mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-10-30 15:23:34 +00:00 
			
		
		
		
	Compare commits
	
		
			4 Commits
		
	
	
		
			dependabot
			...
			static-con
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | 066a765a4d | ||
|  | 5a3d32db7b | ||
|  | 8de118d875 | ||
|  | f61ab55b52 | 
							
								
								
									
										30
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										30
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							| @@ -6,30 +6,20 @@ labels: bug | ||||
| assignees: '' | ||||
|  | ||||
| --- | ||||
| <!-- | ||||
|  | ||||
| Are you in the right place? | ||||
| **Are you in the right place?** | ||||
| - If you are looking for support on how to get your upstream server forwarding, please consider asking the community on Reddit. | ||||
| - If you are writing code changes to contribute and need to ask about the internals of the software, Gitter is the best place to ask. | ||||
| - If you think you found a bug with NPM (not Nginx, or your upstream server or MySql) then you are in the *right place.* | ||||
|  | ||||
| --> | ||||
|  | ||||
| **Checklist** | ||||
| - Have you pulled and found the error with `jc21/nginx-proxy-manager:latest` docker image? | ||||
|   - Yes / No | ||||
| - Are you sure you're not using someone else's docker image? | ||||
|   - Yes / No | ||||
| - Have you searched for similar issues (both open and closed)? | ||||
|   - Yes / No | ||||
| - If having problems with Lets Encrypt, have you made absolutely sure your site is accessible from outside of your network? | ||||
|  | ||||
| **Describe the bug** | ||||
| <!-- A clear and concise description of what the bug is. --> | ||||
|  | ||||
|  | ||||
| **Nginx Proxy Manager Version** | ||||
| <!-- What version of Nginx Proxy Manager is reported on the login page? --> | ||||
|  | ||||
| - A clear and concise description of what the bug is. | ||||
| - What version of Nginx Proxy Manager is reported on the login page? | ||||
|  | ||||
| **To Reproduce** | ||||
| Steps to reproduce the behavior: | ||||
| @@ -38,18 +28,14 @@ Steps to reproduce the behavior: | ||||
| 3. Scroll down to '....' | ||||
| 4. See error | ||||
|  | ||||
|  | ||||
| **Expected behavior** | ||||
| <!-- A clear and concise description of what you expected to happen. --> | ||||
|  | ||||
| A clear and concise description of what you expected to happen. | ||||
|  | ||||
| **Screenshots** | ||||
| <!-- If applicable, add screenshots to help explain your problem. --> | ||||
|  | ||||
| If applicable, add screenshots to help explain your problem. | ||||
|  | ||||
| **Operating System** | ||||
| <!-- Please specify if using a Rpi, Mac, orchestration tool or any other setups that might affect the reproduction of this error. --> | ||||
|  | ||||
| - Please specify if using a Rpi, Mac, orchestration tool or any other setups that might affect the reproduction of this error. | ||||
|  | ||||
| **Additional context** | ||||
| <!-- Add any other context about the problem here, docker version, browser version, logs if applicable to the problem. Too much info is better than too little. --> | ||||
| Add any other context about the problem here, docker version, browser version if applicable to the problem. Too much info is better than too little. | ||||
|   | ||||
							
								
								
									
										18
									
								
								.github/ISSUE_TEMPLATE/dns_challenge_request.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										18
									
								
								.github/ISSUE_TEMPLATE/dns_challenge_request.md
									
									
									
									
										vendored
									
									
								
							| @@ -1,18 +0,0 @@ | ||||
| --- | ||||
| name: DNS challenge provider request | ||||
| about: Suggest a new provider to be available for a certificate DNS challenge | ||||
| title: '' | ||||
| labels: dns provider request | ||||
| assignees: '' | ||||
|  | ||||
| --- | ||||
|  | ||||
| **What provider would you like to see added to NPM?** | ||||
| <!-- What is this provider called? --> | ||||
|  | ||||
|  | ||||
| **Have you checked if a certbot plugin exists?** | ||||
| <!--  | ||||
| Currently NPM only supports DNS challenge providers for which a certbot plugin exists.  | ||||
| You can visit pypi.org, and search for a package with the name `certbot-dns-<privider>`. | ||||
| --> | ||||
							
								
								
									
										19
									
								
								.github/ISSUE_TEMPLATE/feature_request.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										19
									
								
								.github/ISSUE_TEMPLATE/feature_request.md
									
									
									
									
										vendored
									
									
								
							| @@ -7,26 +7,19 @@ assignees: '' | ||||
|  | ||||
| --- | ||||
|  | ||||
| <!-- | ||||
|  | ||||
| Are you in the right place? | ||||
| **Are you in the right place?** | ||||
| - If you are looking for support on how to get your upstream server forwarding, please consider asking the community on Reddit. | ||||
| - If you are writing code changes to contribute and need to ask about the internals of the software, Gitter is the best place to ask. | ||||
| - If you think you found a bug with NPM (not Nginx, or your upstream server or MySql) then you are in the *right place.* | ||||
|  | ||||
| --> | ||||
| - If you have a feature request for NPM then you are in the *right place.* | ||||
|  | ||||
| **Is your feature request related to a problem? Please describe.** | ||||
| <!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] --> | ||||
|  | ||||
| A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] | ||||
|  | ||||
| **Describe the solution you'd like** | ||||
| <!-- A clear and concise description of what you want to happen. --> | ||||
|  | ||||
| A clear and concise description of what you want to happen. | ||||
|  | ||||
| **Describe alternatives you've considered** | ||||
| <!-- A clear and concise description of any alternative solutions or features you've considered. --> | ||||
|  | ||||
| A clear and concise description of any alternative solutions or features you've considered. | ||||
|  | ||||
| **Additional context** | ||||
| <!-- Add any other context or screenshots about the feature request here. --> | ||||
| Add any other context or screenshots about the feature request here. | ||||
|   | ||||
							
								
								
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
								
							| @@ -1,21 +0,0 @@ | ||||
| name: 'Close stale issues and PRs' | ||||
| on: | ||||
|   schedule: | ||||
|     - cron: '30 1 * * *' | ||||
|   workflow_dispatch: | ||||
|  | ||||
| jobs: | ||||
|   stale: | ||||
|     runs-on: ubuntu-latest | ||||
|     steps: | ||||
|       - uses: actions/stale@v9 | ||||
|         with: | ||||
|           stale-issue-label: 'stale' | ||||
|           stale-pr-label: 'stale' | ||||
|           stale-issue-message: 'Issue is now considered stale. If you want to keep it open, please comment :+1:' | ||||
|           stale-pr-message: 'PR is now considered stale. If you want to keep it open, please comment :+1:' | ||||
|           close-issue-message: 'Issue was closed due to inactivity.' | ||||
|           close-pr-message: 'PR was closed due to inactivity.' | ||||
|           days-before-stale: 182 | ||||
|           days-before-close: 365 | ||||
|           operations-per-run: 50 | ||||
							
								
								
									
										4
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -3,7 +3,3 @@ | ||||
| ._* | ||||
| .vscode | ||||
| certbot-help.txt | ||||
| test/node_modules | ||||
| */node_modules | ||||
| docker/dev/dnsrouter-config.json.tmp | ||||
| docker/dev/resolv.conf | ||||
|   | ||||
							
								
								
									
										347
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										347
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							| @@ -1,9 +1,3 @@ | ||||
| import groovy.transform.Field | ||||
|  | ||||
| @Field | ||||
| def shOutput = "" | ||||
| def buildxPushTags = "" | ||||
|  | ||||
| pipeline { | ||||
| 	agent { | ||||
| 		label 'docker-multiarch' | ||||
| @@ -14,12 +8,14 @@ pipeline { | ||||
| 		ansiColor('xterm') | ||||
| 	} | ||||
| 	environment { | ||||
| 		IMAGE                      = 'nginx-proxy-manager' | ||||
| 		IMAGE                      = "nginx-proxy-manager" | ||||
| 		BUILD_VERSION              = getVersion() | ||||
| 		MAJOR_VERSION              = '2' | ||||
| 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('\\\\', '-').replaceAll('/', '-').replaceAll('\\.', '-')}" | ||||
| 		BUILDX_NAME                = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | ||||
| 		MAJOR_VERSION              = "2" | ||||
| 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('/', '-')}" | ||||
| 		COMPOSE_PROJECT_NAME       = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | ||||
| 		COMPOSE_FILE               = 'docker/docker-compose.ci.yml' | ||||
| 		COMPOSE_INTERACTIVE_NO_CLI = 1 | ||||
| 		BUILDX_NAME                = "${COMPOSE_PROJECT_NAME}" | ||||
| 	} | ||||
| 	stages { | ||||
| 		stage('Environment') { | ||||
| @@ -30,7 +26,7 @@ pipeline { | ||||
| 					} | ||||
| 					steps { | ||||
| 						script { | ||||
| 							buildxPushTags = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | ||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| @@ -43,7 +39,7 @@ pipeline { | ||||
| 					steps { | ||||
| 						script { | ||||
| 							// Defaults to the Branch name, which is applies to all branches AND pr's | ||||
| 							buildxPushTags = "-t docker.io/nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}" | ||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}" | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| @@ -56,155 +52,109 @@ pipeline { | ||||
| 						sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md' | ||||
| 					} | ||||
| 				} | ||||
| 				stage('Docker Login') { | ||||
| 					steps { | ||||
| 						withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { | ||||
| 							sh 'docker login -u "${duser}" -p "${dpass}"' | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Builds') { | ||||
| 			parallel { | ||||
| 				stage('Project') { | ||||
| 					steps { | ||||
| 						script { | ||||
| 							// Frontend and Backend | ||||
| 							def shStatusCode = sh(label: 'Checking and Building', returnStatus: true, script: ''' | ||||
| 								set -e | ||||
| 								./scripts/ci/frontend-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||
| 								./scripts/ci/test-and-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||
| 							''') | ||||
| 							shOutput = readFile "${env.WORKSPACE}/tmp-sh-build" | ||||
| 							if (shStatusCode != 0) { | ||||
| 								error "${shOutput}" | ||||
| 							} | ||||
| 						} | ||||
| 					} | ||||
| 					post { | ||||
| 						always { | ||||
| 							sh 'rm -f ${WORKSPACE}/tmp-sh-build' | ||||
| 						} | ||||
| 						failure { | ||||
| 							npmGithubPrComment("CI Error:\n\n```\n${shOutput}\n```", true) | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| 				stage('Docs') { | ||||
| 					steps { | ||||
| 						dir(path: 'docs') { | ||||
| 							sh 'yarn install' | ||||
| 							sh 'yarn build' | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Test Sqlite') { | ||||
| 			environment { | ||||
| 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_sqlite" | ||||
| 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.sqlite.yml' | ||||
| 			} | ||||
| 			when { | ||||
| 				not { | ||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 				} | ||||
| 			} | ||||
| 		stage('Frontend') { | ||||
| 			steps { | ||||
| 				sh 'rm -rf ./test/results/junit/*' | ||||
| 				sh './scripts/ci/fulltest-cypress' | ||||
| 			} | ||||
| 			post { | ||||
| 				always { | ||||
| 					// Dumps to analyze later | ||||
| 					sh 'mkdir -p debug/sqlite' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1' | ||||
| 					junit 'test/results/junit/*' | ||||
| 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||
| 				} | ||||
| 				unstable { | ||||
| 					dir(path: 'test/results') { | ||||
| 						archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml') | ||||
| 					} | ||||
| 				} | ||||
| 				sh './scripts/frontend-build' | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Test Mysql') { | ||||
| 			environment { | ||||
| 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_mysql" | ||||
| 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.mysql.yml' | ||||
| 			} | ||||
| 			when { | ||||
| 				not { | ||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 				} | ||||
| 			} | ||||
| 		stage('Backend') { | ||||
| 			steps { | ||||
| 				sh 'rm -rf ./test/results/junit/*' | ||||
| 				sh './scripts/ci/fulltest-cypress' | ||||
| 			} | ||||
| 			post { | ||||
| 				always { | ||||
| 					// Dumps to analyze later | ||||
| 					sh 'mkdir -p debug/mysql' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1' | ||||
| 					junit 'test/results/junit/*' | ||||
| 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||
| 				} | ||||
| 				unstable { | ||||
| 					dir(path: 'test/results') { | ||||
| 						archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml') | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Test Postgres') { | ||||
| 			environment { | ||||
| 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_postgres" | ||||
| 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.postgres.yml' | ||||
| 			} | ||||
| 			when { | ||||
| 				not { | ||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 				} | ||||
| 			} | ||||
| 			steps { | ||||
| 				sh 'rm -rf ./test/results/junit/*' | ||||
| 				sh './scripts/ci/fulltest-cypress' | ||||
| 			} | ||||
| 			post { | ||||
| 				always { | ||||
| 					// Dumps to analyze later | ||||
| 					sh 'mkdir -p debug/postgres' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/postgres/docker_fullstack.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/postgres/docker_stepca.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/postgres/docker_pdns.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/postgres/docker_pdns-db.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/postgres/docker_dnsrouter.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q db-postgres) > debug/postgres/docker_db-postgres.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q authentik) > debug/postgres/docker_authentik.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q authentik-redis) > debug/postgres/docker_authentik-redis.log 2>&1' | ||||
| 					sh 'docker logs $(docker-compose ps --all -q authentik-ldap) > debug/postgres/docker_authentik-ldap.log 2>&1' | ||||
| 				echo 'Checking Syntax ...' | ||||
| 				// See: https://github.com/yarnpkg/yarn/issues/3254 | ||||
| 				sh '''docker run --rm \\ | ||||
| 					-v "$(pwd)/backend:/app" \\ | ||||
| 					-v "$(pwd)/global:/app/global" \\ | ||||
| 					-w /app \\ | ||||
| 					node:latest \\ | ||||
| 					sh -c "yarn install && yarn eslint . && rm -rf node_modules" | ||||
| 				''' | ||||
|  | ||||
| 					junit 'test/results/junit/*' | ||||
| 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||
| 				} | ||||
| 				unstable { | ||||
| 				echo 'Docker Build ...' | ||||
| 				sh '''docker build --pull --no-cache --squash --compress \\ | ||||
| 					-t "${IMAGE}:ci-${BUILD_NUMBER}" \\ | ||||
| 					-f docker/Dockerfile \\ | ||||
| 					--build-arg TARGETPLATFORM=linux/amd64 \\ | ||||
| 					--build-arg BUILDPLATFORM=linux/amd64 \\ | ||||
| 					--build-arg BUILD_VERSION="${BUILD_VERSION}" \\ | ||||
| 					--build-arg BUILD_COMMIT="${BUILD_COMMIT}" \\ | ||||
| 					--build-arg BUILD_DATE="$(date '+%Y-%m-%d %T %Z')" \\ | ||||
| 					. | ||||
| 				''' | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Integration Tests Sqlite') { | ||||
| 			steps { | ||||
| 				// Bring up a stack | ||||
| 				sh 'docker-compose up -d fullstack-sqlite' | ||||
| 				sh './scripts/wait-healthy $(docker-compose ps -q fullstack-sqlite) 120' | ||||
|  | ||||
| 				// Run tests | ||||
| 				sh 'rm -rf test/results' | ||||
| 				sh 'docker-compose up cypress-sqlite' | ||||
| 				// Get results | ||||
| 				sh 'docker cp -L "$(docker-compose ps -q cypress-sqlite):/test/results" test/' | ||||
| 			} | ||||
| 			post { | ||||
| 				always { | ||||
| 					// Dumps to analyze later | ||||
| 					sh 'mkdir -p debug' | ||||
| 					sh 'docker-compose logs fullstack-sqlite | gzip > debug/docker_fullstack_sqlite.log.gz' | ||||
| 					sh 'docker-compose logs db | gzip > debug/docker_db.log.gz' | ||||
| 					// Cypress videos and screenshot artifacts | ||||
| 					dir(path: 'test/results') { | ||||
| 						archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml') | ||||
| 						archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml' | ||||
| 					} | ||||
| 					junit 'test/results/junit/*' | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Integration Tests Mysql') { | ||||
| 			steps { | ||||
| 				// Bring up a stack | ||||
| 				sh 'docker-compose up -d fullstack-mysql' | ||||
| 				sh './scripts/wait-healthy $(docker-compose ps -q fullstack-mysql) 120' | ||||
|  | ||||
| 				// Run tests | ||||
| 				sh 'rm -rf test/results' | ||||
| 				sh 'docker-compose up cypress-mysql' | ||||
| 				// Get results | ||||
| 				sh 'docker cp -L "$(docker-compose ps -q cypress-mysql):/test/results" test/' | ||||
| 			} | ||||
| 			post { | ||||
| 				always { | ||||
| 					// Dumps to analyze later | ||||
| 					sh 'mkdir -p debug' | ||||
| 					sh 'docker-compose logs fullstack-mysql | gzip > debug/docker_fullstack_mysql.log.gz' | ||||
| 					sh 'docker-compose logs db | gzip > debug/docker_db.log.gz' | ||||
| 					// Cypress videos and screenshot artifacts | ||||
| 					dir(path: 'test/results') { | ||||
| 						archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml' | ||||
| 					} | ||||
| 					junit 'test/results/junit/*' | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Docs') { | ||||
| 			when { | ||||
| 				not { | ||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 				} | ||||
| 			} | ||||
| 			steps { | ||||
| 				dir(path: 'docs') { | ||||
| 					sh 'yarn install' | ||||
| 					sh 'yarn build' | ||||
| 				} | ||||
|  | ||||
| 				dir(path: 'docs/.vuepress/dist') { | ||||
| 					sh 'tar -czf ../../docs.tgz *' | ||||
| 				} | ||||
|  | ||||
| 				archiveArtifacts(artifacts: 'docs/docs.tgz', allowEmptyArchive: false) | ||||
| 			} | ||||
| 		} | ||||
| 		stage('MultiArch Build') { | ||||
| 			when { | ||||
| 				not { | ||||
| @@ -212,64 +162,81 @@ pipeline { | ||||
| 				} | ||||
| 			} | ||||
| 			steps { | ||||
| 				sh "./scripts/buildx --push ${buildxPushTags}" | ||||
| 				withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { | ||||
| 					// Docker Login | ||||
| 					sh "docker login -u '${duser}' -p '${dpass}'" | ||||
| 					// Buildx with push from cache | ||||
| 					sh "./scripts/buildx --push ${BUILDX_PUSH_TAGS}" | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('Docs / Comment') { | ||||
| 			parallel { | ||||
| 				stage('Docs Job') { | ||||
| 					when { | ||||
| 						allOf { | ||||
| 							branch pattern: "^(develop|master)\$", comparator: "REGEXP" | ||||
| 							not { | ||||
| 								equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 							} | ||||
| 						} | ||||
| 					} | ||||
| 					steps { | ||||
| 						build wait: false, job: 'nginx-proxy-manager-docs', parameters: [string(name: 'docs_branch', value: "$BRANCH_NAME")] | ||||
| 		stage('Docs Deploy') { | ||||
| 			when { | ||||
| 				allOf { | ||||
| 					branch 'master' | ||||
| 					not { | ||||
| 						equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 					} | ||||
| 				} | ||||
| 				stage('PR Comment') { | ||||
| 					when { | ||||
| 						allOf { | ||||
| 							changeRequest() | ||||
| 							not { | ||||
| 								equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 							} | ||||
| 						} | ||||
| 					} | ||||
| 					steps { | ||||
| 						script { | ||||
| 							npmGithubPrComment("""Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/nginxproxymanager/${IMAGE}-dev): | ||||
| ``` | ||||
| nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER} | ||||
| ``` | ||||
| 			} | ||||
| 			steps { | ||||
| 				withCredentials([[$class: 'AmazonWebServicesCredentialsBinding', accessKeyVariable: 'AWS_ACCESS_KEY_ID', credentialsId: 'npm-s3-docs', secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']]) { | ||||
| 					sh """docker run --rm \\ | ||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-upload \\ | ||||
| 						-e S3_BUCKET=jc21-npm-site \\ | ||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ | ||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ | ||||
| 						-v \$(pwd):/app \\ | ||||
| 						-w /app \\ | ||||
| 						jc21/ci-tools \\ | ||||
| 						scripts/docs-upload /app/docs/.vuepress/dist/ | ||||
| 					""" | ||||
|  | ||||
| > [!NOTE] | ||||
| > Ensure you backup your NPM instance before testing this image! Especially if there are database changes. | ||||
| > This is a different docker image namespace than the official image. | ||||
|  | ||||
| > [!WARNING] | ||||
| > Changes and additions to DNS Providers require verification by at least 2 members of the community! | ||||
| """, true) | ||||
| 						} | ||||
| 					sh """docker run --rm \\ | ||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-invalidate \\ | ||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ | ||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ | ||||
| 						jc21/ci-tools \\ | ||||
| 						aws cloudfront create-invalidation --distribution-id EN1G6DEWZUTDT --paths '/*' | ||||
| 					""" | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		stage('PR Comment') { | ||||
| 			when { | ||||
| 				allOf { | ||||
| 					changeRequest() | ||||
| 					not { | ||||
| 						equals expected: 'UNSTABLE', actual: currentBuild.result | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 			steps { | ||||
| 				script { | ||||
| 					def comment = pullRequest.comment("Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`") | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	post { | ||||
| 		always { | ||||
| 			sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30' | ||||
| 			sh 'echo Reverting ownership' | ||||
| 			sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data' | ||||
| 			printResult(true) | ||||
| 			sh 'docker run --rm -v $(pwd):/data jc21/ci-tools chown -R $(id -u):$(id -g) /data' | ||||
| 		} | ||||
| 		success { | ||||
| 			juxtapose event: 'success' | ||||
| 			sh 'figlet "SUCCESS"' | ||||
| 		} | ||||
| 		failure { | ||||
| 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | ||||
| 			juxtapose event: 'failure' | ||||
| 			sh 'figlet "FAILURE"' | ||||
| 		} | ||||
| 		unstable { | ||||
| 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | ||||
| 			juxtapose event: 'unstable' | ||||
| 			sh 'figlet "UNSTABLE"' | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|   | ||||
							
								
								
									
										285
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										285
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,25 +1,31 @@ | ||||
| <p align="center"> | ||||
| 	<img src="https://nginxproxymanager.com/github.png"> | ||||
| 	<br><br> | ||||
| 	<img src="https://img.shields.io/badge/version-2.12.6-green.svg?style=for-the-badge"> | ||||
| 	<img src="https://img.shields.io/badge/version-2.8.1-green.svg?style=for-the-badge"> | ||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||
| 		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||
| 	</a> | ||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||
| 		<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||
| 	</a> | ||||
| 	<a href="https://ci.nginxproxymanager.com/blue/organizations/jenkins/nginx-proxy-manager/branches/"> | ||||
| 		<img src="https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fci.nginxproxymanager.com%2Fjob%2Fnginx-proxy-manager%2Fjob%2Fmaster&style=for-the-badge"> | ||||
| 	</a> | ||||
| 	<a href="https://gitter.im/nginx-proxy-manager/community"> | ||||
| 		<img alt="Gitter" src="https://img.shields.io/gitter/room/nginx-proxy-manager/community?style=for-the-badge"> | ||||
| 	</a> | ||||
| </p> | ||||
|  | ||||
| This project comes as a pre-built docker image that enables you to easily forward to your websites | ||||
| running at home or otherwise, including free SSL, without having to know too much about Nginx or Letsencrypt. | ||||
|  | ||||
| - [Quick Setup](#quick-setup) | ||||
| - [Quick Setup](https://nginxproxymanager.com#quick-setup) | ||||
| - [Full Setup](https://nginxproxymanager.com/setup/) | ||||
| - [Screenshots](https://nginxproxymanager.com/screenshots/) | ||||
|  | ||||
| ## Project Goal | ||||
|  | ||||
| I created this project to fill a personal need to provide users with an easy way to accomplish reverse | ||||
| I created this project to fill a personal need to provide users with a easy way to accomplish reverse | ||||
| proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed. | ||||
| While there might be advanced options they are optional and the project should be as simple as possible | ||||
| so that the barrier for entry here is low. | ||||
| @@ -46,75 +52,210 @@ I won't go in to too much detail here but here are the basics for someone new to | ||||
| 3. Configure your domain name details to point to your home, either with a static ip or a service like DuckDNS or [Amazon Route53](https://github.com/jc21/route53-ddns) | ||||
| 4. Use the Nginx Proxy Manager as your gateway to forward to your other web based services | ||||
|  | ||||
| ## Quick Setup | ||||
|  | ||||
| 1. Install Docker and Docker-Compose | ||||
| ## Contributors | ||||
|  | ||||
| - [Docker Install documentation](https://docs.docker.com/install/) | ||||
| - [Docker-Compose Install documentation](https://docs.docker.com/compose/install/) | ||||
| Special thanks to the following contributors: | ||||
|  | ||||
| 2. Create a docker-compose.yml file similar to this: | ||||
|  | ||||
| ```yml | ||||
| services: | ||||
|   app: | ||||
|     image: 'docker.io/jc21/nginx-proxy-manager:latest' | ||||
|     restart: unless-stopped | ||||
|     ports: | ||||
|       - '80:80' | ||||
|       - '81:81' | ||||
|       - '443:443' | ||||
|     volumes: | ||||
|       - ./data:/data | ||||
|       - ./letsencrypt:/etc/letsencrypt | ||||
| ``` | ||||
|  | ||||
| This is the bare minimum configuration required. See the [documentation](https://nginxproxymanager.com/setup/) for more. | ||||
|  | ||||
| 3. Bring up your stack by running | ||||
|  | ||||
| ```bash | ||||
| docker-compose up -d | ||||
|  | ||||
| # If using docker-compose-plugin | ||||
| docker compose up -d | ||||
|  | ||||
| ``` | ||||
|  | ||||
| 4. Log in to the Admin UI | ||||
|  | ||||
| When your docker container is running, connect to it on port `81` for the admin interface. | ||||
| Sometimes this can take a little bit because of the entropy of keys. | ||||
|  | ||||
| [http://127.0.0.1:81](http://127.0.0.1:81) | ||||
|  | ||||
| Default Admin User: | ||||
| ``` | ||||
| Email:    admin@example.com | ||||
| Password: changeme | ||||
| ``` | ||||
|  | ||||
| Immediately after logging in with this default user you will be asked to modify your details and change your password. | ||||
|  | ||||
|  | ||||
| ## Contributing | ||||
|  | ||||
| All are welcome to create pull requests for this project, against the `develop` branch. Official releases are created from the `master` branch. | ||||
|  | ||||
| CI is used in this project. All PR's must pass before being considered. After passing, | ||||
| docker builds for PR's are available on dockerhub for manual verifications. | ||||
|  | ||||
| Documentation within the `develop` branch is available for preview at | ||||
| [https://develop.nginxproxymanager.com](https://develop.nginxproxymanager.com) | ||||
|  | ||||
|  | ||||
| ### Contributors | ||||
|  | ||||
| Special thanks to [all of our contributors](https://github.com/NginxProxyManager/nginx-proxy-manager/graphs/contributors). | ||||
|  | ||||
|  | ||||
| ## Getting Support | ||||
|  | ||||
| 1. [Found a bug?](https://github.com/NginxProxyManager/nginx-proxy-manager/issues) | ||||
| 2. [Discussions](https://github.com/NginxProxyManager/nginx-proxy-manager/discussions) | ||||
| 3. [Reddit](https://reddit.com/r/nginxproxymanager) | ||||
| <!-- prettier-ignore-start --> | ||||
| <!-- markdownlint-disable --> | ||||
| <table> | ||||
| 	<tr> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Subv"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/357072?s=460&u=d8adcdc91d749ae53e177973ed9b6bb6c4c894a3&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Sebastian Valle</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Indemnity83"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/35218?s=460&u=7082004ff35138157c868d7d9c683ccebfce5968&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Kyle Klaus</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/theraw"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/32969774?s=460&u=6b359971e15685fb0359e6a8c065a399b40dc228&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>ƬHE ЯAW</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/spalger"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/1329312?s=400&u=565223e38f1c052afb4c5dcca3fcf1c63ba17ae7&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Spencer</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Xantios"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/1507836?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Xantios Krugor</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/dpanesso"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/2687121?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>David Panesso</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/IronTooch"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/27360514?s=460&u=69bf854a6647c55725f62ecb8d39249c6c0b2602&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>IronTooch</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 	</tr> | ||||
| 	<tr> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/damianog"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/2786682?s=460&u=76c6136fae797abb76b951cd8a246dcaecaf21af&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Damiano</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/tfmm"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/6880538?s=460&u=ce0160821cc4aa802df8395200f2d4956a5bc541&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Russ</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/margaale"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/20794934?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Marcelo Castagna</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Steven-Harris"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/7720242?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Steven Harris</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/jlesage"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/1791123?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Jocelyn Le Sage</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/cmer"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/412?s=460&u=67dd8b2e3661bfd6f68ec1eaa5b9821bd8a321cd&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Carl Mercier</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/the1ts"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/84956?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Paul Mansfield</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 	</tr> | ||||
| 	<tr> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/OhHeyAlan"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/11955126?s=460&u=fbaa5a1a4f73ef8960132c703349bfd037fe2630&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>OhHeyAlan</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/dogmatic69"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/94674?s=460&u=ca7647de53145c6283b6373ade5dc94ba99347db&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Carl Sutton</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/tg44"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/31839?s=460&u=ad32f4cadfef5e5fb09cdfa4b7b7b36a99ba6811&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Gergő Törcsvári</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/vrenjith"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/2093241?s=460&u=96ce93a9bebabdd0a60a2dc96cd093a41d5edaba&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>vrenjith</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/duhruh"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/1133969?s=460&u=c0691e6131ec6d516416c1c6fcedb5034f877bbe&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>David Rivera</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/jipjan"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/1384618?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Jaap-Jan de Wit</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/jmwebslave"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/6118262?s=460&u=7db409c47135b1e141c366bbb03ed9fae6ac2638&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>James Morgan</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 	</tr> | ||||
| 	<tr> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/chaptergy"> | ||||
| 				<img src="https://avatars2.githubusercontent.com/u/26956711?s=460&u=7d9adebabb6b4e7af7cb05d98d751087a372304b&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>chaptergy</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Philip-Mooney"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/48624631?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Philip Mooney</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/WaterCalm"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/23502129?s=400&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>WaterCalm</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/lebrou34"> | ||||
| 				<img src="https://avatars1.githubusercontent.com/u/16373103?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>lebrou34</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/lightglitch"> | ||||
| 				<img src="https://avatars0.githubusercontent.com/u/196953?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Mário Franco</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/klutchell"> | ||||
| 				<img src="https://avatars3.githubusercontent.com/u/20458272?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Kyle Harding</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/ahgraber"> | ||||
| 				<img src="https://avatars.githubusercontent.com/u/24922003?s=460&u=8376c9f00af9b6057ba4d2fb03b4f1b20a75277f&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Alex Graber</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 	</tr> | ||||
| 	<tr> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/MooBaloo"> | ||||
| 				<img src="https://avatars.githubusercontent.com/u/9493496?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>MooBaloo</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/Shuro"> | ||||
| 				<img src="https://avatars.githubusercontent.com/u/944030?s=460&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Shuro</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 		<td align="center"> | ||||
| 			<a href="https://github.com/lorisbergeron"> | ||||
| 				<img src="https://avatars.githubusercontent.com/u/51918567?s=460&u=778e4ff284b7d7304450f98421c99f79298371fb&v=4" width="80px;" alt=""/> | ||||
| 				<br /><sub><b>Loris Bergeron</b></sub> | ||||
| 			</a> | ||||
| 		</td> | ||||
| 	</tr> | ||||
| </table> | ||||
| <!-- markdownlint-enable --> | ||||
| <!-- prettier-ignore-end --> | ||||
|   | ||||
							
								
								
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,8 @@ | ||||
| { | ||||
| 	"editor.insertSpaces": false, | ||||
| 	"editor.formatOnSave": true, | ||||
| 	"files.trimTrailingWhitespace": true, | ||||
| 	"editor.codeActionsOnSave": { | ||||
| 		"source.fixAll.eslint": true | ||||
| 	} | ||||
| } | ||||
| @@ -2,7 +2,6 @@ const express     = require('express'); | ||||
| const bodyParser  = require('body-parser'); | ||||
| const fileUpload  = require('express-fileupload'); | ||||
| const compression = require('compression'); | ||||
| const config      = require('./lib/config'); | ||||
| const log         = require('./logger').express; | ||||
|  | ||||
| /** | ||||
| @@ -25,7 +24,7 @@ app.enable('trust proxy', ['loopback', 'linklocal', 'uniquelocal']); | ||||
| app.enable('strict routing'); | ||||
|  | ||||
| // pretty print JSON when not live | ||||
| if (config.debug()) { | ||||
| if (process.env.NODE_ENV !== 'production') { | ||||
| 	app.set('json spaces', 2); | ||||
| } | ||||
|  | ||||
| @@ -41,18 +40,19 @@ app.use(function (req, res, next) { | ||||
| 	} | ||||
|  | ||||
| 	res.set({ | ||||
| 		'X-XSS-Protection':       '1; mode=block', | ||||
| 		'X-Content-Type-Options': 'nosniff', | ||||
| 		'X-Frame-Options':        x_frame_options, | ||||
| 		'Cache-Control':          'no-cache, no-store, max-age=0, must-revalidate', | ||||
| 		Pragma:                   'no-cache', | ||||
| 		Expires:                  0 | ||||
| 		'Strict-Transport-Security': 'includeSubDomains; max-age=631138519; preload', | ||||
| 		'X-XSS-Protection':          '1; mode=block', | ||||
| 		'X-Content-Type-Options':    'nosniff', | ||||
| 		'X-Frame-Options':           x_frame_options, | ||||
| 		'Cache-Control':             'no-cache, no-store, max-age=0, must-revalidate', | ||||
| 		Pragma:                      'no-cache', | ||||
| 		Expires:                     0 | ||||
| 	}); | ||||
| 	next(); | ||||
| }); | ||||
|  | ||||
| app.use(require('./lib/express/jwt')()); | ||||
| app.use('/', require('./routes/main')); | ||||
| app.use('/', require('./routes/api/main')); | ||||
|  | ||||
| // production error handler | ||||
| // no stacktraces leaked to user | ||||
| @@ -66,7 +66,7 @@ app.use(function (err, req, res, next) { | ||||
| 		} | ||||
| 	}; | ||||
|  | ||||
| 	if (config.debug() || (req.baseUrl + req.path).includes('nginx/certificates')) { | ||||
| 	if (process.env.NODE_ENV === 'development' || (req.baseUrl + req.path).includes('nginx/certificates')) { | ||||
| 		payload.debug = { | ||||
| 			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null, | ||||
| 			previous: err.previous | ||||
| @@ -75,7 +75,7 @@ app.use(function (err, req, res, next) { | ||||
|  | ||||
| 	// Not every error is worth logging - but this is good for now until it gets annoying. | ||||
| 	if (typeof err.stack !== 'undefined' && err.stack) { | ||||
| 		if (config.debug()) { | ||||
| 		if (process.env.NODE_ENV === 'development') { | ||||
| 			log.debug(err.stack); | ||||
| 		} else if (typeof err.public == 'undefined' || !err.public) { | ||||
| 			log.warn(err.message); | ||||
|   | ||||
| @@ -1,6 +1,6 @@ | ||||
| { | ||||
|   "database": { | ||||
|     "engine": "mysql2", | ||||
|     "engine": "mysql", | ||||
|     "host": "db", | ||||
|     "name": "npm", | ||||
|     "user": "npm", | ||||
|   | ||||
| @@ -1,27 +1,33 @@ | ||||
| const config = require('./lib/config'); | ||||
| const config = require('config'); | ||||
|  | ||||
| if (!config.has('database')) { | ||||
| 	throw new Error('Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/'); | ||||
| 	throw new Error('Database config does not exist! Please read the instructions: https://github.com/jc21/nginx-proxy-manager/blob/master/doc/INSTALL.md'); | ||||
| } | ||||
|  | ||||
| function generateDbConfig() { | ||||
| 	const cfg = config.get('database'); | ||||
| 	if (cfg.engine === 'knex-native') { | ||||
| 		return cfg.knex; | ||||
| 	} | ||||
| 	return { | ||||
| 		client:     cfg.engine, | ||||
| 		connection: { | ||||
| 			host:     cfg.host, | ||||
| 			user:     cfg.user, | ||||
| 			password: cfg.password, | ||||
| 			database: cfg.name, | ||||
| 			port:     cfg.port | ||||
| 		}, | ||||
| 		migrations: { | ||||
| 			tableName: 'migrations' | ||||
| 		} | ||||
| 	}; | ||||
| 	if (config.database.engine === 'knex-native') { | ||||
| 		return config.database.knex; | ||||
| 	} else | ||||
| 		return { | ||||
| 			client:     config.database.engine, | ||||
| 			connection: { | ||||
| 				host:     config.database.host, | ||||
| 				user:     config.database.user, | ||||
| 				password: config.database.password, | ||||
| 				database: config.database.name, | ||||
| 				port:     config.database.port | ||||
| 			}, | ||||
| 			migrations: { | ||||
| 				tableName: 'migrations' | ||||
| 			} | ||||
| 		}; | ||||
| } | ||||
|  | ||||
| module.exports = require('knex')(generateDbConfig()); | ||||
|  | ||||
| let data = generateDbConfig(); | ||||
|  | ||||
| if (typeof config.database.version !== 'undefined') { | ||||
| 	data.version = config.database.version; | ||||
| } | ||||
|  | ||||
| module.exports = require('knex')(data); | ||||
|   | ||||
							
								
								
									
										1254
									
								
								backend/doc/api.swagger.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1254
									
								
								backend/doc/api.swagger.json
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										103
									
								
								backend/index.js
									
									
									
									
									
								
							
							
						
						
									
										103
									
								
								backend/index.js
									
									
									
									
									
								
							| @@ -1,31 +1,26 @@ | ||||
| #!/usr/bin/env node | ||||
|  | ||||
| const schema = require('./schema'); | ||||
| const logger = require('./logger').global; | ||||
|  | ||||
| const IP_RANGES_FETCH_ENABLED = process.env.IP_RANGES_FETCH_ENABLED !== 'false'; | ||||
|  | ||||
| async function appStart () { | ||||
| 	// Create config file db settings if environment variables have been set | ||||
| 	await createDbConfigFromEnvironment(); | ||||
|  | ||||
| 	const migrate             = require('./migrate'); | ||||
| 	const setup               = require('./setup'); | ||||
| 	const app                 = require('./app'); | ||||
| 	const apiValidator        = require('./lib/validator/api'); | ||||
| 	const internalCertificate = require('./internal/certificate'); | ||||
| 	const internalIpRanges    = require('./internal/ip_ranges'); | ||||
|  | ||||
| 	return migrate.latest() | ||||
| 		.then(setup) | ||||
| 		.then(schema.getCompiledSchema) | ||||
| 		.then(() => { | ||||
| 			if (IP_RANGES_FETCH_ENABLED) { | ||||
| 				logger.info('IP Ranges fetch is enabled'); | ||||
| 				return internalIpRanges.fetch().catch((err) => { | ||||
| 					logger.error('IP Ranges fetch failed, continuing anyway:', err.message); | ||||
| 				}); | ||||
| 			} else { | ||||
| 				logger.info('IP Ranges fetch is disabled by environment variable'); | ||||
| 			} | ||||
| 			return apiValidator.loadSchemas; | ||||
| 		}) | ||||
| 		.then(internalIpRanges.fetch) | ||||
| 		.then(() => { | ||||
|  | ||||
| 			internalCertificate.initTimer(); | ||||
| 			internalIpRanges.initTimer(); | ||||
|  | ||||
| @@ -42,11 +37,93 @@ async function appStart () { | ||||
| 			}); | ||||
| 		}) | ||||
| 		.catch((err) => { | ||||
| 			logger.error(err.message, err); | ||||
| 			logger.error(err.message); | ||||
| 			setTimeout(appStart, 1000); | ||||
| 		}); | ||||
| } | ||||
|  | ||||
| async function createDbConfigFromEnvironment() { | ||||
| 	return new Promise((resolve, reject) => { | ||||
| 		const envMysqlHost  = process.env.DB_MYSQL_HOST || null; | ||||
| 		const envMysqlPort  = process.env.DB_MYSQL_PORT || null; | ||||
| 		const envMysqlUser  = process.env.DB_MYSQL_USER || null; | ||||
| 		const envMysqlName  = process.env.DB_MYSQL_NAME || null; | ||||
| 		const envSqliteFile = process.env.DB_SQLITE_FILE || null; | ||||
|  | ||||
| 		if ((envMysqlHost && envMysqlPort && envMysqlUser && envMysqlName) || envSqliteFile) { | ||||
| 			const fs       = require('fs'); | ||||
| 			const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json'; | ||||
| 			let configData = {}; | ||||
|  | ||||
| 			try { | ||||
| 				configData = require(filename); | ||||
| 			} catch (err) { | ||||
| 				// do nothing | ||||
| 			} | ||||
|  | ||||
| 			if (configData.database && configData.database.engine && !configData.database.fromEnv) { | ||||
| 				logger.info('Manual db configuration already exists, skipping config creation from environment variables'); | ||||
| 				resolve(); | ||||
| 				return; | ||||
| 			} | ||||
|  | ||||
| 			if (envMysqlHost && envMysqlPort && envMysqlUser && envMysqlName) { | ||||
| 				const newConfig = { | ||||
| 					fromEnv:  true, | ||||
| 					engine:   'mysql', | ||||
| 					host:     envMysqlHost, | ||||
| 					port:     envMysqlPort, | ||||
| 					user:     envMysqlUser, | ||||
| 					password: process.env.DB_MYSQL_PASSWORD, | ||||
| 					name:     envMysqlName, | ||||
| 				}; | ||||
|  | ||||
| 				if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) { | ||||
| 					// Config is unchanged, skip overwrite | ||||
| 					resolve(); | ||||
| 					return; | ||||
| 				} | ||||
|  | ||||
| 				logger.info('Generating MySQL db configuration from environment variables'); | ||||
| 				configData.database = newConfig; | ||||
|  | ||||
| 			} else { | ||||
| 				const newConfig = { | ||||
| 					fromEnv: true, | ||||
| 					engine:  'knex-native', | ||||
| 					knex:    { | ||||
| 						client:     'sqlite3', | ||||
| 						connection: { | ||||
| 							filename: envSqliteFile | ||||
| 						} | ||||
| 					} | ||||
| 				}; | ||||
| 				if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) { | ||||
| 					// Config is unchanged, skip overwrite | ||||
| 					resolve(); | ||||
| 					return; | ||||
| 				} | ||||
|  | ||||
| 				logger.info('Generating Sqlite db configuration from environment variables'); | ||||
| 				configData.database = newConfig; | ||||
| 			} | ||||
|  | ||||
| 			// Write config | ||||
| 			fs.writeFile(filename, JSON.stringify(configData, null, 2), (err) => { | ||||
| 				if (err) { | ||||
| 					logger.error('Could not write db config to config file: ' + filename); | ||||
| 					reject(err); | ||||
| 				} else { | ||||
| 					logger.info('Wrote db configuration to config file: ' + filename); | ||||
| 					resolve(); | ||||
| 				} | ||||
| 			}); | ||||
| 		} else { | ||||
| 			resolve(); | ||||
| 		} | ||||
| 	}); | ||||
| } | ||||
|  | ||||
| try { | ||||
| 	appStart(); | ||||
| } catch (err) { | ||||
|   | ||||
| @@ -1,15 +1,15 @@ | ||||
| const _                     = require('lodash'); | ||||
| const fs                    = require('node:fs'); | ||||
| const fs                    = require('fs'); | ||||
| const batchflow             = require('batchflow'); | ||||
| const logger                = require('../logger').access; | ||||
| const error                 = require('../lib/error'); | ||||
| const utils                 = require('../lib/utils'); | ||||
| const accessListModel       = require('../models/access_list'); | ||||
| const accessListAuthModel   = require('../models/access_list_auth'); | ||||
| const accessListClientModel = require('../models/access_list_client'); | ||||
| const proxyHostModel        = require('../models/proxy_host'); | ||||
| const internalAuditLog      = require('./audit-log'); | ||||
| const internalNginx         = require('./nginx'); | ||||
| const utils                 = require('../lib/utils'); | ||||
|  | ||||
| function omissions () { | ||||
| 	return ['is_deleted']; | ||||
| @@ -27,18 +27,18 @@ const internalAccessList = { | ||||
| 			.then((/*access_data*/) => { | ||||
| 				return accessListModel | ||||
| 					.query() | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch({ | ||||
| 						name:          data.name, | ||||
| 						satisfy_any:   data.satisfy_any, | ||||
| 						pass_auth:     data.pass_auth, | ||||
| 						owner_user_id: access.token.getUserId(1) | ||||
| 					}) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				data.id = row.id; | ||||
|  | ||||
| 				const promises = []; | ||||
| 				let promises = []; | ||||
|  | ||||
| 				// Now add the items | ||||
| 				data.items.map((item) => { | ||||
| @@ -81,7 +81,7 @@ const internalAccessList = { | ||||
|  | ||||
| 				return internalAccessList.build(row) | ||||
| 					.then(() => { | ||||
| 						if (parseInt(row.proxy_host_count, 10)) { | ||||
| 						if (row.proxy_host_count) { | ||||
| 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | ||||
| 						} | ||||
| 					}) | ||||
| @@ -116,8 +116,9 @@ const internalAccessList = { | ||||
| 			.then((row) => { | ||||
| 				if (row.id !== data.id) { | ||||
| 					// Sanity check that something crazy hasn't happened | ||||
| 					throw new error.InternalValidationError(`Access List could not be updated, IDs do not match: ${row.id} !== ${data.id}`); | ||||
| 					throw new error.InternalValidationError('Access List could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id); | ||||
| 				} | ||||
|  | ||||
| 			}) | ||||
| 			.then(() => { | ||||
| 				// patch name if specified | ||||
| @@ -135,10 +136,10 @@ const internalAccessList = { | ||||
| 			.then(() => { | ||||
| 				// Check for items and add/update/remove them | ||||
| 				if (typeof data.items !== 'undefined' && data.items) { | ||||
| 					const promises      = []; | ||||
| 					const items_to_keep = []; | ||||
| 					let promises      = []; | ||||
| 					let items_to_keep = []; | ||||
|  | ||||
| 					data.items.map((item) => { | ||||
| 					data.items.map(function (item) { | ||||
| 						if (item.password) { | ||||
| 							promises.push(accessListAuthModel | ||||
| 								.query() | ||||
| @@ -154,7 +155,7 @@ const internalAccessList = { | ||||
| 						} | ||||
| 					}); | ||||
|  | ||||
| 					const query = accessListAuthModel | ||||
| 					let query = accessListAuthModel | ||||
| 						.query() | ||||
| 						.delete() | ||||
| 						.where('access_list_id', data.id); | ||||
| @@ -175,9 +176,9 @@ const internalAccessList = { | ||||
| 			.then(() => { | ||||
| 				// Check for clients and add/update/remove them | ||||
| 				if (typeof data.clients !== 'undefined' && data.clients) { | ||||
| 					const promises = []; | ||||
| 					let promises = []; | ||||
|  | ||||
| 					data.clients.map((client) => { | ||||
| 					data.clients.map(function (client) { | ||||
| 						if (client.address) { | ||||
| 							promises.push(accessListClientModel | ||||
| 								.query() | ||||
| @@ -190,7 +191,7 @@ const internalAccessList = { | ||||
| 						} | ||||
| 					}); | ||||
|  | ||||
| 					const query = accessListClientModel | ||||
| 					let query = accessListClientModel | ||||
| 						.query() | ||||
| 						.delete() | ||||
| 						.where('access_list_id', data.id); | ||||
| @@ -217,16 +218,16 @@ const internalAccessList = { | ||||
| 				// re-fetch with expansions | ||||
| 				return internalAccessList.get(access, { | ||||
| 					id:     data.id, | ||||
| 					expand: ['owner', 'items', 'clients', 'proxy_hosts.[certificate,access_list.[clients,items]]'] | ||||
| 					expand: ['owner', 'items', 'clients', 'proxy_hosts.access_list.[clients,items]'] | ||||
| 				}, true /* <- skip masking */); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				return internalAccessList.build(row) | ||||
| 					.then(() => { | ||||
| 						if (parseInt(row.proxy_host_count, 10)) { | ||||
| 						if (row.proxy_host_count) { | ||||
| 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | ||||
| 						} | ||||
| 					}).then(internalNginx.reload) | ||||
| 					}) | ||||
| 					.then(() => { | ||||
| 						return internalAccessList.maskItems(row); | ||||
| 					}); | ||||
| @@ -249,41 +250,41 @@ const internalAccessList = { | ||||
|  | ||||
| 		return access.can('access_lists:get', data.id) | ||||
| 			.then((access_data) => { | ||||
| 				const query = accessListModel | ||||
| 				let query = accessListModel | ||||
| 					.query() | ||||
| 					.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count')) | ||||
| 					.leftJoin('proxy_host', function() { | ||||
| 						this.on('proxy_host.access_list_id', '=', 'access_list.id') | ||||
| 							.andOn('proxy_host.is_deleted', '=', 0); | ||||
| 					}) | ||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||
| 					.where('access_list.is_deleted', 0) | ||||
| 					.andWhere('access_list.id', data.id) | ||||
| 					.groupBy('access_list.id') | ||||
| 					.allowGraph('[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]') | ||||
| 					.allowEager('[owner,items,clients,proxy_hosts.[*, access_list.[clients,items]]]') | ||||
| 					.omit(['access_list.is_deleted']) | ||||
| 					.first(); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched(`[${data.expand.join(', ')}]`); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | ||||
| 					row = internalAccessList.maskItems(row); | ||||
| 				} | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | ||||
| 						row = internalAccessList.maskItems(row); | ||||
| 					} | ||||
|  | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -300,7 +301,7 @@ const internalAccessList = { | ||||
| 				return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items', 'clients']}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
|  | ||||
| @@ -327,7 +328,7 @@ const internalAccessList = { | ||||
| 									// 3. reconfigure those hosts, then reload nginx | ||||
|  | ||||
| 									// set the access_list_id to zero for these items | ||||
| 									row.proxy_hosts.map((_val, idx) => { | ||||
| 									row.proxy_hosts.map(function (val, idx) { | ||||
| 										row.proxy_hosts[idx].access_list_id = 0; | ||||
| 									}); | ||||
|  | ||||
| @@ -340,11 +341,11 @@ const internalAccessList = { | ||||
| 					}) | ||||
| 					.then(() => { | ||||
| 						// delete the htpasswd file | ||||
| 						const htpasswd_file = internalAccessList.getFilename(row); | ||||
| 						let htpasswd_file = internalAccessList.getFilename(row); | ||||
|  | ||||
| 						try { | ||||
| 							fs.unlinkSync(htpasswd_file); | ||||
| 						} catch (_err) { | ||||
| 						} catch (err) { | ||||
| 							// do nothing | ||||
| 						} | ||||
| 					}) | ||||
| @@ -374,16 +375,14 @@ const internalAccessList = { | ||||
| 	getAll: (access, expand, search_query) => { | ||||
| 		return access.can('access_lists:list') | ||||
| 			.then((access_data) => { | ||||
| 				const query = accessListModel | ||||
| 				let query = accessListModel | ||||
| 					.query() | ||||
| 					.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count')) | ||||
| 					.leftJoin('proxy_host', function() { | ||||
| 						this.on('proxy_host.access_list_id', '=', 'access_list.id') | ||||
| 							.andOn('proxy_host.is_deleted', '=', 0); | ||||
| 					}) | ||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||
| 					.where('access_list.is_deleted', 0) | ||||
| 					.groupBy('access_list.id') | ||||
| 					.allowGraph('[owner,items,clients]') | ||||
| 					.omit(['access_list.is_deleted']) | ||||
| 					.allowEager('[owner,items,clients]') | ||||
| 					.orderBy('access_list.name', 'ASC'); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| @@ -393,19 +392,19 @@ const internalAccessList = { | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where('name', 'like', `%${search_query}%`); | ||||
| 						this.where('name', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched(`[${expand.join(', ')}]`); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((rows) => { | ||||
| 				if (rows) { | ||||
| 					rows.map((row, idx) => { | ||||
| 					rows.map(function (row, idx) { | ||||
| 						if (typeof row.items !== 'undefined' && row.items) { | ||||
| 							rows[idx] = internalAccessList.maskItems(row); | ||||
| 						} | ||||
| @@ -424,7 +423,7 @@ const internalAccessList = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	getCount: (user_id, visibility) => { | ||||
| 		const query = accessListModel | ||||
| 		let query = accessListModel | ||||
| 			.query() | ||||
| 			.count('id as count') | ||||
| 			.where('is_deleted', 0); | ||||
| @@ -445,7 +444,7 @@ const internalAccessList = { | ||||
| 	 */ | ||||
| 	maskItems: (list) => { | ||||
| 		if (list && typeof list.items !== 'undefined') { | ||||
| 			list.items.map((val, idx) => { | ||||
| 			list.items.map(function (val, idx) { | ||||
| 				let repeat_for = 8; | ||||
| 				let first_char = '*'; | ||||
|  | ||||
| @@ -468,7 +467,7 @@ const internalAccessList = { | ||||
| 	 * @returns {String} | ||||
| 	 */ | ||||
| 	getFilename: (list) => { | ||||
| 		return `/data/access/${list.id}`; | ||||
| 		return '/data/access/' + list.id; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| @@ -479,15 +478,15 @@ const internalAccessList = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	build: (list) => { | ||||
| 		logger.info(`Building Access file #${list.id} for: ${list.name}`); | ||||
| 		logger.info('Building Access file #' + list.id + ' for: ' + list.name); | ||||
|  | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			const htpasswd_file = internalAccessList.getFilename(list); | ||||
| 			let htpasswd_file = internalAccessList.getFilename(list); | ||||
|  | ||||
| 			// 1. remove any existing access file | ||||
| 			try { | ||||
| 				fs.unlinkSync(htpasswd_file); | ||||
| 			} catch (_err) { | ||||
| 			} catch (err) { | ||||
| 				// do nothing | ||||
| 			} | ||||
|  | ||||
| @@ -504,17 +503,12 @@ const internalAccessList = { | ||||
| 				if (list.items.length) { | ||||
| 					return new Promise((resolve, reject) => { | ||||
| 						batchflow(list.items).sequential() | ||||
| 							.each((_i, item, next) => { | ||||
| 							.each((i, item, next) => { | ||||
| 								if (typeof item.password !== 'undefined' && item.password.length) { | ||||
| 									logger.info(`Adding: ${item.username}`); | ||||
| 									logger.info('Adding: ' + item.username); | ||||
|  | ||||
| 									utils.execFile('openssl', ['passwd', '-apr1', item.password]) | ||||
| 										.then((res) => { | ||||
| 											try { | ||||
| 												fs.appendFileSync(htpasswd_file, `${item.username}:${res}\n`, {encoding: 'utf8'}); | ||||
| 											} catch (err) { | ||||
| 												reject(err); | ||||
| 											} | ||||
| 									utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"') | ||||
| 										.then((/*result*/) => { | ||||
| 											next(); | ||||
| 										}) | ||||
| 										.catch((err) => { | ||||
| @@ -528,7 +522,7 @@ const internalAccessList = { | ||||
| 								reject(err); | ||||
| 							}) | ||||
| 							.end((results) => { | ||||
| 								logger.success(`Built Access file #${list.id} for: ${list.name}`); | ||||
| 								logger.success('Built Access file #' + list.id + ' for: ' + list.name); | ||||
| 								resolve(results); | ||||
| 							}); | ||||
| 					}); | ||||
|   | ||||
| @@ -1,6 +1,5 @@ | ||||
| const error            = require('../lib/error'); | ||||
| const auditLogModel    = require('../models/audit-log'); | ||||
| const {castJsonIfNeed} = require('../lib/helpers'); | ||||
| const error         = require('../lib/error'); | ||||
| const auditLogModel = require('../models/audit-log'); | ||||
|  | ||||
| const internalAuditLog = { | ||||
|  | ||||
| @@ -20,17 +19,17 @@ const internalAuditLog = { | ||||
| 					.orderBy('created_on', 'DESC') | ||||
| 					.orderBy('id', 'DESC') | ||||
| 					.limit(100) | ||||
| 					.allowGraph('[user]'); | ||||
| 					.allowEager('[user]'); | ||||
|  | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string' && search_query.length > 0) { | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where(castJsonIfNeed('meta'), 'like', '%' + search_query + '%'); | ||||
| 						this.where('meta', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
|   | ||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -1,12 +1,10 @@ | ||||
| const _                   = require('lodash'); | ||||
| const error               = require('../lib/error'); | ||||
| const utils               = require('../lib/utils'); | ||||
| const deadHostModel       = require('../models/dead_host'); | ||||
| const internalHost        = require('./host'); | ||||
| const internalNginx       = require('./nginx'); | ||||
| const internalAuditLog    = require('./audit-log'); | ||||
| const internalCertificate = require('./certificate'); | ||||
| const {castJsonIfNeed}    = require('../lib/helpers'); | ||||
|  | ||||
| function omissions () { | ||||
| 	return ['is_deleted']; | ||||
| @@ -49,16 +47,10 @@ const internalDeadHost = { | ||||
| 				data.owner_user_id = access.token.getUserId(1); | ||||
| 				data               = internalHost.cleanSslHstsData(data); | ||||
|  | ||||
| 				// Fix for db field not having a default value | ||||
| 				// for this optional field. | ||||
| 				if (typeof data.advanced_config === 'undefined') { | ||||
| 					data.advanced_config = ''; | ||||
| 				} | ||||
|  | ||||
| 				return deadHostModel | ||||
| 					.query() | ||||
| 					.insertAndFetch(data) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch(data); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (create_certificate) { | ||||
| @@ -226,28 +218,31 @@ const internalDeadHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.andWhere('id', data.id) | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.allowEager('[owner,certificate]') | ||||
| 					.first(); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					row = internalHost.cleanRowCertificateMeta(row); | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -264,7 +259,7 @@ const internalDeadHost = { | ||||
| 				return internalDeadHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
|  | ||||
| @@ -312,7 +307,7 @@ const internalDeadHost = { | ||||
| 				}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already enabled'); | ||||
| @@ -358,7 +353,7 @@ const internalDeadHost = { | ||||
| 				return internalDeadHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (!row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already disabled'); | ||||
| @@ -409,25 +404,26 @@ const internalDeadHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.groupBy('id') | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.orderBy(castJsonIfNeed('domain_names'), 'ASC'); | ||||
| 					.omit(['is_deleted']) | ||||
| 					.allowEager('[owner,certificate]') | ||||
| 					.orderBy('domain_names', 'ASC'); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string' && search_query.length > 0) { | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where(castJsonIfNeed('domain_names'), 'like', '%' + search_query + '%'); | ||||
| 						this.where('domain_names', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((rows) => { | ||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||
|   | ||||
| @@ -2,7 +2,6 @@ const _                    = require('lodash'); | ||||
| const proxyHostModel       = require('../models/proxy_host'); | ||||
| const redirectionHostModel = require('../models/redirection_host'); | ||||
| const deadHostModel        = require('../models/dead_host'); | ||||
| const {castJsonIfNeed}     = require('../lib/helpers'); | ||||
|  | ||||
| const internalHost = { | ||||
|  | ||||
| @@ -18,7 +17,7 @@ const internalHost = { | ||||
| 	cleanSslHstsData: function (data, existing_data) { | ||||
| 		existing_data = existing_data === undefined ? {} : existing_data; | ||||
|  | ||||
| 		const combined_data = _.assign({}, existing_data, data); | ||||
| 		let combined_data = _.assign({}, existing_data, data); | ||||
|  | ||||
| 		if (!combined_data.certificate_id) { | ||||
| 			combined_data.ssl_forced    = false; | ||||
| @@ -74,7 +73,7 @@ const internalHost = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	getHostsWithDomains: function (domain_names) { | ||||
| 		const promises = [ | ||||
| 		let promises = [ | ||||
| 			proxyHostModel | ||||
| 				.query() | ||||
| 				.where('is_deleted', 0), | ||||
| @@ -126,19 +125,19 @@ const internalHost = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	isHostnameTaken: function (hostname, ignore_type, ignore_id) { | ||||
| 		const promises = [ | ||||
| 		let promises = [ | ||||
| 			proxyHostModel | ||||
| 				.query() | ||||
| 				.where('is_deleted', 0) | ||||
| 				.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%'), | ||||
| 				.andWhere('domain_names', 'like', '%' + hostname + '%'), | ||||
| 			redirectionHostModel | ||||
| 				.query() | ||||
| 				.where('is_deleted', 0) | ||||
| 				.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%'), | ||||
| 				.andWhere('domain_names', 'like', '%' + hostname + '%'), | ||||
| 			deadHostModel | ||||
| 				.query() | ||||
| 				.where('is_deleted', 0) | ||||
| 				.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%') | ||||
| 				.andWhere('domain_names', 'like', '%' + hostname + '%') | ||||
| 		]; | ||||
|  | ||||
| 		return Promise.all(promises) | ||||
|   | ||||
| @@ -2,16 +2,13 @@ const https         = require('https'); | ||||
| const fs            = require('fs'); | ||||
| const logger        = require('../logger').ip_ranges; | ||||
| const error         = require('../lib/error'); | ||||
| const utils         = require('../lib/utils'); | ||||
| const internalNginx = require('./nginx'); | ||||
| const { Liquid }    = require('liquidjs'); | ||||
|  | ||||
| const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json'; | ||||
| const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4'; | ||||
| const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6'; | ||||
|  | ||||
| const regIpV4 = /^(\d+\.?){4}\/\d+/; | ||||
| const regIpV6 = /^(([\da-fA-F]+)?:)+\/\d+/; | ||||
|  | ||||
| const internalIpRanges = { | ||||
|  | ||||
| 	interval_timeout:    1000 * 60 * 60 * 6, // 6 hours | ||||
| @@ -77,14 +74,14 @@ const internalIpRanges = { | ||||
| 					return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL); | ||||
| 				}) | ||||
| 				.then((cloudfare_data) => { | ||||
| 					let items = cloudfare_data.split('\n').filter((line) => regIpV4.test(line)); | ||||
| 					let items = cloudfare_data.split('\n'); | ||||
| 					ip_ranges = [... ip_ranges, ... items]; | ||||
| 				}) | ||||
| 				.then(() => { | ||||
| 					return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL); | ||||
| 				}) | ||||
| 				.then((cloudfare_data) => { | ||||
| 					let items = cloudfare_data.split('\n').filter((line) => regIpV6.test(line)); | ||||
| 					let items = cloudfare_data.split('\n'); | ||||
| 					ip_ranges = [... ip_ranges, ... items]; | ||||
| 				}) | ||||
| 				.then(() => { | ||||
| @@ -119,7 +116,10 @@ const internalIpRanges = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	generateConfig: (ip_ranges) => { | ||||
| 		const renderEngine = utils.getRenderEngine(); | ||||
| 		let renderEngine = new Liquid({ | ||||
| 			root: __dirname + '/../templates/' | ||||
| 		}); | ||||
|  | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			let template = null; | ||||
| 			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf'; | ||||
|   | ||||
| @@ -1,9 +1,10 @@ | ||||
| const _      = require('lodash'); | ||||
| const fs     = require('node:fs'); | ||||
| const logger = require('../logger').nginx; | ||||
| const config = require('../lib/config'); | ||||
| const utils  = require('../lib/utils'); | ||||
| const error  = require('../lib/error'); | ||||
| const _          = require('lodash'); | ||||
| const fs         = require('fs'); | ||||
| const logger     = require('../logger').nginx; | ||||
| const utils      = require('../lib/utils'); | ||||
| const error      = require('../lib/error'); | ||||
| const { Liquid } = require('liquidjs'); | ||||
| const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG; | ||||
|  | ||||
| const internalNginx = { | ||||
|  | ||||
| @@ -28,9 +29,7 @@ const internalNginx = { | ||||
| 			.then(() => { | ||||
| 				// Nginx is OK | ||||
| 				// We're deleting this config regardless. | ||||
| 				// Don't throw errors, as the file may not exist at all | ||||
| 				// Delete the .err file too | ||||
| 				return internalNginx.deleteConfig(host_type, host, false, true); | ||||
| 				return internalNginx.deleteConfig(host_type, host); // Don't throw errors, as the file may not exist at all | ||||
| 			}) | ||||
| 			.then(() => { | ||||
| 				return internalNginx.generateConfig(host_type, host); | ||||
| @@ -57,15 +56,15 @@ const internalNginx = { | ||||
| 						// It will always look like this: | ||||
| 						//   nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (6: No such device or address) | ||||
|  | ||||
| 						const valid_lines = []; | ||||
| 						const err_lines   = err.message.split('\n'); | ||||
| 						err_lines.map((line) => { | ||||
| 						let valid_lines = []; | ||||
| 						let err_lines   = err.message.split('\n'); | ||||
| 						err_lines.map(function (line) { | ||||
| 							if (line.indexOf('/var/log/nginx/error.log') === -1) { | ||||
| 								valid_lines.push(line); | ||||
| 							} | ||||
| 						}); | ||||
|  | ||||
| 						if (config.debug()) { | ||||
| 						if (debug_mode) { | ||||
| 							logger.error('Nginx test failed:', valid_lines.join('\n')); | ||||
| 						} | ||||
|  | ||||
| @@ -81,9 +80,6 @@ const internalNginx = { | ||||
| 							.patch({ | ||||
| 								meta: combined_meta | ||||
| 							}) | ||||
| 							.then(() => { | ||||
| 								internalNginx.renameConfigAsError(host_type, host); | ||||
| 							}) | ||||
| 							.then(() => { | ||||
| 								return internalNginx.deleteConfig(host_type, host, true); | ||||
| 							}); | ||||
| @@ -101,11 +97,11 @@ const internalNginx = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	test: () => { | ||||
| 		if (config.debug()) { | ||||
| 		if (debug_mode) { | ||||
| 			logger.info('Testing Nginx configuration'); | ||||
| 		} | ||||
|  | ||||
| 		return utils.execFile('/usr/sbin/nginx', ['-t', '-g', 'error_log off;']); | ||||
| 		return utils.exec('/usr/sbin/nginx -t -g "error_log off;"'); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| @@ -115,7 +111,7 @@ const internalNginx = { | ||||
| 		return internalNginx.test() | ||||
| 			.then(() => { | ||||
| 				logger.info('Reloading Nginx'); | ||||
| 				return utils.execFile('/usr/sbin/nginx', ['-s', 'reload']); | ||||
| 				return utils.exec('/usr/sbin/nginx -s reload'); | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -125,10 +121,13 @@ const internalNginx = { | ||||
| 	 * @returns {String} | ||||
| 	 */ | ||||
| 	getConfigName: (host_type, host_id) => { | ||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | ||||
|  | ||||
| 		if (host_type === 'default') { | ||||
| 			return '/data/nginx/default_host/site.conf'; | ||||
| 		} | ||||
| 		return `/data/nginx/${internalNginx.getFileFriendlyHostType(host_type)}/${host_id}.conf`; | ||||
|  | ||||
| 		return '/data/nginx/' + host_type + '/' + host_id + '.conf'; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| @@ -141,22 +140,18 @@ const internalNginx = { | ||||
| 			let template; | ||||
|  | ||||
| 			try { | ||||
| 				template = fs.readFileSync(`${__dirname}/../templates/_location.conf`, {encoding: 'utf8'}); | ||||
| 				template = fs.readFileSync(__dirname + '/../templates/_location.conf', {encoding: 'utf8'}); | ||||
| 			} catch (err) { | ||||
| 				reject(new error.ConfigurationError(err.message)); | ||||
| 				return; | ||||
| 			} | ||||
|  | ||||
| 			const renderEngine    = utils.getRenderEngine(); | ||||
| 			let renderer          = new Liquid(); | ||||
| 			let renderedLocations = ''; | ||||
|  | ||||
| 			const locationRendering = async () => { | ||||
| 				for (let i = 0; i < host.locations.length; i++) { | ||||
| 					const locationCopy = Object.assign({}, {access_list_id: host.access_list_id}, {certificate_id: host.certificate_id}, | ||||
| 						{ssl_forced: host.ssl_forced}, {caching_enabled: host.caching_enabled}, {block_exploits: host.block_exploits}, | ||||
| 						{allow_websocket_upgrade: host.allow_websocket_upgrade}, {http2_support: host.http2_support}, | ||||
| 						{hsts_enabled: host.hsts_enabled}, {hsts_subdomains: host.hsts_subdomains}, {access_list: host.access_list}, | ||||
| 						{certificate: host.certificate}, host.locations[i]); | ||||
| 					let locationCopy = Object.assign({}, host.locations[i]); | ||||
|  | ||||
| 					if (locationCopy.forward_host.indexOf('/') > -1) { | ||||
| 						const splitted = locationCopy.forward_host.split('/'); | ||||
| @@ -166,13 +161,11 @@ const internalNginx = { | ||||
| 					} | ||||
|  | ||||
| 					// eslint-disable-next-line | ||||
| 					renderedLocations += await renderEngine.parseAndRender(template, locationCopy); | ||||
| 					renderedLocations += await renderer.parseAndRender(template, locationCopy); | ||||
| 				} | ||||
|  | ||||
| 			}; | ||||
|  | ||||
| 			locationRendering().then(() => resolve(renderedLocations)); | ||||
|  | ||||
| 		}); | ||||
| 	}, | ||||
|  | ||||
| @@ -181,23 +174,23 @@ const internalNginx = { | ||||
| 	 * @param   {Object}  host | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	generateConfig: (host_type, host_row) => { | ||||
| 		// Prevent modifying the original object: | ||||
| 		const host           = JSON.parse(JSON.stringify(host_row)); | ||||
| 		const nice_host_type = internalNginx.getFileFriendlyHostType(host_type); | ||||
| 	generateConfig: (host_type, host) => { | ||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | ||||
|  | ||||
| 		if (config.debug()) { | ||||
| 			logger.info(`Generating ${nice_host_type} Config:`, JSON.stringify(host, null, 2)); | ||||
| 		if (debug_mode) { | ||||
| 			logger.info('Generating ' + host_type + ' Config:', host); | ||||
| 		} | ||||
|  | ||||
| 		const renderEngine = utils.getRenderEngine(); | ||||
| 		let renderEngine = new Liquid({ | ||||
| 			root: __dirname + '/../templates/' | ||||
| 		}); | ||||
|  | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			let template   = null; | ||||
| 			const filename = internalNginx.getConfigName(nice_host_type, host.id); | ||||
| 			let template = null; | ||||
| 			let filename = internalNginx.getConfigName(host_type, host.id); | ||||
|  | ||||
| 			try { | ||||
| 				template = fs.readFileSync(`${__dirname}/../templates/${nice_host_type}.conf`, {encoding: 'utf8'}); | ||||
| 				template = fs.readFileSync(__dirname + '/../templates/' + host_type + '.conf', {encoding: 'utf8'}); | ||||
| 			} catch (err) { | ||||
| 				reject(new error.ConfigurationError(err.message)); | ||||
| 				return; | ||||
| @@ -207,7 +200,7 @@ const internalNginx = { | ||||
| 			let origLocations; | ||||
|  | ||||
| 			// Manipulate the data a bit before sending it to the template | ||||
| 			if (nice_host_type !== 'default') { | ||||
| 			if (host_type !== 'default') { | ||||
| 				host.use_default_location = true; | ||||
| 				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) { | ||||
| 					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config); | ||||
| @@ -215,7 +208,6 @@ const internalNginx = { | ||||
| 			} | ||||
|  | ||||
| 			if (host.locations) { | ||||
| 				//logger.info ('host.locations = ' + JSON.stringify(host.locations, null, 2)); | ||||
| 				origLocations    = [].concat(host.locations); | ||||
| 				locationsPromise = internalNginx.renderLocations(host).then((renderedLocations) => { | ||||
| 					host.locations = renderedLocations; | ||||
| @@ -241,7 +233,7 @@ const internalNginx = { | ||||
| 					.then((config_text) => { | ||||
| 						fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||
|  | ||||
| 						if (config.debug()) { | ||||
| 						if (debug_mode) { | ||||
| 							logger.success('Wrote config:', filename, config_text); | ||||
| 						} | ||||
|  | ||||
| @@ -251,8 +243,8 @@ const internalNginx = { | ||||
| 						resolve(true); | ||||
| 					}) | ||||
| 					.catch((err) => { | ||||
| 						if (config.debug()) { | ||||
| 							logger.warn(`Could not write ${filename}:`, err.message); | ||||
| 						if (debug_mode) { | ||||
| 							logger.warn('Could not write ' + filename + ':', err.message); | ||||
| 						} | ||||
|  | ||||
| 						reject(new error.ConfigurationError(err.message)); | ||||
| @@ -270,18 +262,20 @@ const internalNginx = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	generateLetsEncryptRequestConfig: (certificate) => { | ||||
| 		if (config.debug()) { | ||||
| 		if (debug_mode) { | ||||
| 			logger.info('Generating LetsEncrypt Request Config:', certificate); | ||||
| 		} | ||||
|  | ||||
| 		const renderEngine = utils.getRenderEngine(); | ||||
| 		let renderEngine = new Liquid({ | ||||
| 			root: __dirname + '/../templates/' | ||||
| 		}); | ||||
|  | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			let template   = null; | ||||
| 			const filename = `/data/nginx/temp/letsencrypt_${certificate.id}.conf`; | ||||
| 			let template = null; | ||||
| 			let filename = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | ||||
|  | ||||
| 			try { | ||||
| 				template = fs.readFileSync(`${__dirname}/../templates/letsencrypt-request.conf`, {encoding: 'utf8'}); | ||||
| 				template = fs.readFileSync(__dirname + '/../templates/letsencrypt-request.conf', {encoding: 'utf8'}); | ||||
| 			} catch (err) { | ||||
| 				reject(new error.ConfigurationError(err.message)); | ||||
| 				return; | ||||
| @@ -294,15 +288,15 @@ const internalNginx = { | ||||
| 				.then((config_text) => { | ||||
| 					fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||
|  | ||||
| 					if (config.debug()) { | ||||
| 					if (debug_mode) { | ||||
| 						logger.success('Wrote config:', filename, config_text); | ||||
| 					} | ||||
|  | ||||
| 					resolve(true); | ||||
| 				}) | ||||
| 				.catch((err) => { | ||||
| 					if (config.debug()) { | ||||
| 						logger.warn(`Could not write ${filename}:`, err.message); | ||||
| 					if (debug_mode) { | ||||
| 						logger.warn('Could not write ' + filename + ':', err.message); | ||||
| 					} | ||||
|  | ||||
| 					reject(new error.ConfigurationError(err.message)); | ||||
| @@ -310,58 +304,33 @@ const internalNginx = { | ||||
| 		}); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * A simple wrapper around unlinkSync that writes to the logger | ||||
| 	 * | ||||
| 	 * @param   {String}  filename | ||||
| 	 */ | ||||
| 	deleteFile: (filename) => { | ||||
| 		logger.debug(`Deleting file: ${filename}`); | ||||
| 		try { | ||||
| 			fs.unlinkSync(filename); | ||||
| 		} catch (err) { | ||||
| 			logger.debug('Could not delete file:', JSON.stringify(err, null, 2)); | ||||
| 		} | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * | ||||
| 	 * @param   {String} host_type | ||||
| 	 * @returns String | ||||
| 	 */ | ||||
| 	getFileFriendlyHostType: (host_type) => { | ||||
| 		return host_type.replace(/-/g, '_'); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig` | ||||
| 	 * | ||||
| 	 * @param   {Object}  certificate | ||||
| 	 * @param   {Boolean} [throw_errors] | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	deleteLetsEncryptRequestConfig: (certificate) => { | ||||
| 		const config_file = `/data/nginx/temp/letsencrypt_${certificate.id}.conf`; | ||||
| 		return new Promise((resolve/*, reject*/) => { | ||||
| 			internalNginx.deleteFile(config_file); | ||||
| 			resolve(); | ||||
| 		}); | ||||
| 	}, | ||||
| 	deleteLetsEncryptRequestConfig: (certificate, throw_errors) => { | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			try { | ||||
| 				let config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | ||||
|  | ||||
| 	/** | ||||
| 	 * @param   {String}  host_type | ||||
| 	 * @param   {Object}  [host] | ||||
| 	 * @param   {Boolean} [delete_err_file] | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	deleteConfig: (host_type, host, delete_err_file) => { | ||||
| 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||
| 		const config_file_err = `${config_file}.err`; | ||||
| 				if (debug_mode) { | ||||
| 					logger.warn('Deleting nginx config: ' + config_file); | ||||
| 				} | ||||
|  | ||||
| 		return new Promise((resolve/*, reject*/) => { | ||||
| 			internalNginx.deleteFile(config_file); | ||||
| 			if (delete_err_file) { | ||||
| 				internalNginx.deleteFile(config_file_err); | ||||
| 				fs.unlinkSync(config_file); | ||||
| 			} catch (err) { | ||||
| 				if (debug_mode) { | ||||
| 					logger.warn('Could not delete config:', err.message); | ||||
| 				} | ||||
|  | ||||
| 				if (throw_errors) { | ||||
| 					reject(err); | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			resolve(); | ||||
| 		}); | ||||
| 	}, | ||||
| @@ -369,20 +338,32 @@ const internalNginx = { | ||||
| 	/** | ||||
| 	 * @param   {String}  host_type | ||||
| 	 * @param   {Object}  [host] | ||||
| 	 * @param   {Boolean} [throw_errors] | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	renameConfigAsError: (host_type, host) => { | ||||
| 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||
| 		const config_file_err = `${config_file}.err`; | ||||
| 	deleteConfig: (host_type, host, throw_errors) => { | ||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | ||||
|  | ||||
| 		return new Promise((resolve/*, reject*/) => { | ||||
| 			fs.unlink(config_file, () => { | ||||
| 				// ignore result, continue | ||||
| 				fs.rename(config_file, config_file_err, () => { | ||||
| 					// also ignore result, as this is a debugging informative file anyway | ||||
| 					resolve(); | ||||
| 				}); | ||||
| 			}); | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			try { | ||||
| 				let config_file = internalNginx.getConfigName(host_type, typeof host === 'undefined' ? 0 : host.id); | ||||
|  | ||||
| 				if (debug_mode) { | ||||
| 					logger.warn('Deleting nginx config: ' + config_file); | ||||
| 				} | ||||
|  | ||||
| 				fs.unlinkSync(config_file); | ||||
| 			} catch (err) { | ||||
| 				if (debug_mode) { | ||||
| 					logger.warn('Could not delete config:', err.message); | ||||
| 				} | ||||
|  | ||||
| 				if (throw_errors) { | ||||
| 					reject(err); | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			resolve(); | ||||
| 		}); | ||||
| 	}, | ||||
|  | ||||
| @@ -392,8 +373,8 @@ const internalNginx = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	bulkGenerateConfigs: (host_type, hosts) => { | ||||
| 		const promises = []; | ||||
| 		hosts.map((host) => { | ||||
| 		let promises = []; | ||||
| 		hosts.map(function (host) { | ||||
| 			promises.push(internalNginx.generateConfig(host_type, host)); | ||||
| 		}); | ||||
|  | ||||
| @@ -403,12 +384,13 @@ const internalNginx = { | ||||
| 	/** | ||||
| 	 * @param   {String}  host_type | ||||
| 	 * @param   {Array}   hosts | ||||
| 	 * @param   {Boolean} [throw_errors] | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	bulkDeleteConfigs: (host_type, hosts) => { | ||||
| 		const promises = []; | ||||
| 		hosts.map((host) => { | ||||
| 			promises.push(internalNginx.deleteConfig(host_type, host, true)); | ||||
| 	bulkDeleteConfigs: (host_type, hosts, throw_errors) => { | ||||
| 		let promises = []; | ||||
| 		hosts.map(function (host) { | ||||
| 			promises.push(internalNginx.deleteConfig(host_type, host, throw_errors)); | ||||
| 		}); | ||||
|  | ||||
| 		return Promise.all(promises); | ||||
| @@ -418,12 +400,14 @@ const internalNginx = { | ||||
| 	 * @param   {string}  config | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	advancedConfigHasDefaultLocation: (cfg) => !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im), | ||||
| 	advancedConfigHasDefaultLocation: function (config) { | ||||
| 		return !!config.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	ipv6Enabled: () => { | ||||
| 	ipv6Enabled: function () { | ||||
| 		if (typeof process.env.DISABLE_IPV6 !== 'undefined') { | ||||
| 			const disabled = process.env.DISABLE_IPV6.toLowerCase(); | ||||
| 			return !(disabled === 'on' || disabled === 'true' || disabled === '1' || disabled === 'yes'); | ||||
|   | ||||
| @@ -1,15 +1,13 @@ | ||||
| const _                   = require('lodash'); | ||||
| const error               = require('../lib/error'); | ||||
| const utils               = require('../lib/utils'); | ||||
| const proxyHostModel      = require('../models/proxy_host'); | ||||
| const internalHost        = require('./host'); | ||||
| const internalNginx       = require('./nginx'); | ||||
| const internalAuditLog    = require('./audit-log'); | ||||
| const internalCertificate = require('./certificate'); | ||||
| const {castJsonIfNeed}    = require('../lib/helpers'); | ||||
|  | ||||
| function omissions () { | ||||
| 	return ['is_deleted', 'owner.is_deleted']; | ||||
| 	return ['is_deleted']; | ||||
| } | ||||
|  | ||||
| const internalProxyHost = { | ||||
| @@ -49,16 +47,10 @@ const internalProxyHost = { | ||||
| 				data.owner_user_id = access.token.getUserId(1); | ||||
| 				data               = internalHost.cleanSslHstsData(data); | ||||
|  | ||||
| 				// Fix for db field not having a default value | ||||
| 				// for this optional field. | ||||
| 				if (typeof data.advanced_config === 'undefined') { | ||||
| 					data.advanced_config = ''; | ||||
| 				} | ||||
|  | ||||
| 				return proxyHostModel | ||||
| 					.query() | ||||
| 					.insertAndFetch(data) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch(data); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (create_certificate) { | ||||
| @@ -178,7 +170,6 @@ const internalProxyHost = { | ||||
| 					.query() | ||||
| 					.where({id: data.id}) | ||||
| 					.patch(data) | ||||
| 					.then(utils.omitRow(omissions())) | ||||
| 					.then((saved_row) => { | ||||
| 						// Add to audit log | ||||
| 						return internalAuditLog.add(access, { | ||||
| @@ -188,7 +179,7 @@ const internalProxyHost = { | ||||
| 							meta:        data | ||||
| 						}) | ||||
| 							.then(() => { | ||||
| 								return saved_row; | ||||
| 								return _.omit(saved_row, omissions()); | ||||
| 							}); | ||||
| 					}); | ||||
| 			}) | ||||
| @@ -232,29 +223,31 @@ const internalProxyHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.andWhere('id', data.id) | ||||
| 					.allowGraph('[owner,access_list.[clients,items],certificate]') | ||||
| 					.allowEager('[owner,access_list,access_list.[clients,items],certificate]') | ||||
| 					.first(); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				row = internalHost.cleanRowCertificateMeta(row); | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					row = internalHost.cleanRowCertificateMeta(row); | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -271,7 +264,7 @@ const internalProxyHost = { | ||||
| 				return internalProxyHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
|  | ||||
| @@ -319,7 +312,7 @@ const internalProxyHost = { | ||||
| 				}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already enabled'); | ||||
| @@ -365,7 +358,7 @@ const internalProxyHost = { | ||||
| 				return internalProxyHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (!row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already disabled'); | ||||
| @@ -416,25 +409,26 @@ const internalProxyHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.groupBy('id') | ||||
| 					.allowGraph('[owner,access_list,certificate]') | ||||
| 					.orderBy(castJsonIfNeed('domain_names'), 'ASC'); | ||||
| 					.omit(['is_deleted']) | ||||
| 					.allowEager('[owner,access_list,certificate]') | ||||
| 					.orderBy('domain_names', 'ASC'); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string' && search_query.length > 0) { | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where(castJsonIfNeed('domain_names'), 'like', `%${search_query}%`); | ||||
| 						this.where('domain_names', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((rows) => { | ||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||
|   | ||||
| @@ -1,12 +1,10 @@ | ||||
| const _                    = require('lodash'); | ||||
| const error                = require('../lib/error'); | ||||
| const utils                = require('../lib/utils'); | ||||
| const redirectionHostModel = require('../models/redirection_host'); | ||||
| const internalHost         = require('./host'); | ||||
| const internalNginx        = require('./nginx'); | ||||
| const internalAuditLog     = require('./audit-log'); | ||||
| const internalCertificate  = require('./certificate'); | ||||
| const {castJsonIfNeed}     = require('../lib/helpers'); | ||||
|  | ||||
| function omissions () { | ||||
| 	return ['is_deleted']; | ||||
| @@ -49,16 +47,10 @@ const internalRedirectionHost = { | ||||
| 				data.owner_user_id = access.token.getUserId(1); | ||||
| 				data               = internalHost.cleanSslHstsData(data); | ||||
|  | ||||
| 				// Fix for db field not having a default value | ||||
| 				// for this optional field. | ||||
| 				if (typeof data.advanced_config === 'undefined') { | ||||
| 					data.advanced_config = ''; | ||||
| 				} | ||||
|  | ||||
| 				return redirectionHostModel | ||||
| 					.query() | ||||
| 					.insertAndFetch(data) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch(data); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (create_certificate) { | ||||
| @@ -73,8 +65,9 @@ const internalRedirectionHost = { | ||||
| 						.then(() => { | ||||
| 							return row; | ||||
| 						}); | ||||
| 				} else { | ||||
| 					return row; | ||||
| 				} | ||||
| 				return row; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				// re-fetch with cert | ||||
| @@ -225,29 +218,31 @@ const internalRedirectionHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.andWhere('id', data.id) | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.allowEager('[owner,certificate]') | ||||
| 					.first(); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				row = internalHost.cleanRowCertificateMeta(row); | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					row = internalHost.cleanRowCertificateMeta(row); | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -264,7 +259,7 @@ const internalRedirectionHost = { | ||||
| 				return internalRedirectionHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
|  | ||||
| @@ -312,7 +307,7 @@ const internalRedirectionHost = { | ||||
| 				}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already enabled'); | ||||
| @@ -358,7 +353,7 @@ const internalRedirectionHost = { | ||||
| 				return internalRedirectionHost.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (!row.enabled) { | ||||
| 					throw new error.ValidationError('Host is already disabled'); | ||||
| @@ -409,25 +404,26 @@ const internalRedirectionHost = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.groupBy('id') | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.orderBy(castJsonIfNeed('domain_names'), 'ASC'); | ||||
| 					.omit(['is_deleted']) | ||||
| 					.allowEager('[owner,certificate]') | ||||
| 					.orderBy('domain_names', 'ASC'); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string' && search_query.length > 0) { | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where(castJsonIfNeed('domain_names'), 'like', `%${search_query}%`); | ||||
| 						this.where('domain_names', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((rows) => { | ||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||
|   | ||||
| @@ -1,15 +1,11 @@ | ||||
| const _                   = require('lodash'); | ||||
| const error               = require('../lib/error'); | ||||
| const utils               = require('../lib/utils'); | ||||
| const streamModel         = require('../models/stream'); | ||||
| const internalNginx       = require('./nginx'); | ||||
| const internalAuditLog    = require('./audit-log'); | ||||
| const internalCertificate = require('./certificate'); | ||||
| const internalHost        = require('./host'); | ||||
| const {castJsonIfNeed}    = require('../lib/helpers'); | ||||
| const _                = require('lodash'); | ||||
| const error            = require('../lib/error'); | ||||
| const streamModel      = require('../models/stream'); | ||||
| const internalNginx    = require('./nginx'); | ||||
| const internalAuditLog = require('./audit-log'); | ||||
|  | ||||
| function omissions () { | ||||
| 	return ['is_deleted', 'owner.is_deleted', 'certificate.is_deleted']; | ||||
| 	return ['is_deleted']; | ||||
| } | ||||
|  | ||||
| const internalStream = { | ||||
| @@ -20,12 +16,6 @@ const internalStream = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	create: (access, data) => { | ||||
| 		const create_certificate = data.certificate_id === 'new'; | ||||
|  | ||||
| 		if (create_certificate) { | ||||
| 			delete data.certificate_id; | ||||
| 		} | ||||
|  | ||||
| 		return access.can('streams:create', data) | ||||
| 			.then((/*access_data*/) => { | ||||
| 				// TODO: At this point the existing ports should have been checked | ||||
| @@ -35,44 +25,16 @@ const internalStream = { | ||||
| 					data.meta = {}; | ||||
| 				} | ||||
|  | ||||
| 				// streams aren't routed by domain name so don't store domain names in the DB | ||||
| 				let data_no_domains = structuredClone(data); | ||||
| 				delete data_no_domains.domain_names; | ||||
|  | ||||
| 				return streamModel | ||||
| 					.query() | ||||
| 					.insertAndFetch(data_no_domains) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (create_certificate) { | ||||
| 					return internalCertificate.createQuickCertificate(access, data) | ||||
| 						.then((cert) => { | ||||
| 							// update host with cert id | ||||
| 							return internalStream.update(access, { | ||||
| 								id:             row.id, | ||||
| 								certificate_id: cert.id | ||||
| 							}); | ||||
| 						}) | ||||
| 						.then(() => { | ||||
| 							return row; | ||||
| 						}); | ||||
| 				} else { | ||||
| 					return row; | ||||
| 				} | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				// re-fetch with cert | ||||
| 				return internalStream.get(access, { | ||||
| 					id:     row.id, | ||||
| 					expand: ['certificate', 'owner'] | ||||
| 				}); | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch(data); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				// Configure nginx | ||||
| 				return internalNginx.configure(streamModel, 'stream', row) | ||||
| 					.then(() => { | ||||
| 						return row; | ||||
| 						return internalStream.get(access, {id: row.id, expand: ['owner']}); | ||||
| 					}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| @@ -96,12 +58,6 @@ const internalStream = { | ||||
| 	 * @return {Promise} | ||||
| 	 */ | ||||
| 	update: (access, data) => { | ||||
| 		const create_certificate = data.certificate_id === 'new'; | ||||
|  | ||||
| 		if (create_certificate) { | ||||
| 			delete data.certificate_id; | ||||
| 		} | ||||
|  | ||||
| 		return access.can('streams:update', data.id) | ||||
| 			.then((/*access_data*/) => { | ||||
| 				// TODO: at this point the existing streams should have been checked | ||||
| @@ -113,32 +69,16 @@ const internalStream = { | ||||
| 					throw new error.InternalValidationError('Stream could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id); | ||||
| 				} | ||||
|  | ||||
| 				if (create_certificate) { | ||||
| 					return internalCertificate.createQuickCertificate(access, { | ||||
| 						domain_names: data.domain_names || row.domain_names, | ||||
| 						meta:         _.assign({}, row.meta, data.meta) | ||||
| 					}) | ||||
| 						.then((cert) => { | ||||
| 							// update host with cert id | ||||
| 							data.certificate_id = cert.id; | ||||
| 						}) | ||||
| 						.then(() => { | ||||
| 							return row; | ||||
| 						}); | ||||
| 				} else { | ||||
| 					return row; | ||||
| 				} | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here. | ||||
| 				data = _.assign({}, { | ||||
| 					domain_names: row.domain_names | ||||
| 				}, data); | ||||
|  | ||||
| 				return streamModel | ||||
| 					.query() | ||||
| 					.omit(omissions()) | ||||
| 					.patchAndFetchById(row.id, data) | ||||
| 					.then(utils.omitRow(omissions())) | ||||
| 					.then((saved_row) => { | ||||
| 						return internalNginx.configure(streamModel, 'stream', saved_row) | ||||
| 							.then(() => { | ||||
| 								return internalStream.get(access, {id: row.id, expand: ['owner']}); | ||||
| 							}); | ||||
| 					}) | ||||
| 					.then((saved_row) => { | ||||
| 						// Add to audit log | ||||
| 						return internalAuditLog.add(access, { | ||||
| @@ -148,18 +88,7 @@ const internalStream = { | ||||
| 							meta:        data | ||||
| 						}) | ||||
| 							.then(() => { | ||||
| 								return saved_row; | ||||
| 							}); | ||||
| 					}); | ||||
| 			}) | ||||
| 			.then(() => { | ||||
| 				return internalStream.get(access, {id: data.id, expand: ['owner', 'certificate']}) | ||||
| 					.then((row) => { | ||||
| 						return internalNginx.configure(streamModel, 'stream', row) | ||||
| 							.then((new_meta) => { | ||||
| 								row.meta = new_meta; | ||||
| 								row      = internalHost.cleanRowCertificateMeta(row); | ||||
| 								return _.omit(row, omissions()); | ||||
| 								return _.omit(saved_row, omissions()); | ||||
| 							}); | ||||
| 					}); | ||||
| 			}); | ||||
| @@ -184,29 +113,30 @@ const internalStream = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.andWhere('id', data.id) | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.allowEager('[owner]') | ||||
| 					.first(); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				row = internalHost.cleanRowCertificateMeta(row); | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -223,7 +153,7 @@ const internalStream = { | ||||
| 				return internalStream.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
|  | ||||
| @@ -267,14 +197,14 @@ const internalStream = { | ||||
| 			.then(() => { | ||||
| 				return internalStream.get(access, { | ||||
| 					id:     data.id, | ||||
| 					expand: ['certificate', 'owner'] | ||||
| 					expand: ['owner'] | ||||
| 				}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (row.enabled) { | ||||
| 					throw new error.ValidationError('Stream is already enabled'); | ||||
| 					throw new error.ValidationError('Host is already enabled'); | ||||
| 				} | ||||
|  | ||||
| 				row.enabled = 1; | ||||
| @@ -317,10 +247,10 @@ const internalStream = { | ||||
| 				return internalStream.get(access, {id: data.id}); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 				if (!row) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} else if (!row.enabled) { | ||||
| 					throw new error.ValidationError('Stream is already disabled'); | ||||
| 					throw new error.ValidationError('Host is already disabled'); | ||||
| 				} | ||||
|  | ||||
| 				row.enabled = 0; | ||||
| @@ -364,11 +294,12 @@ const internalStream = { | ||||
| 	getAll: (access, expand, search_query) => { | ||||
| 		return access.can('streams:list') | ||||
| 			.then((access_data) => { | ||||
| 				const query = streamModel | ||||
| 				let query = streamModel | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.groupBy('id') | ||||
| 					.allowGraph('[owner,certificate]') | ||||
| 					.omit(['is_deleted']) | ||||
| 					.allowEager('[owner]') | ||||
| 					.orderBy('incoming_port', 'ASC'); | ||||
|  | ||||
| 				if (access_data.permission_visibility !== 'all') { | ||||
| @@ -376,24 +307,17 @@ const internalStream = { | ||||
| 				} | ||||
|  | ||||
| 				// Query is used for searching | ||||
| 				if (typeof search_query === 'string' && search_query.length > 0) { | ||||
| 				if (typeof search_query === 'string') { | ||||
| 					query.where(function () { | ||||
| 						this.where(castJsonIfNeed('incoming_port'), 'like', `%${search_query}%`); | ||||
| 						this.where('incoming_port', 'like', '%' + search_query + '%'); | ||||
| 					}); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 			}) | ||||
| 			.then((rows) => { | ||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||
| 					return internalHost.cleanAllRowsCertificateMeta(rows); | ||||
| 				} | ||||
|  | ||||
| 				return rows; | ||||
| 				return query; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -405,9 +329,9 @@ const internalStream = { | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	getCount: (user_id, visibility) => { | ||||
| 		const query = streamModel | ||||
| 		let query = streamModel | ||||
| 			.query() | ||||
| 			.count('id AS count') | ||||
| 			.count('id as count') | ||||
| 			.where('is_deleted', 0); | ||||
|  | ||||
| 		if (visibility !== 'all') { | ||||
|   | ||||
| @@ -5,8 +5,6 @@ const authModel  = require('../models/auth'); | ||||
| const helpers    = require('../lib/helpers'); | ||||
| const TokenModel = require('../models/token'); | ||||
|  | ||||
| const ERROR_MESSAGE_INVALID_AUTH = 'Invalid email or password'; | ||||
|  | ||||
| module.exports = { | ||||
|  | ||||
| 	/** | ||||
| @@ -26,7 +24,7 @@ module.exports = { | ||||
|  | ||||
| 		return userModel | ||||
| 			.query() | ||||
| 			.where('email', data.identity.toLowerCase().trim()) | ||||
| 			.where('email', data.identity) | ||||
| 			.andWhere('is_deleted', 0) | ||||
| 			.andWhere('is_disabled', 0) | ||||
| 			.first() | ||||
| @@ -71,15 +69,15 @@ module.exports = { | ||||
| 													}; | ||||
| 												}); | ||||
| 										} else { | ||||
| 											throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||
| 											throw new error.AuthError('Invalid password'); | ||||
| 										} | ||||
| 									}); | ||||
| 							} else { | ||||
| 								throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||
| 								throw new error.AuthError('No password auth for user'); | ||||
| 							} | ||||
| 						}); | ||||
| 				} else { | ||||
| 					throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||
| 					throw new error.AuthError('No relevant user found'); | ||||
| 				} | ||||
| 			}); | ||||
| 	}, | ||||
|   | ||||
| @@ -1,6 +1,5 @@ | ||||
| const _                   = require('lodash'); | ||||
| const error               = require('../lib/error'); | ||||
| const utils               = require('../lib/utils'); | ||||
| const userModel           = require('../models/user'); | ||||
| const userPermissionModel = require('../models/user_permission'); | ||||
| const authModel           = require('../models/auth'); | ||||
| @@ -36,8 +35,8 @@ const internalUser = { | ||||
|  | ||||
| 				return userModel | ||||
| 					.query() | ||||
| 					.insertAndFetch(data) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					.omit(omissions()) | ||||
| 					.insertAndFetch(data); | ||||
| 			}) | ||||
| 			.then((user) => { | ||||
| 				if (auth) { | ||||
| @@ -141,8 +140,11 @@ const internalUser = { | ||||
|  | ||||
| 				return userModel | ||||
| 					.query() | ||||
| 					.omit(omissions()) | ||||
| 					.patchAndFetchById(user.id, data) | ||||
| 					.then(utils.omitRow(omissions())); | ||||
| 					.then((saved_user) => { | ||||
| 						return _.omit(saved_user, omissions()); | ||||
| 					}); | ||||
| 			}) | ||||
| 			.then(() => { | ||||
| 				return internalUser.get(access, {id: data.id}); | ||||
| @@ -184,24 +186,26 @@ const internalUser = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.andWhere('id', data.id) | ||||
| 					.allowGraph('[permissions]') | ||||
| 					.allowEager('[permissions]') | ||||
| 					.first(); | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRow(omissions())); | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (!row || !row.id) { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				// Custom omissions | ||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||
| 					row = _.omit(row, data.omit); | ||||
| 					query.omit(data.omit); | ||||
| 				} | ||||
|  | ||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query; | ||||
| 			}) | ||||
| 			.then((row) => { | ||||
| 				if (row) { | ||||
| 					return _.omit(row, omissions()); | ||||
| 				} else { | ||||
| 					throw new error.ItemNotFoundError(data.id); | ||||
| 				} | ||||
| 				return row; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
| @@ -318,7 +322,8 @@ const internalUser = { | ||||
| 					.query() | ||||
| 					.where('is_deleted', 0) | ||||
| 					.groupBy('id') | ||||
| 					.allowGraph('[permissions]') | ||||
| 					.omit(['is_deleted']) | ||||
| 					.allowEager('[permissions]') | ||||
| 					.orderBy('name', 'ASC'); | ||||
|  | ||||
| 				// Query is used for searching | ||||
| @@ -330,10 +335,10 @@ const internalUser = { | ||||
| 				} | ||||
|  | ||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | ||||
| 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||
| 					query.eager('[' + expand.join(', ') + ']'); | ||||
| 				} | ||||
|  | ||||
| 				return query.then(utils.omitRows(omissions())); | ||||
| 				return query; | ||||
| 			}); | ||||
| 	}, | ||||
|  | ||||
|   | ||||
| @@ -1,6 +1,6 @@ | ||||
| module.exports = { | ||||
| 	development: { | ||||
| 		client:     'mysql2', | ||||
| 		client:     'mysql', | ||||
| 		migrations: { | ||||
| 			tableName: 'migrations', | ||||
| 			stub:      'lib/migrate_template.js', | ||||
| @@ -9,7 +9,7 @@ module.exports = { | ||||
| 	}, | ||||
|  | ||||
| 	production: { | ||||
| 		client:     'mysql2', | ||||
| 		client:     'mysql', | ||||
| 		migrations: { | ||||
| 			tableName: 'migrations', | ||||
| 			stub:      'lib/migrate_template.js', | ||||
|   | ||||
| @@ -10,7 +10,7 @@ | ||||
|  | ||||
| const _              = require('lodash'); | ||||
| const logger         = require('../logger').access; | ||||
| const Ajv            = require('ajv/dist/2020'); | ||||
| const validator      = require('ajv'); | ||||
| const error          = require('./error'); | ||||
| const userModel      = require('../models/user'); | ||||
| const proxyHostModel = require('../models/proxy_host'); | ||||
| @@ -55,8 +55,8 @@ module.exports = function (token_string) { | ||||
| 								.where('id', token_data.attrs.id) | ||||
| 								.andWhere('is_deleted', 0) | ||||
| 								.andWhere('is_disabled', 0) | ||||
| 								.allowGraph('[permissions]') | ||||
| 								.withGraphFetched('[permissions]') | ||||
| 								.allowEager('[permissions]') | ||||
| 								.eager('[permissions]') | ||||
| 								.first() | ||||
| 								.then((user) => { | ||||
| 									if (user) { | ||||
| @@ -174,6 +174,7 @@ module.exports = function (token_string) { | ||||
|  | ||||
| 		let schema = { | ||||
| 			$id:                  'objects', | ||||
| 			$schema:              'http://json-schema.org/draft-07/schema#', | ||||
| 			description:          'Actor Properties', | ||||
| 			type:                 'object', | ||||
| 			additionalProperties: false, | ||||
| @@ -250,7 +251,7 @@ module.exports = function (token_string) { | ||||
| 						// Initialised, token decoded ok | ||||
| 						return this.getObjectSchema(permission) | ||||
| 							.then((objectSchema) => { | ||||
| 								const data_schema = { | ||||
| 								let data_schema = { | ||||
| 									[permission]: { | ||||
| 										data:                         data, | ||||
| 										scope:                        Token.get('scope'), | ||||
| @@ -266,18 +267,24 @@ module.exports = function (token_string) { | ||||
| 								}; | ||||
|  | ||||
| 								let permissionSchema = { | ||||
| 									$schema:              'http://json-schema.org/draft-07/schema#', | ||||
| 									$async:               true, | ||||
| 									$id:                  'permissions', | ||||
| 									type:                 'object', | ||||
| 									additionalProperties: false, | ||||
| 									properties:           {} | ||||
| 								}; | ||||
|  | ||||
| 								permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json'); | ||||
|  | ||||
| 								const ajv = new Ajv({ | ||||
| 								// logger.info('objectSchema', JSON.stringify(objectSchema, null, 2)); | ||||
| 								// logger.info('permissionSchema', JSON.stringify(permissionSchema, null, 2)); | ||||
| 								// logger.info('data_schema', JSON.stringify(data_schema, null, 2)); | ||||
|  | ||||
| 								let ajv = validator({ | ||||
| 									verbose:      true, | ||||
| 									allErrors:    true, | ||||
| 									format:       'full', | ||||
| 									missingRefs:  'fail', | ||||
| 									breakOnError: true, | ||||
| 									coerceTypes:  true, | ||||
| 									schemas:      [ | ||||
|   | ||||
| @@ -1,4 +1,5 @@ | ||||
| { | ||||
| 	"$schema": "http://json-schema.org/draft-07/schema#", | ||||
| 	"$id": "perms", | ||||
| 	"definitions": { | ||||
| 		"view": { | ||||
|   | ||||
| @@ -1,4 +1,5 @@ | ||||
| { | ||||
| 	"$schema": "http://json-schema.org/draft-07/schema#", | ||||
| 	"$id": "roles", | ||||
| 	"definitions": { | ||||
| 		"admin": { | ||||
|   | ||||
| @@ -1,85 +0,0 @@ | ||||
| const dnsPlugins = require('../global/certbot-dns-plugins.json'); | ||||
| const utils      = require('./utils'); | ||||
| const error      = require('./error'); | ||||
| const logger     = require('../logger').certbot; | ||||
| const batchflow  = require('batchflow'); | ||||
|  | ||||
| const CERTBOT_VERSION_REPLACEMENT = '$(certbot --version | grep -Eo \'[0-9](\\.[0-9]+)+\')'; | ||||
|  | ||||
| const certbot = { | ||||
|  | ||||
| 	/** | ||||
| 	 * @param {array} pluginKeys | ||||
| 	 */ | ||||
| 	installPlugins: async (pluginKeys) => { | ||||
| 		let hasErrors = false; | ||||
|  | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			if (pluginKeys.length === 0) { | ||||
| 				resolve(); | ||||
| 				return; | ||||
| 			} | ||||
|  | ||||
| 			batchflow(pluginKeys).sequential() | ||||
| 				.each((_i, pluginKey, next) => { | ||||
| 					certbot.installPlugin(pluginKey) | ||||
| 						.then(() => { | ||||
| 							next(); | ||||
| 						}) | ||||
| 						.catch((err) => { | ||||
| 							hasErrors = true; | ||||
| 							next(err); | ||||
| 						}); | ||||
| 				}) | ||||
| 				.error((err) => { | ||||
| 					logger.error(err.message); | ||||
| 				}) | ||||
| 				.end(() => { | ||||
| 					if (hasErrors) { | ||||
| 						reject(new error.CommandError('Some plugins failed to install. Please check the logs above', 1)); | ||||
| 					} else { | ||||
| 						resolve(); | ||||
| 					} | ||||
| 				}); | ||||
| 		}); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Installs a cerbot plugin given the key for the object from | ||||
| 	 * ../global/certbot-dns-plugins.json | ||||
| 	 * | ||||
| 	 * @param   {string}  pluginKey | ||||
| 	 * @returns {Object} | ||||
| 	 */ | ||||
| 	installPlugin: async (pluginKey) => { | ||||
| 		if (typeof dnsPlugins[pluginKey] === 'undefined') { | ||||
| 			// throw Error(`Certbot plugin ${pluginKey} not found`); | ||||
| 			throw new error.ItemNotFoundError(pluginKey); | ||||
| 		} | ||||
|  | ||||
| 		const plugin = dnsPlugins[pluginKey]; | ||||
| 		logger.start(`Installing ${pluginKey}...`); | ||||
|  | ||||
| 		plugin.version      = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||
| 		plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||
|  | ||||
| 		// SETUPTOOLS_USE_DISTUTILS is required for certbot plugins to install correctly | ||||
| 		// in new versions of Python | ||||
| 		let env = Object.assign({}, process.env, {SETUPTOOLS_USE_DISTUTILS: 'stdlib'}); | ||||
| 		if (typeof plugin.env === 'object') { | ||||
| 			env = Object.assign(env, plugin.env); | ||||
| 		} | ||||
|  | ||||
| 		const cmd = `. /opt/certbot/bin/activate && pip install --no-cache-dir ${plugin.dependencies} ${plugin.package_name}${plugin.version}  && deactivate`; | ||||
| 		return utils.exec(cmd, {env}) | ||||
| 			.then((result) => { | ||||
| 				logger.complete(`Installed ${pluginKey}`); | ||||
| 				return result; | ||||
| 			}) | ||||
| 			.catch((err) => { | ||||
| 				throw err; | ||||
| 			}); | ||||
| 	}, | ||||
| }; | ||||
|  | ||||
| module.exports = certbot; | ||||
| @@ -1,237 +0,0 @@ | ||||
| const fs      = require('fs'); | ||||
| const NodeRSA = require('node-rsa'); | ||||
| const logger  = require('../logger').global; | ||||
|  | ||||
| const keysFile         = '/data/keys.json'; | ||||
| const mysqlEngine      = 'mysql2'; | ||||
| const postgresEngine   = 'pg'; | ||||
| const sqliteClientName = 'sqlite3'; | ||||
|  | ||||
| let instance = null; | ||||
|  | ||||
| // 1. Load from config file first (not recommended anymore) | ||||
| // 2. Use config env variables next | ||||
| const configure = () => { | ||||
| 	const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json'; | ||||
| 	if (fs.existsSync(filename)) { | ||||
| 		let configData; | ||||
| 		try { | ||||
| 			configData = require(filename); | ||||
| 		} catch (_) { | ||||
| 			// do nothing | ||||
| 		} | ||||
|  | ||||
| 		if (configData && configData.database) { | ||||
| 			logger.info(`Using configuration from file: ${filename}`); | ||||
| 			instance      = configData; | ||||
| 			instance.keys = getKeys(); | ||||
| 			return; | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	const envMysqlHost = process.env.DB_MYSQL_HOST || null; | ||||
| 	const envMysqlUser = process.env.DB_MYSQL_USER || null; | ||||
| 	const envMysqlName = process.env.DB_MYSQL_NAME || null; | ||||
| 	if (envMysqlHost && envMysqlUser && envMysqlName) { | ||||
| 		// we have enough mysql creds to go with mysql | ||||
| 		logger.info('Using MySQL configuration'); | ||||
| 		instance = { | ||||
| 			database: { | ||||
| 				engine:   mysqlEngine, | ||||
| 				host:     envMysqlHost, | ||||
| 				port:     process.env.DB_MYSQL_PORT || 3306, | ||||
| 				user:     envMysqlUser, | ||||
| 				password: process.env.DB_MYSQL_PASSWORD, | ||||
| 				name:     envMysqlName, | ||||
| 			}, | ||||
| 			keys: getKeys(), | ||||
| 		}; | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	const envPostgresHost = process.env.DB_POSTGRES_HOST || null; | ||||
| 	const envPostgresUser = process.env.DB_POSTGRES_USER || null; | ||||
| 	const envPostgresName = process.env.DB_POSTGRES_NAME || null; | ||||
| 	if (envPostgresHost && envPostgresUser && envPostgresName) { | ||||
| 		// we have enough postgres creds to go with postgres | ||||
| 		logger.info('Using Postgres configuration'); | ||||
| 		instance = { | ||||
| 			database: { | ||||
| 				engine:   postgresEngine, | ||||
| 				host:     envPostgresHost, | ||||
| 				port:     process.env.DB_POSTGRES_PORT || 5432, | ||||
| 				user:     envPostgresUser, | ||||
| 				password: process.env.DB_POSTGRES_PASSWORD, | ||||
| 				name:     envPostgresName, | ||||
| 			}, | ||||
| 			keys: getKeys(), | ||||
| 		}; | ||||
| 		return; | ||||
| 	} | ||||
|  | ||||
| 	const envSqliteFile = process.env.DB_SQLITE_FILE || '/data/database.sqlite'; | ||||
| 	logger.info(`Using Sqlite: ${envSqliteFile}`); | ||||
| 	instance = { | ||||
| 		database: { | ||||
| 			engine: 'knex-native', | ||||
| 			knex:   { | ||||
| 				client:     sqliteClientName, | ||||
| 				connection: { | ||||
| 					filename: envSqliteFile | ||||
| 				}, | ||||
| 				useNullAsDefault: true | ||||
| 			} | ||||
| 		}, | ||||
| 		keys: getKeys(), | ||||
| 	}; | ||||
| }; | ||||
|  | ||||
| const getKeys = () => { | ||||
| 	// Get keys from file | ||||
| 	if (!fs.existsSync(keysFile)) { | ||||
| 		generateKeys(); | ||||
| 	} else if (process.env.DEBUG) { | ||||
| 		logger.info('Keys file exists OK'); | ||||
| 	} | ||||
| 	try { | ||||
| 		return require(keysFile); | ||||
| 	} catch (err) { | ||||
| 		logger.error('Could not read JWT key pair from config file: ' + keysFile, err); | ||||
| 		process.exit(1); | ||||
| 	} | ||||
| }; | ||||
|  | ||||
| const generateKeys = () => { | ||||
| 	logger.info('Creating a new JWT key pair...'); | ||||
| 	// Now create the keys and save them in the config. | ||||
| 	const key = new NodeRSA({ b: 2048 }); | ||||
| 	key.generateKeyPair(); | ||||
|  | ||||
| 	const keys = { | ||||
| 		key: key.exportKey('private').toString(), | ||||
| 		pub: key.exportKey('public').toString(), | ||||
| 	}; | ||||
|  | ||||
| 	// Write keys config | ||||
| 	try { | ||||
| 		fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2)); | ||||
| 	} catch (err) { | ||||
| 		logger.error('Could not write JWT key pair to config file: ' + keysFile + ': ' + err.message); | ||||
| 		process.exit(1); | ||||
| 	} | ||||
| 	logger.info('Wrote JWT key pair to config file: ' + keysFile); | ||||
| }; | ||||
|  | ||||
| module.exports = { | ||||
|  | ||||
| 	/** | ||||
| 	 * | ||||
| 	 * @param   {string}  key   ie: 'database' or 'database.engine' | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	has: function(key) { | ||||
| 		instance === null && configure(); | ||||
| 		const keys = key.split('.'); | ||||
| 		let level  = instance; | ||||
| 		let has    = true; | ||||
| 		keys.forEach((keyItem) =>{ | ||||
| 			if (typeof level[keyItem] === 'undefined') { | ||||
| 				has = false; | ||||
| 			} else { | ||||
| 				level = level[keyItem]; | ||||
| 			} | ||||
| 		}); | ||||
|  | ||||
| 		return has; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Gets a specific key from the top level | ||||
| 	 * | ||||
| 	 * @param {string} key | ||||
| 	 * @returns {*} | ||||
| 	 */ | ||||
| 	get: function (key) { | ||||
| 		instance === null && configure(); | ||||
| 		if (key && typeof instance[key] !== 'undefined') { | ||||
| 			return instance[key]; | ||||
| 		} | ||||
| 		return instance; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Is this a sqlite configuration? | ||||
| 	 * | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	isSqlite: function () { | ||||
| 		instance === null && configure(); | ||||
| 		return instance.database.knex && instance.database.knex.client === sqliteClientName; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Is this a mysql configuration? | ||||
| 	 * | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	isMysql: function () { | ||||
| 		instance === null && configure(); | ||||
| 		return instance.database.engine === mysqlEngine; | ||||
| 	}, | ||||
| 	 | ||||
| 	/** | ||||
| 		 * Is this a postgres configuration? | ||||
| 		 * | ||||
| 		 * @returns {boolean} | ||||
| 		 */ | ||||
| 	isPostgres: function () { | ||||
| 		instance === null && configure(); | ||||
| 		return instance.database.engine === postgresEngine; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Are we running in debug mdoe? | ||||
| 	 * | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	debug: function () { | ||||
| 		return !!process.env.DEBUG; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Returns a public key | ||||
| 	 * | ||||
| 	 * @returns {string} | ||||
| 	 */ | ||||
| 	getPublicKey: function () { | ||||
| 		instance === null && configure(); | ||||
| 		return instance.keys.pub; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Returns a private key | ||||
| 	 * | ||||
| 	 * @returns {string} | ||||
| 	 */ | ||||
| 	getPrivateKey: function () { | ||||
| 		instance === null && configure(); | ||||
| 		return instance.keys.key; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * @returns {boolean} | ||||
| 	 */ | ||||
| 	useLetsencryptStaging: function () { | ||||
| 		return !!process.env.LE_STAGING; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * @returns {string|null} | ||||
| 	 */ | ||||
| 	useLetsencryptServer: function () { | ||||
| 		if (process.env.LE_SERVER) { | ||||
| 			return process.env.LE_SERVER; | ||||
| 		} | ||||
| 		return null; | ||||
| 	} | ||||
| }; | ||||
| @@ -82,16 +82,7 @@ module.exports = { | ||||
| 		this.message  = message; | ||||
| 		this.public   = false; | ||||
| 		this.status   = 400; | ||||
| 	}, | ||||
|  | ||||
| 	CommandError: function (stdErr, code, previous) { | ||||
| 		Error.captureStackTrace(this, this.constructor); | ||||
| 		this.name     = this.constructor.name; | ||||
| 		this.previous = previous; | ||||
| 		this.message  = stdErr; | ||||
| 		this.code     = code; | ||||
| 		this.public   = false; | ||||
| 	}, | ||||
| 	} | ||||
| }; | ||||
|  | ||||
| _.forEach(module.exports, function (error) { | ||||
|   | ||||
| @@ -1,16 +1,40 @@ | ||||
| const validator = require('../validator'); | ||||
|  | ||||
| module.exports = function (req, res, next) { | ||||
|  | ||||
| 	if (req.headers.origin) { | ||||
| 		res.set({ | ||||
| 			'Access-Control-Allow-Origin':      req.headers.origin, | ||||
| 			'Access-Control-Allow-Credentials': true, | ||||
| 			'Access-Control-Allow-Methods':     'OPTIONS, GET, POST', | ||||
| 			'Access-Control-Allow-Headers':     'Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit', | ||||
| 			'Access-Control-Max-Age':           5 * 60, | ||||
| 			'Access-Control-Expose-Headers':    'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit' | ||||
| 		}); | ||||
| 		next(); | ||||
|  | ||||
| 		const originSchema = { | ||||
| 			oneOf: [ | ||||
| 				{ | ||||
| 					type:    'string', | ||||
| 					pattern: '^[a-z\\-]+:\\/\\/(?:[\\w\\-\\.]+(:[0-9]+)?/?)?$' | ||||
| 				}, | ||||
| 				{ | ||||
| 					type:    'string', | ||||
| 					pattern: '^[a-z\\-]+:\\/\\/(?:\\[([a-z0-9]{0,4}\\:?)+\\])?/?(:[0-9]+)?$' | ||||
| 				} | ||||
| 			] | ||||
| 		}; | ||||
|  | ||||
| 		// very relaxed validation.... | ||||
| 		validator(originSchema, req.headers.origin) | ||||
| 			.then(function () { | ||||
| 				res.set({ | ||||
| 					'Access-Control-Allow-Origin':      req.headers.origin, | ||||
| 					'Access-Control-Allow-Credentials': true, | ||||
| 					'Access-Control-Allow-Methods':     'OPTIONS, GET, POST', | ||||
| 					'Access-Control-Allow-Headers':     'Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit', | ||||
| 					'Access-Control-Max-Age':           5 * 60, | ||||
| 					'Access-Control-Expose-Headers':    'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit' | ||||
| 				}); | ||||
| 				next(); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
|  | ||||
| 	} else { | ||||
| 		// No origin | ||||
| 		next(); | ||||
| 	} | ||||
|  | ||||
| }; | ||||
|   | ||||
| @@ -1,6 +1,4 @@ | ||||
| const moment       = require('moment'); | ||||
| const {isPostgres} = require('./config'); | ||||
| const {ref}        = require('objection'); | ||||
| const moment = require('moment'); | ||||
|  | ||||
| module.exports = { | ||||
|  | ||||
| @@ -29,34 +27,6 @@ module.exports = { | ||||
| 		} | ||||
|  | ||||
| 		return null; | ||||
| 	}, | ||||
|  | ||||
| 	convertIntFieldsToBool: function (obj, fields) { | ||||
| 		fields.forEach(function (field) { | ||||
| 			if (typeof obj[field] !== 'undefined') { | ||||
| 				obj[field] = obj[field] === 1; | ||||
| 			} | ||||
| 		}); | ||||
| 		return obj; | ||||
| 	}, | ||||
|  | ||||
| 	convertBoolFieldsToInt: function (obj, fields) { | ||||
| 		fields.forEach(function (field) { | ||||
| 			if (typeof obj[field] !== 'undefined') { | ||||
| 				obj[field] = obj[field] ? 1 : 0; | ||||
| 			} | ||||
| 		}); | ||||
| 		return obj; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Casts a column to json if using postgres | ||||
| 	 * | ||||
| 	 * @param {string} colName | ||||
| 	 * @returns {string|Objection.ReferenceBuilder} | ||||
| 	 */ | ||||
| 	castJsonIfNeed: function (colName) { | ||||
| 		return isPostgres() ? ref(colName).castText() : colName; | ||||
| 	} | ||||
|  | ||||
| }; | ||||
|   | ||||
| @@ -1,110 +1,20 @@ | ||||
| const _          = require('lodash'); | ||||
| const exec       = require('node:child_process').exec; | ||||
| const execFile   = require('node:child_process').execFile; | ||||
| const { Liquid } = require('liquidjs'); | ||||
| const logger     = require('../logger').global; | ||||
| const error      = require('./error'); | ||||
| const exec = require('child_process').exec; | ||||
|  | ||||
| module.exports = { | ||||
|  | ||||
| 	exec: async (cmd, options = {}) => { | ||||
| 		logger.debug('CMD:', cmd); | ||||
|  | ||||
| 		const { stdout, stderr } = await new Promise((resolve, reject) => { | ||||
| 			const child = exec(cmd, options, (isError, stdout, stderr) => { | ||||
| 				if (isError) { | ||||
| 					reject(new error.CommandError(stderr, isError)); | ||||
| 				} else { | ||||
| 					resolve({ stdout, stderr }); | ||||
| 				} | ||||
| 			}); | ||||
|  | ||||
| 			child.on('error', (e) => { | ||||
| 				reject(new error.CommandError(stderr, 1, e)); | ||||
| 			}); | ||||
| 		}); | ||||
| 		return stdout; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * @param   {String} cmd | ||||
| 	 * @param   {Array}  args | ||||
| 	 * @param   {Object|undefined}  options | ||||
| 	 * @returns {Promise} | ||||
| 	 */ | ||||
| 	execFile: (cmd, args, options) => { | ||||
| 		logger.debug(`CMD: ${cmd} ${args ? args.join(' ') : ''}`); | ||||
| 		if (typeof options === 'undefined') { | ||||
| 			options = {}; | ||||
| 		} | ||||
|  | ||||
| 	exec: function (cmd) { | ||||
| 		return new Promise((resolve, reject) => { | ||||
| 			execFile(cmd, args, options, (err, stdout, stderr) => { | ||||
| 			exec(cmd, function (err, stdout, /*stderr*/) { | ||||
| 				if (err && typeof err === 'object') { | ||||
| 					reject(new error.CommandError(stderr, 1, err)); | ||||
| 					reject(err); | ||||
| 				} else { | ||||
| 					resolve(stdout.trim()); | ||||
| 				} | ||||
| 			}); | ||||
| 		}); | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Used in objection query builder | ||||
| 	 * | ||||
| 	 * @param   {Array}  omissions | ||||
| 	 * @returns {Function} | ||||
| 	 */ | ||||
| 	omitRow: (omissions) => { | ||||
| 		/** | ||||
| 		 * @param   {Object} row | ||||
| 		 * @returns {Object} | ||||
| 		 */ | ||||
| 		return (row) => { | ||||
| 			return _.omit(row, omissions); | ||||
| 		}; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * Used in objection query builder | ||||
| 	 * | ||||
| 	 * @param   {Array}  omissions | ||||
| 	 * @returns {Function} | ||||
| 	 */ | ||||
| 	omitRows: (omissions) => { | ||||
| 		/** | ||||
| 		 * @param   {Array} rows | ||||
| 		 * @returns {Object} | ||||
| 		 */ | ||||
| 		return (rows) => { | ||||
| 			rows.forEach((row, idx) => { | ||||
| 				rows[idx] = _.omit(row, omissions); | ||||
| 			}); | ||||
| 			return rows; | ||||
| 		}; | ||||
| 	}, | ||||
|  | ||||
| 	/** | ||||
| 	 * @returns {Object} Liquid render engine | ||||
| 	 */ | ||||
| 	getRenderEngine: () => { | ||||
| 		const renderEngine = new Liquid({ | ||||
| 			root: `${__dirname}/../templates/` | ||||
| 		}); | ||||
|  | ||||
| 		/** | ||||
| 		 * nginxAccessRule expects the object given to have 2 properties: | ||||
| 		 * | ||||
| 		 * directive  string | ||||
| 		 * address    string | ||||
| 		 */ | ||||
| 		renderEngine.registerFilter('nginxAccessRule', (v) => { | ||||
| 			if (typeof v.directive !== 'undefined' && typeof v.address !== 'undefined' && v.directive && v.address) { | ||||
| 				return `${v.directive} ${v.address};`; | ||||
| 			} | ||||
| 			return ''; | ||||
| 		}); | ||||
|  | ||||
| 		return renderEngine; | ||||
| 	} | ||||
| }; | ||||
|   | ||||
| @@ -1,12 +1,13 @@ | ||||
| const Ajv   = require('ajv/dist/2020'); | ||||
| const error = require('../error'); | ||||
| const error  = require('../error'); | ||||
| const path   = require('path'); | ||||
| const parser = require('json-schema-ref-parser'); | ||||
|  | ||||
| const ajv = new Ajv({ | ||||
| 	verbose:         true, | ||||
| 	allErrors:       true, | ||||
| 	allowUnionTypes: true, | ||||
| 	strict:          false, | ||||
| 	coerceTypes:     true, | ||||
| const ajv = require('ajv')({ | ||||
| 	verbose:        true, | ||||
| 	validateSchema: true, | ||||
| 	allErrors:      false, | ||||
| 	format:         'full', | ||||
| 	coerceTypes:    true | ||||
| }); | ||||
|  | ||||
| /** | ||||
| @@ -16,18 +17,12 @@ const ajv = new Ajv({ | ||||
|  */ | ||||
| function apiValidator (schema, payload/*, description*/) { | ||||
| 	return new Promise(function Promise_apiValidator (resolve, reject) { | ||||
| 		if (schema === null) { | ||||
| 			reject(new error.ValidationError('Schema is undefined')); | ||||
| 			return; | ||||
| 		} | ||||
|  | ||||
| 		if (typeof payload === 'undefined') { | ||||
| 			reject(new error.ValidationError('Payload is undefined')); | ||||
| 			return; | ||||
| 		} | ||||
|  | ||||
| 		const validate = ajv.compile(schema); | ||||
| 		const valid    = validate(payload); | ||||
| 		let validate = ajv.compile(schema); | ||||
| 		let valid    = validate(payload); | ||||
|  | ||||
| 		if (valid && !validate.errors) { | ||||
| 			resolve(payload); | ||||
| @@ -40,4 +35,11 @@ function apiValidator (schema, payload/*, description*/) { | ||||
| 	}); | ||||
| } | ||||
|  | ||||
| apiValidator.loadSchemas = parser | ||||
| 	.dereference(path.resolve('schema/index.json')) | ||||
| 	.then((schema) => { | ||||
| 		ajv.addSchema(schema); | ||||
| 		return schema; | ||||
| 	}); | ||||
|  | ||||
| module.exports = apiValidator; | ||||
|   | ||||
| @@ -1,17 +1,17 @@ | ||||
| const _                 = require('lodash'); | ||||
| const Ajv               = require('ajv/dist/2020'); | ||||
| const error             = require('../error'); | ||||
| const commonDefinitions = require('../../schema/common.json'); | ||||
| const _           = require('lodash'); | ||||
| const error       = require('../error'); | ||||
| const definitions = require('../../schema/definitions.json'); | ||||
|  | ||||
| RegExp.prototype.toJSON = RegExp.prototype.toString; | ||||
|  | ||||
| const ajv = new Ajv({ | ||||
| 	verbose:         true, | ||||
| 	allErrors:       true, | ||||
| 	allowUnionTypes: true, | ||||
| 	coerceTypes:     true, | ||||
| 	strict:          false, | ||||
| 	schemas:         [commonDefinitions] | ||||
| const ajv = require('ajv')({ | ||||
| 	verbose:     true, //process.env.NODE_ENV === 'development', | ||||
| 	allErrors:   true, | ||||
| 	format:      'full',  // strict regexes for format checks | ||||
| 	coerceTypes: true, | ||||
| 	schemas:     [ | ||||
| 		definitions | ||||
| 	] | ||||
| }); | ||||
|  | ||||
| /** | ||||
| @@ -27,19 +27,23 @@ function validator (schema, payload) { | ||||
| 		} else { | ||||
| 			try { | ||||
| 				let validate = ajv.compile(schema); | ||||
| 				let valid    = validate(payload); | ||||
|  | ||||
| 				let valid = validate(payload); | ||||
| 				if (valid && !validate.errors) { | ||||
| 					resolve(_.cloneDeep(payload)); | ||||
| 				} else { | ||||
| 					let message = ajv.errorsText(validate.errors); | ||||
| 					reject(new error.InternalValidationError(message)); | ||||
| 				} | ||||
|  | ||||
| 			} catch (err) { | ||||
| 				reject(err); | ||||
| 			} | ||||
|  | ||||
| 		} | ||||
|  | ||||
| 	}); | ||||
|  | ||||
| } | ||||
|  | ||||
| module.exports = validator; | ||||
|   | ||||
| @@ -7,7 +7,6 @@ module.exports = { | ||||
| 	access:    new Signale({scope: 'Access   '}), | ||||
| 	nginx:     new Signale({scope: 'Nginx    '}), | ||||
| 	ssl:       new Signale({scope: 'SSL      '}), | ||||
| 	certbot:   new Signale({scope: 'Certbot  '}), | ||||
| 	import:    new Signale({scope: 'Importer '}), | ||||
| 	setup:     new Signale({scope: 'Setup    '}), | ||||
| 	ip_ranges: new Signale({scope: 'IP Ranges'}) | ||||
|   | ||||
| @@ -69,6 +69,9 @@ exports.up = function (knex/*, Promise*/) { | ||||
| 				table.json('domain_names').notNull(); | ||||
| 				table.string('forward_ip').notNull(); | ||||
| 				table.integer('forward_port').notNull().unsigned(); | ||||
| 				table.string('root_dir').notNull(); | ||||
| 				table.string('index_file').notNull(); | ||||
| 				table.integer('static').notNull().unsigned().defaultTo(0); | ||||
| 				table.integer('access_list_id').notNull().unsigned().defaultTo(0); | ||||
| 				table.integer('certificate_id').notNull().unsigned().defaultTo(0); | ||||
| 				table.integer('ssl_forced').notNull().unsigned().defaultTo(0); | ||||
|   | ||||
| @@ -1,40 +0,0 @@ | ||||
| const migrate_name = 'stream_domain'; | ||||
| const logger       = require('../logger').migrate; | ||||
|  | ||||
| /** | ||||
| 	* Migrate | ||||
| 	* | ||||
| 	* @see http://knexjs.org/#Schema | ||||
| 	* | ||||
| 	* @param   {Object} knex | ||||
| 	* @param   {Promise} Promise | ||||
| 	* @returns {Promise} | ||||
| 	*/ | ||||
| exports.up = function (knex/*, Promise*/) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||
|  | ||||
| 	return knex.schema.table('stream', (table) => { | ||||
| 		table.renameColumn('forward_ip', 'forwarding_host'); | ||||
| 	}) | ||||
| 		.then(function () { | ||||
| 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||
| 		}); | ||||
| }; | ||||
|  | ||||
| /** | ||||
| 	* Undo Migrate | ||||
| 	* | ||||
| 	* @param   {Object} knex | ||||
| 	* @param   {Promise} Promise | ||||
| 	* @returns {Promise} | ||||
| 	*/ | ||||
| exports.down = function (knex/*, Promise*/) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||
|  | ||||
| 	return knex.schema.table('stream', (table) => { | ||||
| 		table.renameColumn('forwarding_host', 'forward_ip'); | ||||
| 	}) | ||||
| 		.then(function () { | ||||
| 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||
| 		}); | ||||
| }; | ||||
| @@ -1,50 +0,0 @@ | ||||
| const migrate_name  = 'stream_domain'; | ||||
| const logger        = require('../logger').migrate; | ||||
| const internalNginx = require('../internal/nginx'); | ||||
|  | ||||
| async function regenerateDefaultHost(knex) { | ||||
| 	const row = await knex('setting').select('*').where('id', 'default-site').first(); | ||||
|  | ||||
| 	if (!row) { | ||||
| 		return Promise.resolve(); | ||||
| 	} | ||||
|  | ||||
| 	return internalNginx.deleteConfig('default') | ||||
| 		.then(() => { | ||||
| 			return internalNginx.generateConfig('default', row); | ||||
| 		}) | ||||
| 		.then(() => { | ||||
| 			return internalNginx.test(); | ||||
| 		}) | ||||
| 		.then(() => { | ||||
| 			return internalNginx.reload(); | ||||
| 		}); | ||||
| } | ||||
|  | ||||
| /** | ||||
| 	* Migrate | ||||
| 	* | ||||
| 	* @see http://knexjs.org/#Schema | ||||
| 	* | ||||
| 	* @param   {Object} knex | ||||
| 	* @param   {Promise} Promise | ||||
| 	* @returns {Promise} | ||||
| 	*/ | ||||
| exports.up = function (knex) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||
|  | ||||
| 	return regenerateDefaultHost(knex); | ||||
| }; | ||||
|  | ||||
| /** | ||||
| 	* Undo Migrate | ||||
| 	* | ||||
| 	* @param   {Object} knex | ||||
| 	* @param   {Promise} Promise | ||||
| 	* @returns {Promise} | ||||
| 	*/ | ||||
| exports.down = function (knex) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||
|  | ||||
| 	return regenerateDefaultHost(knex); | ||||
| }; | ||||
| @@ -1,38 +0,0 @@ | ||||
| const migrate_name = 'stream_ssl'; | ||||
| const logger       = require('../logger').migrate; | ||||
|  | ||||
| /** | ||||
|  * Migrate | ||||
|  * | ||||
|  * @see http://knexjs.org/#Schema | ||||
|  * | ||||
|  * @param   {Object} knex | ||||
|  * @returns {Promise} | ||||
|  */ | ||||
| exports.up = function (knex) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||
|  | ||||
| 	return knex.schema.table('stream', (table) => { | ||||
| 		table.integer('certificate_id').notNull().unsigned().defaultTo(0); | ||||
| 	}) | ||||
| 		.then(function () { | ||||
| 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||
| 		}); | ||||
| }; | ||||
|  | ||||
| /** | ||||
|  * Undo Migrate | ||||
|  * | ||||
|  * @param   {Object} knex | ||||
|  * @returns {Promise} | ||||
|  */ | ||||
| exports.down = function (knex) { | ||||
| 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||
|  | ||||
| 	return knex.schema.table('stream', (table) => { | ||||
| 		table.dropColumn('certificate_id'); | ||||
| 	}) | ||||
| 		.then(function () { | ||||
| 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||
| 		}); | ||||
| }; | ||||
| @@ -2,7 +2,6 @@ | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db               = require('../db'); | ||||
| const helpers          = require('../lib/helpers'); | ||||
| const Model            = require('objection').Model; | ||||
| const User             = require('./user'); | ||||
| const AccessListAuth   = require('./access_list_auth'); | ||||
| @@ -11,12 +10,6 @@ const now              = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'satisfy_any', | ||||
| 	'pass_auth', | ||||
| ]; | ||||
|  | ||||
| class AccessList extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -32,16 +25,6 @@ class AccessList extends Model { | ||||
| 		this.modified_on = now(); | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'AccessList'; | ||||
| 	} | ||||
| @@ -67,6 +50,7 @@ class AccessList extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			}, | ||||
| 			items: { | ||||
| @@ -75,6 +59,9 @@ class AccessList extends Model { | ||||
| 				join:       { | ||||
| 					from: 'access_list.id', | ||||
| 					to:   'access_list_auth.access_list_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']); | ||||
| 				} | ||||
| 			}, | ||||
| 			clients: { | ||||
| @@ -83,6 +70,9 @@ class AccessList extends Model { | ||||
| 				join:       { | ||||
| 					from: 'access_list.id', | ||||
| 					to:   'access_list_client.access_list_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']); | ||||
| 				} | ||||
| 			}, | ||||
| 			proxy_hosts: { | ||||
| @@ -94,10 +84,19 @@ class AccessList extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('proxy_host.is_deleted', 0); | ||||
| 					qb.omit(['is_deleted', 'meta']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
| 	} | ||||
|  | ||||
| 	get satisfy() { | ||||
| 		return this.satisfy_any ? 'satisfy any' : 'satisfy all'; | ||||
| 	} | ||||
|  | ||||
| 	get passauth() { | ||||
| 		return this.pass_auth ? '' : 'proxy_set_header Authorization "";'; | ||||
| 	} | ||||
| } | ||||
|  | ||||
| module.exports = AccessList; | ||||
|   | ||||
| @@ -45,6 +45,7 @@ class AccessListAuth extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('access_list.is_deleted', 0); | ||||
| 					qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -45,10 +45,15 @@ class AccessListClient extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('access_list.is_deleted', 0); | ||||
| 					qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
| 	} | ||||
|  | ||||
| 	get rule() { | ||||
| 		return `${this.directive} ${this.address}`; | ||||
| 	} | ||||
| } | ||||
|  | ||||
| module.exports = AccessListClient; | ||||
|   | ||||
| @@ -43,6 +43,9 @@ class AuditLog extends Model { | ||||
| 				join:       { | ||||
| 					from: 'audit_log.user_id', | ||||
| 					to:   'user.id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'roles']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -1,19 +1,14 @@ | ||||
| // Objection Docs: | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const bcrypt  = require('bcrypt'); | ||||
| const db      = require('../db'); | ||||
| const helpers = require('../lib/helpers'); | ||||
| const Model   = require('objection').Model; | ||||
| const User    = require('./user'); | ||||
| const now     = require('./now_helper'); | ||||
| const bcrypt = require('bcrypt'); | ||||
| const db     = require('../db'); | ||||
| const Model  = require('objection').Model; | ||||
| const User   = require('./user'); | ||||
| const now    = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| ]; | ||||
|  | ||||
| function encryptPassword () { | ||||
| 	/* jshint -W040 */ | ||||
| 	let _this = this; | ||||
| @@ -46,16 +41,6 @@ class Auth extends Model { | ||||
| 		return encryptPassword.apply(this, queryContext); | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	/** | ||||
| 	 * Verify a plain password against the encrypted password | ||||
| 	 * | ||||
| @@ -89,6 +74,9 @@ class Auth extends Model { | ||||
| 				}, | ||||
| 				filter: { | ||||
| 					is_deleted: 0 | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.omit(['is_deleted']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -1,17 +1,13 @@ | ||||
| // Objection Docs: | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db      = require('../db'); | ||||
| const helpers = require('../lib/helpers'); | ||||
| const Model   = require('objection').Model; | ||||
| const now     = require('./now_helper'); | ||||
| const db    = require('../db'); | ||||
| const Model = require('objection').Model; | ||||
| const User  = require('./user'); | ||||
| const now   = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| ]; | ||||
|  | ||||
| class Certificate extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -44,16 +40,6 @@ class Certificate extends Model { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'Certificate'; | ||||
| 	} | ||||
| @@ -67,11 +53,6 @@ class Certificate extends Model { | ||||
| 	} | ||||
|  | ||||
| 	static get relationMappings () { | ||||
| 		const ProxyHost       = require('./proxy_host'); | ||||
| 		const DeadHost        = require('./dead_host'); | ||||
| 		const User            = require('./user'); | ||||
| 		const RedirectionHost = require('./redirection_host'); | ||||
|  | ||||
| 		return { | ||||
| 			owner: { | ||||
| 				relation:   Model.HasOneRelation, | ||||
| @@ -82,39 +63,7 @@ class Certificate extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 				} | ||||
| 			}, | ||||
| 			proxy_hosts: { | ||||
| 				relation:   Model.HasManyRelation, | ||||
| 				modelClass: ProxyHost, | ||||
| 				join:       { | ||||
| 					from: 'certificate.id', | ||||
| 					to:   'proxy_host.certificate_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('proxy_host.is_deleted', 0); | ||||
| 				} | ||||
| 			}, | ||||
| 			dead_hosts: { | ||||
| 				relation:   Model.HasManyRelation, | ||||
| 				modelClass: DeadHost, | ||||
| 				join:       { | ||||
| 					from: 'certificate.id', | ||||
| 					to:   'dead_host.certificate_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('dead_host.is_deleted', 0); | ||||
| 				} | ||||
| 			}, | ||||
| 			redirection_hosts: { | ||||
| 				relation:   Model.HasManyRelation, | ||||
| 				modelClass: RedirectionHost, | ||||
| 				join:       { | ||||
| 					from: 'certificate.id', | ||||
| 					to:   'redirection_host.certificate_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('redirection_host.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -2,7 +2,6 @@ | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db          = require('../db'); | ||||
| const helpers     = require('../lib/helpers'); | ||||
| const Model       = require('objection').Model; | ||||
| const User        = require('./user'); | ||||
| const Certificate = require('./certificate'); | ||||
| @@ -10,15 +9,6 @@ const now         = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'ssl_forced', | ||||
| 	'http2_support', | ||||
| 	'enabled', | ||||
| 	'hsts_enabled', | ||||
| 	'hsts_subdomains', | ||||
| ]; | ||||
|  | ||||
| class DeadHost extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -46,16 +36,6 @@ class DeadHost extends Model { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'DeadHost'; | ||||
| 	} | ||||
| @@ -79,6 +59,7 @@ class DeadHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			}, | ||||
| 			certificate: { | ||||
| @@ -90,6 +71,7 @@ class DeadHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('certificate.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -1,13 +1,13 @@ | ||||
| const db     = require('../db'); | ||||
| const config = require('../lib/config'); | ||||
| const config = require('config'); | ||||
| const Model  = require('objection').Model; | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| module.exports = function () { | ||||
| 	if (config.isSqlite()) { | ||||
| 		// eslint-disable-next-line | ||||
| 		return Model.raw("datetime('now','localtime')"); | ||||
| 	if (config.database.knex && config.database.knex.client === 'sqlite3') { | ||||
| 		return Model.raw('datetime(\'now\',\'localtime\')'); | ||||
| 	} else { | ||||
| 		return Model.raw('NOW()'); | ||||
| 	} | ||||
| 	return Model.raw('NOW()'); | ||||
| }; | ||||
|   | ||||
| @@ -2,7 +2,6 @@ | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db          = require('../db'); | ||||
| const helpers     = require('../lib/helpers'); | ||||
| const Model       = require('objection').Model; | ||||
| const User        = require('./user'); | ||||
| const AccessList  = require('./access_list'); | ||||
| @@ -11,18 +10,6 @@ const now         = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'ssl_forced', | ||||
| 	'caching_enabled', | ||||
| 	'block_exploits', | ||||
| 	'allow_websocket_upgrade', | ||||
| 	'http2_support', | ||||
| 	'enabled', | ||||
| 	'hsts_enabled', | ||||
| 	'hsts_subdomains', | ||||
| ]; | ||||
|  | ||||
| class ProxyHost extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -50,16 +37,6 @@ class ProxyHost extends Model { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'ProxyHost'; | ||||
| 	} | ||||
| @@ -83,6 +60,7 @@ class ProxyHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			}, | ||||
| 			access_list: { | ||||
| @@ -94,6 +72,7 @@ class ProxyHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('access_list.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); | ||||
| 				} | ||||
| 			}, | ||||
| 			certificate: { | ||||
| @@ -105,6 +84,7 @@ class ProxyHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('certificate.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -1,9 +1,7 @@ | ||||
|  | ||||
| // Objection Docs: | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db          = require('../db'); | ||||
| const helpers     = require('../lib/helpers'); | ||||
| const Model       = require('objection').Model; | ||||
| const User        = require('./user'); | ||||
| const Certificate = require('./certificate'); | ||||
| @@ -11,17 +9,6 @@ const now         = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'enabled', | ||||
| 	'preserve_path', | ||||
| 	'ssl_forced', | ||||
| 	'block_exploits', | ||||
| 	'hsts_enabled', | ||||
| 	'hsts_subdomains', | ||||
| 	'http2_support', | ||||
| ]; | ||||
|  | ||||
| class RedirectionHost extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -49,16 +36,6 @@ class RedirectionHost extends Model { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'RedirectionHost'; | ||||
| 	} | ||||
| @@ -82,6 +59,7 @@ class RedirectionHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			}, | ||||
| 			certificate: { | ||||
| @@ -93,6 +71,7 @@ class RedirectionHost extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('certificate.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -1,19 +1,13 @@ | ||||
| const Model       = require('objection').Model; | ||||
| const db          = require('../db'); | ||||
| const helpers     = require('../lib/helpers'); | ||||
| const User        = require('./user'); | ||||
| const Certificate = require('./certificate'); | ||||
| const now         = require('./now_helper'); | ||||
| // Objection Docs: | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db    = require('../db'); | ||||
| const Model = require('objection').Model; | ||||
| const User  = require('./user'); | ||||
| const now   = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'enabled', | ||||
| 	'tcp_forwarding', | ||||
| 	'udp_forwarding', | ||||
| ]; | ||||
|  | ||||
| class Stream extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -29,16 +23,6 @@ class Stream extends Model { | ||||
| 		this.modified_on = now(); | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'Stream'; | ||||
| 	} | ||||
| @@ -62,17 +46,7 @@ class Stream extends Model { | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('user.is_deleted', 0); | ||||
| 				} | ||||
| 			}, | ||||
| 			certificate: { | ||||
| 				relation:   Model.HasOneRelation, | ||||
| 				modelClass: Certificate, | ||||
| 				join:       { | ||||
| 					from: 'stream.certificate_id', | ||||
| 					to:   'certificate.id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.where('certificate.is_deleted', 0); | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -6,36 +6,44 @@ | ||||
| const _      = require('lodash'); | ||||
| const jwt    = require('jsonwebtoken'); | ||||
| const crypto = require('crypto'); | ||||
| const config = require('../lib/config'); | ||||
| const error  = require('../lib/error'); | ||||
| const logger = require('../logger').global; | ||||
| const ALGO   = 'RS256'; | ||||
|  | ||||
| let public_key  = null; | ||||
| let private_key = null; | ||||
|  | ||||
| function checkJWTKeyPair() { | ||||
| 	if (!public_key || !private_key) { | ||||
| 		let config  = require('config'); | ||||
| 		public_key  = config.get('jwt.pub'); | ||||
| 		private_key = config.get('jwt.key'); | ||||
| 	} | ||||
| } | ||||
|  | ||||
| module.exports = function () { | ||||
|  | ||||
| 	let token_data = {}; | ||||
|  | ||||
| 	const self = { | ||||
| 	let self = { | ||||
| 		/** | ||||
| 		 * @param {Object}  payload | ||||
| 		 * @returns {Promise} | ||||
| 		 */ | ||||
| 		create: (payload) => { | ||||
| 			if (!config.getPrivateKey()) { | ||||
| 				logger.error('Private key is empty!'); | ||||
| 			} | ||||
| 			// sign with RSA SHA256 | ||||
| 			const options = { | ||||
| 			let options = { | ||||
| 				algorithm: ALGO, | ||||
| 				expiresIn: payload.expiresIn || '1d' | ||||
| 			}; | ||||
|  | ||||
| 			payload.jti = crypto.randomBytes(12) | ||||
| 				.toString('base64') | ||||
| 				.substring(-8); | ||||
| 				.substr(-8); | ||||
|  | ||||
| 			checkJWTKeyPair(); | ||||
|  | ||||
| 			return new Promise((resolve, reject) => { | ||||
| 				jwt.sign(payload, config.getPrivateKey(), options, (err, token) => { | ||||
| 				jwt.sign(payload, private_key, options, (err, token) => { | ||||
| 					if (err) { | ||||
| 						reject(err); | ||||
| 					} else { | ||||
| @@ -54,15 +62,13 @@ module.exports = function () { | ||||
| 		 * @returns {Promise} | ||||
| 		 */ | ||||
| 		load: function (token) { | ||||
| 			if (!config.getPublicKey()) { | ||||
| 				logger.error('Public key is empty!'); | ||||
| 			} | ||||
| 			return new Promise((resolve, reject) => { | ||||
| 				checkJWTKeyPair(); | ||||
| 				try { | ||||
| 					if (!token || token === null || token === 'null') { | ||||
| 						reject(new error.AuthError('Empty token')); | ||||
| 					} else { | ||||
| 						jwt.verify(token, config.getPublicKey(), {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | ||||
| 						jwt.verify(token, public_key, {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | ||||
| 							if (err) { | ||||
|  | ||||
| 								if (err.name === 'TokenExpiredError') { | ||||
| @@ -77,6 +83,8 @@ module.exports = function () { | ||||
| 								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'. | ||||
| 								// For 30 days at least, we need to replace 'all' with user. | ||||
| 								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) { | ||||
| 									//console.log('Warning! Replacing "all" scope with "user"'); | ||||
|  | ||||
| 									token_data.scope = ['user']; | ||||
| 								} | ||||
|  | ||||
| @@ -126,7 +134,7 @@ module.exports = function () { | ||||
| 		 * @returns {Integer} | ||||
| 		 */ | ||||
| 		getUserId: (default_value) => { | ||||
| 			const attrs = self.get('attrs'); | ||||
| 			let attrs = self.get('attrs'); | ||||
| 			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) { | ||||
| 				return attrs.id; | ||||
| 			} | ||||
|   | ||||
| @@ -2,18 +2,12 @@ | ||||
| // http://vincit.github.io/objection.js/ | ||||
|  | ||||
| const db             = require('../db'); | ||||
| const helpers        = require('../lib/helpers'); | ||||
| const Model          = require('objection').Model; | ||||
| const UserPermission = require('./user_permission'); | ||||
| const now            = require('./now_helper'); | ||||
|  | ||||
| Model.knex(db); | ||||
|  | ||||
| const boolFields = [ | ||||
| 	'is_deleted', | ||||
| 	'is_disabled', | ||||
| ]; | ||||
|  | ||||
| class User extends Model { | ||||
| 	$beforeInsert () { | ||||
| 		this.created_on  = now(); | ||||
| @@ -29,16 +23,6 @@ class User extends Model { | ||||
| 		this.modified_on = now(); | ||||
| 	} | ||||
|  | ||||
| 	$parseDatabaseJson(json) { | ||||
| 		json = super.$parseDatabaseJson(json); | ||||
| 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||
| 	} | ||||
|  | ||||
| 	$formatDatabaseJson(json) { | ||||
| 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||
| 		return super.$formatDatabaseJson(json); | ||||
| 	} | ||||
|  | ||||
| 	static get name () { | ||||
| 		return 'User'; | ||||
| 	} | ||||
| @@ -59,6 +43,9 @@ class User extends Model { | ||||
| 				join:       { | ||||
| 					from: 'user.id', | ||||
| 					to:   'user_permission.user_id' | ||||
| 				}, | ||||
| 				modify: function (qb) { | ||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'user_id']); | ||||
| 				} | ||||
| 			} | ||||
| 		}; | ||||
|   | ||||
| @@ -2,31 +2,36 @@ | ||||
| 	"name": "nginx-proxy-manager", | ||||
| 	"version": "0.0.0", | ||||
| 	"description": "A beautiful interface for creating Nginx endpoints", | ||||
| 	"main": "index.js", | ||||
| 	"main": "js/index.js", | ||||
| 	"dependencies": { | ||||
| 		"@apidevtools/json-schema-ref-parser": "^11.7.0", | ||||
| 		"ajv": "^8.17.1", | ||||
| 		"archiver": "^5.3.0", | ||||
| 		"ajv": "^6.12.0", | ||||
| 		"batchflow": "^0.4.0", | ||||
| 		"bcrypt": "^5.0.0", | ||||
| 		"body-parser": "^1.20.3", | ||||
| 		"body-parser": "^1.19.0", | ||||
| 		"compression": "^1.7.4", | ||||
| 		"express": "^4.20.0", | ||||
| 		"config": "^3.3.1", | ||||
| 		"diskdb": "^0.1.17", | ||||
| 		"express": "^4.17.1", | ||||
| 		"express-fileupload": "^1.1.9", | ||||
| 		"gravatar": "^1.8.0", | ||||
| 		"jsonwebtoken": "^9.0.0", | ||||
| 		"knex": "2.4.2", | ||||
| 		"liquidjs": "10.6.1", | ||||
| 		"lodash": "^4.17.21", | ||||
| 		"moment": "^2.29.4", | ||||
| 		"mysql2": "^3.11.1", | ||||
| 		"html-entities": "^1.2.1", | ||||
| 		"json-schema-ref-parser": "^8.0.0", | ||||
| 		"jsonwebtoken": "^8.5.1", | ||||
| 		"knex": "^0.20.13", | ||||
| 		"liquidjs": "^9.11.10", | ||||
| 		"lodash": "^4.17.19", | ||||
| 		"moment": "^2.24.0", | ||||
| 		"mysql": "^2.18.1", | ||||
| 		"node-rsa": "^1.0.8", | ||||
| 		"objection": "3.0.1", | ||||
| 		"nodemon": "^2.0.2", | ||||
| 		"objection": "^2.1.3", | ||||
| 		"path": "^0.12.7", | ||||
| 		"pg": "^8.13.1", | ||||
| 		"signale": "1.4.0", | ||||
| 		"sqlite3": "5.1.6", | ||||
| 		"temp-write": "^4.0.0" | ||||
| 		"pg": "^7.12.1", | ||||
| 		"restler": "^3.4.0", | ||||
| 		"signale": "^1.4.0", | ||||
| 		"sqlite3": "^4.1.1", | ||||
| 		"temp-write": "^4.0.0", | ||||
| 		"unix-timestamp": "^0.2.0" | ||||
| 	}, | ||||
| 	"signale": { | ||||
| 		"displayDate": true, | ||||
| @@ -35,14 +40,8 @@ | ||||
| 	"author": "Jamie Curnow <jc@jc21.com>", | ||||
| 	"license": "MIT", | ||||
| 	"devDependencies": { | ||||
| 		"@apidevtools/swagger-parser": "^10.1.0", | ||||
| 		"chalk": "4.1.2", | ||||
| 		"eslint": "^8.36.0", | ||||
| 		"eslint": "^6.8.0", | ||||
| 		"eslint-plugin-align-assignments": "^1.1.2", | ||||
| 		"nodemon": "^2.0.2", | ||||
| 		"prettier": "^2.0.4" | ||||
| 	}, | ||||
| 	"scripts": { | ||||
| 		"validate-schema": "node validate-schema.js" | ||||
| 	} | ||||
| } | ||||
|   | ||||
| @@ -1,7 +1,7 @@ | ||||
| const express          = require('express'); | ||||
| const validator        = require('../lib/validator'); | ||||
| const jwtdecode        = require('../lib/express/jwt-decode'); | ||||
| const internalAuditLog = require('../internal/audit-log'); | ||||
| const validator        = require('../../lib/validator'); | ||||
| const jwtdecode        = require('../../lib/express/jwt-decode'); | ||||
| const internalAuditLog = require('../../internal/audit-log'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -14,7 +14,7 @@ let router = express.Router({ | ||||
|  */ | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -29,10 +29,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -1,6 +1,6 @@ | ||||
| const express = require('express'); | ||||
| const pjson   = require('../package.json'); | ||||
| const error   = require('../lib/error'); | ||||
| const pjson   = require('../../package.json'); | ||||
| const error   = require('../../lib/error'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -43,7 +43,7 @@ router.use('/nginx/certificates', require('./nginx/certificates')); | ||||
|  * | ||||
|  * ALL /api/* | ||||
|  */ | ||||
| router.all(/(.+)/, function (req, _, next) { | ||||
| router.all(/(.+)/, function (req, res, next) { | ||||
| 	req.params.page = req.params['0']; | ||||
| 	next(new error.ItemNotFoundError(req.params.page)); | ||||
| }); | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express            = require('express'); | ||||
| const validator          = require('../../lib/validator'); | ||||
| const jwtdecode          = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator       = require('../../lib/validator/api'); | ||||
| const internalAccessList = require('../../internal/access-list'); | ||||
| const schema             = require('../../schema'); | ||||
| const validator          = require('../../../lib/validator'); | ||||
| const jwtdecode          = require('../../../lib/express/jwt-decode'); | ||||
| const internalAccessList = require('../../../internal/access-list'); | ||||
| const apiValidator       = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -31,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -57,7 +56,7 @@ router | ||||
| 	 * Create a new access-list | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/access-lists', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/access-lists#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalAccessList.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -75,7 +74,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:list_id') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -91,10 +90,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				list_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -120,7 +119,7 @@ router | ||||
| 	 * Update and existing access-list | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/access-lists/{listID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/access-lists#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.list_id, 10); | ||||
| 				return internalAccessList.update(res.locals.access, payload); | ||||
| @@ -1,12 +1,10 @@ | ||||
| const express             = require('express'); | ||||
| const error               = require('../../lib/error'); | ||||
| const validator           = require('../../lib/validator'); | ||||
| const jwtdecode           = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator        = require('../../lib/validator/api'); | ||||
| const internalCertificate = require('../../internal/certificate'); | ||||
| const schema              = require('../../schema'); | ||||
| const validator           = require('../../../lib/validator'); | ||||
| const jwtdecode           = require('../../../lib/express/jwt-decode'); | ||||
| const internalCertificate = require('../../../internal/certificate'); | ||||
| const apiValidator        = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| const router = express.Router({ | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| 	strict:        true, | ||||
| 	mergeParams:   true | ||||
| @@ -17,7 +15,7 @@ const router = express.Router({ | ||||
|  */ | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -32,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -58,7 +56,7 @@ router | ||||
| 	 * Create a new certificate | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/certificates', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/certificates#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				req.setTimeout(900000); // 15 minutes timeout
 | ||||
| 				return internalCertificate.create(res.locals.access, payload); | ||||
| @@ -70,37 +68,6 @@ router | ||||
| 			.catch(next); | ||||
| 	}); | ||||
| 
 | ||||
| /** | ||||
|  * Test HTTP challenge for domains | ||||
|  * | ||||
|  * /api/nginx/certificates/test-http | ||||
|  */ | ||||
| router | ||||
| 	.route('/test-http') | ||||
| 	.options((_, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * GET /api/nginx/certificates/test-http | ||||
| 	 * | ||||
| 	 * Test HTTP challenge for domains | ||||
| 	 */ | ||||
| 	.get((req, res, next) => { | ||||
| 		if (req.query.domains === undefined) { | ||||
| 			next(new error.ValidationError('Domains are required as query parameters')); | ||||
| 			return; | ||||
| 		} | ||||
| 
 | ||||
| 		internalCertificate.testHttpsChallenge(res.locals.access, JSON.parse(req.query.domains)) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 					.send(result); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| 	}); | ||||
| 
 | ||||
| /** | ||||
|  * Specific certificate | ||||
|  * | ||||
| @@ -108,7 +75,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:certificate_id') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -124,10 +91,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				certificate_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -147,6 +114,24 @@ router | ||||
| 			.catch(next); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * PUT /api/nginx/certificates/123 | ||||
| 	 * | ||||
| 	 * Update and existing certificate | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator({$ref: 'endpoints/certificates#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.certificate_id, 10); | ||||
| 				return internalCertificate.update(res.locals.access, payload); | ||||
| 			}) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 					.send(result); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * DELETE /api/nginx/certificates/123 | ||||
| 	 * | ||||
| @@ -168,7 +153,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:certificate_id/upload') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -202,7 +187,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:certificate_id/renew') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -224,34 +209,6 @@ router | ||||
| 			.catch(next); | ||||
| 	}); | ||||
| 
 | ||||
| /** | ||||
|  * Download LE Certs | ||||
|  * | ||||
|  * /api/nginx/certificates/123/download | ||||
|  */ | ||||
| router | ||||
| 	.route('/:certificate_id/download') | ||||
| 	.options((_req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * GET /api/nginx/certificates/123/download | ||||
| 	 * | ||||
| 	 * Renew certificate | ||||
| 	 */ | ||||
| 	.get((req, res, next) => { | ||||
| 		internalCertificate.download(res.locals.access, { | ||||
| 			id: parseInt(req.params.certificate_id, 10) | ||||
| 		}) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 					.download(result.fileName); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| 	}); | ||||
| 
 | ||||
| /** | ||||
|  * Validate Certs before saving | ||||
|  * | ||||
| @@ -259,7 +216,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/validate') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express          = require('express'); | ||||
| const validator        = require('../../lib/validator'); | ||||
| const jwtdecode        = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator     = require('../../lib/validator/api'); | ||||
| const internalDeadHost = require('../../internal/dead-host'); | ||||
| const schema           = require('../../schema'); | ||||
| const validator        = require('../../../lib/validator'); | ||||
| const jwtdecode        = require('../../../lib/express/jwt-decode'); | ||||
| const internalDeadHost = require('../../../internal/dead-host'); | ||||
| const apiValidator     = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -16,7 +15,7 @@ let router = express.Router({ | ||||
|  */ | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -31,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -57,7 +56,7 @@ router | ||||
| 	 * Create a new dead-host | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/dead-hosts', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/dead-hosts#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalDeadHost.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -91,10 +90,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				host_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -120,7 +119,7 @@ router | ||||
| 	 * Update and existing dead-host | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/dead-hosts/{hostID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/dead-hosts#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.host_id, 10); | ||||
| 				return internalDeadHost.update(res.locals.access, payload); | ||||
| @@ -153,7 +152,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/enable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -177,7 +176,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/disable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express           = require('express'); | ||||
| const validator         = require('../../lib/validator'); | ||||
| const jwtdecode         = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator      = require('../../lib/validator/api'); | ||||
| const internalProxyHost = require('../../internal/proxy-host'); | ||||
| const schema            = require('../../schema'); | ||||
| const validator         = require('../../../lib/validator'); | ||||
| const jwtdecode         = require('../../../lib/express/jwt-decode'); | ||||
| const internalProxyHost = require('../../../internal/proxy-host'); | ||||
| const apiValidator      = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -31,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -57,7 +56,7 @@ router | ||||
| 	 * Create a new proxy-host | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/proxy-hosts', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/proxy-hosts#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalProxyHost.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -91,10 +90,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				host_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -120,7 +119,7 @@ router | ||||
| 	 * Update and existing proxy-host | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/proxy-hosts/{hostID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/proxy-hosts#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.host_id, 10); | ||||
| 				return internalProxyHost.update(res.locals.access, payload); | ||||
| @@ -153,7 +152,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/enable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -177,7 +176,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/disable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express                 = require('express'); | ||||
| const validator               = require('../../lib/validator'); | ||||
| const jwtdecode               = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator            = require('../../lib/validator/api'); | ||||
| const internalRedirectionHost = require('../../internal/redirection-host'); | ||||
| const schema                  = require('../../schema'); | ||||
| const validator               = require('../../../lib/validator'); | ||||
| const jwtdecode               = require('../../../lib/express/jwt-decode'); | ||||
| const internalRedirectionHost = require('../../../internal/redirection-host'); | ||||
| const apiValidator            = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -31,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -57,7 +56,7 @@ router | ||||
| 	 * Create a new redirection-host | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/redirection-hosts', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/redirection-hosts#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalRedirectionHost.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -91,10 +90,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				host_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -120,7 +119,7 @@ router | ||||
| 	 * Update and existing redirection-host | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/redirection-hosts/{hostID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/redirection-hosts#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.host_id, 10); | ||||
| 				return internalRedirectionHost.update(res.locals.access, payload); | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express        = require('express'); | ||||
| const validator      = require('../../lib/validator'); | ||||
| const jwtdecode      = require('../../lib/express/jwt-decode'); | ||||
| const apiValidator   = require('../../lib/validator/api'); | ||||
| const internalStream = require('../../internal/stream'); | ||||
| const schema         = require('../../schema'); | ||||
| const validator      = require('../../../lib/validator'); | ||||
| const jwtdecode      = require('../../../lib/express/jwt-decode'); | ||||
| const internalStream = require('../../../internal/stream'); | ||||
| const apiValidator   = require('../../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -31,10 +30,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -57,7 +56,7 @@ router | ||||
| 	 * Create a new stream | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/streams', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/streams#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalStream.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -91,10 +90,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				stream_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -120,7 +119,7 @@ router | ||||
| 	 * Update and existing stream | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/nginx/streams/{streamID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/streams#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = parseInt(req.params.stream_id, 10); | ||||
| 				return internalStream.update(res.locals.access, payload); | ||||
| @@ -153,7 +152,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/enable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -177,7 +176,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:host_id/disable') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -1,6 +1,6 @@ | ||||
| const express        = require('express'); | ||||
| const jwtdecode      = require('../lib/express/jwt-decode'); | ||||
| const internalReport = require('../internal/report'); | ||||
| const jwtdecode      = require('../../lib/express/jwt-decode'); | ||||
| const internalReport = require('../../internal/report'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -10,14 +10,14 @@ let router = express.Router({ | ||||
| 
 | ||||
| router | ||||
| 	.route('/hosts') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * GET /reports/hosts | ||||
| 	 */ | ||||
| 	.get(jwtdecode(), (_, res, next) => { | ||||
| 	.get(jwtdecode(), (req, res, next) => { | ||||
| 		internalReport.getHostsReport(res.locals.access) | ||||
| 			.then((data) => { | ||||
| 				res.status(200) | ||||
| @@ -1,8 +1,8 @@ | ||||
| const express = require('express'); | ||||
| const schema  = require('../schema'); | ||||
| const PACKAGE = require('../package.json'); | ||||
| const express     = require('express'); | ||||
| const swaggerJSON = require('../../doc/api.swagger.json'); | ||||
| const PACKAGE     = require('../../package.json'); | ||||
| 
 | ||||
| const router = express.Router({ | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| 	strict:        true, | ||||
| 	mergeParams:   true | ||||
| @@ -10,16 +10,14 @@ const router = express.Router({ | ||||
| 
 | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| 	 * GET /schema | ||||
| 	 */ | ||||
| 	.get(async (req, res) => { | ||||
| 		let swaggerJSON = await schema.getCompiledSchema(); | ||||
| 
 | ||||
| 	.get((req, res/*, next*/) => { | ||||
| 		let proto = req.protocol; | ||||
| 		if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) { | ||||
| 			proto = req.headers['x-forwarded-proto']; | ||||
| @@ -1,9 +1,8 @@ | ||||
| const express         = require('express'); | ||||
| const validator       = require('../lib/validator'); | ||||
| const jwtdecode       = require('../lib/express/jwt-decode'); | ||||
| const apiValidator    = require('../lib/validator/api'); | ||||
| const internalSetting = require('../internal/setting'); | ||||
| const schema          = require('../schema'); | ||||
| const validator       = require('../../lib/validator'); | ||||
| const jwtdecode       = require('../../lib/express/jwt-decode'); | ||||
| const internalSetting = require('../../internal/setting'); | ||||
| const apiValidator    = require('../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -16,7 +15,7 @@ let router = express.Router({ | ||||
|  */ | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -26,7 +25,7 @@ router | ||||
| 	 * | ||||
| 	 * Retrieve all settings | ||||
| 	 */ | ||||
| 	.get((_, res, next) => { | ||||
| 	.get((req, res, next) => { | ||||
| 		internalSetting.getAll(res.locals.access) | ||||
| 			.then((rows) => { | ||||
| 				res.status(200) | ||||
| @@ -42,7 +41,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:setting_id') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -58,8 +57,7 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				setting_id: { | ||||
| 					type:      'string', | ||||
| 					minLength: 1 | ||||
| 					$ref: 'definitions#/definitions/setting_id' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -83,7 +81,7 @@ router | ||||
| 	 * Update and existing setting | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/settings/{settingID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/settings#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = req.params.setting_id; | ||||
| 				return internalSetting.update(res.locals.access, payload); | ||||
| @@ -1,8 +1,7 @@ | ||||
| const express       = require('express'); | ||||
| const jwtdecode     = require('../lib/express/jwt-decode'); | ||||
| const apiValidator  = require('../lib/validator/api'); | ||||
| const internalToken = require('../internal/token'); | ||||
| const schema        = require('../schema'); | ||||
| const jwtdecode     = require('../../lib/express/jwt-decode'); | ||||
| const internalToken = require('../../internal/token'); | ||||
| const apiValidator  = require('../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -12,7 +11,7 @@ let router = express.Router({ | ||||
| 
 | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 
 | ||||
| @@ -40,9 +39,11 @@ router | ||||
| 	 * | ||||
| 	 * Create a new Token | ||||
| 	 */ | ||||
| 	.post(async (req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/tokens', 'post'), req.body) | ||||
| 			.then(internalToken.getTokenFromEmail) | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator({$ref: 'endpoints/tokens#/links/0/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalToken.getTokenFromEmail(payload); | ||||
| 			}) | ||||
| 			.then((data) => { | ||||
| 				res.status(200) | ||||
| 					.send(data); | ||||
| @@ -1,10 +1,9 @@ | ||||
| const express      = require('express'); | ||||
| const validator    = require('../lib/validator'); | ||||
| const jwtdecode    = require('../lib/express/jwt-decode'); | ||||
| const userIdFromMe = require('../lib/express/user-id-from-me'); | ||||
| const internalUser = require('../internal/user'); | ||||
| const apiValidator = require('../lib/validator/api'); | ||||
| const schema       = require('../schema'); | ||||
| const validator    = require('../../lib/validator'); | ||||
| const jwtdecode    = require('../../lib/express/jwt-decode'); | ||||
| const userIdFromMe = require('../../lib/express/user-id-from-me'); | ||||
| const internalUser = require('../../internal/user'); | ||||
| const apiValidator = require('../../lib/validator/api'); | ||||
| 
 | ||||
| let router = express.Router({ | ||||
| 	caseSensitive: true, | ||||
| @@ -17,7 +16,7 @@ let router = express.Router({ | ||||
|  */ | ||||
| router | ||||
| 	.route('/') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -32,10 +31,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				}, | ||||
| 				query: { | ||||
| 					$ref: 'common#/properties/query' | ||||
| 					$ref: 'definitions#/definitions/query' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -49,11 +48,7 @@ router | ||||
| 				res.status(200) | ||||
| 					.send(users); | ||||
| 			}) | ||||
| 			.catch((err) => { | ||||
| 				console.log(err); | ||||
| 				next(err); | ||||
| 			}); | ||||
| 		//.catch(next);
 | ||||
| 			.catch(next); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| @@ -62,7 +57,7 @@ router | ||||
| 	 * Create a new User | ||||
| 	 */ | ||||
| 	.post((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/users', 'post'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/users#/links/1/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				return internalUser.create(res.locals.access, payload); | ||||
| 			}) | ||||
| @@ -80,7 +75,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:user_id') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -97,10 +92,10 @@ router | ||||
| 			additionalProperties: false, | ||||
| 			properties:           { | ||||
| 				user_id: { | ||||
| 					$ref: 'common#/properties/id' | ||||
| 					$ref: 'definitions#/definitions/id' | ||||
| 				}, | ||||
| 				expand: { | ||||
| 					$ref: 'common#/properties/expand' | ||||
| 					$ref: 'definitions#/definitions/expand' | ||||
| 				} | ||||
| 			} | ||||
| 		}, { | ||||
| @@ -118,10 +113,7 @@ router | ||||
| 				res.status(200) | ||||
| 					.send(user); | ||||
| 			}) | ||||
| 			.catch((err) => { | ||||
| 				console.log(err); | ||||
| 				next(err); | ||||
| 			}); | ||||
| 			.catch(next); | ||||
| 	}) | ||||
| 
 | ||||
| 	/** | ||||
| @@ -130,7 +122,7 @@ router | ||||
| 	 * Update and existing user | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/users/{userID}', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/users#/links/2/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = req.params.user_id; | ||||
| 				return internalUser.update(res.locals.access, payload); | ||||
| @@ -175,13 +167,13 @@ router | ||||
| 	 * Update password for a user | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/users/{userID}/auth', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/users#/links/4/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = req.params.user_id; | ||||
| 				return internalUser.setPassword(res.locals.access, payload); | ||||
| 			}) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 				res.status(201) | ||||
| 					.send(result); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| @@ -206,13 +198,13 @@ router | ||||
| 	 * Set some or all permissions for a user | ||||
| 	 */ | ||||
| 	.put((req, res, next) => { | ||||
| 		apiValidator(schema.getValidationSchema('/users/{userID}/permissions', 'put'), req.body) | ||||
| 		apiValidator({$ref: 'endpoints/users#/links/5/schema'}, req.body) | ||||
| 			.then((payload) => { | ||||
| 				payload.id = req.params.user_id; | ||||
| 				return internalUser.setPermissions(res.locals.access, payload); | ||||
| 			}) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 				res.status(201) | ||||
| 					.send(result); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| @@ -225,7 +217,7 @@ router | ||||
|  */ | ||||
| router | ||||
| 	.route('/:user_id/login') | ||||
| 	.options((_, res) => { | ||||
| 	.options((req, res) => { | ||||
| 		res.sendStatus(204); | ||||
| 	}) | ||||
| 	.all(jwtdecode()) | ||||
| @@ -238,7 +230,7 @@ router | ||||
| 	.post((req, res, next) => { | ||||
| 		internalUser.loginAs(res.locals.access, {id: parseInt(req.params.user_id, 10)}) | ||||
| 			.then((result) => { | ||||
| 				res.status(200) | ||||
| 				res.status(201) | ||||
| 					.send(result); | ||||
| 			}) | ||||
| 			.catch(next); | ||||
| @@ -1,120 +0,0 @@ | ||||
| { | ||||
| 	"$schema": "https://json-schema.org/draft/2020-12/schema", | ||||
| 	"$id": "common", | ||||
| 	"type": "object", | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"description": "Unique identifier", | ||||
| 			"readOnly": true, | ||||
| 			"type": "integer", | ||||
| 			"minimum": 1 | ||||
| 		}, | ||||
| 		"expand": { | ||||
| 			"anyOf": [ | ||||
| 				{ | ||||
| 					"type": "null" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "array", | ||||
| 					"minItems": 1, | ||||
| 					"items": { | ||||
| 						"type": "string" | ||||
| 					} | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"query": { | ||||
| 			"anyOf": [ | ||||
| 				{ | ||||
| 					"type": "null" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"minLength": 1, | ||||
| 					"maxLength": 255 | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"description": "Date and time of creation", | ||||
| 			"readOnly": true, | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"description": "Date and time of last update", | ||||
| 			"readOnly": true, | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"user_id": { | ||||
| 			"description": "User ID", | ||||
| 			"type": "integer", | ||||
| 			"minimum": 1 | ||||
| 		}, | ||||
| 		"certificate_id": { | ||||
| 			"description": "Certificate ID", | ||||
| 			"anyOf": [ | ||||
| 				{ | ||||
| 					"type": "integer", | ||||
| 					"minimum": 0 | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^new$" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"access_list_id": { | ||||
| 			"description": "Access List ID", | ||||
| 			"type": "integer", | ||||
| 			"minimum": 0 | ||||
| 		}, | ||||
| 		"domain_names": { | ||||
| 			"description": "Domain Names separated by a comma", | ||||
| 			"type": "array", | ||||
| 			"minItems": 1, | ||||
| 			"maxItems": 100, | ||||
| 			"uniqueItems": true, | ||||
| 			"items": { | ||||
| 				"type": "string", | ||||
| 				"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$" | ||||
| 			} | ||||
| 		}, | ||||
| 		"enabled": { | ||||
| 			"description": "Is Enabled", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"ssl_forced": { | ||||
| 			"description": "Is SSL Forced", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"hsts_enabled": { | ||||
| 			"description": "Is HSTS Enabled", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"hsts_subdomains": { | ||||
| 			"description": "Is HSTS applicable to all subdomains", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"ssl_provider": { | ||||
| 			"type": "string", | ||||
| 			"pattern": "^(letsencrypt|other)$" | ||||
| 		}, | ||||
| 		"http2_support": { | ||||
| 			"description": "HTTP2 Protocol Support", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"block_exploits": { | ||||
| 			"description": "Should we block common exploits", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"caching_enabled": { | ||||
| 			"description": "Should we cache assets", | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"email": { | ||||
| 			"description": "Email address", | ||||
| 			"type": "string", | ||||
| 			"pattern": "^[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\\.[A-Za-z]{2,}$" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,53 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Access List object", | ||||
| 	"required": ["id", "created_on", "modified_on", "owner_user_id", "name", "directive", "address", "satisfy_any", "pass_auth", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"name": { | ||||
| 			"type": "string", | ||||
| 			"minLength": 1 | ||||
| 		}, | ||||
| 		"directive": { | ||||
| 			"type": "string", | ||||
| 			"enum": ["allow", "deny"] | ||||
| 		}, | ||||
| 		"address": { | ||||
| 			"oneOf": [ | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}(/([0-9]|[1-2][0-9]|3[0-2]))?$" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^all$" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"satisfy_any": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"pass_auth": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,32 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Audit Log object", | ||||
| 	"required": ["id", "created_on", "modified_on", "user_id", "object_type", "object_id", "action", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"object_type": { | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"object_id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"action": { | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "Certificates list", | ||||
| 	"items": { | ||||
| 		"$ref": "./certificate-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,81 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Certificate object", | ||||
| 	"required": ["id", "created_on", "modified_on", "owner_user_id", "provider", "nice_name", "domain_names", "expires_on", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"provider": { | ||||
| 			"$ref": "../common.json#/properties/ssl_provider" | ||||
| 		}, | ||||
| 		"nice_name": { | ||||
| 			"type": "string", | ||||
| 			"description": "Nice Name for the custom certificate" | ||||
| 		}, | ||||
| 		"domain_names": { | ||||
| 			"description": "Domain Names separated by a comma", | ||||
| 			"type": "array", | ||||
| 			"maxItems": 100, | ||||
| 			"uniqueItems": true, | ||||
| 			"items": { | ||||
| 				"type": "string", | ||||
| 				"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$" | ||||
| 			} | ||||
| 		}, | ||||
| 		"expires_on": { | ||||
| 			"description": "Date and time of expiration", | ||||
| 			"readOnly": true, | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"owner": { | ||||
| 			"$ref": "./user-object.json" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object", | ||||
| 			"additionalProperties": false, | ||||
| 			"properties": { | ||||
| 				"certificate": { | ||||
| 					"type": "string", | ||||
| 					"minLength": 1 | ||||
| 				}, | ||||
| 				"certificate_key": { | ||||
| 					"type": "string", | ||||
| 					"minLength": 1 | ||||
| 				}, | ||||
| 				"dns_challenge": { | ||||
| 					"type": "boolean" | ||||
| 				}, | ||||
| 				"dns_provider": { | ||||
| 					"type": "string" | ||||
| 				}, | ||||
| 				"dns_provider_credentials": { | ||||
| 					"type": "string" | ||||
| 				}, | ||||
| 				"letsencrypt_agree": { | ||||
| 					"type": "boolean" | ||||
| 				}, | ||||
| 				"letsencrypt_certificate": { | ||||
| 					"type": "object" | ||||
| 				}, | ||||
| 				"letsencrypt_email": { | ||||
| 					"$ref": "../common.json#/properties/email" | ||||
| 				}, | ||||
| 				"propagation_seconds": { | ||||
| 					"type": "integer", | ||||
| 					"minimum": 0 | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "404 Hosts list", | ||||
| 	"items": { | ||||
| 		"$ref": "./dead-host-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,47 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "404 Host object", | ||||
| 	"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "advanced_config", "enabled", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"domain_names": { | ||||
| 			"$ref": "../common.json#/properties/domain_names" | ||||
| 		}, | ||||
| 		"certificate_id": { | ||||
| 			"$ref": "../common.json#/properties/certificate_id" | ||||
| 		}, | ||||
| 		"ssl_forced": { | ||||
| 			"$ref": "../common.json#/properties/ssl_forced" | ||||
| 		}, | ||||
| 		"hsts_enabled": { | ||||
| 			"$ref": "../common.json#/properties/hsts_enabled" | ||||
| 		}, | ||||
| 		"hsts_subdomains": { | ||||
| 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||
| 		}, | ||||
| 		"http2_support": { | ||||
| 			"$ref": "../common.json#/properties/http2_support" | ||||
| 		}, | ||||
| 		"advanced_config": { | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"enabled": { | ||||
| 			"$ref": "../common.json#/properties/enabled" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,14 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Error object", | ||||
| 	"additionalProperties": false, | ||||
| 	"required": ["code", "message"], | ||||
| 	"properties": { | ||||
| 		"code": { | ||||
| 			"type": "integer" | ||||
| 		}, | ||||
| 		"message": { | ||||
| 			"type": "string" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,9 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Error", | ||||
| 	"properties": { | ||||
| 		"error": { | ||||
| 			"$ref": "./error-object.json" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,38 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Health object", | ||||
| 	"additionalProperties": false, | ||||
| 	"required": ["status", "version"], | ||||
| 	"properties": { | ||||
| 		"status": { | ||||
| 			"type": "string", | ||||
| 			"description": "Healthy", | ||||
| 			"example": "OK" | ||||
| 		}, | ||||
| 		"version": { | ||||
| 			"type": "object", | ||||
| 			"description": "The version object", | ||||
| 			"example": { | ||||
| 				"major": 2, | ||||
| 				"minor": 0, | ||||
| 				"revision": 0 | ||||
| 			}, | ||||
| 			"additionalProperties": false, | ||||
| 			"required": ["major", "minor", "revision"], | ||||
| 			"properties": { | ||||
| 				"major": { | ||||
| 					"type": "integer", | ||||
| 					"minimum": 0 | ||||
| 				}, | ||||
| 				"minor": { | ||||
| 					"type": "integer", | ||||
| 					"minimum": 0 | ||||
| 				}, | ||||
| 				"revision": { | ||||
| 					"type": "integer", | ||||
| 					"minimum": 0 | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,41 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"minProperties": 1, | ||||
| 	"properties": { | ||||
| 		"visibility": { | ||||
| 			"type": "string", | ||||
| 			"description": "Visibility Type", | ||||
| 			"enum": ["all", "user"] | ||||
| 		}, | ||||
| 		"access_lists": { | ||||
| 			"type": "string", | ||||
| 			"description": "Access Lists Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		}, | ||||
| 		"dead_hosts": { | ||||
| 			"type": "string", | ||||
| 			"description": "404 Hosts Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		}, | ||||
| 		"proxy_hosts": { | ||||
| 			"type": "string", | ||||
| 			"description": "Proxy Hosts Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		}, | ||||
| 		"redirection_hosts": { | ||||
| 			"type": "string", | ||||
| 			"description": "Redirection Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		}, | ||||
| 		"streams": { | ||||
| 			"type": "string", | ||||
| 			"description": "Streams Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		}, | ||||
| 		"certificates": { | ||||
| 			"type": "string", | ||||
| 			"description": "Certificates Permissions", | ||||
| 			"enum": ["hidden", "view", "manage"] | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "Proxy Hosts list", | ||||
| 	"items": { | ||||
| 		"$ref": "./proxy-host-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,153 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Proxy Host object", | ||||
| 	"required": [ | ||||
| 		"id", | ||||
| 		"created_on", | ||||
| 		"modified_on", | ||||
| 		"owner_user_id", | ||||
| 		"domain_names", | ||||
| 		"forward_host", | ||||
| 		"forward_port", | ||||
| 		"access_list_id", | ||||
| 		"certificate_id", | ||||
| 		"ssl_forced", | ||||
| 		"caching_enabled", | ||||
| 		"block_exploits", | ||||
| 		"advanced_config", | ||||
| 		"meta", | ||||
| 		"allow_websocket_upgrade", | ||||
| 		"http2_support", | ||||
| 		"forward_scheme", | ||||
| 		"enabled", | ||||
| 		"locations", | ||||
| 		"hsts_enabled", | ||||
| 		"hsts_subdomains" | ||||
| 	], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"domain_names": { | ||||
| 			"$ref": "../common.json#/properties/domain_names" | ||||
| 		}, | ||||
| 		"forward_host": { | ||||
| 			"type": "string", | ||||
| 			"minLength": 1, | ||||
| 			"maxLength": 255 | ||||
| 		}, | ||||
| 		"forward_port": { | ||||
| 			"type": "integer", | ||||
| 			"minimum": 1, | ||||
| 			"maximum": 65535 | ||||
| 		}, | ||||
| 		"access_list_id": { | ||||
| 			"$ref": "../common.json#/properties/access_list_id" | ||||
| 		}, | ||||
| 		"certificate_id": { | ||||
| 			"$ref": "../common.json#/properties/certificate_id" | ||||
| 		}, | ||||
| 		"ssl_forced": { | ||||
| 			"$ref": "../common.json#/properties/ssl_forced" | ||||
| 		}, | ||||
| 		"caching_enabled": { | ||||
| 			"$ref": "../common.json#/properties/caching_enabled" | ||||
| 		}, | ||||
| 		"block_exploits": { | ||||
| 			"$ref": "../common.json#/properties/block_exploits" | ||||
| 		}, | ||||
| 		"advanced_config": { | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		}, | ||||
| 		"allow_websocket_upgrade": { | ||||
| 			"description": "Allow Websocket Upgrade for all paths", | ||||
| 			"example": true, | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"http2_support": { | ||||
| 			"$ref": "../common.json#/properties/http2_support" | ||||
| 		}, | ||||
| 		"forward_scheme": { | ||||
| 			"type": "string", | ||||
| 			"enum": ["http", "https"] | ||||
| 		}, | ||||
| 		"enabled": { | ||||
| 			"$ref": "../common.json#/properties/enabled" | ||||
| 		}, | ||||
| 		"locations": { | ||||
| 			"type": "array", | ||||
| 			"minItems": 0, | ||||
| 			"items": { | ||||
| 				"type": "object", | ||||
| 				"required": ["forward_scheme", "forward_host", "forward_port", "path"], | ||||
| 				"additionalProperties": false, | ||||
| 				"properties": { | ||||
| 					"id": { | ||||
| 						"type": ["integer", "null"] | ||||
| 					}, | ||||
| 					"path": { | ||||
| 						"type": "string", | ||||
| 						"minLength": 1 | ||||
| 					}, | ||||
| 					"forward_scheme": { | ||||
| 						"$ref": "#/properties/forward_scheme" | ||||
| 					}, | ||||
| 					"forward_host": { | ||||
| 						"$ref": "#/properties/forward_host" | ||||
| 					}, | ||||
| 					"forward_port": { | ||||
| 						"$ref": "#/properties/forward_port" | ||||
| 					}, | ||||
| 					"forward_path": { | ||||
| 						"type": "string" | ||||
| 					}, | ||||
| 					"advanced_config": { | ||||
| 						"type": "string" | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		}, | ||||
| 		"hsts_enabled": { | ||||
| 			"$ref": "../common.json#/properties/hsts_enabled" | ||||
| 		}, | ||||
| 		"hsts_subdomains": { | ||||
| 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||
| 		}, | ||||
| 		"certificate": { | ||||
| 			"oneOf": [ | ||||
| 				{ | ||||
| 					"type": "null" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"$ref": "./certificate-object.json" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"owner": { | ||||
| 			"$ref": "./user-object.json" | ||||
| 		}, | ||||
| 		"access_list": { | ||||
| 			"oneOf": [ | ||||
| 				{ | ||||
| 					"type": "null" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"$ref": "./access-list-object.json" | ||||
| 				} | ||||
| 			] | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "Redirection Hosts list", | ||||
| 	"items": { | ||||
| 		"$ref": "./redirection-host-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,72 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Redirection Host object", | ||||
| 	"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "forward_http_code", "forward_scheme", "forward_domain_name", "preserve_path", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "block_exploits", "advanced_config", "enabled", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"domain_names": { | ||||
| 			"$ref": "../common.json#/properties/domain_names" | ||||
| 		}, | ||||
| 		"forward_http_code": { | ||||
| 			"description": "Redirect HTTP Status Code", | ||||
| 			"example": 302, | ||||
| 			"type": "integer", | ||||
| 			"minimum": 300, | ||||
| 			"maximum": 308 | ||||
| 		}, | ||||
| 		"forward_scheme": { | ||||
| 			"type": "string", | ||||
| 			"enum": ["auto", "http", "https"] | ||||
| 		}, | ||||
| 		"forward_domain_name": { | ||||
| 			"description": "Domain Name", | ||||
| 			"example": "jc21.com", | ||||
| 			"type": "string", | ||||
| 			"pattern": "^(?:[^.*]+\\.?)+[^.]$" | ||||
| 		}, | ||||
| 		"preserve_path": { | ||||
| 			"description": "Should the path be preserved", | ||||
| 			"example": true, | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"certificate_id": { | ||||
| 			"$ref": "../common.json#/properties/certificate_id" | ||||
| 		}, | ||||
| 		"ssl_forced": { | ||||
| 			"$ref": "../common.json#/properties/ssl_forced" | ||||
| 		}, | ||||
| 		"hsts_enabled": { | ||||
| 			"$ref": "../common.json#/properties/hsts_enabled" | ||||
| 		}, | ||||
| 		"hsts_subdomains": { | ||||
| 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||
| 		}, | ||||
| 		"http2_support": { | ||||
| 			"$ref": "../common.json#/properties/http2_support" | ||||
| 		}, | ||||
| 		"block_exploits": { | ||||
| 			"$ref": "../common.json#/properties/block_exploits" | ||||
| 		}, | ||||
| 		"advanced_config": { | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"enabled": { | ||||
| 			"$ref": "../common.json#/properties/enabled" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,6 +0,0 @@ | ||||
| { | ||||
| 	"BearerAuth": { | ||||
| 		"type": "http", | ||||
| 		"scheme": "bearer" | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "Setting list", | ||||
| 	"items": { | ||||
| 		"$ref": "./setting-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,56 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Setting object", | ||||
| 	"required": ["id", "name", "description", "value", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"type": "string", | ||||
| 			"description": "Setting ID", | ||||
| 			"minLength": 1, | ||||
| 			"example": "default-site" | ||||
| 		}, | ||||
| 		"name": { | ||||
| 			"type": "string", | ||||
| 			"description": "Setting Display Name", | ||||
| 			"minLength": 1, | ||||
| 			"example": "Default Site" | ||||
| 		}, | ||||
| 		"description": { | ||||
| 			"type": "string", | ||||
| 			"description": "Meaningful description", | ||||
| 			"minLength": 1, | ||||
| 			"example": "What to show when Nginx is hit with an unknown Host" | ||||
| 		}, | ||||
| 		"value": { | ||||
| 			"description": "Value in almost any form", | ||||
| 			"example": "congratulations", | ||||
| 			"anyOf": [ | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"minLength": 1 | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "integer" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "object" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "number" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "array" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"description": "Extra metadata", | ||||
| 			"example": { | ||||
| 				"redirect": "http://example.com", | ||||
| 				"html": "<h1>404</h1>" | ||||
| 			}, | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "Streams list", | ||||
| 	"items": { | ||||
| 		"$ref": "./stream-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,76 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Stream object", | ||||
| 	"required": ["id", "created_on", "modified_on", "owner_user_id", "incoming_port", "forwarding_host", "forwarding_port", "tcp_forwarding", "udp_forwarding", "enabled", "meta"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "../common.json#/properties/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../common.json#/properties/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../common.json#/properties/modified_on" | ||||
| 		}, | ||||
| 		"owner_user_id": { | ||||
| 			"$ref": "../common.json#/properties/user_id" | ||||
| 		}, | ||||
| 		"incoming_port": { | ||||
| 			"type": "integer", | ||||
| 			"minimum": 1, | ||||
| 			"maximum": 65535 | ||||
| 		}, | ||||
| 		"forwarding_host": { | ||||
| 			"anyOf": [ | ||||
| 				{ | ||||
| 					"description": "Domain Name", | ||||
| 					"example": "jc21.com", | ||||
| 					"type": "string", | ||||
| 					"pattern": "^(?:[^.*]+\\.?)+[^.]$" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"format": "ipv4" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"format": "ipv6" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"forwarding_port": { | ||||
| 			"type": "integer", | ||||
| 			"minimum": 1, | ||||
| 			"maximum": 65535 | ||||
| 		}, | ||||
| 		"tcp_forwarding": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"udp_forwarding": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"enabled": { | ||||
| 			"$ref": "../common.json#/properties/enabled" | ||||
| 		}, | ||||
| 		"certificate_id": { | ||||
| 			"$ref": "../common.json#/properties/certificate_id" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		}, | ||||
| 		"owner": { | ||||
| 			"$ref": "./user-object.json" | ||||
| 		}, | ||||
| 		"certificate": { | ||||
| 			"oneOf": [ | ||||
| 				{ | ||||
| 					"type": "null" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"$ref": "./certificate-object.json" | ||||
| 				} | ||||
| 			] | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,18 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "Token object", | ||||
| 	"required": ["expires", "token"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"expires": { | ||||
| 			"description": "Token Expiry ISO Time String", | ||||
| 			"example": "2025-02-04T20:40:46.340Z", | ||||
| 			"type": "string" | ||||
| 		}, | ||||
| 		"token": { | ||||
| 			"description": "JWT Token", | ||||
| 			"example": "eyJhbGciOiJSUzUxMiIsInR5cCI6IkpXVCJ9.ey...xaHKYr3Kk6MvkUjcC4", | ||||
| 			"type": "string" | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @@ -1,7 +0,0 @@ | ||||
| { | ||||
| 	"type": "array", | ||||
| 	"description": "User list", | ||||
| 	"items": { | ||||
| 		"$ref": "./user-object.json" | ||||
| 	} | ||||
| } | ||||
| @@ -1,59 +0,0 @@ | ||||
| { | ||||
| 	"type": "object", | ||||
| 	"description": "User object", | ||||
| 	"required": ["id", "created_on", "modified_on", "is_disabled", "email", "name", "nickname", "avatar", "roles"], | ||||
| 	"additionalProperties": false, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"type": "integer", | ||||
| 			"description": "User ID", | ||||
| 			"minimum": 1, | ||||
| 			"example": 1 | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"type": "string", | ||||
| 			"description": "Created Date", | ||||
| 			"example": "2020-01-30T09:36:08.000Z" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"type": "string", | ||||
| 			"description": "Modified Date", | ||||
| 			"example": "2020-01-30T09:41:04.000Z" | ||||
| 		}, | ||||
| 		"is_disabled": { | ||||
| 			"type": "boolean", | ||||
| 			"description": "Is user Disabled", | ||||
| 			"example": true | ||||
| 		}, | ||||
| 		"email": { | ||||
| 			"type": "string", | ||||
| 			"description": "Email", | ||||
| 			"minLength": 3, | ||||
| 			"example": "jc@jc21.com" | ||||
| 		}, | ||||
| 		"name": { | ||||
| 			"type": "string", | ||||
| 			"description": "Name", | ||||
| 			"minLength": 1, | ||||
| 			"example": "Jamie Curnow" | ||||
| 		}, | ||||
| 		"nickname": { | ||||
| 			"type": "string", | ||||
| 			"description": "Nickname", | ||||
| 			"example": "James" | ||||
| 		}, | ||||
| 		"avatar": { | ||||
| 			"type": "string", | ||||
| 			"description": "Gravatar URL based on email, without scheme", | ||||
| 			"example": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm" | ||||
| 		}, | ||||
| 		"roles": { | ||||
| 			"description": "Roles applied", | ||||
| 			"example": ["admin"], | ||||
| 			"type": "array", | ||||
| 			"items": { | ||||
| 				"type": "string" | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
							
								
								
									
										245
									
								
								backend/schema/definitions.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										245
									
								
								backend/schema/definitions.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,245 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "definitions", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "description": "Unique identifier", | ||||
|       "example": 123456, | ||||
|       "readOnly": true, | ||||
|       "type": "integer", | ||||
|       "minimum": 1 | ||||
|     }, | ||||
|     "setting_id": { | ||||
|       "description": "Unique identifier for a Setting", | ||||
|       "example": "default-site", | ||||
|       "readOnly": true, | ||||
|       "type": "string", | ||||
|       "minLength": 2 | ||||
|     }, | ||||
|     "token": { | ||||
|       "type": "string", | ||||
|       "minLength": 10 | ||||
|     }, | ||||
|     "expand": { | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "null" | ||||
|         }, | ||||
|         { | ||||
|           "type": "array", | ||||
|           "minItems": 1, | ||||
|           "items": { | ||||
|             "type": "string" | ||||
|           } | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "sort": { | ||||
|       "type": "array", | ||||
|       "minItems": 1, | ||||
|       "items": { | ||||
|         "type": "object", | ||||
|         "required": [ | ||||
|           "field", | ||||
|           "dir" | ||||
|         ], | ||||
|         "additionalProperties": false, | ||||
|         "properties": { | ||||
|           "field": { | ||||
|             "type": "string" | ||||
|           }, | ||||
|           "dir": { | ||||
|             "type": "string", | ||||
|             "pattern": "^(asc|desc)$" | ||||
|           } | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     "query": { | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "null" | ||||
|         }, | ||||
|         { | ||||
|           "type": "string", | ||||
|           "minLength": 1, | ||||
|           "maxLength": 255 | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "criteria": { | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "null" | ||||
|         }, | ||||
|         { | ||||
|           "type": "object" | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "fields": { | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "null" | ||||
|         }, | ||||
|         { | ||||
|           "type": "array", | ||||
|           "minItems": 1, | ||||
|           "items": { | ||||
|             "type": "string" | ||||
|           } | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "omit": { | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "null" | ||||
|         }, | ||||
|         { | ||||
|           "type": "array", | ||||
|           "minItems": 1, | ||||
|           "items": { | ||||
|             "type": "string" | ||||
|           } | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "description": "Date and time of creation", | ||||
|       "format": "date-time", | ||||
|       "readOnly": true, | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "description": "Date and time of last update", | ||||
|       "format": "date-time", | ||||
|       "readOnly": true, | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "user_id": { | ||||
|       "description": "User ID", | ||||
|       "example": 1234, | ||||
|       "type": "integer", | ||||
|       "minimum": 1 | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "description": "Certificate ID", | ||||
|       "example": 1234, | ||||
|       "anyOf": [ | ||||
|         { | ||||
|           "type": "integer", | ||||
|           "minimum": 0 | ||||
|         }, | ||||
|         { | ||||
|           "type": "string", | ||||
|           "pattern": "^new$" | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "access_list_id": { | ||||
|       "description": "Access List ID", | ||||
|       "example": 1234, | ||||
|       "type": "integer", | ||||
|       "minimum": 0 | ||||
|     }, | ||||
|     "name": { | ||||
|       "type": "string", | ||||
|       "minLength": 1, | ||||
|       "maxLength": 255 | ||||
|     }, | ||||
|     "email": { | ||||
|       "description": "Email Address", | ||||
|       "example": "john@example.com", | ||||
|       "format": "email", | ||||
|       "type": "string", | ||||
|       "minLength": 8, | ||||
|       "maxLength": 100 | ||||
|     }, | ||||
|     "password": { | ||||
|       "description": "Password", | ||||
|       "type": "string", | ||||
|       "minLength": 8, | ||||
|       "maxLength": 255 | ||||
|     }, | ||||
|     "domain_name": { | ||||
|       "description": "Domain Name", | ||||
|       "example": "jc21.com", | ||||
|       "type": "string", | ||||
|       "pattern": "^(?:[^.*]+\\.?)+[^.]$" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "description": "Domain Names separated by a comma", | ||||
|       "example": "*.jc21.com,blog.jc21.com", | ||||
|       "type": "array", | ||||
|       "maxItems": 15, | ||||
|       "uniqueItems": true, | ||||
|       "items": { | ||||
|         "type": "string", | ||||
|         "pattern": "^(?:\\*\\.)?(?:[^.*]+\\.?)+[^.]$" | ||||
|       } | ||||
|     }, | ||||
|     "http_code": { | ||||
|       "description": "Redirect HTTP Status Code", | ||||
|       "example": 302, | ||||
|       "type": "integer", | ||||
|       "minimum": 300, | ||||
|       "maximum": 308 | ||||
|     }, | ||||
|     "scheme": { | ||||
|       "description": "RFC Protocol", | ||||
|       "example": "HTTPS or $scheme", | ||||
|       "type": "string", | ||||
|       "minLength": 4 | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "description": "Is Enabled", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "ssl_enabled": { | ||||
|       "description": "Is SSL Enabled", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "description": "Is SSL Forced", | ||||
|       "example": false, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "description": "Is HSTS Enabled", | ||||
|       "example": false, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "description": "Is HSTS applicable to all subdomains", | ||||
|       "example": false, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "ssl_provider": { | ||||
|       "type": "string", | ||||
|       "pattern": "^(letsencrypt|other)$" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "description": "HTTP2 Protocol Support", | ||||
|       "example": false, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "block_exploits": { | ||||
|       "description": "Should we block common exploits", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "caching_enabled": { | ||||
|       "description": "Should we cache assets", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "static": { | ||||
|       "description": "Should the proxy point to static files", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     } | ||||
|   } | ||||
| } | ||||
							
								
								
									
										236
									
								
								backend/schema/endpoints/access-lists.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										236
									
								
								backend/schema/endpoints/access-lists.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,236 @@ | ||||
| { | ||||
| 	"$schema": "http://json-schema.org/draft-07/schema#", | ||||
| 	"$id": "endpoints/access-lists", | ||||
| 	"title": "Access Lists", | ||||
| 	"description": "Endpoints relating to Access Lists", | ||||
| 	"stability": "stable", | ||||
| 	"type": "object", | ||||
| 	"definitions": { | ||||
| 		"id": { | ||||
| 			"$ref": "../definitions.json#/definitions/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "../definitions.json#/definitions/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "../definitions.json#/definitions/modified_on" | ||||
| 		}, | ||||
| 		"name": { | ||||
| 			"type": "string", | ||||
| 			"description": "Name of the Access List" | ||||
| 		}, | ||||
| 		"directive": { | ||||
| 			"type": "string", | ||||
| 			"enum": ["allow", "deny"] | ||||
| 		}, | ||||
| 		"address": { | ||||
| 			"oneOf": [ | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}(/([0-9]|[1-2][0-9]|3[0-2]))?$" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$" | ||||
| 				}, | ||||
| 				{ | ||||
| 					"type": "string", | ||||
| 					"pattern": "^all$" | ||||
| 				} | ||||
| 			] | ||||
| 		}, | ||||
| 		"satisfy_any": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"pass_auth": { | ||||
| 			"type": "boolean" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"type": "object" | ||||
| 		} | ||||
| 	}, | ||||
| 	"properties": { | ||||
| 		"id": { | ||||
| 			"$ref": "#/definitions/id" | ||||
| 		}, | ||||
| 		"created_on": { | ||||
| 			"$ref": "#/definitions/created_on" | ||||
| 		}, | ||||
| 		"modified_on": { | ||||
| 			"$ref": "#/definitions/modified_on" | ||||
| 		}, | ||||
| 		"name": { | ||||
| 			"$ref": "#/definitions/name" | ||||
| 		}, | ||||
| 		"meta": { | ||||
| 			"$ref": "#/definitions/meta" | ||||
| 		} | ||||
| 	}, | ||||
| 	"links": [ | ||||
| 		{ | ||||
| 			"title": "List", | ||||
| 			"description": "Returns a list of Access Lists", | ||||
| 			"href": "/nginx/access-lists", | ||||
| 			"access": "private", | ||||
| 			"method": "GET", | ||||
| 			"rel": "self", | ||||
| 			"http_header": { | ||||
| 				"$ref": "../examples.json#/definitions/auth_header" | ||||
| 			}, | ||||
| 			"targetSchema": { | ||||
| 				"type": "array", | ||||
| 				"items": { | ||||
| 					"$ref": "#/properties" | ||||
| 				} | ||||
| 			} | ||||
| 		}, | ||||
| 		{ | ||||
| 			"title": "Create", | ||||
| 			"description": "Creates a new Access List", | ||||
| 			"href": "/nginx/access-list", | ||||
| 			"access": "private", | ||||
| 			"method": "POST", | ||||
| 			"rel": "create", | ||||
| 			"http_header": { | ||||
| 				"$ref": "../examples.json#/definitions/auth_header" | ||||
| 			}, | ||||
| 			"schema": { | ||||
| 				"type": "object", | ||||
| 				"additionalProperties": false, | ||||
| 				"required": ["name"], | ||||
| 				"properties": { | ||||
| 					"name": { | ||||
| 						"$ref": "#/definitions/name" | ||||
| 					}, | ||||
| 					"satisfy_any": { | ||||
| 						"$ref": "#/definitions/satisfy_any" | ||||
| 					}, | ||||
| 					"pass_auth": { | ||||
| 						"$ref": "#/definitions/pass_auth" | ||||
| 					}, | ||||
| 					"items": { | ||||
| 						"type": "array", | ||||
| 						"minItems": 0, | ||||
| 						"items": { | ||||
| 							"type": "object", | ||||
| 							"additionalProperties": false, | ||||
| 							"properties": { | ||||
| 								"username": { | ||||
| 									"type": "string", | ||||
| 									"minLength": 1 | ||||
| 								}, | ||||
| 								"password": { | ||||
| 									"type": "string", | ||||
| 									"minLength": 1 | ||||
| 								} | ||||
| 							} | ||||
| 						} | ||||
| 					}, | ||||
| 					"clients": { | ||||
| 						"type": "array", | ||||
| 						"minItems": 0, | ||||
| 						"items": { | ||||
| 							"type": "object", | ||||
| 							"additionalProperties": false, | ||||
| 							"properties": { | ||||
| 								"address": { | ||||
| 									"$ref": "#/definitions/address" | ||||
| 								}, | ||||
| 								"directive": { | ||||
| 									"$ref": "#/definitions/directive" | ||||
| 								} | ||||
| 							} | ||||
| 						} | ||||
| 					}, | ||||
| 					"meta": { | ||||
| 						"$ref": "#/definitions/meta" | ||||
| 					} | ||||
| 				} | ||||
| 			}, | ||||
| 			"targetSchema": { | ||||
| 				"properties": { | ||||
| 					"$ref": "#/properties" | ||||
| 				} | ||||
| 			} | ||||
| 		}, | ||||
| 		{ | ||||
| 			"title": "Update", | ||||
| 			"description": "Updates a existing Access List", | ||||
| 			"href": "/nginx/access-list/{definitions.identity.example}", | ||||
| 			"access": "private", | ||||
| 			"method": "PUT", | ||||
| 			"rel": "update", | ||||
| 			"http_header": { | ||||
| 				"$ref": "../examples.json#/definitions/auth_header" | ||||
| 			}, | ||||
| 			"schema": { | ||||
| 				"type": "object", | ||||
| 				"additionalProperties": false, | ||||
| 				"properties": { | ||||
| 					"name": { | ||||
| 						"$ref": "#/definitions/name" | ||||
| 					}, | ||||
| 					"satisfy_any": { | ||||
| 						"$ref": "#/definitions/satisfy_any" | ||||
| 					}, | ||||
| 					"pass_auth": { | ||||
| 						"$ref": "#/definitions/pass_auth" | ||||
| 					}, | ||||
| 					"items": { | ||||
| 						"type": "array", | ||||
| 						"minItems": 0, | ||||
| 						"items": { | ||||
| 							"type": "object", | ||||
| 							"additionalProperties": false, | ||||
| 							"properties": { | ||||
| 								"username": { | ||||
| 									"type": "string", | ||||
| 									"minLength": 1 | ||||
| 								}, | ||||
| 								"password": { | ||||
| 									"type": "string", | ||||
| 									"minLength": 0 | ||||
| 								} | ||||
| 							} | ||||
| 						} | ||||
| 					}, | ||||
| 					"clients": { | ||||
| 						"type": "array", | ||||
| 						"minItems": 0, | ||||
| 						"items": { | ||||
| 							"type": "object", | ||||
| 							"additionalProperties": false, | ||||
| 							"properties": { | ||||
| 								"address": { | ||||
| 									"$ref": "#/definitions/address" | ||||
| 								}, | ||||
| 								"directive": { | ||||
| 									"$ref": "#/definitions/directive" | ||||
| 								} | ||||
| 							} | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| 			}, | ||||
| 			"targetSchema": { | ||||
| 				"properties": { | ||||
| 					"$ref": "#/properties" | ||||
| 				} | ||||
| 			} | ||||
| 		}, | ||||
| 		{ | ||||
| 			"title": "Delete", | ||||
| 			"description": "Deletes a existing Access List", | ||||
| 			"href": "/nginx/access-list/{definitions.identity.example}", | ||||
| 			"access": "private", | ||||
| 			"method": "DELETE", | ||||
| 			"rel": "delete", | ||||
| 			"http_header": { | ||||
| 				"$ref": "../examples.json#/definitions/auth_header" | ||||
| 			}, | ||||
| 			"targetSchema": { | ||||
| 				"type": "boolean" | ||||
| 			} | ||||
| 		} | ||||
| 	] | ||||
| } | ||||
							
								
								
									
										162
									
								
								backend/schema/endpoints/certificates.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										162
									
								
								backend/schema/endpoints/certificates.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,162 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "endpoints/certificates", | ||||
|   "title": "Certificates", | ||||
|   "description": "Endpoints relating to Certificates", | ||||
|   "stability": "stable", | ||||
|   "type": "object", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "$ref": "../definitions.json#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "../definitions.json#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "../definitions.json#/definitions/modified_on" | ||||
|     }, | ||||
|     "provider": { | ||||
|       "$ref": "../definitions.json#/definitions/ssl_provider" | ||||
|     }, | ||||
|     "nice_name": { | ||||
|       "type": "string", | ||||
|       "description": "Nice Name for the custom certificate" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "../definitions.json#/definitions/domain_names" | ||||
|     }, | ||||
|     "expires_on": { | ||||
|       "description": "Date and time of expiration", | ||||
|       "format": "date-time", | ||||
|       "readOnly": true, | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "type": "object", | ||||
|       "additionalProperties": false, | ||||
|       "properties": { | ||||
|         "letsencrypt_email": { | ||||
|           "type": "string", | ||||
|           "format": "email" | ||||
|         }, | ||||
|         "letsencrypt_agree": { | ||||
|           "type": "boolean" | ||||
|         }, | ||||
|         "dns_challenge": { | ||||
|           "type": "boolean" | ||||
|         }, | ||||
|         "dns_provider": { | ||||
|           "type": "string" | ||||
|         }, | ||||
|         "dns_provider_credentials": { | ||||
|           "type": "string" | ||||
|         }, | ||||
|         "propagation_seconds": { | ||||
|           "anyOf": [ | ||||
|             {  | ||||
|               "type": "integer", | ||||
|               "minimum": 0  | ||||
|             } | ||||
|           ] | ||||
|            | ||||
|         } | ||||
|       } | ||||
|     } | ||||
|   }, | ||||
|   "properties": { | ||||
|     "id": { | ||||
|       "$ref": "#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "#/definitions/modified_on" | ||||
|     }, | ||||
|     "provider": { | ||||
|       "$ref": "#/definitions/provider" | ||||
|     }, | ||||
|     "nice_name": { | ||||
|       "$ref": "#/definitions/nice_name" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "#/definitions/domain_names" | ||||
|     }, | ||||
|     "expires_on": { | ||||
|       "$ref": "#/definitions/expires_on" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "$ref": "#/definitions/meta" | ||||
|     } | ||||
|   }, | ||||
|   "links": [ | ||||
|     { | ||||
|       "title": "List", | ||||
|       "description": "Returns a list of Certificates", | ||||
|       "href": "/nginx/certificates", | ||||
|       "access": "private", | ||||
|       "method": "GET", | ||||
|       "rel": "self", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "array", | ||||
|         "items": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Create", | ||||
|       "description": "Creates a new Certificate", | ||||
|       "href": "/nginx/certificates", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "create", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "required": [ | ||||
|           "provider" | ||||
|         ], | ||||
|         "properties": { | ||||
|           "provider": { | ||||
|             "$ref": "#/definitions/provider" | ||||
|           }, | ||||
|           "nice_name": { | ||||
|             "$ref": "#/definitions/nice_name" | ||||
|           }, | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Delete", | ||||
|       "description": "Deletes a existing Certificate", | ||||
|       "href": "/nginx/certificates/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "DELETE", | ||||
|       "rel": "delete", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     } | ||||
|   ] | ||||
| } | ||||
							
								
								
									
										240
									
								
								backend/schema/endpoints/dead-hosts.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										240
									
								
								backend/schema/endpoints/dead-hosts.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,240 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "endpoints/dead-hosts", | ||||
|   "title": "404 Hosts", | ||||
|   "description": "Endpoints relating to 404 Hosts", | ||||
|   "stability": "stable", | ||||
|   "type": "object", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "$ref": "../definitions.json#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "../definitions.json#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "../definitions.json#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "../definitions.json#/definitions/domain_names" | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "../definitions.json#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "../definitions.json#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "../definitions.json#/definitions/http2_support" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "type": "object" | ||||
|     } | ||||
|   }, | ||||
|   "properties": { | ||||
|     "id": { | ||||
|       "$ref": "#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "#/definitions/domain_names" | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "#/definitions/http2_support" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "$ref": "#/definitions/advanced_config" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "$ref": "#/definitions/meta" | ||||
|     } | ||||
|   }, | ||||
|   "links": [ | ||||
|     { | ||||
|       "title": "List", | ||||
|       "description": "Returns a list of 404 Hosts", | ||||
|       "href": "/nginx/dead-hosts", | ||||
|       "access": "private", | ||||
|       "method": "GET", | ||||
|       "rel": "self", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "array", | ||||
|         "items": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Create", | ||||
|       "description": "Creates a new 404 Host", | ||||
|       "href": "/nginx/dead-hosts", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "create", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "required": [ | ||||
|           "domain_names" | ||||
|         ], | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Update", | ||||
|       "description": "Updates a existing 404 Host", | ||||
|       "href": "/nginx/dead-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "PUT", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Delete", | ||||
|       "description": "Deletes a existing 404 Host", | ||||
|       "href": "/nginx/dead-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "DELETE", | ||||
|       "rel": "delete", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Enable", | ||||
|       "description": "Enables a existing 404 Host", | ||||
|       "href": "/nginx/dead-hosts/{definitions.identity.example}/enable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Disable", | ||||
|       "description": "Disables a existing 404 Host", | ||||
|       "href": "/nginx/dead-hosts/{definitions.identity.example}/disable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     } | ||||
|   ] | ||||
| } | ||||
							
								
								
									
										429
									
								
								backend/schema/endpoints/proxy-hosts.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										429
									
								
								backend/schema/endpoints/proxy-hosts.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,429 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "endpoints/proxy-hosts", | ||||
|   "title": "Proxy Hosts", | ||||
|   "description": "Endpoints relating to Proxy Hosts", | ||||
|   "stability": "stable", | ||||
|   "type": "object", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "$ref": "../definitions.json#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "../definitions.json#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "../definitions.json#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "../definitions.json#/definitions/domain_names" | ||||
|     }, | ||||
|     "forward_scheme": { | ||||
|       "type": "string", | ||||
|       "enum": ["http", "https"] | ||||
|     }, | ||||
|     "forward_host": { | ||||
|       "type": "string", | ||||
|       "minLength": 0, | ||||
|       "maxLength": 255 | ||||
|     }, | ||||
|     "forward_port": { | ||||
|       "type": "integer", | ||||
|       "minimum": 0, | ||||
|       "maximum": 65535 | ||||
|     }, | ||||
|     "root_dir": { | ||||
|       "type": "string", | ||||
|       "minLength": 0, | ||||
|     }, | ||||
|     "index_file": { | ||||
|       "type": "string", | ||||
|       "minLength": 0, | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "../definitions.json#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "../definitions.json#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "../definitions.json#/definitions/http2_support" | ||||
|     }, | ||||
|     "block_exploits": { | ||||
|       "$ref": "../definitions.json#/definitions/block_exploits" | ||||
|     }, | ||||
|     "caching_enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/caching_enabled" | ||||
|     }, | ||||
|     "static": { | ||||
|       "$ref": "../definitions.json#/definitions/static" | ||||
|     }, | ||||
|     "allow_websocket_upgrade": { | ||||
|       "description": "Allow Websocket Upgrade for all paths", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "access_list_id": { | ||||
|       "$ref": "../definitions.json#/definitions/access_list_id" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "type": "object" | ||||
|     }, | ||||
|     "locations": { | ||||
|       "type": "array", | ||||
|       "minItems": 0, | ||||
|       "items": { | ||||
|         "type": "object", | ||||
|         "required": [ | ||||
|           "forward_scheme" | ||||
|         ], | ||||
|         "additionalProperties": false, | ||||
|         "properties": { | ||||
|           "id": { | ||||
|             "type": ["integer", "null"] | ||||
|           }, | ||||
|           "path": { | ||||
|             "type": "string", | ||||
|             "minLength": 1 | ||||
|           }, | ||||
|           "forward_scheme": { | ||||
|             "$ref": "#/definitions/forward_scheme" | ||||
|           }, | ||||
|           "forward_host": { | ||||
|             "$ref": "#/definitions/forward_host" | ||||
|           }, | ||||
|           "forward_port": { | ||||
|             "$ref": "#/definitions/forward_port" | ||||
|           }, | ||||
|           "root_dir": { | ||||
|             "$ref": "#/definitions/root_dir" | ||||
|           }, | ||||
|           "index_file": { | ||||
|             "$ref": "#/definitions/index_file" | ||||
|           }, | ||||
|           "static": { | ||||
|             "$ref": "#/definitions/static" | ||||
|           }, | ||||
|           "forward_path": { | ||||
|             "type": "string" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "type": "string" | ||||
|           } | ||||
|         } | ||||
|       } | ||||
|     } | ||||
|   }, | ||||
|   "properties": { | ||||
|     "id": { | ||||
|       "$ref": "#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "#/definitions/domain_names" | ||||
|     }, | ||||
|     "forward_scheme": { | ||||
|       "$ref": "#/definitions/forward_scheme" | ||||
|     }, | ||||
|     "forward_host": { | ||||
|       "$ref": "#/definitions/forward_host" | ||||
|     }, | ||||
|     "forward_port": { | ||||
|       "$ref": "#/definitions/forward_port" | ||||
|     }, | ||||
|     "root_dir": { | ||||
|       "$ref": "#/definitions/root_dir" | ||||
|     }, | ||||
|     "index_file": { | ||||
|       "$ref": "#/definitions/index_file" | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "#/definitions/http2_support" | ||||
|     }, | ||||
|     "block_exploits": { | ||||
|       "$ref": "#/definitions/block_exploits" | ||||
|     }, | ||||
|     "caching_enabled": { | ||||
|       "$ref": "#/definitions/caching_enabled" | ||||
|     }, | ||||
|     "static": { | ||||
|       "$ref": "#/definitions/static" | ||||
|     }, | ||||
|     "allow_websocket_upgrade": { | ||||
|       "$ref": "#/definitions/allow_websocket_upgrade" | ||||
|     }, | ||||
|     "access_list_id": { | ||||
|       "$ref": "#/definitions/access_list_id" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "$ref": "#/definitions/advanced_config" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "$ref": "#/definitions/meta" | ||||
|     }, | ||||
|     "locations": { | ||||
|       "$ref": "#/definitions/locations" | ||||
|     } | ||||
|   }, | ||||
|   "links": [ | ||||
|     { | ||||
|       "title": "List", | ||||
|       "description": "Returns a list of Proxy Hosts", | ||||
|       "href": "/nginx/proxy-hosts", | ||||
|       "access": "private", | ||||
|       "method": "GET", | ||||
|       "rel": "self", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "array", | ||||
|         "items": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Create", | ||||
|       "description": "Creates a new Proxy Host", | ||||
|       "href": "/nginx/proxy-hosts", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "create", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "required": [ | ||||
|           "domain_names", | ||||
|           "forward_scheme" | ||||
|         ], | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "forward_scheme": { | ||||
|             "$ref": "#/definitions/forward_scheme" | ||||
|           }, | ||||
|           "forward_host": { | ||||
|             "$ref": "#/definitions/forward_host" | ||||
|           }, | ||||
|           "forward_port": { | ||||
|             "$ref": "#/definitions/forward_port" | ||||
|           }, | ||||
|           "root_dir": { | ||||
|             "$ref": "#/definitions/root_dir" | ||||
|           }, | ||||
|           "index_file": { | ||||
|             "$ref": "#/definitions/index_file" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "block_exploits": { | ||||
|             "$ref": "#/definitions/block_exploits" | ||||
|           }, | ||||
|           "caching_enabled": { | ||||
|             "$ref": "#/definitions/caching_enabled" | ||||
|           }, | ||||
|           "static": { | ||||
|             "$ref": "#/definitions/static" | ||||
|           }, | ||||
|           "allow_websocket_upgrade": { | ||||
|             "$ref": "#/definitions/allow_websocket_upgrade" | ||||
|           }, | ||||
|           "access_list_id": { | ||||
|             "$ref": "#/definitions/access_list_id" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "enabled": { | ||||
|             "$ref": "#/definitions/enabled" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           }, | ||||
|           "locations": { | ||||
|             "$ref": "#/definitions/locations" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Update", | ||||
|       "description": "Updates a existing Proxy Host", | ||||
|       "href": "/nginx/proxy-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "PUT", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "forward_scheme": { | ||||
|             "$ref": "#/definitions/forward_scheme" | ||||
|           }, | ||||
|           "forward_host": { | ||||
|             "$ref": "#/definitions/forward_host" | ||||
|           }, | ||||
|           "forward_port": { | ||||
|             "$ref": "#/definitions/forward_port" | ||||
|           }, | ||||
|           "root_dir": { | ||||
|             "$ref": "#/definitions/root_dir" | ||||
|           }, | ||||
|           "index_file": { | ||||
|             "$ref": "#/definitions/index_file" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "block_exploits": { | ||||
|             "$ref": "#/definitions/block_exploits" | ||||
|           }, | ||||
|           "caching_enabled": { | ||||
|             "$ref": "#/definitions/caching_enabled" | ||||
|           }, | ||||
|           "static": { | ||||
|             "$ref": "#/definitions/static" | ||||
|           }, | ||||
|           "allow_websocket_upgrade": { | ||||
|             "$ref": "#/definitions/allow_websocket_upgrade" | ||||
|           }, | ||||
|           "access_list_id": { | ||||
|             "$ref": "#/definitions/access_list_id" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "enabled": { | ||||
|             "$ref": "#/definitions/enabled" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           }, | ||||
|           "locations": { | ||||
|             "$ref": "#/definitions/locations" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Delete", | ||||
|       "description": "Deletes a existing Proxy Host", | ||||
|       "href": "/nginx/proxy-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "DELETE", | ||||
|       "rel": "delete", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Enable", | ||||
|       "description": "Enables a existing Proxy Host", | ||||
|       "href": "/nginx/proxy-hosts/{definitions.identity.example}/enable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Disable", | ||||
|       "description": "Disables a existing Proxy Host", | ||||
|       "href": "/nginx/proxy-hosts/{definitions.identity.example}/disable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     } | ||||
|   ] | ||||
| } | ||||
							
								
								
									
										305
									
								
								backend/schema/endpoints/redirection-hosts.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										305
									
								
								backend/schema/endpoints/redirection-hosts.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,305 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "endpoints/redirection-hosts", | ||||
|   "title": "Redirection Hosts", | ||||
|   "description": "Endpoints relating to Redirection Hosts", | ||||
|   "stability": "stable", | ||||
|   "type": "object", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "$ref": "../definitions.json#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "../definitions.json#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "../definitions.json#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "../definitions.json#/definitions/domain_names" | ||||
|     }, | ||||
|     "forward_http_code": { | ||||
|       "$ref": "../definitions.json#/definitions/http_code" | ||||
|     }, | ||||
|     "forward_scheme": { | ||||
|       "$ref": "../definitions.json#/definitions/scheme" | ||||
|     }, | ||||
|     "forward_domain_name": { | ||||
|       "$ref": "../definitions.json#/definitions/domain_name" | ||||
|     }, | ||||
|     "preserve_path": { | ||||
|       "description": "Should the path be preserved", | ||||
|       "example": true, | ||||
|       "type": "boolean" | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "../definitions.json#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "../definitions.json#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "../definitions.json#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "../definitions.json#/definitions/http2_support" | ||||
|     }, | ||||
|     "block_exploits": { | ||||
|       "$ref": "../definitions.json#/definitions/block_exploits" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "type": "string" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "../definitions.json#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "type": "object" | ||||
|     } | ||||
|   }, | ||||
|   "properties": { | ||||
|     "id": { | ||||
|       "$ref": "#/definitions/id" | ||||
|     }, | ||||
|     "created_on": { | ||||
|       "$ref": "#/definitions/created_on" | ||||
|     }, | ||||
|     "modified_on": { | ||||
|       "$ref": "#/definitions/modified_on" | ||||
|     }, | ||||
|     "domain_names": { | ||||
|       "$ref": "#/definitions/domain_names" | ||||
|     }, | ||||
|     "forward_http_code": { | ||||
|       "$ref": "#/definitions/forward_http_code" | ||||
|     }, | ||||
|     "forward_scheme": { | ||||
|       "$ref": "#/definitions/forward_scheme" | ||||
|     }, | ||||
|     "forward_domain_name": { | ||||
|       "$ref": "#/definitions/forward_domain_name" | ||||
|     }, | ||||
|     "preserve_path": { | ||||
|       "$ref": "#/definitions/preserve_path" | ||||
|     }, | ||||
|     "certificate_id": { | ||||
|       "$ref": "#/definitions/certificate_id" | ||||
|     }, | ||||
|     "ssl_forced": { | ||||
|       "$ref": "#/definitions/ssl_forced" | ||||
|     }, | ||||
|     "hsts_enabled": { | ||||
|       "$ref": "#/definitions/hsts_enabled" | ||||
|     }, | ||||
|     "hsts_subdomains": { | ||||
|       "$ref": "#/definitions/hsts_subdomains" | ||||
|     }, | ||||
|     "http2_support": { | ||||
|       "$ref": "#/definitions/http2_support" | ||||
|     }, | ||||
|     "block_exploits": { | ||||
|       "$ref": "#/definitions/block_exploits" | ||||
|     }, | ||||
|     "advanced_config": { | ||||
|       "$ref": "#/definitions/advanced_config" | ||||
|     }, | ||||
|     "enabled": { | ||||
|       "$ref": "#/definitions/enabled" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "$ref": "#/definitions/meta" | ||||
|     } | ||||
|   }, | ||||
|   "links": [ | ||||
|     { | ||||
|       "title": "List", | ||||
|       "description": "Returns a list of Redirection Hosts", | ||||
|       "href": "/nginx/redirection-hosts", | ||||
|       "access": "private", | ||||
|       "method": "GET", | ||||
|       "rel": "self", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "array", | ||||
|         "items": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Create", | ||||
|       "description": "Creates a new Redirection Host", | ||||
|       "href": "/nginx/redirection-hosts", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "create", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "required": [ | ||||
|           "domain_names", | ||||
|           "forward_scheme", | ||||
|           "forward_http_code", | ||||
|           "forward_domain_name" | ||||
|         ], | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "forward_http_code": { | ||||
|             "$ref": "#/definitions/forward_http_code" | ||||
|           }, | ||||
|           "forward_scheme": { | ||||
|             "$ref": "#/definitions/forward_scheme" | ||||
|           }, | ||||
|           "forward_domain_name": { | ||||
|             "$ref": "#/definitions/forward_domain_name" | ||||
|           }, | ||||
|           "preserve_path": { | ||||
|             "$ref": "#/definitions/preserve_path" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "block_exploits": { | ||||
|             "$ref": "#/definitions/block_exploits" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Update", | ||||
|       "description": "Updates a existing Redirection Host", | ||||
|       "href": "/nginx/redirection-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "PUT", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "additionalProperties": false, | ||||
|         "properties": { | ||||
|           "domain_names": { | ||||
|             "$ref": "#/definitions/domain_names" | ||||
|           }, | ||||
|           "forward_http_code": { | ||||
|             "$ref": "#/definitions/forward_http_code" | ||||
|           }, | ||||
|           "forward_scheme": { | ||||
|             "$ref": "#/definitions/forward_scheme" | ||||
|           }, | ||||
|           "forward_domain_name": { | ||||
|             "$ref": "#/definitions/forward_domain_name" | ||||
|           }, | ||||
|           "preserve_path": { | ||||
|             "$ref": "#/definitions/preserve_path" | ||||
|           }, | ||||
|           "certificate_id": { | ||||
|             "$ref": "#/definitions/certificate_id" | ||||
|           }, | ||||
|           "ssl_forced": { | ||||
|             "$ref": "#/definitions/ssl_forced" | ||||
|           }, | ||||
|           "hsts_enabled": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "hsts_subdomains": { | ||||
|             "$ref": "#/definitions/hsts_enabled" | ||||
|           }, | ||||
|           "http2_support": { | ||||
|             "$ref": "#/definitions/http2_support" | ||||
|           }, | ||||
|           "block_exploits": { | ||||
|             "$ref": "#/definitions/block_exploits" | ||||
|           }, | ||||
|           "advanced_config": { | ||||
|             "$ref": "#/definitions/advanced_config" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Delete", | ||||
|       "description": "Deletes a existing Redirection Host", | ||||
|       "href": "/nginx/redirection-hosts/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "DELETE", | ||||
|       "rel": "delete", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Enable", | ||||
|       "description": "Enables a existing Redirection Host", | ||||
|       "href": "/nginx/redirection-hosts/{definitions.identity.example}/enable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Disable", | ||||
|       "description": "Disables a existing Redirection Host", | ||||
|       "href": "/nginx/redirection-hosts/{definitions.identity.example}/disable", | ||||
|       "access": "private", | ||||
|       "method": "POST", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "boolean" | ||||
|       } | ||||
|     } | ||||
|   ] | ||||
| } | ||||
							
								
								
									
										99
									
								
								backend/schema/endpoints/settings.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										99
									
								
								backend/schema/endpoints/settings.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,99 @@ | ||||
| { | ||||
|   "$schema": "http://json-schema.org/draft-07/schema#", | ||||
|   "$id": "endpoints/settings", | ||||
|   "title": "Settings", | ||||
|   "description": "Endpoints relating to Settings", | ||||
|   "stability": "stable", | ||||
|   "type": "object", | ||||
|   "definitions": { | ||||
|     "id": { | ||||
|       "$ref": "../definitions.json#/definitions/setting_id" | ||||
|     }, | ||||
|     "name": { | ||||
|       "description": "Name", | ||||
|       "example": "Default Site", | ||||
|       "type": "string", | ||||
|       "minLength": 2, | ||||
|       "maxLength": 100 | ||||
|     }, | ||||
|     "description": { | ||||
|       "description": "Description", | ||||
|       "example": "Default Site", | ||||
|       "type": "string", | ||||
|       "minLength": 2, | ||||
|       "maxLength": 255 | ||||
|     }, | ||||
|     "value": { | ||||
|       "description": "Value", | ||||
|       "example": "404", | ||||
|       "type": "string", | ||||
|       "maxLength": 255 | ||||
|     }, | ||||
|     "meta": { | ||||
|       "type": "object" | ||||
|     } | ||||
|   }, | ||||
|   "links": [ | ||||
|     { | ||||
|       "title": "List", | ||||
|       "description": "Returns a list of Settings", | ||||
|       "href": "/settings", | ||||
|       "access": "private", | ||||
|       "method": "GET", | ||||
|       "rel": "self", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "type": "array", | ||||
|         "items": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     }, | ||||
|     { | ||||
|       "title": "Update", | ||||
|       "description": "Updates a existing Setting", | ||||
|       "href": "/settings/{definitions.identity.example}", | ||||
|       "access": "private", | ||||
|       "method": "PUT", | ||||
|       "rel": "update", | ||||
|       "http_header": { | ||||
|         "$ref": "../examples.json#/definitions/auth_header" | ||||
|       }, | ||||
|       "schema": { | ||||
|         "type": "object", | ||||
|         "properties": { | ||||
|           "value": { | ||||
|             "$ref": "#/definitions/value" | ||||
|           }, | ||||
|           "meta": { | ||||
|             "$ref": "#/definitions/meta" | ||||
|           } | ||||
|         } | ||||
|       }, | ||||
|       "targetSchema": { | ||||
|         "properties": { | ||||
|           "$ref": "#/properties" | ||||
|         } | ||||
|       } | ||||
|     } | ||||
|   ], | ||||
|   "properties": { | ||||
|     "id": { | ||||
|       "$ref": "#/definitions/id" | ||||
|     }, | ||||
|     "name": { | ||||
|       "$ref": "#/definitions/description" | ||||
|     }, | ||||
|     "description": { | ||||
|       "$ref": "#/definitions/description" | ||||
|     }, | ||||
|     "value": { | ||||
|       "$ref": "#/definitions/value" | ||||
|     }, | ||||
|     "meta": { | ||||
|       "$ref": "#/definitions/meta" | ||||
|     } | ||||
|   } | ||||
| } | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user