/with-contenv bash | ||||||
|  | # shellcheck shell=bash | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  | set +x | ||||||
|  |  | ||||||
|  | echo " | ||||||
|  | ------------------------------------- | ||||||
|  |  _   _ ____  __  __ | ||||||
|  | | \ | |  _ \|  \/  | | ||||||
|  | |  \| | |_) | |\/| | | ||||||
|  | | |\  |  __/| |  | | | ||||||
|  | |_| \_|_|   |_|  |_| | ||||||
|  | ------------------------------------- | ||||||
|  | User:  $NPMUSER PUID:$PUID ID:$(id -u "$NPMUSER") GROUP:$(id -g "$NPMUSER") | ||||||
|  | Group: $NPMGROUP PGID:$PGID ID:$(get_group_id "$NPMGROUP") | ||||||
|  | ------------------------------------- | ||||||
|  | " | ||||||
							
								
								
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/type
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/type
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | |||||||
|  | oneshot | ||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user