mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2025-04-27 09:32:29 +00:00
Compare commits
No commits in common. "develop" and "v2.9.11" have entirely different histories.
21
.github/workflows/stale.yml
vendored
21
.github/workflows/stale.yml
vendored
@ -1,21 +0,0 @@
|
|||||||
name: 'Close stale issues and PRs'
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
- cron: '30 1 * * *'
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
stale:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/stale@v9
|
|
||||||
with:
|
|
||||||
stale-issue-label: 'stale'
|
|
||||||
stale-pr-label: 'stale'
|
|
||||||
stale-issue-message: 'Issue is now considered stale. If you want to keep it open, please comment :+1:'
|
|
||||||
stale-pr-message: 'PR is now considered stale. If you want to keep it open, please comment :+1:'
|
|
||||||
close-issue-message: 'Issue was closed due to inactivity.'
|
|
||||||
close-pr-message: 'PR was closed due to inactivity.'
|
|
||||||
days-before-stale: 182
|
|
||||||
days-before-close: 365
|
|
||||||
operations-per-run: 50
|
|
4
.gitignore
vendored
4
.gitignore
vendored
@ -3,7 +3,3 @@
|
|||||||
._*
|
._*
|
||||||
.vscode
|
.vscode
|
||||||
certbot-help.txt
|
certbot-help.txt
|
||||||
test/node_modules
|
|
||||||
*/node_modules
|
|
||||||
docker/dev/dnsrouter-config.json.tmp
|
|
||||||
docker/dev/resolv.conf
|
|
||||||
|
342
Jenkinsfile
vendored
342
Jenkinsfile
vendored
@ -1,9 +1,3 @@
|
|||||||
import groovy.transform.Field
|
|
||||||
|
|
||||||
@Field
|
|
||||||
def shOutput = ""
|
|
||||||
def buildxPushTags = ""
|
|
||||||
|
|
||||||
pipeline {
|
pipeline {
|
||||||
agent {
|
agent {
|
||||||
label 'docker-multiarch'
|
label 'docker-multiarch'
|
||||||
@ -14,12 +8,14 @@ pipeline {
|
|||||||
ansiColor('xterm')
|
ansiColor('xterm')
|
||||||
}
|
}
|
||||||
environment {
|
environment {
|
||||||
IMAGE = 'nginx-proxy-manager'
|
IMAGE = "nginx-proxy-manager"
|
||||||
BUILD_VERSION = getVersion()
|
BUILD_VERSION = getVersion()
|
||||||
MAJOR_VERSION = '2'
|
MAJOR_VERSION = "2"
|
||||||
BRANCH_LOWER = "${BRANCH_NAME.toLowerCase().replaceAll('\\\\', '-').replaceAll('/', '-').replaceAll('\\.', '-')}"
|
BRANCH_LOWER = "${BRANCH_NAME.toLowerCase().replaceAll('/', '-')}"
|
||||||
BUILDX_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}"
|
COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}"
|
||||||
|
COMPOSE_FILE = 'docker/docker-compose.ci.yml'
|
||||||
COMPOSE_INTERACTIVE_NO_CLI = 1
|
COMPOSE_INTERACTIVE_NO_CLI = 1
|
||||||
|
BUILDX_NAME = "${COMPOSE_PROJECT_NAME}"
|
||||||
}
|
}
|
||||||
stages {
|
stages {
|
||||||
stage('Environment') {
|
stage('Environment') {
|
||||||
@ -30,7 +26,7 @@ pipeline {
|
|||||||
}
|
}
|
||||||
steps {
|
steps {
|
||||||
script {
|
script {
|
||||||
buildxPushTags = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest"
|
env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -43,7 +39,7 @@ pipeline {
|
|||||||
steps {
|
steps {
|
||||||
script {
|
script {
|
||||||
// Defaults to the Branch name, which is applies to all branches AND pr's
|
// Defaults to the Branch name, which is applies to all branches AND pr's
|
||||||
buildxPushTags = "-t docker.io/nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}"
|
env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -56,155 +52,109 @@ pipeline {
|
|||||||
sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md'
|
sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('Docker Login') {
|
|
||||||
steps {
|
|
||||||
withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) {
|
|
||||||
sh 'docker login -u "${duser}" -p "${dpass}"'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('Builds') {
|
stage('Frontend') {
|
||||||
parallel {
|
|
||||||
stage('Project') {
|
|
||||||
steps {
|
|
||||||
script {
|
|
||||||
// Frontend and Backend
|
|
||||||
def shStatusCode = sh(label: 'Checking and Building', returnStatus: true, script: '''
|
|
||||||
set -e
|
|
||||||
./scripts/ci/frontend-build > ${WORKSPACE}/tmp-sh-build 2>&1
|
|
||||||
./scripts/ci/test-and-build > ${WORKSPACE}/tmp-sh-build 2>&1
|
|
||||||
''')
|
|
||||||
shOutput = readFile "${env.WORKSPACE}/tmp-sh-build"
|
|
||||||
if (shStatusCode != 0) {
|
|
||||||
error "${shOutput}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
sh 'rm -f ${WORKSPACE}/tmp-sh-build'
|
|
||||||
}
|
|
||||||
failure {
|
|
||||||
npmGithubPrComment("CI Error:\n\n```\n${shOutput}\n```", true)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('Docs') {
|
|
||||||
steps {
|
|
||||||
dir(path: 'docs') {
|
|
||||||
sh 'yarn install'
|
|
||||||
sh 'yarn build'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('Test Sqlite') {
|
|
||||||
environment {
|
|
||||||
COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_sqlite"
|
|
||||||
COMPOSE_FILE = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.sqlite.yml'
|
|
||||||
}
|
|
||||||
when {
|
|
||||||
not {
|
|
||||||
equals expected: 'UNSTABLE', actual: currentBuild.result
|
|
||||||
}
|
|
||||||
}
|
|
||||||
steps {
|
steps {
|
||||||
sh 'rm -rf ./test/results/junit/*'
|
sh './scripts/frontend-build'
|
||||||
sh './scripts/ci/fulltest-cypress'
|
|
||||||
}
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
// Dumps to analyze later
|
|
||||||
sh 'mkdir -p debug/sqlite'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1'
|
|
||||||
junit 'test/results/junit/*'
|
|
||||||
sh 'docker-compose down --remove-orphans --volumes -t 30 || true'
|
|
||||||
}
|
|
||||||
unstable {
|
|
||||||
dir(path: 'test/results') {
|
|
||||||
archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('Test Mysql') {
|
stage('Backend') {
|
||||||
environment {
|
|
||||||
COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_mysql"
|
|
||||||
COMPOSE_FILE = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.mysql.yml'
|
|
||||||
}
|
|
||||||
when {
|
|
||||||
not {
|
|
||||||
equals expected: 'UNSTABLE', actual: currentBuild.result
|
|
||||||
}
|
|
||||||
}
|
|
||||||
steps {
|
steps {
|
||||||
sh 'rm -rf ./test/results/junit/*'
|
echo 'Checking Syntax ...'
|
||||||
sh './scripts/ci/fulltest-cypress'
|
// See: https://github.com/yarnpkg/yarn/issues/3254
|
||||||
}
|
sh '''docker run --rm \\
|
||||||
post {
|
-v "$(pwd)/backend:/app" \\
|
||||||
always {
|
-v "$(pwd)/global:/app/global" \\
|
||||||
// Dumps to analyze later
|
-w /app \\
|
||||||
sh 'mkdir -p debug/mysql'
|
node:latest \\
|
||||||
sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1'
|
sh -c "yarn install && yarn eslint . && rm -rf node_modules"
|
||||||
sh 'docker logs $(docker-compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1'
|
'''
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1'
|
|
||||||
junit 'test/results/junit/*'
|
|
||||||
sh 'docker-compose down --remove-orphans --volumes -t 30 || true'
|
|
||||||
}
|
|
||||||
unstable {
|
|
||||||
dir(path: 'test/results') {
|
|
||||||
archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('Test Postgres') {
|
|
||||||
environment {
|
|
||||||
COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_postgres"
|
|
||||||
COMPOSE_FILE = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.postgres.yml'
|
|
||||||
}
|
|
||||||
when {
|
|
||||||
not {
|
|
||||||
equals expected: 'UNSTABLE', actual: currentBuild.result
|
|
||||||
}
|
|
||||||
}
|
|
||||||
steps {
|
|
||||||
sh 'rm -rf ./test/results/junit/*'
|
|
||||||
sh './scripts/ci/fulltest-cypress'
|
|
||||||
}
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
// Dumps to analyze later
|
|
||||||
sh 'mkdir -p debug/postgres'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/postgres/docker_fullstack.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q stepca) > debug/postgres/docker_stepca.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns) > debug/postgres/docker_pdns.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/postgres/docker_pdns-db.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/postgres/docker_dnsrouter.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q db-postgres) > debug/postgres/docker_db-postgres.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q authentik) > debug/postgres/docker_authentik.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q authentik-redis) > debug/postgres/docker_authentik-redis.log 2>&1'
|
|
||||||
sh 'docker logs $(docker-compose ps --all -q authentik-ldap) > debug/postgres/docker_authentik-ldap.log 2>&1'
|
|
||||||
|
|
||||||
junit 'test/results/junit/*'
|
echo 'Docker Build ...'
|
||||||
sh 'docker-compose down --remove-orphans --volumes -t 30 || true'
|
sh '''docker build --pull --no-cache --squash --compress \\
|
||||||
}
|
-t "${IMAGE}:ci-${BUILD_NUMBER}" \\
|
||||||
unstable {
|
-f docker/Dockerfile \\
|
||||||
|
--build-arg TARGETPLATFORM=linux/amd64 \\
|
||||||
|
--build-arg BUILDPLATFORM=linux/amd64 \\
|
||||||
|
--build-arg BUILD_VERSION="${BUILD_VERSION}" \\
|
||||||
|
--build-arg BUILD_COMMIT="${BUILD_COMMIT}" \\
|
||||||
|
--build-arg BUILD_DATE="$(date '+%Y-%m-%d %T %Z')" \\
|
||||||
|
.
|
||||||
|
'''
|
||||||
|
}
|
||||||
|
}
|
||||||
|
stage('Integration Tests Sqlite') {
|
||||||
|
steps {
|
||||||
|
// Bring up a stack
|
||||||
|
sh 'docker-compose up -d fullstack-sqlite'
|
||||||
|
sh './scripts/wait-healthy $(docker-compose ps -q fullstack-sqlite) 120'
|
||||||
|
|
||||||
|
// Run tests
|
||||||
|
sh 'rm -rf test/results'
|
||||||
|
sh 'docker-compose up cypress-sqlite'
|
||||||
|
// Get results
|
||||||
|
sh 'docker cp -L "$(docker-compose ps -q cypress-sqlite):/test/results" test/'
|
||||||
|
}
|
||||||
|
post {
|
||||||
|
always {
|
||||||
|
// Dumps to analyze later
|
||||||
|
sh 'mkdir -p debug'
|
||||||
|
sh 'docker-compose logs fullstack-sqlite | gzip > debug/docker_fullstack_sqlite.log.gz'
|
||||||
|
sh 'docker-compose logs db | gzip > debug/docker_db.log.gz'
|
||||||
|
// Cypress videos and screenshot artifacts
|
||||||
dir(path: 'test/results') {
|
dir(path: 'test/results') {
|
||||||
archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
|
archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml'
|
||||||
}
|
}
|
||||||
|
junit 'test/results/junit/*'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
stage('Integration Tests Mysql') {
|
||||||
|
steps {
|
||||||
|
// Bring up a stack
|
||||||
|
sh 'docker-compose up -d fullstack-mysql'
|
||||||
|
sh './scripts/wait-healthy $(docker-compose ps -q fullstack-mysql) 120'
|
||||||
|
|
||||||
|
// Run tests
|
||||||
|
sh 'rm -rf test/results'
|
||||||
|
sh 'docker-compose up cypress-mysql'
|
||||||
|
// Get results
|
||||||
|
sh 'docker cp -L "$(docker-compose ps -q cypress-mysql):/test/results" test/'
|
||||||
|
}
|
||||||
|
post {
|
||||||
|
always {
|
||||||
|
// Dumps to analyze later
|
||||||
|
sh 'mkdir -p debug'
|
||||||
|
sh 'docker-compose logs fullstack-mysql | gzip > debug/docker_fullstack_mysql.log.gz'
|
||||||
|
sh 'docker-compose logs db | gzip > debug/docker_db.log.gz'
|
||||||
|
// Cypress videos and screenshot artifacts
|
||||||
|
dir(path: 'test/results') {
|
||||||
|
archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml'
|
||||||
|
}
|
||||||
|
junit 'test/results/junit/*'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
stage('Docs') {
|
||||||
|
when {
|
||||||
|
not {
|
||||||
|
equals expected: 'UNSTABLE', actual: currentBuild.result
|
||||||
|
}
|
||||||
|
}
|
||||||
|
steps {
|
||||||
|
dir(path: 'docs') {
|
||||||
|
sh 'yarn install'
|
||||||
|
sh 'yarn build'
|
||||||
|
}
|
||||||
|
|
||||||
|
dir(path: 'docs/.vuepress/dist') {
|
||||||
|
sh 'tar -czf ../../docs.tgz *'
|
||||||
|
}
|
||||||
|
|
||||||
|
archiveArtifacts(artifacts: 'docs/docs.tgz', allowEmptyArchive: false)
|
||||||
|
}
|
||||||
|
}
|
||||||
stage('MultiArch Build') {
|
stage('MultiArch Build') {
|
||||||
when {
|
when {
|
||||||
not {
|
not {
|
||||||
@ -212,59 +162,81 @@ pipeline {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
steps {
|
steps {
|
||||||
sh "./scripts/buildx --push ${buildxPushTags}"
|
withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) {
|
||||||
|
// Docker Login
|
||||||
|
sh "docker login -u '${duser}' -p '${dpass}'"
|
||||||
|
// Buildx with push from cache
|
||||||
|
sh "./scripts/buildx --push ${BUILDX_PUSH_TAGS}"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('Docs / Comment') {
|
stage('Docs Deploy') {
|
||||||
parallel {
|
when {
|
||||||
stage('Docs Job') {
|
allOf {
|
||||||
when {
|
branch 'master'
|
||||||
allOf {
|
not {
|
||||||
branch pattern: "^(develop|master)\$", comparator: "REGEXP"
|
equals expected: 'UNSTABLE', actual: currentBuild.result
|
||||||
not {
|
|
||||||
equals expected: 'UNSTABLE', actual: currentBuild.result
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
steps {
|
|
||||||
build wait: false, job: 'nginx-proxy-manager-docs', parameters: [string(name: 'docs_branch', value: "$BRANCH_NAME")]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('PR Comment') {
|
}
|
||||||
when {
|
steps {
|
||||||
allOf {
|
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding', accessKeyVariable: 'AWS_ACCESS_KEY_ID', credentialsId: 'npm-s3-docs', secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']]) {
|
||||||
changeRequest()
|
sh """docker run --rm \\
|
||||||
not {
|
--name \${COMPOSE_PROJECT_NAME}-docs-upload \\
|
||||||
equals expected: 'UNSTABLE', actual: currentBuild.result
|
-e S3_BUCKET=jc21-npm-site \\
|
||||||
}
|
-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\
|
||||||
}
|
-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\
|
||||||
}
|
-v \$(pwd):/app \\
|
||||||
steps {
|
-w /app \\
|
||||||
script {
|
jc21/ci-tools \\
|
||||||
npmGithubPrComment("""Docker Image for build ${BUILD_NUMBER} is available on
|
scripts/docs-upload /app/docs/.vuepress/dist/
|
||||||
[DockerHub](https://cloud.docker.com/repository/docker/nginxproxymanager/${IMAGE}-dev)
|
"""
|
||||||
as `nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}`
|
|
||||||
|
|
||||||
**Note:** ensure you backup your NPM instance before testing this image! Especially if there are database changes
|
sh """docker run --rm \\
|
||||||
**Note:** this is a different docker image namespace than the official image
|
--name \${COMPOSE_PROJECT_NAME}-docs-invalidate \\
|
||||||
""", true)
|
-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\
|
||||||
}
|
-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\
|
||||||
|
jc21/ci-tools \\
|
||||||
|
aws cloudfront create-invalidation --distribution-id EN1G6DEWZUTDT --paths '/*'
|
||||||
|
"""
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
stage('PR Comment') {
|
||||||
|
when {
|
||||||
|
allOf {
|
||||||
|
changeRequest()
|
||||||
|
not {
|
||||||
|
equals expected: 'UNSTABLE', actual: currentBuild.result
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
steps {
|
||||||
|
script {
|
||||||
|
def comment = pullRequest.comment("This is an automated message from CI:\n\nDocker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`\n\n**Note:** ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes.")
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
post {
|
post {
|
||||||
always {
|
always {
|
||||||
|
sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30'
|
||||||
sh 'echo Reverting ownership'
|
sh 'echo Reverting ownership'
|
||||||
sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data'
|
sh 'docker run --rm -v $(pwd):/data jc21/ci-tools chown -R $(id -u):$(id -g) /data'
|
||||||
printResult(true)
|
}
|
||||||
|
success {
|
||||||
|
juxtapose event: 'success'
|
||||||
|
sh 'figlet "SUCCESS"'
|
||||||
}
|
}
|
||||||
failure {
|
failure {
|
||||||
archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
|
archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true)
|
||||||
|
juxtapose event: 'failure'
|
||||||
|
sh 'figlet "FAILURE"'
|
||||||
}
|
}
|
||||||
unstable {
|
unstable {
|
||||||
archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
|
archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true)
|
||||||
|
juxtapose event: 'unstable'
|
||||||
|
sh 'figlet "UNSTABLE"'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
451
README.md
451
README.md
@ -1,13 +1,22 @@
|
|||||||
<p align="center">
|
<p align="center">
|
||||||
<img src="https://nginxproxymanager.com/github.png">
|
<img src="https://nginxproxymanager.com/github.png">
|
||||||
<br><br>
|
<br><br>
|
||||||
<img src="https://img.shields.io/badge/version-2.12.3-green.svg?style=for-the-badge">
|
<img src="https://img.shields.io/badge/version-2.9.11-green.svg?style=for-the-badge">
|
||||||
<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
|
<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
|
||||||
<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge">
|
<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge">
|
||||||
</a>
|
</a>
|
||||||
<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
|
<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
|
||||||
<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge">
|
<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge">
|
||||||
</a>
|
</a>
|
||||||
|
<a href="https://ci.nginxproxymanager.com/blue/organizations/jenkins/nginx-proxy-manager/branches/">
|
||||||
|
<img src="https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fci.nginxproxymanager.com%2Fjob%2Fnginx-proxy-manager%2Fjob%2Fmaster&style=for-the-badge">
|
||||||
|
</a>
|
||||||
|
<a href="https://gitter.im/nginx-proxy-manager/community">
|
||||||
|
<img alt="Gitter" src="https://img.shields.io/gitter/room/nginx-proxy-manager/community?style=for-the-badge">
|
||||||
|
</a>
|
||||||
|
<a href="https://reddit.com/r/nginxproxymanager">
|
||||||
|
<img alt="Reddit" src="https://img.shields.io/reddit/subreddit-subscribers/nginxproxymanager?label=Reddit%20Community&style=for-the-badge">
|
||||||
|
</a>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
This project comes as a pre-built docker image that enables you to easily forward to your websites
|
This project comes as a pre-built docker image that enables you to easily forward to your websites
|
||||||
@ -19,7 +28,7 @@ running at home or otherwise, including free SSL, without having to know too muc
|
|||||||
|
|
||||||
## Project Goal
|
## Project Goal
|
||||||
|
|
||||||
I created this project to fill a personal need to provide users with an easy way to accomplish reverse
|
I created this project to fill a personal need to provide users with a easy way to accomplish reverse
|
||||||
proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed.
|
proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed.
|
||||||
While there might be advanced options they are optional and the project should be as simple as possible
|
While there might be advanced options they are optional and the project should be as simple as possible
|
||||||
so that the barrier for entry here is low.
|
so that the barrier for entry here is low.
|
||||||
@ -56,29 +65,40 @@ I won't go in to too much detail here but here are the basics for someone new to
|
|||||||
2. Create a docker-compose.yml file similar to this:
|
2. Create a docker-compose.yml file similar to this:
|
||||||
|
|
||||||
```yml
|
```yml
|
||||||
|
version: '3'
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: 'docker.io/jc21/nginx-proxy-manager:latest'
|
image: 'jc21/nginx-proxy-manager:latest'
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
ports:
|
ports:
|
||||||
- '80:80'
|
- '80:80'
|
||||||
- '81:81'
|
- '81:81'
|
||||||
- '443:443'
|
- '443:443'
|
||||||
|
environment:
|
||||||
|
DB_MYSQL_HOST: "db"
|
||||||
|
DB_MYSQL_PORT: 3306
|
||||||
|
DB_MYSQL_USER: "npm"
|
||||||
|
DB_MYSQL_PASSWORD: "npm"
|
||||||
|
DB_MYSQL_NAME: "npm"
|
||||||
volumes:
|
volumes:
|
||||||
- ./data:/data
|
- ./data:/data
|
||||||
- ./letsencrypt:/etc/letsencrypt
|
- ./letsencrypt:/etc/letsencrypt
|
||||||
|
db:
|
||||||
|
image: 'jc21/mariadb-aria:latest'
|
||||||
|
restart: unless-stopped
|
||||||
|
environment:
|
||||||
|
MYSQL_ROOT_PASSWORD: 'npm'
|
||||||
|
MYSQL_DATABASE: 'npm'
|
||||||
|
MYSQL_USER: 'npm'
|
||||||
|
MYSQL_PASSWORD: 'npm'
|
||||||
|
volumes:
|
||||||
|
- ./data/mysql:/var/lib/mysql
|
||||||
```
|
```
|
||||||
|
|
||||||
This is the bare minimum configuration required. See the [documentation](https://nginxproxymanager.com/setup/) for more.
|
3. Bring up your stack
|
||||||
|
|
||||||
3. Bring up your stack by running
|
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
docker-compose up -d
|
docker-compose up -d
|
||||||
|
|
||||||
# If using docker-compose-plugin
|
|
||||||
docker compose up -d
|
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Log in to the Admin UI
|
4. Log in to the Admin UI
|
||||||
@ -97,24 +117,397 @@ Password: changeme
|
|||||||
Immediately after logging in with this default user you will be asked to modify your details and change your password.
|
Immediately after logging in with this default user you will be asked to modify your details and change your password.
|
||||||
|
|
||||||
|
|
||||||
## Contributing
|
## Contributors
|
||||||
|
|
||||||
All are welcome to create pull requests for this project, against the `develop` branch. Official releases are created from the `master` branch.
|
Special thanks to the following contributors:
|
||||||
|
|
||||||
CI is used in this project. All PR's must pass before being considered. After passing,
|
<!-- prettier-ignore-start -->
|
||||||
docker builds for PR's are available on dockerhub for manual verifications.
|
<!-- markdownlint-disable -->
|
||||||
|
<table>
|
||||||
Documentation within the `develop` branch is available for preview at
|
<tr>
|
||||||
[https://develop.nginxproxymanager.com](https://develop.nginxproxymanager.com)
|
<td align="center">
|
||||||
|
<a href="https://github.com/Subv">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/357072?s=460&u=d8adcdc91d749ae53e177973ed9b6bb6c4c894a3&v=4" width="80" alt=""/>
|
||||||
### Contributors
|
<br /><sub><b>Sebastian Valle</b></sub>
|
||||||
|
</a>
|
||||||
Special thanks to [all of our contributors](https://github.com/NginxProxyManager/nginx-proxy-manager/graphs/contributors).
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Indemnity83">
|
||||||
## Getting Support
|
<img src="https://avatars3.githubusercontent.com/u/35218?s=460&u=7082004ff35138157c868d7d9c683ccebfce5968&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Kyle Klaus</b></sub>
|
||||||
1. [Found a bug?](https://github.com/NginxProxyManager/nginx-proxy-manager/issues)
|
</a>
|
||||||
2. [Discussions](https://github.com/NginxProxyManager/nginx-proxy-manager/discussions)
|
</td>
|
||||||
3. [Reddit](https://reddit.com/r/nginxproxymanager)
|
<td align="center">
|
||||||
|
<a href="https://github.com/theraw">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/32969774?s=460&u=6b359971e15685fb0359e6a8c065a399b40dc228&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>ƬHE ЯAW</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/spalger">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/1329312?s=400&u=565223e38f1c052afb4c5dcca3fcf1c63ba17ae7&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Spencer</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Xantios">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/1507836?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Xantios Krugor</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/dpanesso">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/2687121?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>David Panesso</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/IronTooch">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/27360514?s=460&u=69bf854a6647c55725f62ecb8d39249c6c0b2602&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>IronTooch</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/damianog">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/2786682?s=460&u=76c6136fae797abb76b951cd8a246dcaecaf21af&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Damiano</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/tfmm">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/6880538?s=460&u=ce0160821cc4aa802df8395200f2d4956a5bc541&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Russ</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/margaale">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/20794934?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Marcelo Castagna</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Steven-Harris">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/7720242?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Steven Harris</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/jlesage">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/1791123?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Jocelyn Le Sage</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/cmer">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/412?s=460&u=67dd8b2e3661bfd6f68ec1eaa5b9821bd8a321cd&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Carl Mercier</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/the1ts">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/84956?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Paul Mansfield</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/OhHeyAlan">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/11955126?s=460&u=fbaa5a1a4f73ef8960132c703349bfd037fe2630&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>OhHeyAlan</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/dogmatic69">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/94674?s=460&u=ca7647de53145c6283b6373ade5dc94ba99347db&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Carl Sutton</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/tg44">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/31839?s=460&u=ad32f4cadfef5e5fb09cdfa4b7b7b36a99ba6811&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Gergő Törcsvári</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/vrenjith">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/2093241?s=460&u=96ce93a9bebabdd0a60a2dc96cd093a41d5edaba&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>vrenjith</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/duhruh">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/1133969?s=460&u=c0691e6131ec6d516416c1c6fcedb5034f877bbe&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>David Rivera</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/jipjan">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/1384618?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Jaap-Jan de Wit</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/jmwebslave">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/6118262?s=460&u=7db409c47135b1e141c366bbb03ed9fae6ac2638&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>James Morgan</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/chaptergy">
|
||||||
|
<img src="https://avatars2.githubusercontent.com/u/26956711?s=460&u=7d9adebabb6b4e7af7cb05d98d751087a372304b&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>chaptergy</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Philip-Mooney">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/48624631?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Philip Mooney</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/WaterCalm">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/23502129?s=400&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>WaterCalm</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/lebrou34">
|
||||||
|
<img src="https://avatars1.githubusercontent.com/u/16373103?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>lebrou34</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/lightglitch">
|
||||||
|
<img src="https://avatars0.githubusercontent.com/u/196953?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Mário Franco</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/klutchell">
|
||||||
|
<img src="https://avatars3.githubusercontent.com/u/20458272?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Kyle Harding</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/ahgraber">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/24922003?s=460&u=8376c9f00af9b6057ba4d2fb03b4f1b20a75277f&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Alex Graber</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/MooBaloo">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/9493496?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>MooBaloo</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Shuro">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/944030?s=460&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Shuro</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/lorisbergeron">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/51918567?s=460&u=778e4ff284b7d7304450f98421c99f79298371fb&v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Loris Bergeron</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/hepelayo">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/8243119?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>hepelayo</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/jonasled">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/46790650?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Jonas Leder</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/stegmannb">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/12850482?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Bastian Stegmann</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Stealthii">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/998920?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Stealthii</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/thegamingninja">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/8020534?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>THEGamingninja</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/italobb">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/1801687?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Italo Borssatto</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/GurjinderSingh">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/3470709?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Gurjinder Singh</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/phantomski77">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/69464125?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>David Dosoudil</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/ijaron">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/5156472?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>ijaron</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/nielscil">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/9073152?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Niels Bouma</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/ogarai">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/2949572?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Orko Garai</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/baruffaldi">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/36949?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Filippo Baruffaldi</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/bikram990">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/6782131?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Bikramjeet Singh</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/razvanstoica89">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/28236583?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Razvan Stoica</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/psharma04">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/22587474?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>RBXII3</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/demize">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/264914?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>demize</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/PUP-Loki">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/75944209?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>PUP-Loki</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/DSorlov">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/8133650?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Daniel Sörlöv</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Theyooo">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/58510131?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Theyooo</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/mrdink">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/514751?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Justin Peacock</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/ChrisTracy">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/58871574?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Chris Tracy</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/Fuechslein">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/15112818?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Fuechslein</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/nightah">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/3339418?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Amir Zarrinkafsh</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/gabbe">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/156397?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>gabbe</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/bmbvenom">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/20530371?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>bmbvenom</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/FMeinicke">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/42121639?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Florian Meinicke</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/ssrahul96">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/15570570?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Rahul Somasundaram</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/BjoernAkAManf">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/833043?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Björn Heinrichs</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/realJoshByrnes">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/204185?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>Josh Byrnes</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="https://github.com/bergi9">
|
||||||
|
<img src="https://avatars.githubusercontent.com/u/5556750?v=4" width="80" alt=""/>
|
||||||
|
<br /><sub><b>bergi9</b></sub>
|
||||||
|
</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
<!-- markdownlint-enable -->
|
||||||
|
<!-- prettier-ignore-end -->
|
||||||
|
8
backend/.vscode/settings.json
vendored
Normal file
8
backend/.vscode/settings.json
vendored
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
{
|
||||||
|
"editor.insertSpaces": false,
|
||||||
|
"editor.formatOnSave": true,
|
||||||
|
"files.trimTrailingWhitespace": true,
|
||||||
|
"editor.codeActionsOnSave": {
|
||||||
|
"source.fixAll.eslint": true
|
||||||
|
}
|
||||||
|
}
|
@ -2,7 +2,6 @@ const express = require('express');
|
|||||||
const bodyParser = require('body-parser');
|
const bodyParser = require('body-parser');
|
||||||
const fileUpload = require('express-fileupload');
|
const fileUpload = require('express-fileupload');
|
||||||
const compression = require('compression');
|
const compression = require('compression');
|
||||||
const config = require('./lib/config');
|
|
||||||
const log = require('./logger').express;
|
const log = require('./logger').express;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -25,7 +24,7 @@ app.enable('trust proxy', ['loopback', 'linklocal', 'uniquelocal']);
|
|||||||
app.enable('strict routing');
|
app.enable('strict routing');
|
||||||
|
|
||||||
// pretty print JSON when not live
|
// pretty print JSON when not live
|
||||||
if (config.debug()) {
|
if (process.env.NODE_ENV !== 'production') {
|
||||||
app.set('json spaces', 2);
|
app.set('json spaces', 2);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -41,18 +40,19 @@ app.use(function (req, res, next) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
res.set({
|
res.set({
|
||||||
'X-XSS-Protection': '1; mode=block',
|
'Strict-Transport-Security': 'includeSubDomains; max-age=631138519; preload',
|
||||||
'X-Content-Type-Options': 'nosniff',
|
'X-XSS-Protection': '1; mode=block',
|
||||||
'X-Frame-Options': x_frame_options,
|
'X-Content-Type-Options': 'nosniff',
|
||||||
'Cache-Control': 'no-cache, no-store, max-age=0, must-revalidate',
|
'X-Frame-Options': x_frame_options,
|
||||||
Pragma: 'no-cache',
|
'Cache-Control': 'no-cache, no-store, max-age=0, must-revalidate',
|
||||||
Expires: 0
|
Pragma: 'no-cache',
|
||||||
|
Expires: 0
|
||||||
});
|
});
|
||||||
next();
|
next();
|
||||||
});
|
});
|
||||||
|
|
||||||
app.use(require('./lib/express/jwt')());
|
app.use(require('./lib/express/jwt')());
|
||||||
app.use('/', require('./routes/main'));
|
app.use('/', require('./routes/api/main'));
|
||||||
|
|
||||||
// production error handler
|
// production error handler
|
||||||
// no stacktraces leaked to user
|
// no stacktraces leaked to user
|
||||||
@ -66,7 +66,7 @@ app.use(function (err, req, res, next) {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
if (config.debug() || (req.baseUrl + req.path).includes('nginx/certificates')) {
|
if (process.env.NODE_ENV === 'development' || (req.baseUrl + req.path).includes('nginx/certificates')) {
|
||||||
payload.debug = {
|
payload.debug = {
|
||||||
stack: typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null,
|
stack: typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null,
|
||||||
previous: err.previous
|
previous: err.previous
|
||||||
@ -75,7 +75,7 @@ app.use(function (err, req, res, next) {
|
|||||||
|
|
||||||
// Not every error is worth logging - but this is good for now until it gets annoying.
|
// Not every error is worth logging - but this is good for now until it gets annoying.
|
||||||
if (typeof err.stack !== 'undefined' && err.stack) {
|
if (typeof err.stack !== 'undefined' && err.stack) {
|
||||||
if (config.debug()) {
|
if (process.env.NODE_ENV === 'development' || process.env.DEBUG) {
|
||||||
log.debug(err.stack);
|
log.debug(err.stack);
|
||||||
} else if (typeof err.public == 'undefined' || !err.public) {
|
} else if (typeof err.public == 'undefined' || !err.public) {
|
||||||
log.warn(err.message);
|
log.warn(err.message);
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"database": {
|
"database": {
|
||||||
"engine": "mysql2",
|
"engine": "mysql",
|
||||||
"host": "db",
|
"host": "db",
|
||||||
"name": "npm",
|
"name": "npm",
|
||||||
"user": "npm",
|
"user": "npm",
|
||||||
|
@ -1,27 +1,33 @@
|
|||||||
const config = require('./lib/config');
|
const config = require('config');
|
||||||
|
|
||||||
if (!config.has('database')) {
|
if (!config.has('database')) {
|
||||||
throw new Error('Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/');
|
throw new Error('Database config does not exist! Please read the instructions: https://github.com/jc21/nginx-proxy-manager/blob/master/doc/INSTALL.md');
|
||||||
}
|
}
|
||||||
|
|
||||||
function generateDbConfig() {
|
function generateDbConfig() {
|
||||||
const cfg = config.get('database');
|
if (config.database.engine === 'knex-native') {
|
||||||
if (cfg.engine === 'knex-native') {
|
return config.database.knex;
|
||||||
return cfg.knex;
|
} else
|
||||||
}
|
return {
|
||||||
return {
|
client: config.database.engine,
|
||||||
client: cfg.engine,
|
connection: {
|
||||||
connection: {
|
host: config.database.host,
|
||||||
host: cfg.host,
|
user: config.database.user,
|
||||||
user: cfg.user,
|
password: config.database.password,
|
||||||
password: cfg.password,
|
database: config.database.name,
|
||||||
database: cfg.name,
|
port: config.database.port
|
||||||
port: cfg.port
|
},
|
||||||
},
|
migrations: {
|
||||||
migrations: {
|
tableName: 'migrations'
|
||||||
tableName: 'migrations'
|
}
|
||||||
}
|
};
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = require('knex')(generateDbConfig());
|
|
||||||
|
let data = generateDbConfig();
|
||||||
|
|
||||||
|
if (typeof config.database.version !== 'undefined') {
|
||||||
|
data.version = config.database.version;
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports = require('knex')(data);
|
||||||
|
1254
backend/doc/api.swagger.json
Normal file
1254
backend/doc/api.swagger.json
Normal file
File diff suppressed because it is too large
Load Diff
@ -1,20 +1,26 @@
|
|||||||
#!/usr/bin/env node
|
#!/usr/bin/env node
|
||||||
|
|
||||||
const schema = require('./schema');
|
|
||||||
const logger = require('./logger').global;
|
const logger = require('./logger').global;
|
||||||
|
|
||||||
async function appStart () {
|
async function appStart () {
|
||||||
|
// Create config file db settings if environment variables have been set
|
||||||
|
await createDbConfigFromEnvironment();
|
||||||
|
|
||||||
const migrate = require('./migrate');
|
const migrate = require('./migrate');
|
||||||
const setup = require('./setup');
|
const setup = require('./setup');
|
||||||
const app = require('./app');
|
const app = require('./app');
|
||||||
|
const apiValidator = require('./lib/validator/api');
|
||||||
const internalCertificate = require('./internal/certificate');
|
const internalCertificate = require('./internal/certificate');
|
||||||
const internalIpRanges = require('./internal/ip_ranges');
|
const internalIpRanges = require('./internal/ip_ranges');
|
||||||
|
|
||||||
return migrate.latest()
|
return migrate.latest()
|
||||||
.then(setup)
|
.then(setup)
|
||||||
.then(schema.getCompiledSchema)
|
.then(() => {
|
||||||
|
return apiValidator.loadSchemas;
|
||||||
|
})
|
||||||
.then(internalIpRanges.fetch)
|
.then(internalIpRanges.fetch)
|
||||||
.then(() => {
|
.then(() => {
|
||||||
|
|
||||||
internalCertificate.initTimer();
|
internalCertificate.initTimer();
|
||||||
internalIpRanges.initTimer();
|
internalIpRanges.initTimer();
|
||||||
|
|
||||||
@ -31,11 +37,94 @@ async function appStart () {
|
|||||||
});
|
});
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch((err) => {
|
||||||
logger.error(err.message, err);
|
logger.error(err.message);
|
||||||
setTimeout(appStart, 1000);
|
setTimeout(appStart, 1000);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async function createDbConfigFromEnvironment() {
|
||||||
|
return new Promise((resolve, reject) => {
|
||||||
|
const envMysqlHost = process.env.DB_MYSQL_HOST || null;
|
||||||
|
const envMysqlPort = process.env.DB_MYSQL_PORT || null;
|
||||||
|
const envMysqlUser = process.env.DB_MYSQL_USER || null;
|
||||||
|
const envMysqlName = process.env.DB_MYSQL_NAME || null;
|
||||||
|
const envSqliteFile = process.env.DB_SQLITE_FILE || null;
|
||||||
|
|
||||||
|
if ((envMysqlHost && envMysqlPort && envMysqlUser && envMysqlName) || envSqliteFile) {
|
||||||
|
const fs = require('fs');
|
||||||
|
const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json';
|
||||||
|
let configData = {};
|
||||||
|
|
||||||
|
try {
|
||||||
|
configData = require(filename);
|
||||||
|
} catch (err) {
|
||||||
|
// do nothing
|
||||||
|
}
|
||||||
|
|
||||||
|
if (configData.database && configData.database.engine && !configData.database.fromEnv) {
|
||||||
|
logger.info('Manual db configuration already exists, skipping config creation from environment variables');
|
||||||
|
resolve();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (envMysqlHost && envMysqlPort && envMysqlUser && envMysqlName) {
|
||||||
|
const newConfig = {
|
||||||
|
fromEnv: true,
|
||||||
|
engine: 'mysql',
|
||||||
|
host: envMysqlHost,
|
||||||
|
port: envMysqlPort,
|
||||||
|
user: envMysqlUser,
|
||||||
|
password: process.env.DB_MYSQL_PASSWORD,
|
||||||
|
name: envMysqlName,
|
||||||
|
};
|
||||||
|
|
||||||
|
if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) {
|
||||||
|
// Config is unchanged, skip overwrite
|
||||||
|
resolve();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.info('Generating MySQL db configuration from environment variables');
|
||||||
|
configData.database = newConfig;
|
||||||
|
|
||||||
|
} else {
|
||||||
|
const newConfig = {
|
||||||
|
fromEnv: true,
|
||||||
|
engine: 'knex-native',
|
||||||
|
knex: {
|
||||||
|
client: 'sqlite3',
|
||||||
|
connection: {
|
||||||
|
filename: envSqliteFile
|
||||||
|
},
|
||||||
|
useNullAsDefault: true
|
||||||
|
}
|
||||||
|
};
|
||||||
|
if (JSON.stringify(configData.database) === JSON.stringify(newConfig)) {
|
||||||
|
// Config is unchanged, skip overwrite
|
||||||
|
resolve();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.info('Generating Sqlite db configuration from environment variables');
|
||||||
|
configData.database = newConfig;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write config
|
||||||
|
fs.writeFile(filename, JSON.stringify(configData, null, 2), (err) => {
|
||||||
|
if (err) {
|
||||||
|
logger.error('Could not write db config to config file: ' + filename);
|
||||||
|
reject(err);
|
||||||
|
} else {
|
||||||
|
logger.info('Wrote db configuration to config file: ' + filename);
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
appStart();
|
appStart();
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
|
@ -3,13 +3,13 @@ const fs = require('fs');
|
|||||||
const batchflow = require('batchflow');
|
const batchflow = require('batchflow');
|
||||||
const logger = require('../logger').access;
|
const logger = require('../logger').access;
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const accessListModel = require('../models/access_list');
|
const accessListModel = require('../models/access_list');
|
||||||
const accessListAuthModel = require('../models/access_list_auth');
|
const accessListAuthModel = require('../models/access_list_auth');
|
||||||
const accessListClientModel = require('../models/access_list_client');
|
const accessListClientModel = require('../models/access_list_client');
|
||||||
const proxyHostModel = require('../models/proxy_host');
|
const proxyHostModel = require('../models/proxy_host');
|
||||||
const internalAuditLog = require('./audit-log');
|
const internalAuditLog = require('./audit-log');
|
||||||
const internalNginx = require('./nginx');
|
const internalNginx = require('./nginx');
|
||||||
|
const utils = require('../lib/utils');
|
||||||
|
|
||||||
function omissions () {
|
function omissions () {
|
||||||
return ['is_deleted'];
|
return ['is_deleted'];
|
||||||
@ -27,13 +27,13 @@ const internalAccessList = {
|
|||||||
.then((/*access_data*/) => {
|
.then((/*access_data*/) => {
|
||||||
return accessListModel
|
return accessListModel
|
||||||
.query()
|
.query()
|
||||||
|
.omit(omissions())
|
||||||
.insertAndFetch({
|
.insertAndFetch({
|
||||||
name: data.name,
|
name: data.name,
|
||||||
satisfy_any: data.satisfy_any,
|
satisfy_any: data.satisfy_any,
|
||||||
pass_auth: data.pass_auth,
|
pass_auth: data.pass_auth,
|
||||||
owner_user_id: access.token.getUserId(1)
|
owner_user_id: access.token.getUserId(1)
|
||||||
})
|
});
|
||||||
.then(utils.omitRow(omissions()));
|
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
data.id = row.id;
|
data.id = row.id;
|
||||||
@ -81,7 +81,7 @@ const internalAccessList = {
|
|||||||
|
|
||||||
return internalAccessList.build(row)
|
return internalAccessList.build(row)
|
||||||
.then(() => {
|
.then(() => {
|
||||||
if (parseInt(row.proxy_host_count, 10)) {
|
if (row.proxy_host_count) {
|
||||||
return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
|
return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
@ -204,6 +204,7 @@ const internalAccessList = {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
.then(internalNginx.reload)
|
||||||
.then(() => {
|
.then(() => {
|
||||||
// Add to audit log
|
// Add to audit log
|
||||||
return internalAuditLog.add(access, {
|
return internalAuditLog.add(access, {
|
||||||
@ -217,16 +218,16 @@ const internalAccessList = {
|
|||||||
// re-fetch with expansions
|
// re-fetch with expansions
|
||||||
return internalAccessList.get(access, {
|
return internalAccessList.get(access, {
|
||||||
id: data.id,
|
id: data.id,
|
||||||
expand: ['owner', 'items', 'clients', 'proxy_hosts.[certificate,access_list.[clients,items]]']
|
expand: ['owner', 'items', 'clients', 'proxy_hosts.access_list.[clients,items]']
|
||||||
}, true /* <- skip masking */);
|
}, true /* <- skip masking */);
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
return internalAccessList.build(row)
|
return internalAccessList.build(row)
|
||||||
.then(() => {
|
.then(() => {
|
||||||
if (parseInt(row.proxy_host_count, 10)) {
|
if (row.proxy_host_count) {
|
||||||
return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
|
return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
|
||||||
}
|
}
|
||||||
}).then(internalNginx.reload)
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return internalAccessList.maskItems(row);
|
return internalAccessList.maskItems(row);
|
||||||
});
|
});
|
||||||
@ -252,38 +253,38 @@ const internalAccessList = {
|
|||||||
let query = accessListModel
|
let query = accessListModel
|
||||||
.query()
|
.query()
|
||||||
.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
||||||
.leftJoin('proxy_host', function() {
|
.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
|
||||||
this.on('proxy_host.access_list_id', '=', 'access_list.id')
|
|
||||||
.andOn('proxy_host.is_deleted', '=', 0);
|
|
||||||
})
|
|
||||||
.where('access_list.is_deleted', 0)
|
.where('access_list.is_deleted', 0)
|
||||||
.andWhere('access_list.id', data.id)
|
.andWhere('access_list.id', data.id)
|
||||||
.groupBy('access_list.id')
|
.allowEager('[owner,items,clients,proxy_hosts.[*, access_list.[clients,items]]]')
|
||||||
.allowGraph('[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]')
|
.omit(['access_list.is_deleted'])
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('access_list.owner_user_id', access.token.getUserId(1));
|
query.andWhere('access_list.owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
if (!skip_masking && typeof row.items !== 'undefined' && row.items) {
|
|
||||||
row = internalAccessList.maskItems(row);
|
|
||||||
}
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
if (!skip_masking && typeof row.items !== 'undefined' && row.items) {
|
||||||
|
row = internalAccessList.maskItems(row);
|
||||||
|
}
|
||||||
|
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -300,7 +301,7 @@ const internalAccessList = {
|
|||||||
return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items', 'clients']});
|
return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items', 'clients']});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -377,13 +378,11 @@ const internalAccessList = {
|
|||||||
let query = accessListModel
|
let query = accessListModel
|
||||||
.query()
|
.query()
|
||||||
.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
||||||
.leftJoin('proxy_host', function() {
|
.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
|
||||||
this.on('proxy_host.access_list_id', '=', 'access_list.id')
|
|
||||||
.andOn('proxy_host.is_deleted', '=', 0);
|
|
||||||
})
|
|
||||||
.where('access_list.is_deleted', 0)
|
.where('access_list.is_deleted', 0)
|
||||||
.groupBy('access_list.id')
|
.groupBy('access_list.id')
|
||||||
.allowGraph('[owner,items,clients]')
|
.omit(['access_list.is_deleted'])
|
||||||
|
.allowEager('[owner,items,clients]')
|
||||||
.orderBy('access_list.name', 'ASC');
|
.orderBy('access_list.name', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
@ -398,10 +397,10 @@ const internalAccessList = {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
})
|
})
|
||||||
.then((rows) => {
|
.then((rows) => {
|
||||||
if (rows) {
|
if (rows) {
|
||||||
@ -508,13 +507,8 @@ const internalAccessList = {
|
|||||||
if (typeof item.password !== 'undefined' && item.password.length) {
|
if (typeof item.password !== 'undefined' && item.password.length) {
|
||||||
logger.info('Adding: ' + item.username);
|
logger.info('Adding: ' + item.username);
|
||||||
|
|
||||||
utils.execFile('openssl', ['passwd', '-apr1', item.password])
|
utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"')
|
||||||
.then((res) => {
|
.then((/*result*/) => {
|
||||||
try {
|
|
||||||
fs.appendFileSync(htpasswd_file, item.username + ':' + res + '\n', {encoding: 'utf8'});
|
|
||||||
} catch (err) {
|
|
||||||
reject(err);
|
|
||||||
}
|
|
||||||
next();
|
next();
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch((err) => {
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const auditLogModel = require('../models/audit-log');
|
const auditLogModel = require('../models/audit-log');
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
const internalAuditLog = {
|
const internalAuditLog = {
|
||||||
|
|
||||||
@ -20,17 +19,17 @@ const internalAuditLog = {
|
|||||||
.orderBy('created_on', 'DESC')
|
.orderBy('created_on', 'DESC')
|
||||||
.orderBy('id', 'DESC')
|
.orderBy('id', 'DESC')
|
||||||
.limit(100)
|
.limit(100)
|
||||||
.allowGraph('[user]');
|
.allowEager('[user]');
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string' && search_query.length > 0) {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where(castJsonIfNeed('meta'), 'like', '%' + search_query + '%');
|
this.where('meta', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query;
|
return query;
|
||||||
|
@ -1,40 +1,31 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const fs = require('fs');
|
const fs = require('fs');
|
||||||
const https = require('https');
|
const tempWrite = require('temp-write');
|
||||||
const tempWrite = require('temp-write');
|
const moment = require('moment');
|
||||||
const moment = require('moment');
|
const logger = require('../logger').ssl;
|
||||||
const archiver = require('archiver');
|
const error = require('../lib/error');
|
||||||
const path = require('path');
|
const utils = require('../lib/utils');
|
||||||
const { isArray } = require('lodash');
|
const certificateModel = require('../models/certificate');
|
||||||
const logger = require('../logger').ssl;
|
const dnsPlugins = require('../global/certbot-dns-plugins');
|
||||||
const config = require('../lib/config');
|
const internalAuditLog = require('./audit-log');
|
||||||
const error = require('../lib/error');
|
const internalNginx = require('./nginx');
|
||||||
const utils = require('../lib/utils');
|
const internalHost = require('./host');
|
||||||
const certbot = require('../lib/certbot');
|
const letsencryptStaging = process.env.NODE_ENV !== 'production';
|
||||||
const certificateModel = require('../models/certificate');
|
|
||||||
const tokenModel = require('../models/token');
|
|
||||||
const dnsPlugins = require('../global/certbot-dns-plugins.json');
|
|
||||||
const internalAuditLog = require('./audit-log');
|
|
||||||
const internalNginx = require('./nginx');
|
|
||||||
const internalHost = require('./host');
|
|
||||||
|
|
||||||
|
|
||||||
const letsencryptStaging = config.useLetsencryptStaging();
|
|
||||||
const letsencryptServer = config.useLetsencryptServer();
|
|
||||||
const letsencryptConfig = '/etc/letsencrypt.ini';
|
const letsencryptConfig = '/etc/letsencrypt.ini';
|
||||||
const certbotCommand = 'certbot';
|
const certbotCommand = 'certbot';
|
||||||
|
const archiver = require('archiver');
|
||||||
|
const path = require('path');
|
||||||
|
|
||||||
function omissions() {
|
function omissions() {
|
||||||
return ['is_deleted', 'owner.is_deleted'];
|
return ['is_deleted'];
|
||||||
}
|
}
|
||||||
|
|
||||||
const internalCertificate = {
|
const internalCertificate = {
|
||||||
|
|
||||||
allowedSslFiles: ['certificate', 'certificate_key', 'intermediate_certificate'],
|
allowedSslFiles: ['certificate', 'certificate_key', 'intermediate_certificate'],
|
||||||
intervalTimeout: 1000 * 60 * 60, // 1 hour
|
intervalTimeout: 1000 * 60 * 60, // 1 hour
|
||||||
interval: null,
|
interval: null,
|
||||||
intervalProcessing: false,
|
intervalProcessing: false,
|
||||||
renewBeforeExpirationBy: [30, 'days'],
|
|
||||||
|
|
||||||
initTimer: () => {
|
initTimer: () => {
|
||||||
logger.info('Let\'s Encrypt Renewal Timer initialized');
|
logger.info('Let\'s Encrypt Renewal Timer initialized');
|
||||||
@ -49,51 +40,60 @@ const internalCertificate = {
|
|||||||
processExpiringHosts: () => {
|
processExpiringHosts: () => {
|
||||||
if (!internalCertificate.intervalProcessing) {
|
if (!internalCertificate.intervalProcessing) {
|
||||||
internalCertificate.intervalProcessing = true;
|
internalCertificate.intervalProcessing = true;
|
||||||
logger.info('Renewing SSL certs expiring within ' + internalCertificate.renewBeforeExpirationBy[0] + ' ' + internalCertificate.renewBeforeExpirationBy[1] + ' ...');
|
logger.info('Renewing SSL certs close to expiry...');
|
||||||
|
|
||||||
const expirationThreshold = moment().add(internalCertificate.renewBeforeExpirationBy[0], internalCertificate.renewBeforeExpirationBy[1]).format('YYYY-MM-DD HH:mm:ss');
|
const cmd = certbotCommand + ' renew --non-interactive --quiet ' +
|
||||||
|
'--config "' + letsencryptConfig + '" ' +
|
||||||
|
'--preferred-challenges "dns,http" ' +
|
||||||
|
'--disable-hook-validation ' +
|
||||||
|
(letsencryptStaging ? '--staging' : '');
|
||||||
|
|
||||||
// Fetch all the letsencrypt certs from the db that will expire within the configured threshold
|
return utils.exec(cmd)
|
||||||
certificateModel
|
.then((result) => {
|
||||||
.query()
|
if (result) {
|
||||||
.where('is_deleted', 0)
|
logger.info('Renew Result: ' + result);
|
||||||
.andWhere('provider', 'letsencrypt')
|
|
||||||
.andWhere('expires_on', '<', expirationThreshold)
|
|
||||||
.then((certificates) => {
|
|
||||||
if (!certificates || !certificates.length) {
|
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
return internalNginx.reload()
|
||||||
* Renews must be run sequentially or we'll get an error 'Another
|
.then(() => {
|
||||||
* instance of Certbot is already running.'
|
logger.info('Renew Complete');
|
||||||
*/
|
return result;
|
||||||
let sequence = Promise.resolve();
|
});
|
||||||
|
})
|
||||||
certificates.forEach(function (certificate) {
|
.then(() => {
|
||||||
sequence = sequence.then(() =>
|
// Now go and fetch all the letsencrypt certs from the db and query the files and update expiry times
|
||||||
internalCertificate
|
return certificateModel
|
||||||
.renew(
|
.query()
|
||||||
{
|
.where('is_deleted', 0)
|
||||||
can: () =>
|
.andWhere('provider', 'letsencrypt')
|
||||||
Promise.resolve({
|
.then((certificates) => {
|
||||||
permission_visibility: 'all',
|
if (certificates && certificates.length) {
|
||||||
}),
|
let promises = [];
|
||||||
token: new tokenModel(),
|
|
||||||
},
|
certificates.map(function (certificate) {
|
||||||
{ id: certificate.id },
|
promises.push(
|
||||||
)
|
internalCertificate.getCertificateInfoFromFile('/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem')
|
||||||
.catch((err) => {
|
.then((cert_info) => {
|
||||||
// Don't want to stop the train here, just log the error
|
return certificateModel
|
||||||
logger.error(err.message);
|
.query()
|
||||||
}),
|
.where('id', certificate.id)
|
||||||
);
|
.andWhere('provider', 'letsencrypt')
|
||||||
});
|
.patch({
|
||||||
|
expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss')
|
||||||
return sequence;
|
});
|
||||||
|
})
|
||||||
|
.catch((err) => {
|
||||||
|
// Don't want to stop the train here, just log the error
|
||||||
|
logger.error(err.message);
|
||||||
|
})
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
return Promise.all(promises);
|
||||||
|
}
|
||||||
|
});
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
logger.info('Completed SSL cert renew process');
|
|
||||||
internalCertificate.intervalProcessing = false;
|
internalCertificate.intervalProcessing = false;
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch((err) => {
|
||||||
@ -119,8 +119,8 @@ const internalCertificate = {
|
|||||||
|
|
||||||
return certificateModel
|
return certificateModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
})
|
||||||
.then((certificate) => {
|
.then((certificate) => {
|
||||||
if (certificate.provider === 'letsencrypt') {
|
if (certificate.provider === 'letsencrypt') {
|
||||||
@ -169,7 +169,6 @@ const internalCertificate = {
|
|||||||
// 3. Generate the LE config
|
// 3. Generate the LE config
|
||||||
return internalNginx.generateLetsEncryptRequestConfig(certificate)
|
return internalNginx.generateLetsEncryptRequestConfig(certificate)
|
||||||
.then(internalNginx.reload)
|
.then(internalNginx.reload)
|
||||||
.then(async() => await new Promise((r) => setTimeout(r, 5000)))
|
|
||||||
.then(() => {
|
.then(() => {
|
||||||
// 4. Request cert
|
// 4. Request cert
|
||||||
return internalCertificate.requestLetsEncryptSsl(certificate);
|
return internalCertificate.requestLetsEncryptSsl(certificate);
|
||||||
@ -209,7 +208,6 @@ const internalCertificate = {
|
|||||||
.patchAndFetchById(certificate.id, {
|
.patchAndFetchById(certificate.id, {
|
||||||
expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss')
|
expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss')
|
||||||
})
|
})
|
||||||
.then(utils.omitRow(omissions()))
|
|
||||||
.then((saved_row) => {
|
.then((saved_row) => {
|
||||||
// Add cert data for audit log
|
// Add cert data for audit log
|
||||||
saved_row.meta = _.assign({}, saved_row.meta, {
|
saved_row.meta = _.assign({}, saved_row.meta, {
|
||||||
@ -268,8 +266,8 @@ const internalCertificate = {
|
|||||||
|
|
||||||
return certificateModel
|
return certificateModel
|
||||||
.query()
|
.query()
|
||||||
|
.omit(omissions())
|
||||||
.patchAndFetchById(row.id, data)
|
.patchAndFetchById(row.id, data)
|
||||||
.then(utils.omitRow(omissions()))
|
|
||||||
.then((saved_row) => {
|
.then((saved_row) => {
|
||||||
saved_row.meta = internalCertificate.cleanMeta(saved_row.meta);
|
saved_row.meta = internalCertificate.cleanMeta(saved_row.meta);
|
||||||
data.meta = internalCertificate.cleanMeta(data.meta);
|
data.meta = internalCertificate.cleanMeta(data.meta);
|
||||||
@ -287,7 +285,7 @@ const internalCertificate = {
|
|||||||
meta: _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw
|
meta: _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return saved_row;
|
return _.omit(saved_row, omissions());
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@ -312,31 +310,30 @@ const internalCertificate = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[owner]')
|
.allowEager('[owner]')
|
||||||
.allowGraph('[proxy_hosts]')
|
|
||||||
.allowGraph('[redirection_hosts]')
|
|
||||||
.allowGraph('[dead_hosts]')
|
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -418,7 +415,7 @@ const internalCertificate = {
|
|||||||
return internalCertificate.get(access, {id: data.id});
|
return internalCertificate.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -466,10 +463,8 @@ const internalCertificate = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[owner]')
|
.omit(['is_deleted'])
|
||||||
.allowGraph('[proxy_hosts]')
|
.allowEager('[owner]')
|
||||||
.allowGraph('[redirection_hosts]')
|
|
||||||
.allowGraph('[dead_hosts]')
|
|
||||||
.orderBy('nice_name', 'ASC');
|
.orderBy('nice_name', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
@ -479,15 +474,15 @@ const internalCertificate = {
|
|||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string') {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where('nice_name', 'like', '%' + search_query + '%');
|
this.where('name', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -664,6 +659,7 @@ const internalCertificate = {
|
|||||||
meta: _.clone(row.meta) // Prevent the update method from changing this value that we'll use later
|
meta: _.clone(row.meta) // Prevent the update method from changing this value that we'll use later
|
||||||
})
|
})
|
||||||
.then((certificate) => {
|
.then((certificate) => {
|
||||||
|
console.log('ROWMETA:', row.meta);
|
||||||
certificate.meta = row.meta;
|
certificate.meta = row.meta;
|
||||||
return internalCertificate.writeCustomCert(certificate);
|
return internalCertificate.writeCustomCert(certificate);
|
||||||
});
|
});
|
||||||
@ -739,29 +735,29 @@ const internalCertificate = {
|
|||||||
|
|
||||||
return utils.exec('openssl x509 -in ' + certificate_file + ' -subject -noout')
|
return utils.exec('openssl x509 -in ' + certificate_file + ' -subject -noout')
|
||||||
.then((result) => {
|
.then((result) => {
|
||||||
// Examples:
|
|
||||||
// subject=CN = *.jc21.com
|
|
||||||
// subject=CN = something.example.com
|
// subject=CN = something.example.com
|
||||||
const regex = /(?:subject=)?[^=]+=\s+(\S+)/gim;
|
const regex = /(?:subject=)?[^=]+=\s+(\S+)/gim;
|
||||||
const match = regex.exec(result);
|
const match = regex.exec(result);
|
||||||
if (match && typeof match[1] !== 'undefined') {
|
|
||||||
certData['cn'] = match[1];
|
if (typeof match[1] === 'undefined') {
|
||||||
|
throw new error.ValidationError('Could not determine subject from certificate: ' + result);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
certData['cn'] = match[1];
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return utils.exec('openssl x509 -in ' + certificate_file + ' -issuer -noout');
|
return utils.exec('openssl x509 -in ' + certificate_file + ' -issuer -noout');
|
||||||
})
|
})
|
||||||
|
|
||||||
.then((result) => {
|
.then((result) => {
|
||||||
// Examples:
|
|
||||||
// issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
|
// issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
|
||||||
// issuer=C = US, O = Let's Encrypt, CN = E5
|
|
||||||
// issuer=O = NginxProxyManager, CN = NginxProxyManager Intermediate CA","O = NginxProxyManager, CN = NginxProxyManager Intermediate CA
|
|
||||||
const regex = /^(?:issuer=)?(.*)$/gim;
|
const regex = /^(?:issuer=)?(.*)$/gim;
|
||||||
const match = regex.exec(result);
|
const match = regex.exec(result);
|
||||||
if (match && typeof match[1] !== 'undefined') {
|
|
||||||
certData['issuer'] = match[1];
|
if (typeof match[1] === 'undefined') {
|
||||||
|
throw new error.ValidationError('Could not determine issuer from certificate: ' + result);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
certData['issuer'] = match[1];
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return utils.exec('openssl x509 -in ' + certificate_file + ' -dates -noout');
|
return utils.exec('openssl x509 -in ' + certificate_file + ' -dates -noout');
|
||||||
@ -836,18 +832,15 @@ const internalCertificate = {
|
|||||||
requestLetsEncryptSsl: (certificate) => {
|
requestLetsEncryptSsl: (certificate) => {
|
||||||
logger.info('Requesting Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
logger.info('Requesting Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
||||||
|
|
||||||
const cmd = `${certbotCommand} certonly ` +
|
const cmd = certbotCommand + ' certonly --non-interactive ' +
|
||||||
`--config '${letsencryptConfig}' ` +
|
'--config "' + letsencryptConfig + '" ' +
|
||||||
'--work-dir "/tmp/letsencrypt-lib" ' +
|
'--cert-name "npm-' + certificate.id + '" ' +
|
||||||
'--logs-dir "/tmp/letsencrypt-log" ' +
|
|
||||||
`--cert-name "npm-${certificate.id}" ` +
|
|
||||||
'--agree-tos ' +
|
'--agree-tos ' +
|
||||||
'--authenticator webroot ' +
|
'--authenticator webroot ' +
|
||||||
`--email '${certificate.meta.letsencrypt_email}' ` +
|
'--email "' + certificate.meta.letsencrypt_email + '" ' +
|
||||||
'--preferred-challenges "dns,http" ' +
|
'--preferred-challenges "dns,http" ' +
|
||||||
`--domains "${certificate.domain_names.join(',')}" ` +
|
'--domains "' + certificate.domain_names.join(',') + '" ' +
|
||||||
(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') +
|
(letsencryptStaging ? '--staging' : '');
|
||||||
(letsencryptStaging && letsencryptServer === null ? '--staging ' : '');
|
|
||||||
|
|
||||||
logger.info('Command:', cmd);
|
logger.info('Command:', cmd);
|
||||||
|
|
||||||
@ -860,65 +853,68 @@ const internalCertificate = {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* @param {Object} certificate the certificate row
|
* @param {Object} certificate the certificate row
|
||||||
* @param {String} dns_provider the dns provider name (key used in `certbot-dns-plugins.json`)
|
* @param {String} dns_provider the dns provider name (key used in `certbot-dns-plugins.js`)
|
||||||
* @param {String | null} credentials the content of this providers credentials file
|
* @param {String | null} credentials the content of this providers credentials file
|
||||||
* @param {String} propagation_seconds
|
* @param {String} propagation_seconds the cloudflare api token
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
requestLetsEncryptSslWithDnsChallenge: async (certificate) => {
|
requestLetsEncryptSslWithDnsChallenge: (certificate) => {
|
||||||
await certbot.installPlugin(certificate.meta.dns_provider);
|
const dns_plugin = dnsPlugins[certificate.meta.dns_provider];
|
||||||
const dnsPlugin = dnsPlugins[certificate.meta.dns_provider];
|
|
||||||
logger.info(`Requesting Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`);
|
if (!dns_plugin) {
|
||||||
|
throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`);
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.info(`Requesting Let'sEncrypt certificates via ${dns_plugin.display_name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`);
|
||||||
|
|
||||||
const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id;
|
const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id;
|
||||||
fs.mkdirSync('/etc/letsencrypt/credentials', { recursive: true });
|
const credentialsCmd = 'mkdir -p /etc/letsencrypt/credentials 2> /dev/null; echo \'' + certificate.meta.dns_provider_credentials.replace('\'', '\\\'') + '\' > \'' + credentialsLocation + '\' && chmod 600 \'' + credentialsLocation + '\'';
|
||||||
fs.writeFileSync(credentialsLocation, certificate.meta.dns_provider_credentials, {mode: 0o600});
|
const prepareCmd = 'pip install ' + dns_plugin.package_name + (dns_plugin.version_requirement || '') + ' ' + dns_plugin.dependencies;
|
||||||
|
|
||||||
// Whether the plugin has a --<name>-credentials argument
|
// Whether the plugin has a --<name>-credentials argument
|
||||||
const hasConfigArg = certificate.meta.dns_provider !== 'route53';
|
const hasConfigArg = certificate.meta.dns_provider !== 'route53';
|
||||||
|
|
||||||
let mainCmd = certbotCommand + ' certonly ' +
|
let mainCmd = certbotCommand + ' certonly --non-interactive ' +
|
||||||
`--config '${letsencryptConfig}' ` +
|
'--cert-name "npm-' + certificate.id + '" ' +
|
||||||
'--work-dir "/tmp/letsencrypt-lib" ' +
|
|
||||||
'--logs-dir "/tmp/letsencrypt-log" ' +
|
|
||||||
`--cert-name 'npm-${certificate.id}' ` +
|
|
||||||
'--agree-tos ' +
|
'--agree-tos ' +
|
||||||
`--email '${certificate.meta.letsencrypt_email}' ` +
|
'--email "' + certificate.meta.letsencrypt_email + '" ' +
|
||||||
`--domains '${certificate.domain_names.join(',')}' ` +
|
'--domains "' + certificate.domain_names.join(',') + '" ' +
|
||||||
`--authenticator '${dnsPlugin.full_plugin_name}' ` +
|
'--authenticator ' + dns_plugin.full_plugin_name + ' ' +
|
||||||
(
|
(
|
||||||
hasConfigArg
|
hasConfigArg
|
||||||
? `--${dnsPlugin.full_plugin_name}-credentials '${credentialsLocation}' `
|
? '--' + dns_plugin.full_plugin_name + '-credentials "' + credentialsLocation + '"'
|
||||||
: ''
|
: ''
|
||||||
) +
|
) +
|
||||||
(
|
(
|
||||||
certificate.meta.propagation_seconds !== undefined
|
certificate.meta.propagation_seconds !== undefined
|
||||||
? `--${dnsPlugin.full_plugin_name}-propagation-seconds '${certificate.meta.propagation_seconds}' `
|
? ' --' + dns_plugin.full_plugin_name + '-propagation-seconds ' + certificate.meta.propagation_seconds
|
||||||
: ''
|
: ''
|
||||||
) +
|
) +
|
||||||
(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') +
|
(letsencryptStaging ? ' --staging' : '');
|
||||||
(letsencryptStaging && letsencryptServer === null ? '--staging ' : '');
|
|
||||||
|
|
||||||
// Prepend the path to the credentials file as an environment variable
|
// Prepend the path to the credentials file as an environment variable
|
||||||
if (certificate.meta.dns_provider === 'route53') {
|
if (certificate.meta.dns_provider === 'route53') {
|
||||||
mainCmd = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd;
|
mainCmd = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (certificate.meta.dns_provider === 'duckdns') {
|
logger.info('Command:', `${credentialsCmd} && ${prepareCmd} && ${mainCmd}`);
|
||||||
mainCmd = mainCmd + ' --dns-duckdns-no-txt-restore';
|
|
||||||
}
|
|
||||||
|
|
||||||
logger.info('Command:', mainCmd);
|
return utils.exec(credentialsCmd)
|
||||||
|
.then(() => {
|
||||||
try {
|
return utils.exec(prepareCmd)
|
||||||
const result = await utils.exec(mainCmd);
|
.then(() => {
|
||||||
logger.info(result);
|
return utils.exec(mainCmd)
|
||||||
return result;
|
.then(async (result) => {
|
||||||
} catch (err) {
|
logger.info(result);
|
||||||
// Don't fail if file does not exist, so no need for action in the callback
|
return result;
|
||||||
fs.unlink(credentialsLocation, () => {});
|
});
|
||||||
throw err;
|
});
|
||||||
}
|
}).catch(async (err) => {
|
||||||
|
// Don't fail if file does not exist
|
||||||
|
const delete_credentialsCmd = `rm -f '${credentialsLocation}' || true`;
|
||||||
|
await utils.exec(delete_credentialsCmd);
|
||||||
|
throw err;
|
||||||
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
|
|
||||||
@ -973,16 +969,12 @@ const internalCertificate = {
|
|||||||
renewLetsEncryptSsl: (certificate) => {
|
renewLetsEncryptSsl: (certificate) => {
|
||||||
logger.info('Renewing Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
logger.info('Renewing Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
||||||
|
|
||||||
const cmd = certbotCommand + ' renew --force-renewal ' +
|
const cmd = certbotCommand + ' renew --force-renewal --non-interactive ' +
|
||||||
`--config '${letsencryptConfig}' ` +
|
'--config "' + letsencryptConfig + '" ' +
|
||||||
'--work-dir "/tmp/letsencrypt-lib" ' +
|
'--cert-name "npm-' + certificate.id + '" ' +
|
||||||
'--logs-dir "/tmp/letsencrypt-log" ' +
|
|
||||||
`--cert-name 'npm-${certificate.id}' ` +
|
|
||||||
'--preferred-challenges "dns,http" ' +
|
'--preferred-challenges "dns,http" ' +
|
||||||
'--no-random-sleep-on-renew ' +
|
|
||||||
'--disable-hook-validation ' +
|
'--disable-hook-validation ' +
|
||||||
(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') +
|
(letsencryptStaging ? '--staging' : '');
|
||||||
(letsencryptStaging && letsencryptServer === null ? '--staging ' : '');
|
|
||||||
|
|
||||||
logger.info('Command:', cmd);
|
logger.info('Command:', cmd);
|
||||||
|
|
||||||
@ -998,23 +990,18 @@ const internalCertificate = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
renewLetsEncryptSslWithDnsChallenge: (certificate) => {
|
renewLetsEncryptSslWithDnsChallenge: (certificate) => {
|
||||||
const dnsPlugin = dnsPlugins[certificate.meta.dns_provider];
|
const dns_plugin = dnsPlugins[certificate.meta.dns_provider];
|
||||||
|
|
||||||
if (!dnsPlugin) {
|
if (!dns_plugin) {
|
||||||
throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`);
|
throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`);
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.info(`Renewing Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`);
|
logger.info(`Renewing Let'sEncrypt certificates via ${dns_plugin.display_name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`);
|
||||||
|
|
||||||
let mainCmd = certbotCommand + ' renew --force-renewal ' +
|
let mainCmd = certbotCommand + ' renew --non-interactive ' +
|
||||||
`--config "${letsencryptConfig}" ` +
|
'--cert-name "npm-' + certificate.id + '" ' +
|
||||||
'--work-dir "/tmp/letsencrypt-lib" ' +
|
'--disable-hook-validation' +
|
||||||
'--logs-dir "/tmp/letsencrypt-log" ' +
|
(letsencryptStaging ? ' --staging' : '');
|
||||||
`--cert-name 'npm-${certificate.id}' ` +
|
|
||||||
'--disable-hook-validation ' +
|
|
||||||
'--no-random-sleep-on-renew ' +
|
|
||||||
(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') +
|
|
||||||
(letsencryptStaging && letsencryptServer === null ? '--staging ' : '');
|
|
||||||
|
|
||||||
// Prepend the path to the credentials file as an environment variable
|
// Prepend the path to the credentials file as an environment variable
|
||||||
if (certificate.meta.dns_provider === 'route53') {
|
if (certificate.meta.dns_provider === 'route53') {
|
||||||
@ -1039,14 +1026,10 @@ const internalCertificate = {
|
|||||||
revokeLetsEncryptSsl: (certificate, throw_errors) => {
|
revokeLetsEncryptSsl: (certificate, throw_errors) => {
|
||||||
logger.info('Revoking Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
logger.info('Revoking Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', '));
|
||||||
|
|
||||||
const mainCmd = certbotCommand + ' revoke ' +
|
const mainCmd = certbotCommand + ' revoke --non-interactive ' +
|
||||||
`--config '${letsencryptConfig}' ` +
|
'--cert-path "/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem" ' +
|
||||||
'--work-dir "/tmp/letsencrypt-lib" ' +
|
|
||||||
'--logs-dir "/tmp/letsencrypt-log" ' +
|
|
||||||
`--cert-path '/etc/letsencrypt/live/npm-${certificate.id}/fullchain.pem' ` +
|
|
||||||
'--delete-after-revoke ' +
|
'--delete-after-revoke ' +
|
||||||
(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') +
|
(letsencryptStaging ? '--staging' : '');
|
||||||
(letsencryptStaging && letsencryptServer === null ? '--staging ' : '');
|
|
||||||
|
|
||||||
// Don't fail command if file does not exist
|
// Don't fail command if file does not exist
|
||||||
const delete_credentialsCmd = `rm -f '/etc/letsencrypt/credentials/credentials-${certificate.id}' || true`;
|
const delete_credentialsCmd = `rm -f '/etc/letsencrypt/credentials/credentials-${certificate.id}' || true`;
|
||||||
@ -1136,108 +1119,6 @@ const internalCertificate = {
|
|||||||
} else {
|
} else {
|
||||||
return Promise.resolve();
|
return Promise.resolve();
|
||||||
}
|
}
|
||||||
},
|
|
||||||
|
|
||||||
testHttpsChallenge: async (access, domains) => {
|
|
||||||
await access.can('certificates:list');
|
|
||||||
|
|
||||||
if (!isArray(domains)) {
|
|
||||||
throw new error.InternalValidationError('Domains must be an array of strings');
|
|
||||||
}
|
|
||||||
if (domains.length === 0) {
|
|
||||||
throw new error.InternalValidationError('No domains provided');
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create a test challenge file
|
|
||||||
const testChallengeDir = '/data/letsencrypt-acme-challenge/.well-known/acme-challenge';
|
|
||||||
const testChallengeFile = testChallengeDir + '/test-challenge';
|
|
||||||
fs.mkdirSync(testChallengeDir, {recursive: true});
|
|
||||||
fs.writeFileSync(testChallengeFile, 'Success', {encoding: 'utf8'});
|
|
||||||
|
|
||||||
async function performTestForDomain (domain) {
|
|
||||||
logger.info('Testing http challenge for ' + domain);
|
|
||||||
const url = `http://${domain}/.well-known/acme-challenge/test-challenge`;
|
|
||||||
const formBody = `method=G&url=${encodeURI(url)}&bodytype=T&requestbody=&headername=User-Agent&headervalue=None&locationid=1&ch=false&cc=false`;
|
|
||||||
const options = {
|
|
||||||
method: 'POST',
|
|
||||||
headers: {
|
|
||||||
'User-Agent': 'Mozilla/5.0',
|
|
||||||
'Content-Type': 'application/x-www-form-urlencoded',
|
|
||||||
'Content-Length': Buffer.byteLength(formBody)
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
const result = await new Promise((resolve) => {
|
|
||||||
|
|
||||||
const req = https.request('https://www.site24x7.com/tools/restapi-tester', options, function (res) {
|
|
||||||
let responseBody = '';
|
|
||||||
|
|
||||||
res.on('data', (chunk) => responseBody = responseBody + chunk);
|
|
||||||
res.on('end', function () {
|
|
||||||
try {
|
|
||||||
const parsedBody = JSON.parse(responseBody + '');
|
|
||||||
if (res.statusCode !== 200) {
|
|
||||||
logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned: ${parsedBody.message}`);
|
|
||||||
resolve(undefined);
|
|
||||||
} else {
|
|
||||||
resolve(parsedBody);
|
|
||||||
}
|
|
||||||
} catch (err) {
|
|
||||||
if (res.statusCode !== 200) {
|
|
||||||
logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned`);
|
|
||||||
} else {
|
|
||||||
logger.warn(`Failed to test HTTP challenge for domain ${domain} because response failed to be parsed: ${err.message}`);
|
|
||||||
}
|
|
||||||
resolve(undefined);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
// Make sure to write the request body.
|
|
||||||
req.write(formBody);
|
|
||||||
req.end();
|
|
||||||
req.on('error', function (e) { logger.warn(`Failed to test HTTP challenge for domain ${domain}`, e);
|
|
||||||
resolve(undefined); });
|
|
||||||
});
|
|
||||||
|
|
||||||
if (!result) {
|
|
||||||
// Some error occurred while trying to get the data
|
|
||||||
return 'failed';
|
|
||||||
} else if (result.error) {
|
|
||||||
logger.info(`HTTP challenge test failed for domain ${domain} because error was returned: ${result.error.msg}`);
|
|
||||||
return `other:${result.error.msg}`;
|
|
||||||
} else if (`${result.responsecode}` === '200' && result.htmlresponse === 'Success') {
|
|
||||||
// Server exists and has responded with the correct data
|
|
||||||
return 'ok';
|
|
||||||
} else if (`${result.responsecode}` === '200') {
|
|
||||||
// Server exists but has responded with wrong data
|
|
||||||
logger.info(`HTTP challenge test failed for domain ${domain} because of invalid returned data:`, result.htmlresponse);
|
|
||||||
return 'wrong-data';
|
|
||||||
} else if (`${result.responsecode}` === '404') {
|
|
||||||
// Server exists but responded with a 404
|
|
||||||
logger.info(`HTTP challenge test failed for domain ${domain} because code 404 was returned`);
|
|
||||||
return '404';
|
|
||||||
} else if (`${result.responsecode}` === '0' || (typeof result.reason === 'string' && result.reason.toLowerCase() === 'host unavailable')) {
|
|
||||||
// Server does not exist at domain
|
|
||||||
logger.info(`HTTP challenge test failed for domain ${domain} the host was not found`);
|
|
||||||
return 'no-host';
|
|
||||||
} else {
|
|
||||||
// Other errors
|
|
||||||
logger.info(`HTTP challenge test failed for domain ${domain} because code ${result.responsecode} was returned`);
|
|
||||||
return `other:${result.responsecode}`;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const results = {};
|
|
||||||
|
|
||||||
for (const domain of domains){
|
|
||||||
results[domain] = await performTestForDomain(domain);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Remove the test challenge file
|
|
||||||
fs.unlinkSync(testChallengeFile);
|
|
||||||
|
|
||||||
return results;
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -1,12 +1,10 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const deadHostModel = require('../models/dead_host');
|
const deadHostModel = require('../models/dead_host');
|
||||||
const internalHost = require('./host');
|
const internalHost = require('./host');
|
||||||
const internalNginx = require('./nginx');
|
const internalNginx = require('./nginx');
|
||||||
const internalAuditLog = require('./audit-log');
|
const internalAuditLog = require('./audit-log');
|
||||||
const internalCertificate = require('./certificate');
|
const internalCertificate = require('./certificate');
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
function omissions () {
|
function omissions () {
|
||||||
return ['is_deleted'];
|
return ['is_deleted'];
|
||||||
@ -49,16 +47,10 @@ const internalDeadHost = {
|
|||||||
data.owner_user_id = access.token.getUserId(1);
|
data.owner_user_id = access.token.getUserId(1);
|
||||||
data = internalHost.cleanSslHstsData(data);
|
data = internalHost.cleanSslHstsData(data);
|
||||||
|
|
||||||
// Fix for db field not having a default value
|
|
||||||
// for this optional field.
|
|
||||||
if (typeof data.advanced_config === 'undefined') {
|
|
||||||
data.advanced_config = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
return deadHostModel
|
return deadHostModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (create_certificate) {
|
if (create_certificate) {
|
||||||
@ -226,28 +218,31 @@ const internalDeadHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[owner,certificate]')
|
.allowEager('[owner,certificate]')
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
row = internalHost.cleanRowCertificateMeta(row);
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -264,7 +259,7 @@ const internalDeadHost = {
|
|||||||
return internalDeadHost.get(access, {id: data.id});
|
return internalDeadHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -312,7 +307,7 @@ const internalDeadHost = {
|
|||||||
});
|
});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (row.enabled) {
|
} else if (row.enabled) {
|
||||||
throw new error.ValidationError('Host is already enabled');
|
throw new error.ValidationError('Host is already enabled');
|
||||||
@ -358,7 +353,7 @@ const internalDeadHost = {
|
|||||||
return internalDeadHost.get(access, {id: data.id});
|
return internalDeadHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (!row.enabled) {
|
} else if (!row.enabled) {
|
||||||
throw new error.ValidationError('Host is already disabled');
|
throw new error.ValidationError('Host is already disabled');
|
||||||
@ -409,25 +404,26 @@ const internalDeadHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[owner,certificate]')
|
.omit(['is_deleted'])
|
||||||
.orderBy(castJsonIfNeed('domain_names'), 'ASC');
|
.allowEager('[owner,certificate]')
|
||||||
|
.orderBy('domain_names', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string' && search_query.length > 0) {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where(castJsonIfNeed('domain_names'), 'like', '%' + search_query + '%');
|
this.where('domain_names', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
})
|
})
|
||||||
.then((rows) => {
|
.then((rows) => {
|
||||||
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
||||||
|
@ -2,7 +2,6 @@ const _ = require('lodash');
|
|||||||
const proxyHostModel = require('../models/proxy_host');
|
const proxyHostModel = require('../models/proxy_host');
|
||||||
const redirectionHostModel = require('../models/redirection_host');
|
const redirectionHostModel = require('../models/redirection_host');
|
||||||
const deadHostModel = require('../models/dead_host');
|
const deadHostModel = require('../models/dead_host');
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
const internalHost = {
|
const internalHost = {
|
||||||
|
|
||||||
@ -18,7 +17,7 @@ const internalHost = {
|
|||||||
cleanSslHstsData: function (data, existing_data) {
|
cleanSslHstsData: function (data, existing_data) {
|
||||||
existing_data = existing_data === undefined ? {} : existing_data;
|
existing_data = existing_data === undefined ? {} : existing_data;
|
||||||
|
|
||||||
const combined_data = _.assign({}, existing_data, data);
|
let combined_data = _.assign({}, existing_data, data);
|
||||||
|
|
||||||
if (!combined_data.certificate_id) {
|
if (!combined_data.certificate_id) {
|
||||||
combined_data.ssl_forced = false;
|
combined_data.ssl_forced = false;
|
||||||
@ -74,7 +73,7 @@ const internalHost = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
getHostsWithDomains: function (domain_names) {
|
getHostsWithDomains: function (domain_names) {
|
||||||
const promises = [
|
let promises = [
|
||||||
proxyHostModel
|
proxyHostModel
|
||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0),
|
.where('is_deleted', 0),
|
||||||
@ -126,19 +125,19 @@ const internalHost = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
isHostnameTaken: function (hostname, ignore_type, ignore_id) {
|
isHostnameTaken: function (hostname, ignore_type, ignore_id) {
|
||||||
const promises = [
|
let promises = [
|
||||||
proxyHostModel
|
proxyHostModel
|
||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%'),
|
.andWhere('domain_names', 'like', '%' + hostname + '%'),
|
||||||
redirectionHostModel
|
redirectionHostModel
|
||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%'),
|
.andWhere('domain_names', 'like', '%' + hostname + '%'),
|
||||||
deadHostModel
|
deadHostModel
|
||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere(castJsonIfNeed('domain_names'), 'like', '%' + hostname + '%')
|
.andWhere('domain_names', 'like', '%' + hostname + '%')
|
||||||
];
|
];
|
||||||
|
|
||||||
return Promise.all(promises)
|
return Promise.all(promises)
|
||||||
|
@ -2,16 +2,13 @@ const https = require('https');
|
|||||||
const fs = require('fs');
|
const fs = require('fs');
|
||||||
const logger = require('../logger').ip_ranges;
|
const logger = require('../logger').ip_ranges;
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const internalNginx = require('./nginx');
|
const internalNginx = require('./nginx');
|
||||||
|
const { Liquid } = require('liquidjs');
|
||||||
|
|
||||||
const CLOUDFRONT_URL = 'https://ip-ranges.amazonaws.com/ip-ranges.json';
|
const CLOUDFRONT_URL = 'https://ip-ranges.amazonaws.com/ip-ranges.json';
|
||||||
const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4';
|
const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4';
|
||||||
const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6';
|
const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6';
|
||||||
|
|
||||||
const regIpV4 = /^(\d+\.?){4}\/\d+/;
|
|
||||||
const regIpV6 = /^(([\da-fA-F]+)?:)+\/\d+/;
|
|
||||||
|
|
||||||
const internalIpRanges = {
|
const internalIpRanges = {
|
||||||
|
|
||||||
interval_timeout: 1000 * 60 * 60 * 6, // 6 hours
|
interval_timeout: 1000 * 60 * 60 * 6, // 6 hours
|
||||||
@ -77,14 +74,14 @@ const internalIpRanges = {
|
|||||||
return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL);
|
return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL);
|
||||||
})
|
})
|
||||||
.then((cloudfare_data) => {
|
.then((cloudfare_data) => {
|
||||||
let items = cloudfare_data.split('\n').filter((line) => regIpV4.test(line));
|
let items = cloudfare_data.split('\n');
|
||||||
ip_ranges = [... ip_ranges, ... items];
|
ip_ranges = [... ip_ranges, ... items];
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL);
|
return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL);
|
||||||
})
|
})
|
||||||
.then((cloudfare_data) => {
|
.then((cloudfare_data) => {
|
||||||
let items = cloudfare_data.split('\n').filter((line) => regIpV6.test(line));
|
let items = cloudfare_data.split('\n');
|
||||||
ip_ranges = [... ip_ranges, ... items];
|
ip_ranges = [... ip_ranges, ... items];
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
@ -119,7 +116,10 @@ const internalIpRanges = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
generateConfig: (ip_ranges) => {
|
generateConfig: (ip_ranges) => {
|
||||||
const renderEngine = utils.getRenderEngine();
|
let renderEngine = new Liquid({
|
||||||
|
root: __dirname + '/../templates/'
|
||||||
|
});
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
let template = null;
|
let template = null;
|
||||||
let filename = '/etc/nginx/conf.d/include/ip_ranges.conf';
|
let filename = '/etc/nginx/conf.d/include/ip_ranges.conf';
|
||||||
|
@ -1,9 +1,10 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const fs = require('fs');
|
const fs = require('fs');
|
||||||
const logger = require('../logger').nginx;
|
const logger = require('../logger').nginx;
|
||||||
const config = require('../lib/config');
|
const utils = require('../lib/utils');
|
||||||
const utils = require('../lib/utils');
|
const error = require('../lib/error');
|
||||||
const error = require('../lib/error');
|
const { Liquid } = require('liquidjs');
|
||||||
|
const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG;
|
||||||
|
|
||||||
const internalNginx = {
|
const internalNginx = {
|
||||||
|
|
||||||
@ -28,9 +29,7 @@ const internalNginx = {
|
|||||||
.then(() => {
|
.then(() => {
|
||||||
// Nginx is OK
|
// Nginx is OK
|
||||||
// We're deleting this config regardless.
|
// We're deleting this config regardless.
|
||||||
// Don't throw errors, as the file may not exist at all
|
return internalNginx.deleteConfig(host_type, host); // Don't throw errors, as the file may not exist at all
|
||||||
// Delete the .err file too
|
|
||||||
return internalNginx.deleteConfig(host_type, host, false, true);
|
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return internalNginx.generateConfig(host_type, host);
|
return internalNginx.generateConfig(host_type, host);
|
||||||
@ -65,7 +64,7 @@ const internalNginx = {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.error('Nginx test failed:', valid_lines.join('\n'));
|
logger.error('Nginx test failed:', valid_lines.join('\n'));
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -81,9 +80,6 @@ const internalNginx = {
|
|||||||
.patch({
|
.patch({
|
||||||
meta: combined_meta
|
meta: combined_meta
|
||||||
})
|
})
|
||||||
.then(() => {
|
|
||||||
internalNginx.renameConfigAsError(host_type, host);
|
|
||||||
})
|
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return internalNginx.deleteConfig(host_type, host, true);
|
return internalNginx.deleteConfig(host_type, host, true);
|
||||||
});
|
});
|
||||||
@ -101,7 +97,7 @@ const internalNginx = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
test: () => {
|
test: () => {
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.info('Testing Nginx configuration');
|
logger.info('Testing Nginx configuration');
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -125,10 +121,13 @@ const internalNginx = {
|
|||||||
* @returns {String}
|
* @returns {String}
|
||||||
*/
|
*/
|
||||||
getConfigName: (host_type, host_id) => {
|
getConfigName: (host_type, host_id) => {
|
||||||
|
host_type = host_type.replace(new RegExp('-', 'g'), '_');
|
||||||
|
|
||||||
if (host_type === 'default') {
|
if (host_type === 'default') {
|
||||||
return '/data/nginx/default_host/site.conf';
|
return '/data/nginx/default_host/site.conf';
|
||||||
}
|
}
|
||||||
return '/data/nginx/' + internalNginx.getFileFriendlyHostType(host_type) + '/' + host_id + '.conf';
|
|
||||||
|
return '/data/nginx/' + host_type + '/' + host_id + '.conf';
|
||||||
},
|
},
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -137,6 +136,8 @@ const internalNginx = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
renderLocations: (host) => {
|
renderLocations: (host) => {
|
||||||
|
|
||||||
|
//logger.info('host = ' + JSON.stringify(host, null, 2));
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
let template;
|
let template;
|
||||||
|
|
||||||
@ -147,7 +148,9 @@ const internalNginx = {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const renderEngine = utils.getRenderEngine();
|
let renderer = new Liquid({
|
||||||
|
root: __dirname + '/../templates/'
|
||||||
|
});
|
||||||
let renderedLocations = '';
|
let renderedLocations = '';
|
||||||
|
|
||||||
const locationRendering = async () => {
|
const locationRendering = async () => {
|
||||||
@ -165,8 +168,10 @@ const internalNginx = {
|
|||||||
locationCopy.forward_path = `/${splitted.join('/')}`;
|
locationCopy.forward_path = `/${splitted.join('/')}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//logger.info('locationCopy = ' + JSON.stringify(locationCopy, null, 2));
|
||||||
|
|
||||||
// eslint-disable-next-line
|
// eslint-disable-next-line
|
||||||
renderedLocations += await renderEngine.parseAndRender(template, locationCopy);
|
renderedLocations += await renderer.parseAndRender(template, locationCopy);
|
||||||
}
|
}
|
||||||
|
|
||||||
};
|
};
|
||||||
@ -181,23 +186,25 @@ const internalNginx = {
|
|||||||
* @param {Object} host
|
* @param {Object} host
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
generateConfig: (host_type, host_row) => {
|
generateConfig: (host_type, host) => {
|
||||||
// Prevent modifying the original object:
|
host_type = host_type.replace(new RegExp('-', 'g'), '_');
|
||||||
let host = JSON.parse(JSON.stringify(host_row));
|
|
||||||
const nice_host_type = internalNginx.getFileFriendlyHostType(host_type);
|
|
||||||
|
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.info('Generating ' + nice_host_type + ' Config:', JSON.stringify(host, null, 2));
|
logger.info('Generating ' + host_type + ' Config:', host);
|
||||||
}
|
}
|
||||||
|
|
||||||
const renderEngine = utils.getRenderEngine();
|
// logger.info('host = ' + JSON.stringify(host, null, 2));
|
||||||
|
|
||||||
|
let renderEngine = new Liquid({
|
||||||
|
root: __dirname + '/../templates/'
|
||||||
|
});
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
let template = null;
|
let template = null;
|
||||||
let filename = internalNginx.getConfigName(nice_host_type, host.id);
|
let filename = internalNginx.getConfigName(host_type, host.id);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
template = fs.readFileSync(__dirname + '/../templates/' + nice_host_type + '.conf', {encoding: 'utf8'});
|
template = fs.readFileSync(__dirname + '/../templates/' + host_type + '.conf', {encoding: 'utf8'});
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
reject(new error.ConfigurationError(err.message));
|
reject(new error.ConfigurationError(err.message));
|
||||||
return;
|
return;
|
||||||
@ -207,7 +214,7 @@ const internalNginx = {
|
|||||||
let origLocations;
|
let origLocations;
|
||||||
|
|
||||||
// Manipulate the data a bit before sending it to the template
|
// Manipulate the data a bit before sending it to the template
|
||||||
if (nice_host_type !== 'default') {
|
if (host_type !== 'default') {
|
||||||
host.use_default_location = true;
|
host.use_default_location = true;
|
||||||
if (typeof host.advanced_config !== 'undefined' && host.advanced_config) {
|
if (typeof host.advanced_config !== 'undefined' && host.advanced_config) {
|
||||||
host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config);
|
host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config);
|
||||||
@ -241,7 +248,7 @@ const internalNginx = {
|
|||||||
.then((config_text) => {
|
.then((config_text) => {
|
||||||
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
|
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
|
||||||
|
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.success('Wrote config:', filename, config_text);
|
logger.success('Wrote config:', filename, config_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -251,7 +258,7 @@ const internalNginx = {
|
|||||||
resolve(true);
|
resolve(true);
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch((err) => {
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.warn('Could not write ' + filename + ':', err.message);
|
logger.warn('Could not write ' + filename + ':', err.message);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -270,11 +277,13 @@ const internalNginx = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
generateLetsEncryptRequestConfig: (certificate) => {
|
generateLetsEncryptRequestConfig: (certificate) => {
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.info('Generating LetsEncrypt Request Config:', certificate);
|
logger.info('Generating LetsEncrypt Request Config:', certificate);
|
||||||
}
|
}
|
||||||
|
|
||||||
const renderEngine = utils.getRenderEngine();
|
let renderEngine = new Liquid({
|
||||||
|
root: __dirname + '/../templates/'
|
||||||
|
});
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
let template = null;
|
let template = null;
|
||||||
@ -294,14 +303,14 @@ const internalNginx = {
|
|||||||
.then((config_text) => {
|
.then((config_text) => {
|
||||||
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
|
fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
|
||||||
|
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.success('Wrote config:', filename, config_text);
|
logger.success('Wrote config:', filename, config_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
resolve(true);
|
resolve(true);
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch((err) => {
|
||||||
if (config.debug()) {
|
if (debug_mode) {
|
||||||
logger.warn('Could not write ' + filename + ':', err.message);
|
logger.warn('Could not write ' + filename + ':', err.message);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -310,58 +319,33 @@ const internalNginx = {
|
|||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
/**
|
|
||||||
* A simple wrapper around unlinkSync that writes to the logger
|
|
||||||
*
|
|
||||||
* @param {String} filename
|
|
||||||
*/
|
|
||||||
deleteFile: (filename) => {
|
|
||||||
logger.debug('Deleting file: ' + filename);
|
|
||||||
try {
|
|
||||||
fs.unlinkSync(filename);
|
|
||||||
} catch (err) {
|
|
||||||
logger.debug('Could not delete file:', JSON.stringify(err, null, 2));
|
|
||||||
}
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
*
|
|
||||||
* @param {String} host_type
|
|
||||||
* @returns String
|
|
||||||
*/
|
|
||||||
getFileFriendlyHostType: (host_type) => {
|
|
||||||
return host_type.replace(new RegExp('-', 'g'), '_');
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig`
|
* This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig`
|
||||||
*
|
*
|
||||||
* @param {Object} certificate
|
* @param {Object} certificate
|
||||||
|
* @param {Boolean} [throw_errors]
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
deleteLetsEncryptRequestConfig: (certificate) => {
|
deleteLetsEncryptRequestConfig: (certificate, throw_errors) => {
|
||||||
const config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf';
|
return new Promise((resolve, reject) => {
|
||||||
return new Promise((resolve/*, reject*/) => {
|
try {
|
||||||
internalNginx.deleteFile(config_file);
|
let config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf';
|
||||||
resolve();
|
|
||||||
});
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
if (debug_mode) {
|
||||||
* @param {String} host_type
|
logger.warn('Deleting nginx config: ' + config_file);
|
||||||
* @param {Object} [host]
|
}
|
||||||
* @param {Boolean} [delete_err_file]
|
|
||||||
* @returns {Promise}
|
|
||||||
*/
|
|
||||||
deleteConfig: (host_type, host, delete_err_file) => {
|
|
||||||
const config_file = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id);
|
|
||||||
const config_file_err = config_file + '.err';
|
|
||||||
|
|
||||||
return new Promise((resolve/*, reject*/) => {
|
fs.unlinkSync(config_file);
|
||||||
internalNginx.deleteFile(config_file);
|
} catch (err) {
|
||||||
if (delete_err_file) {
|
if (debug_mode) {
|
||||||
internalNginx.deleteFile(config_file_err);
|
logger.warn('Could not delete config:', err.message);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (throw_errors) {
|
||||||
|
reject(err);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resolve();
|
resolve();
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
@ -369,20 +353,32 @@ const internalNginx = {
|
|||||||
/**
|
/**
|
||||||
* @param {String} host_type
|
* @param {String} host_type
|
||||||
* @param {Object} [host]
|
* @param {Object} [host]
|
||||||
|
* @param {Boolean} [throw_errors]
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
renameConfigAsError: (host_type, host) => {
|
deleteConfig: (host_type, host, throw_errors) => {
|
||||||
const config_file = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id);
|
host_type = host_type.replace(new RegExp('-', 'g'), '_');
|
||||||
const config_file_err = config_file + '.err';
|
|
||||||
|
|
||||||
return new Promise((resolve/*, reject*/) => {
|
return new Promise((resolve, reject) => {
|
||||||
fs.unlink(config_file, () => {
|
try {
|
||||||
// ignore result, continue
|
let config_file = internalNginx.getConfigName(host_type, typeof host === 'undefined' ? 0 : host.id);
|
||||||
fs.rename(config_file, config_file_err, () => {
|
|
||||||
// also ignore result, as this is a debugging informative file anyway
|
if (debug_mode) {
|
||||||
resolve();
|
logger.warn('Deleting nginx config: ' + config_file);
|
||||||
});
|
}
|
||||||
});
|
|
||||||
|
fs.unlinkSync(config_file);
|
||||||
|
} catch (err) {
|
||||||
|
if (debug_mode) {
|
||||||
|
logger.warn('Could not delete config:', err.message);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (throw_errors) {
|
||||||
|
reject(err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resolve();
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -403,12 +399,13 @@ const internalNginx = {
|
|||||||
/**
|
/**
|
||||||
* @param {String} host_type
|
* @param {String} host_type
|
||||||
* @param {Array} hosts
|
* @param {Array} hosts
|
||||||
|
* @param {Boolean} [throw_errors]
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
bulkDeleteConfigs: (host_type, hosts) => {
|
bulkDeleteConfigs: (host_type, hosts, throw_errors) => {
|
||||||
let promises = [];
|
let promises = [];
|
||||||
hosts.map(function (host) {
|
hosts.map(function (host) {
|
||||||
promises.push(internalNginx.deleteConfig(host_type, host, true));
|
promises.push(internalNginx.deleteConfig(host_type, host, throw_errors));
|
||||||
});
|
});
|
||||||
|
|
||||||
return Promise.all(promises);
|
return Promise.all(promises);
|
||||||
@ -418,8 +415,8 @@ const internalNginx = {
|
|||||||
* @param {string} config
|
* @param {string} config
|
||||||
* @returns {boolean}
|
* @returns {boolean}
|
||||||
*/
|
*/
|
||||||
advancedConfigHasDefaultLocation: function (cfg) {
|
advancedConfigHasDefaultLocation: function (config) {
|
||||||
return !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im);
|
return !!config.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im);
|
||||||
},
|
},
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -1,15 +1,13 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const proxyHostModel = require('../models/proxy_host');
|
const proxyHostModel = require('../models/proxy_host');
|
||||||
const internalHost = require('./host');
|
const internalHost = require('./host');
|
||||||
const internalNginx = require('./nginx');
|
const internalNginx = require('./nginx');
|
||||||
const internalAuditLog = require('./audit-log');
|
const internalAuditLog = require('./audit-log');
|
||||||
const internalCertificate = require('./certificate');
|
const internalCertificate = require('./certificate');
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
function omissions () {
|
function omissions () {
|
||||||
return ['is_deleted', 'owner.is_deleted'];
|
return ['is_deleted'];
|
||||||
}
|
}
|
||||||
|
|
||||||
const internalProxyHost = {
|
const internalProxyHost = {
|
||||||
@ -49,16 +47,10 @@ const internalProxyHost = {
|
|||||||
data.owner_user_id = access.token.getUserId(1);
|
data.owner_user_id = access.token.getUserId(1);
|
||||||
data = internalHost.cleanSslHstsData(data);
|
data = internalHost.cleanSslHstsData(data);
|
||||||
|
|
||||||
// Fix for db field not having a default value
|
|
||||||
// for this optional field.
|
|
||||||
if (typeof data.advanced_config === 'undefined') {
|
|
||||||
data.advanced_config = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
return proxyHostModel
|
return proxyHostModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (create_certificate) {
|
if (create_certificate) {
|
||||||
@ -178,7 +170,6 @@ const internalProxyHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where({id: data.id})
|
.where({id: data.id})
|
||||||
.patch(data)
|
.patch(data)
|
||||||
.then(utils.omitRow(omissions()))
|
|
||||||
.then((saved_row) => {
|
.then((saved_row) => {
|
||||||
// Add to audit log
|
// Add to audit log
|
||||||
return internalAuditLog.add(access, {
|
return internalAuditLog.add(access, {
|
||||||
@ -188,7 +179,7 @@ const internalProxyHost = {
|
|||||||
meta: data
|
meta: data
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return saved_row;
|
return _.omit(saved_row, omissions());
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
})
|
})
|
||||||
@ -232,29 +223,31 @@ const internalProxyHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[owner,access_list.[clients,items],certificate]')
|
.allowEager('[owner,access_list,access_list.[clients,items],certificate]')
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
row = internalHost.cleanRowCertificateMeta(row);
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
row = internalHost.cleanRowCertificateMeta(row);
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -271,7 +264,7 @@ const internalProxyHost = {
|
|||||||
return internalProxyHost.get(access, {id: data.id});
|
return internalProxyHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -319,7 +312,7 @@ const internalProxyHost = {
|
|||||||
});
|
});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (row.enabled) {
|
} else if (row.enabled) {
|
||||||
throw new error.ValidationError('Host is already enabled');
|
throw new error.ValidationError('Host is already enabled');
|
||||||
@ -365,7 +358,7 @@ const internalProxyHost = {
|
|||||||
return internalProxyHost.get(access, {id: data.id});
|
return internalProxyHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (!row.enabled) {
|
} else if (!row.enabled) {
|
||||||
throw new error.ValidationError('Host is already disabled');
|
throw new error.ValidationError('Host is already disabled');
|
||||||
@ -416,25 +409,26 @@ const internalProxyHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[owner,access_list,certificate]')
|
.omit(['is_deleted'])
|
||||||
.orderBy(castJsonIfNeed('domain_names'), 'ASC');
|
.allowEager('[owner,access_list,certificate]')
|
||||||
|
.orderBy('domain_names', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string' && search_query.length > 0) {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where(castJsonIfNeed('domain_names'), 'like', `%${search_query}%`);
|
this.where('domain_names', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
})
|
})
|
||||||
.then((rows) => {
|
.then((rows) => {
|
||||||
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
||||||
|
@ -1,12 +1,10 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const redirectionHostModel = require('../models/redirection_host');
|
const redirectionHostModel = require('../models/redirection_host');
|
||||||
const internalHost = require('./host');
|
const internalHost = require('./host');
|
||||||
const internalNginx = require('./nginx');
|
const internalNginx = require('./nginx');
|
||||||
const internalAuditLog = require('./audit-log');
|
const internalAuditLog = require('./audit-log');
|
||||||
const internalCertificate = require('./certificate');
|
const internalCertificate = require('./certificate');
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
function omissions () {
|
function omissions () {
|
||||||
return ['is_deleted'];
|
return ['is_deleted'];
|
||||||
@ -49,16 +47,10 @@ const internalRedirectionHost = {
|
|||||||
data.owner_user_id = access.token.getUserId(1);
|
data.owner_user_id = access.token.getUserId(1);
|
||||||
data = internalHost.cleanSslHstsData(data);
|
data = internalHost.cleanSslHstsData(data);
|
||||||
|
|
||||||
// Fix for db field not having a default value
|
|
||||||
// for this optional field.
|
|
||||||
if (typeof data.advanced_config === 'undefined') {
|
|
||||||
data.advanced_config = '';
|
|
||||||
}
|
|
||||||
|
|
||||||
return redirectionHostModel
|
return redirectionHostModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (create_certificate) {
|
if (create_certificate) {
|
||||||
@ -73,8 +65,9 @@ const internalRedirectionHost = {
|
|||||||
.then(() => {
|
.then(() => {
|
||||||
return row;
|
return row;
|
||||||
});
|
});
|
||||||
|
} else {
|
||||||
|
return row;
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
// re-fetch with cert
|
// re-fetch with cert
|
||||||
@ -225,29 +218,31 @@ const internalRedirectionHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[owner,certificate]')
|
.allowEager('[owner,certificate]')
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
row = internalHost.cleanRowCertificateMeta(row);
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
row = internalHost.cleanRowCertificateMeta(row);
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -264,7 +259,7 @@ const internalRedirectionHost = {
|
|||||||
return internalRedirectionHost.get(access, {id: data.id});
|
return internalRedirectionHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -312,7 +307,7 @@ const internalRedirectionHost = {
|
|||||||
});
|
});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (row.enabled) {
|
} else if (row.enabled) {
|
||||||
throw new error.ValidationError('Host is already enabled');
|
throw new error.ValidationError('Host is already enabled');
|
||||||
@ -358,7 +353,7 @@ const internalRedirectionHost = {
|
|||||||
return internalRedirectionHost.get(access, {id: data.id});
|
return internalRedirectionHost.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (!row.enabled) {
|
} else if (!row.enabled) {
|
||||||
throw new error.ValidationError('Host is already disabled');
|
throw new error.ValidationError('Host is already disabled');
|
||||||
@ -409,25 +404,26 @@ const internalRedirectionHost = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[owner,certificate]')
|
.omit(['is_deleted'])
|
||||||
.orderBy(castJsonIfNeed('domain_names'), 'ASC');
|
.allowEager('[owner,certificate]')
|
||||||
|
.orderBy('domain_names', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string' && search_query.length > 0) {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where(castJsonIfNeed('domain_names'), 'like', `%${search_query}%`);
|
this.where('domain_names', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
})
|
})
|
||||||
.then((rows) => {
|
.then((rows) => {
|
||||||
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
const streamModel = require('../models/stream');
|
||||||
const streamModel = require('../models/stream');
|
const internalNginx = require('./nginx');
|
||||||
const internalNginx = require('./nginx');
|
const internalAuditLog = require('./audit-log');
|
||||||
const internalAuditLog = require('./audit-log');
|
|
||||||
const internalCertificate = require('./certificate');
|
|
||||||
const internalHost = require('./host');
|
|
||||||
const {castJsonIfNeed} = require('../lib/helpers');
|
|
||||||
|
|
||||||
function omissions () {
|
function omissions () {
|
||||||
return ['is_deleted', 'owner.is_deleted', 'certificate.is_deleted'];
|
return ['is_deleted'];
|
||||||
}
|
}
|
||||||
|
|
||||||
const internalStream = {
|
const internalStream = {
|
||||||
@ -20,12 +16,6 @@ const internalStream = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
create: (access, data) => {
|
create: (access, data) => {
|
||||||
const create_certificate = data.certificate_id === 'new';
|
|
||||||
|
|
||||||
if (create_certificate) {
|
|
||||||
delete data.certificate_id;
|
|
||||||
}
|
|
||||||
|
|
||||||
return access.can('streams:create', data)
|
return access.can('streams:create', data)
|
||||||
.then((/*access_data*/) => {
|
.then((/*access_data*/) => {
|
||||||
// TODO: At this point the existing ports should have been checked
|
// TODO: At this point the existing ports should have been checked
|
||||||
@ -35,44 +25,16 @@ const internalStream = {
|
|||||||
data.meta = {};
|
data.meta = {};
|
||||||
}
|
}
|
||||||
|
|
||||||
// streams aren't routed by domain name so don't store domain names in the DB
|
|
||||||
let data_no_domains = structuredClone(data);
|
|
||||||
delete data_no_domains.domain_names;
|
|
||||||
|
|
||||||
return streamModel
|
return streamModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data_no_domains)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (create_certificate) {
|
|
||||||
return internalCertificate.createQuickCertificate(access, data)
|
|
||||||
.then((cert) => {
|
|
||||||
// update host with cert id
|
|
||||||
return internalStream.update(access, {
|
|
||||||
id: row.id,
|
|
||||||
certificate_id: cert.id
|
|
||||||
});
|
|
||||||
})
|
|
||||||
.then(() => {
|
|
||||||
return row;
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
return row;
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
// re-fetch with cert
|
|
||||||
return internalStream.get(access, {
|
|
||||||
id: row.id,
|
|
||||||
expand: ['certificate', 'owner']
|
|
||||||
});
|
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
// Configure nginx
|
// Configure nginx
|
||||||
return internalNginx.configure(streamModel, 'stream', row)
|
return internalNginx.configure(streamModel, 'stream', row)
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return row;
|
return internalStream.get(access, {id: row.id, expand: ['owner']});
|
||||||
});
|
});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
@ -96,12 +58,6 @@ const internalStream = {
|
|||||||
* @return {Promise}
|
* @return {Promise}
|
||||||
*/
|
*/
|
||||||
update: (access, data) => {
|
update: (access, data) => {
|
||||||
const create_certificate = data.certificate_id === 'new';
|
|
||||||
|
|
||||||
if (create_certificate) {
|
|
||||||
delete data.certificate_id;
|
|
||||||
}
|
|
||||||
|
|
||||||
return access.can('streams:update', data.id)
|
return access.can('streams:update', data.id)
|
||||||
.then((/*access_data*/) => {
|
.then((/*access_data*/) => {
|
||||||
// TODO: at this point the existing streams should have been checked
|
// TODO: at this point the existing streams should have been checked
|
||||||
@ -113,32 +69,16 @@ const internalStream = {
|
|||||||
throw new error.InternalValidationError('Stream could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
|
throw new error.InternalValidationError('Stream could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (create_certificate) {
|
|
||||||
return internalCertificate.createQuickCertificate(access, {
|
|
||||||
domain_names: data.domain_names || row.domain_names,
|
|
||||||
meta: _.assign({}, row.meta, data.meta)
|
|
||||||
})
|
|
||||||
.then((cert) => {
|
|
||||||
// update host with cert id
|
|
||||||
data.certificate_id = cert.id;
|
|
||||||
})
|
|
||||||
.then(() => {
|
|
||||||
return row;
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
return row;
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
|
|
||||||
data = _.assign({}, {
|
|
||||||
domain_names: row.domain_names
|
|
||||||
}, data);
|
|
||||||
|
|
||||||
return streamModel
|
return streamModel
|
||||||
.query()
|
.query()
|
||||||
|
.omit(omissions())
|
||||||
.patchAndFetchById(row.id, data)
|
.patchAndFetchById(row.id, data)
|
||||||
.then(utils.omitRow(omissions()))
|
.then((saved_row) => {
|
||||||
|
return internalNginx.configure(streamModel, 'stream', saved_row)
|
||||||
|
.then(() => {
|
||||||
|
return internalStream.get(access, {id: row.id, expand: ['owner']});
|
||||||
|
});
|
||||||
|
})
|
||||||
.then((saved_row) => {
|
.then((saved_row) => {
|
||||||
// Add to audit log
|
// Add to audit log
|
||||||
return internalAuditLog.add(access, {
|
return internalAuditLog.add(access, {
|
||||||
@ -148,18 +88,7 @@ const internalStream = {
|
|||||||
meta: data
|
meta: data
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return saved_row;
|
return _.omit(saved_row, omissions());
|
||||||
});
|
|
||||||
});
|
|
||||||
})
|
|
||||||
.then(() => {
|
|
||||||
return internalStream.get(access, {id: data.id, expand: ['owner', 'certificate']})
|
|
||||||
.then((row) => {
|
|
||||||
return internalNginx.configure(streamModel, 'stream', row)
|
|
||||||
.then((new_meta) => {
|
|
||||||
row.meta = new_meta;
|
|
||||||
row = internalHost.cleanRowCertificateMeta(row);
|
|
||||||
return _.omit(row, omissions());
|
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@ -184,29 +113,30 @@ const internalStream = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[owner,certificate]')
|
.allowEager('[owner]')
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
row = internalHost.cleanRowCertificateMeta(row);
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -223,7 +153,7 @@ const internalStream = {
|
|||||||
return internalStream.get(access, {id: data.id});
|
return internalStream.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -267,14 +197,14 @@ const internalStream = {
|
|||||||
.then(() => {
|
.then(() => {
|
||||||
return internalStream.get(access, {
|
return internalStream.get(access, {
|
||||||
id: data.id,
|
id: data.id,
|
||||||
expand: ['certificate', 'owner']
|
expand: ['owner']
|
||||||
});
|
});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (row.enabled) {
|
} else if (row.enabled) {
|
||||||
throw new error.ValidationError('Stream is already enabled');
|
throw new error.ValidationError('Host is already enabled');
|
||||||
}
|
}
|
||||||
|
|
||||||
row.enabled = 1;
|
row.enabled = 1;
|
||||||
@ -317,10 +247,10 @@ const internalStream = {
|
|||||||
return internalStream.get(access, {id: data.id});
|
return internalStream.get(access, {id: data.id});
|
||||||
})
|
})
|
||||||
.then((row) => {
|
.then((row) => {
|
||||||
if (!row || !row.id) {
|
if (!row) {
|
||||||
throw new error.ItemNotFoundError(data.id);
|
throw new error.ItemNotFoundError(data.id);
|
||||||
} else if (!row.enabled) {
|
} else if (!row.enabled) {
|
||||||
throw new error.ValidationError('Stream is already disabled');
|
throw new error.ValidationError('Host is already disabled');
|
||||||
}
|
}
|
||||||
|
|
||||||
row.enabled = 0;
|
row.enabled = 0;
|
||||||
@ -364,36 +294,30 @@ const internalStream = {
|
|||||||
getAll: (access, expand, search_query) => {
|
getAll: (access, expand, search_query) => {
|
||||||
return access.can('streams:list')
|
return access.can('streams:list')
|
||||||
.then((access_data) => {
|
.then((access_data) => {
|
||||||
const query = streamModel
|
let query = streamModel
|
||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[owner,certificate]')
|
.omit(['is_deleted'])
|
||||||
.orderByRaw('CAST(incoming_port AS INTEGER) ASC');
|
.allowEager('[owner]')
|
||||||
|
.orderBy('incoming_port', 'ASC');
|
||||||
|
|
||||||
if (access_data.permission_visibility !== 'all') {
|
if (access_data.permission_visibility !== 'all') {
|
||||||
query.andWhere('owner_user_id', access.token.getUserId(1));
|
query.andWhere('owner_user_id', access.token.getUserId(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
if (typeof search_query === 'string' && search_query.length > 0) {
|
if (typeof search_query === 'string') {
|
||||||
query.where(function () {
|
query.where(function () {
|
||||||
this.where(castJsonIfNeed('incoming_port'), 'like', `%${search_query}%`);
|
this.where('incoming_port', 'like', '%' + search_query + '%');
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
})
|
|
||||||
.then((rows) => {
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
|
|
||||||
return internalHost.cleanAllRowsCertificateMeta(rows);
|
|
||||||
}
|
|
||||||
|
|
||||||
return rows;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -405,9 +329,9 @@ const internalStream = {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
getCount: (user_id, visibility) => {
|
getCount: (user_id, visibility) => {
|
||||||
const query = streamModel
|
let query = streamModel
|
||||||
.query()
|
.query()
|
||||||
.count('id AS count')
|
.count('id as count')
|
||||||
.where('is_deleted', 0);
|
.where('is_deleted', 0);
|
||||||
|
|
||||||
if (visibility !== 'all') {
|
if (visibility !== 'all') {
|
||||||
|
@ -5,8 +5,6 @@ const authModel = require('../models/auth');
|
|||||||
const helpers = require('../lib/helpers');
|
const helpers = require('../lib/helpers');
|
||||||
const TokenModel = require('../models/token');
|
const TokenModel = require('../models/token');
|
||||||
|
|
||||||
const ERROR_MESSAGE_INVALID_AUTH = 'Invalid email or password';
|
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -26,7 +24,7 @@ module.exports = {
|
|||||||
|
|
||||||
return userModel
|
return userModel
|
||||||
.query()
|
.query()
|
||||||
.where('email', data.identity.toLowerCase().trim())
|
.where('email', data.identity)
|
||||||
.andWhere('is_deleted', 0)
|
.andWhere('is_deleted', 0)
|
||||||
.andWhere('is_disabled', 0)
|
.andWhere('is_disabled', 0)
|
||||||
.first()
|
.first()
|
||||||
@ -71,15 +69,15 @@ module.exports = {
|
|||||||
};
|
};
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH);
|
throw new error.AuthError('Invalid password');
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH);
|
throw new error.AuthError('No password auth for user');
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH);
|
throw new error.AuthError('No relevant user found');
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const utils = require('../lib/utils');
|
|
||||||
const userModel = require('../models/user');
|
const userModel = require('../models/user');
|
||||||
const userPermissionModel = require('../models/user_permission');
|
const userPermissionModel = require('../models/user_permission');
|
||||||
const authModel = require('../models/auth');
|
const authModel = require('../models/auth');
|
||||||
@ -36,8 +35,8 @@ const internalUser = {
|
|||||||
|
|
||||||
return userModel
|
return userModel
|
||||||
.query()
|
.query()
|
||||||
.insertAndFetch(data)
|
.omit(omissions())
|
||||||
.then(utils.omitRow(omissions()));
|
.insertAndFetch(data);
|
||||||
})
|
})
|
||||||
.then((user) => {
|
.then((user) => {
|
||||||
if (auth) {
|
if (auth) {
|
||||||
@ -141,8 +140,11 @@ const internalUser = {
|
|||||||
|
|
||||||
return userModel
|
return userModel
|
||||||
.query()
|
.query()
|
||||||
|
.omit(omissions())
|
||||||
.patchAndFetchById(user.id, data)
|
.patchAndFetchById(user.id, data)
|
||||||
.then(utils.omitRow(omissions()));
|
.then((saved_user) => {
|
||||||
|
return _.omit(saved_user, omissions());
|
||||||
|
});
|
||||||
})
|
})
|
||||||
.then(() => {
|
.then(() => {
|
||||||
return internalUser.get(access, {id: data.id});
|
return internalUser.get(access, {id: data.id});
|
||||||
@ -184,24 +186,26 @@ const internalUser = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.andWhere('id', data.id)
|
.andWhere('id', data.id)
|
||||||
.allowGraph('[permissions]')
|
.allowEager('[permissions]')
|
||||||
.first();
|
.first();
|
||||||
|
|
||||||
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
|
||||||
query.withGraphFetched('[' + data.expand.join(', ') + ']');
|
|
||||||
}
|
|
||||||
|
|
||||||
return query.then(utils.omitRow(omissions()));
|
|
||||||
})
|
|
||||||
.then((row) => {
|
|
||||||
if (!row || !row.id) {
|
|
||||||
throw new error.ItemNotFoundError(data.id);
|
|
||||||
}
|
|
||||||
// Custom omissions
|
// Custom omissions
|
||||||
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
if (typeof data.omit !== 'undefined' && data.omit !== null) {
|
||||||
row = _.omit(row, data.omit);
|
query.omit(data.omit);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof data.expand !== 'undefined' && data.expand !== null) {
|
||||||
|
query.eager('[' + data.expand.join(', ') + ']');
|
||||||
|
}
|
||||||
|
|
||||||
|
return query;
|
||||||
|
})
|
||||||
|
.then((row) => {
|
||||||
|
if (row) {
|
||||||
|
return _.omit(row, omissions());
|
||||||
|
} else {
|
||||||
|
throw new error.ItemNotFoundError(data.id);
|
||||||
}
|
}
|
||||||
return row;
|
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -318,7 +322,8 @@ const internalUser = {
|
|||||||
.query()
|
.query()
|
||||||
.where('is_deleted', 0)
|
.where('is_deleted', 0)
|
||||||
.groupBy('id')
|
.groupBy('id')
|
||||||
.allowGraph('[permissions]')
|
.omit(['is_deleted'])
|
||||||
|
.allowEager('[permissions]')
|
||||||
.orderBy('name', 'ASC');
|
.orderBy('name', 'ASC');
|
||||||
|
|
||||||
// Query is used for searching
|
// Query is used for searching
|
||||||
@ -330,10 +335,10 @@ const internalUser = {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (typeof expand !== 'undefined' && expand !== null) {
|
if (typeof expand !== 'undefined' && expand !== null) {
|
||||||
query.withGraphFetched('[' + expand.join(', ') + ']');
|
query.eager('[' + expand.join(', ') + ']');
|
||||||
}
|
}
|
||||||
|
|
||||||
return query.then(utils.omitRows(omissions()));
|
return query;
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
module.exports = {
|
module.exports = {
|
||||||
development: {
|
development: {
|
||||||
client: 'mysql2',
|
client: 'mysql',
|
||||||
migrations: {
|
migrations: {
|
||||||
tableName: 'migrations',
|
tableName: 'migrations',
|
||||||
stub: 'lib/migrate_template.js',
|
stub: 'lib/migrate_template.js',
|
||||||
@ -9,7 +9,7 @@ module.exports = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
production: {
|
production: {
|
||||||
client: 'mysql2',
|
client: 'mysql',
|
||||||
migrations: {
|
migrations: {
|
||||||
tableName: 'migrations',
|
tableName: 'migrations',
|
||||||
stub: 'lib/migrate_template.js',
|
stub: 'lib/migrate_template.js',
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
|
|
||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const logger = require('../logger').access;
|
const logger = require('../logger').access;
|
||||||
const Ajv = require('ajv/dist/2020');
|
const validator = require('ajv');
|
||||||
const error = require('./error');
|
const error = require('./error');
|
||||||
const userModel = require('../models/user');
|
const userModel = require('../models/user');
|
||||||
const proxyHostModel = require('../models/proxy_host');
|
const proxyHostModel = require('../models/proxy_host');
|
||||||
@ -55,8 +55,8 @@ module.exports = function (token_string) {
|
|||||||
.where('id', token_data.attrs.id)
|
.where('id', token_data.attrs.id)
|
||||||
.andWhere('is_deleted', 0)
|
.andWhere('is_deleted', 0)
|
||||||
.andWhere('is_disabled', 0)
|
.andWhere('is_disabled', 0)
|
||||||
.allowGraph('[permissions]')
|
.allowEager('[permissions]')
|
||||||
.withGraphFetched('[permissions]')
|
.eager('[permissions]')
|
||||||
.first()
|
.first()
|
||||||
.then((user) => {
|
.then((user) => {
|
||||||
if (user) {
|
if (user) {
|
||||||
@ -174,6 +174,7 @@ module.exports = function (token_string) {
|
|||||||
|
|
||||||
let schema = {
|
let schema = {
|
||||||
$id: 'objects',
|
$id: 'objects',
|
||||||
|
$schema: 'http://json-schema.org/draft-07/schema#',
|
||||||
description: 'Actor Properties',
|
description: 'Actor Properties',
|
||||||
type: 'object',
|
type: 'object',
|
||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
@ -250,7 +251,7 @@ module.exports = function (token_string) {
|
|||||||
// Initialised, token decoded ok
|
// Initialised, token decoded ok
|
||||||
return this.getObjectSchema(permission)
|
return this.getObjectSchema(permission)
|
||||||
.then((objectSchema) => {
|
.then((objectSchema) => {
|
||||||
const data_schema = {
|
let data_schema = {
|
||||||
[permission]: {
|
[permission]: {
|
||||||
data: data,
|
data: data,
|
||||||
scope: Token.get('scope'),
|
scope: Token.get('scope'),
|
||||||
@ -266,18 +267,24 @@ module.exports = function (token_string) {
|
|||||||
};
|
};
|
||||||
|
|
||||||
let permissionSchema = {
|
let permissionSchema = {
|
||||||
|
$schema: 'http://json-schema.org/draft-07/schema#',
|
||||||
$async: true,
|
$async: true,
|
||||||
$id: 'permissions',
|
$id: 'permissions',
|
||||||
type: 'object',
|
|
||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {}
|
properties: {}
|
||||||
};
|
};
|
||||||
|
|
||||||
permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json');
|
permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json');
|
||||||
|
|
||||||
const ajv = new Ajv({
|
// logger.info('objectSchema', JSON.stringify(objectSchema, null, 2));
|
||||||
|
// logger.info('permissionSchema', JSON.stringify(permissionSchema, null, 2));
|
||||||
|
// logger.info('data_schema', JSON.stringify(data_schema, null, 2));
|
||||||
|
|
||||||
|
let ajv = validator({
|
||||||
verbose: true,
|
verbose: true,
|
||||||
allErrors: true,
|
allErrors: true,
|
||||||
|
format: 'full',
|
||||||
|
missingRefs: 'fail',
|
||||||
breakOnError: true,
|
breakOnError: true,
|
||||||
coerceTypes: true,
|
coerceTypes: true,
|
||||||
schemas: [
|
schemas: [
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
{
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
"$id": "perms",
|
"$id": "perms",
|
||||||
"definitions": {
|
"definitions": {
|
||||||
"view": {
|
"view": {
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
{
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
"$id": "roles",
|
"$id": "roles",
|
||||||
"definitions": {
|
"definitions": {
|
||||||
"admin": {
|
"admin": {
|
||||||
|
@ -1,78 +0,0 @@
|
|||||||
const dnsPlugins = require('../global/certbot-dns-plugins.json');
|
|
||||||
const utils = require('./utils');
|
|
||||||
const error = require('./error');
|
|
||||||
const logger = require('../logger').certbot;
|
|
||||||
const batchflow = require('batchflow');
|
|
||||||
|
|
||||||
const CERTBOT_VERSION_REPLACEMENT = '$(certbot --version | grep -Eo \'[0-9](\\.[0-9]+)+\')';
|
|
||||||
|
|
||||||
const certbot = {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @param {array} pluginKeys
|
|
||||||
*/
|
|
||||||
installPlugins: async function (pluginKeys) {
|
|
||||||
let hasErrors = false;
|
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
|
||||||
if (pluginKeys.length === 0) {
|
|
||||||
resolve();
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
batchflow(pluginKeys).sequential()
|
|
||||||
.each((i, pluginKey, next) => {
|
|
||||||
certbot.installPlugin(pluginKey)
|
|
||||||
.then(() => {
|
|
||||||
next();
|
|
||||||
})
|
|
||||||
.catch((err) => {
|
|
||||||
hasErrors = true;
|
|
||||||
next(err);
|
|
||||||
});
|
|
||||||
})
|
|
||||||
.error((err) => {
|
|
||||||
logger.error(err.message);
|
|
||||||
})
|
|
||||||
.end(() => {
|
|
||||||
if (hasErrors) {
|
|
||||||
reject(new error.CommandError('Some plugins failed to install. Please check the logs above', 1));
|
|
||||||
} else {
|
|
||||||
resolve();
|
|
||||||
}
|
|
||||||
});
|
|
||||||
});
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Installs a cerbot plugin given the key for the object from
|
|
||||||
* ../global/certbot-dns-plugins.json
|
|
||||||
*
|
|
||||||
* @param {string} pluginKey
|
|
||||||
* @returns {Object}
|
|
||||||
*/
|
|
||||||
installPlugin: async function (pluginKey) {
|
|
||||||
if (typeof dnsPlugins[pluginKey] === 'undefined') {
|
|
||||||
// throw Error(`Certbot plugin ${pluginKey} not found`);
|
|
||||||
throw new error.ItemNotFoundError(pluginKey);
|
|
||||||
}
|
|
||||||
|
|
||||||
const plugin = dnsPlugins[pluginKey];
|
|
||||||
logger.start(`Installing ${pluginKey}...`);
|
|
||||||
|
|
||||||
plugin.version = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
|
|
||||||
plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
|
|
||||||
|
|
||||||
const cmd = '. /opt/certbot/bin/activate && pip install --no-cache-dir ' + plugin.dependencies + ' ' + plugin.package_name + plugin.version + ' ' + ' && deactivate';
|
|
||||||
return utils.exec(cmd)
|
|
||||||
.then((result) => {
|
|
||||||
logger.complete(`Installed ${pluginKey}`);
|
|
||||||
return result;
|
|
||||||
})
|
|
||||||
.catch((err) => {
|
|
||||||
throw err;
|
|
||||||
});
|
|
||||||
},
|
|
||||||
};
|
|
||||||
|
|
||||||
module.exports = certbot;
|
|
@ -1,237 +0,0 @@
|
|||||||
const fs = require('fs');
|
|
||||||
const NodeRSA = require('node-rsa');
|
|
||||||
const logger = require('../logger').global;
|
|
||||||
|
|
||||||
const keysFile = '/data/keys.json';
|
|
||||||
const mysqlEngine = 'mysql2';
|
|
||||||
const postgresEngine = 'pg';
|
|
||||||
const sqliteClientName = 'sqlite3';
|
|
||||||
|
|
||||||
let instance = null;
|
|
||||||
|
|
||||||
// 1. Load from config file first (not recommended anymore)
|
|
||||||
// 2. Use config env variables next
|
|
||||||
const configure = () => {
|
|
||||||
const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json';
|
|
||||||
if (fs.existsSync(filename)) {
|
|
||||||
let configData;
|
|
||||||
try {
|
|
||||||
configData = require(filename);
|
|
||||||
} catch (_) {
|
|
||||||
// do nothing
|
|
||||||
}
|
|
||||||
|
|
||||||
if (configData && configData.database) {
|
|
||||||
logger.info(`Using configuration from file: ${filename}`);
|
|
||||||
instance = configData;
|
|
||||||
instance.keys = getKeys();
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const envMysqlHost = process.env.DB_MYSQL_HOST || null;
|
|
||||||
const envMysqlUser = process.env.DB_MYSQL_USER || null;
|
|
||||||
const envMysqlName = process.env.DB_MYSQL_NAME || null;
|
|
||||||
if (envMysqlHost && envMysqlUser && envMysqlName) {
|
|
||||||
// we have enough mysql creds to go with mysql
|
|
||||||
logger.info('Using MySQL configuration');
|
|
||||||
instance = {
|
|
||||||
database: {
|
|
||||||
engine: mysqlEngine,
|
|
||||||
host: envMysqlHost,
|
|
||||||
port: process.env.DB_MYSQL_PORT || 3306,
|
|
||||||
user: envMysqlUser,
|
|
||||||
password: process.env.DB_MYSQL_PASSWORD,
|
|
||||||
name: envMysqlName,
|
|
||||||
},
|
|
||||||
keys: getKeys(),
|
|
||||||
};
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
const envPostgresHost = process.env.DB_POSTGRES_HOST || null;
|
|
||||||
const envPostgresUser = process.env.DB_POSTGRES_USER || null;
|
|
||||||
const envPostgresName = process.env.DB_POSTGRES_NAME || null;
|
|
||||||
if (envPostgresHost && envPostgresUser && envPostgresName) {
|
|
||||||
// we have enough postgres creds to go with postgres
|
|
||||||
logger.info('Using Postgres configuration');
|
|
||||||
instance = {
|
|
||||||
database: {
|
|
||||||
engine: postgresEngine,
|
|
||||||
host: envPostgresHost,
|
|
||||||
port: process.env.DB_POSTGRES_PORT || 5432,
|
|
||||||
user: envPostgresUser,
|
|
||||||
password: process.env.DB_POSTGRES_PASSWORD,
|
|
||||||
name: envPostgresName,
|
|
||||||
},
|
|
||||||
keys: getKeys(),
|
|
||||||
};
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
const envSqliteFile = process.env.DB_SQLITE_FILE || '/data/database.sqlite';
|
|
||||||
logger.info(`Using Sqlite: ${envSqliteFile}`);
|
|
||||||
instance = {
|
|
||||||
database: {
|
|
||||||
engine: 'knex-native',
|
|
||||||
knex: {
|
|
||||||
client: sqliteClientName,
|
|
||||||
connection: {
|
|
||||||
filename: envSqliteFile
|
|
||||||
},
|
|
||||||
useNullAsDefault: true
|
|
||||||
}
|
|
||||||
},
|
|
||||||
keys: getKeys(),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
const getKeys = () => {
|
|
||||||
// Get keys from file
|
|
||||||
if (!fs.existsSync(keysFile)) {
|
|
||||||
generateKeys();
|
|
||||||
} else if (process.env.DEBUG) {
|
|
||||||
logger.info('Keys file exists OK');
|
|
||||||
}
|
|
||||||
try {
|
|
||||||
return require(keysFile);
|
|
||||||
} catch (err) {
|
|
||||||
logger.error('Could not read JWT key pair from config file: ' + keysFile, err);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
const generateKeys = () => {
|
|
||||||
logger.info('Creating a new JWT key pair...');
|
|
||||||
// Now create the keys and save them in the config.
|
|
||||||
const key = new NodeRSA({ b: 2048 });
|
|
||||||
key.generateKeyPair();
|
|
||||||
|
|
||||||
const keys = {
|
|
||||||
key: key.exportKey('private').toString(),
|
|
||||||
pub: key.exportKey('public').toString(),
|
|
||||||
};
|
|
||||||
|
|
||||||
// Write keys config
|
|
||||||
try {
|
|
||||||
fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2));
|
|
||||||
} catch (err) {
|
|
||||||
logger.error('Could not write JWT key pair to config file: ' + keysFile + ': ' + err.message);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
logger.info('Wrote JWT key pair to config file: ' + keysFile);
|
|
||||||
};
|
|
||||||
|
|
||||||
module.exports = {
|
|
||||||
|
|
||||||
/**
|
|
||||||
*
|
|
||||||
* @param {string} key ie: 'database' or 'database.engine'
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
has: function(key) {
|
|
||||||
instance === null && configure();
|
|
||||||
const keys = key.split('.');
|
|
||||||
let level = instance;
|
|
||||||
let has = true;
|
|
||||||
keys.forEach((keyItem) =>{
|
|
||||||
if (typeof level[keyItem] === 'undefined') {
|
|
||||||
has = false;
|
|
||||||
} else {
|
|
||||||
level = level[keyItem];
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
return has;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Gets a specific key from the top level
|
|
||||||
*
|
|
||||||
* @param {string} key
|
|
||||||
* @returns {*}
|
|
||||||
*/
|
|
||||||
get: function (key) {
|
|
||||||
instance === null && configure();
|
|
||||||
if (key && typeof instance[key] !== 'undefined') {
|
|
||||||
return instance[key];
|
|
||||||
}
|
|
||||||
return instance;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this a sqlite configuration?
|
|
||||||
*
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
isSqlite: function () {
|
|
||||||
instance === null && configure();
|
|
||||||
return instance.database.knex && instance.database.knex.client === sqliteClientName;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this a mysql configuration?
|
|
||||||
*
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
isMysql: function () {
|
|
||||||
instance === null && configure();
|
|
||||||
return instance.database.engine === mysqlEngine;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Is this a postgres configuration?
|
|
||||||
*
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
isPostgres: function () {
|
|
||||||
instance === null && configure();
|
|
||||||
return instance.database.engine === postgresEngine;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Are we running in debug mdoe?
|
|
||||||
*
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
debug: function () {
|
|
||||||
return !!process.env.DEBUG;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a public key
|
|
||||||
*
|
|
||||||
* @returns {string}
|
|
||||||
*/
|
|
||||||
getPublicKey: function () {
|
|
||||||
instance === null && configure();
|
|
||||||
return instance.keys.pub;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a private key
|
|
||||||
*
|
|
||||||
* @returns {string}
|
|
||||||
*/
|
|
||||||
getPrivateKey: function () {
|
|
||||||
instance === null && configure();
|
|
||||||
return instance.keys.key;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
useLetsencryptStaging: function () {
|
|
||||||
return !!process.env.LE_STAGING;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @returns {string|null}
|
|
||||||
*/
|
|
||||||
useLetsencryptServer: function () {
|
|
||||||
if (process.env.LE_SERVER) {
|
|
||||||
return process.env.LE_SERVER;
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
};
|
|
@ -82,16 +82,7 @@ module.exports = {
|
|||||||
this.message = message;
|
this.message = message;
|
||||||
this.public = false;
|
this.public = false;
|
||||||
this.status = 400;
|
this.status = 400;
|
||||||
},
|
}
|
||||||
|
|
||||||
CommandError: function (stdErr, code, previous) {
|
|
||||||
Error.captureStackTrace(this, this.constructor);
|
|
||||||
this.name = this.constructor.name;
|
|
||||||
this.previous = previous;
|
|
||||||
this.message = stdErr;
|
|
||||||
this.code = code;
|
|
||||||
this.public = false;
|
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
_.forEach(module.exports, function (error) {
|
_.forEach(module.exports, function (error) {
|
||||||
|
@ -1,16 +1,40 @@
|
|||||||
|
const validator = require('../validator');
|
||||||
|
|
||||||
module.exports = function (req, res, next) {
|
module.exports = function (req, res, next) {
|
||||||
|
|
||||||
if (req.headers.origin) {
|
if (req.headers.origin) {
|
||||||
res.set({
|
|
||||||
'Access-Control-Allow-Origin': req.headers.origin,
|
const originSchema = {
|
||||||
'Access-Control-Allow-Credentials': true,
|
oneOf: [
|
||||||
'Access-Control-Allow-Methods': 'OPTIONS, GET, POST',
|
{
|
||||||
'Access-Control-Allow-Headers': 'Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit',
|
type: 'string',
|
||||||
'Access-Control-Max-Age': 5 * 60,
|
pattern: '^[a-z\\-]+:\\/\\/(?:[\\w\\-\\.]+(:[0-9]+)?/?)?$'
|
||||||
'Access-Control-Expose-Headers': 'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit'
|
},
|
||||||
});
|
{
|
||||||
next();
|
type: 'string',
|
||||||
|
pattern: '^[a-z\\-]+:\\/\\/(?:\\[([a-z0-9]{0,4}\\:?)+\\])?/?(:[0-9]+)?$'
|
||||||
|
}
|
||||||
|
]
|
||||||
|
};
|
||||||
|
|
||||||
|
// very relaxed validation....
|
||||||
|
validator(originSchema, req.headers.origin)
|
||||||
|
.then(function () {
|
||||||
|
res.set({
|
||||||
|
'Access-Control-Allow-Origin': req.headers.origin,
|
||||||
|
'Access-Control-Allow-Credentials': true,
|
||||||
|
'Access-Control-Allow-Methods': 'OPTIONS, GET, POST',
|
||||||
|
'Access-Control-Allow-Headers': 'Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit',
|
||||||
|
'Access-Control-Max-Age': 5 * 60,
|
||||||
|
'Access-Control-Expose-Headers': 'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit'
|
||||||
|
});
|
||||||
|
next();
|
||||||
|
})
|
||||||
|
.catch(next);
|
||||||
|
|
||||||
} else {
|
} else {
|
||||||
// No origin
|
// No origin
|
||||||
next();
|
next();
|
||||||
}
|
}
|
||||||
|
|
||||||
};
|
};
|
||||||
|
@ -1,6 +1,4 @@
|
|||||||
const moment = require('moment');
|
const moment = require('moment');
|
||||||
const {isPostgres} = require('./config');
|
|
||||||
const {ref} = require('objection');
|
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
|
|
||||||
@ -29,34 +27,6 @@ module.exports = {
|
|||||||
}
|
}
|
||||||
|
|
||||||
return null;
|
return null;
|
||||||
},
|
|
||||||
|
|
||||||
convertIntFieldsToBool: function (obj, fields) {
|
|
||||||
fields.forEach(function (field) {
|
|
||||||
if (typeof obj[field] !== 'undefined') {
|
|
||||||
obj[field] = obj[field] === 1;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
return obj;
|
|
||||||
},
|
|
||||||
|
|
||||||
convertBoolFieldsToInt: function (obj, fields) {
|
|
||||||
fields.forEach(function (field) {
|
|
||||||
if (typeof obj[field] !== 'undefined') {
|
|
||||||
obj[field] = obj[field] ? 1 : 0;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
return obj;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Casts a column to json if using postgres
|
|
||||||
*
|
|
||||||
* @param {string} colName
|
|
||||||
* @returns {string|Objection.ReferenceBuilder}
|
|
||||||
*/
|
|
||||||
castJsonIfNeed: function (colName) {
|
|
||||||
return isPostgres() ? ref(colName).castText() : colName;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
};
|
};
|
||||||
|
@ -1,41 +1,14 @@
|
|||||||
const _ = require('lodash');
|
const exec = require('child_process').exec;
|
||||||
const exec = require('child_process').exec;
|
|
||||||
const execFile = require('child_process').execFile;
|
|
||||||
const { Liquid } = require('liquidjs');
|
|
||||||
const logger = require('../logger').global;
|
|
||||||
const error = require('./error');
|
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
|
|
||||||
exec: async function(cmd, options = {}) {
|
|
||||||
logger.debug('CMD:', cmd);
|
|
||||||
|
|
||||||
const { stdout, stderr } = await new Promise((resolve, reject) => {
|
|
||||||
const child = exec(cmd, options, (isError, stdout, stderr) => {
|
|
||||||
if (isError) {
|
|
||||||
reject(new error.CommandError(stderr, isError));
|
|
||||||
} else {
|
|
||||||
resolve({ stdout, stderr });
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
child.on('error', (e) => {
|
|
||||||
reject(new error.CommandError(stderr, 1, e));
|
|
||||||
});
|
|
||||||
});
|
|
||||||
return stdout;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param {String} cmd
|
* @param {String} cmd
|
||||||
* @param {Array} args
|
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
execFile: function (cmd, args) {
|
exec: function (cmd) {
|
||||||
// logger.debug('CMD: ' + cmd + ' ' + (args ? args.join(' ') : ''));
|
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
execFile(cmd, args, function (err, stdout, /*stderr*/) {
|
exec(cmd, function (err, stdout, /*stderr*/) {
|
||||||
if (err && typeof err === 'object') {
|
if (err && typeof err === 'object') {
|
||||||
reject(err);
|
reject(err);
|
||||||
} else {
|
} else {
|
||||||
@ -43,64 +16,5 @@ module.exports = {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used in objection query builder
|
|
||||||
*
|
|
||||||
* @param {Array} omissions
|
|
||||||
* @returns {Function}
|
|
||||||
*/
|
|
||||||
omitRow: function (omissions) {
|
|
||||||
/**
|
|
||||||
* @param {Object} row
|
|
||||||
* @returns {Object}
|
|
||||||
*/
|
|
||||||
return (row) => {
|
|
||||||
return _.omit(row, omissions);
|
|
||||||
};
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Used in objection query builder
|
|
||||||
*
|
|
||||||
* @param {Array} omissions
|
|
||||||
* @returns {Function}
|
|
||||||
*/
|
|
||||||
omitRows: function (omissions) {
|
|
||||||
/**
|
|
||||||
* @param {Array} rows
|
|
||||||
* @returns {Object}
|
|
||||||
*/
|
|
||||||
return (rows) => {
|
|
||||||
rows.forEach((row, idx) => {
|
|
||||||
rows[idx] = _.omit(row, omissions);
|
|
||||||
});
|
|
||||||
return rows;
|
|
||||||
};
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @returns {Object} Liquid render engine
|
|
||||||
*/
|
|
||||||
getRenderEngine: function () {
|
|
||||||
const renderEngine = new Liquid({
|
|
||||||
root: __dirname + '/../templates/'
|
|
||||||
});
|
|
||||||
|
|
||||||
/**
|
|
||||||
* nginxAccessRule expects the object given to have 2 properties:
|
|
||||||
*
|
|
||||||
* directive string
|
|
||||||
* address string
|
|
||||||
*/
|
|
||||||
renderEngine.registerFilter('nginxAccessRule', (v) => {
|
|
||||||
if (typeof v.directive !== 'undefined' && typeof v.address !== 'undefined' && v.directive && v.address) {
|
|
||||||
return `${v.directive} ${v.address};`;
|
|
||||||
}
|
|
||||||
return '';
|
|
||||||
});
|
|
||||||
|
|
||||||
return renderEngine;
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,12 +1,13 @@
|
|||||||
const Ajv = require('ajv/dist/2020');
|
const error = require('../error');
|
||||||
const error = require('../error');
|
const path = require('path');
|
||||||
|
const parser = require('json-schema-ref-parser');
|
||||||
|
|
||||||
const ajv = new Ajv({
|
const ajv = require('ajv')({
|
||||||
verbose: true,
|
verbose: true,
|
||||||
allErrors: true,
|
validateSchema: true,
|
||||||
allowUnionTypes: true,
|
allErrors: false,
|
||||||
strict: false,
|
format: 'full',
|
||||||
coerceTypes: true,
|
coerceTypes: true
|
||||||
});
|
});
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -16,18 +17,12 @@ const ajv = new Ajv({
|
|||||||
*/
|
*/
|
||||||
function apiValidator (schema, payload/*, description*/) {
|
function apiValidator (schema, payload/*, description*/) {
|
||||||
return new Promise(function Promise_apiValidator (resolve, reject) {
|
return new Promise(function Promise_apiValidator (resolve, reject) {
|
||||||
if (schema === null) {
|
|
||||||
reject(new error.ValidationError('Schema is undefined'));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (typeof payload === 'undefined') {
|
if (typeof payload === 'undefined') {
|
||||||
reject(new error.ValidationError('Payload is undefined'));
|
reject(new error.ValidationError('Payload is undefined'));
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const validate = ajv.compile(schema);
|
let validate = ajv.compile(schema);
|
||||||
const valid = validate(payload);
|
let valid = validate(payload);
|
||||||
|
|
||||||
if (valid && !validate.errors) {
|
if (valid && !validate.errors) {
|
||||||
resolve(payload);
|
resolve(payload);
|
||||||
@ -40,4 +35,11 @@ function apiValidator (schema, payload/*, description*/) {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
apiValidator.loadSchemas = parser
|
||||||
|
.dereference(path.resolve('schema/index.json'))
|
||||||
|
.then((schema) => {
|
||||||
|
ajv.addSchema(schema);
|
||||||
|
return schema;
|
||||||
|
});
|
||||||
|
|
||||||
module.exports = apiValidator;
|
module.exports = apiValidator;
|
||||||
|
@ -1,17 +1,17 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const Ajv = require('ajv/dist/2020');
|
const error = require('../error');
|
||||||
const error = require('../error');
|
const definitions = require('../../schema/definitions.json');
|
||||||
const commonDefinitions = require('../../schema/common.json');
|
|
||||||
|
|
||||||
RegExp.prototype.toJSON = RegExp.prototype.toString;
|
RegExp.prototype.toJSON = RegExp.prototype.toString;
|
||||||
|
|
||||||
const ajv = new Ajv({
|
const ajv = require('ajv')({
|
||||||
verbose: true,
|
verbose: true, //process.env.NODE_ENV === 'development',
|
||||||
allErrors: true,
|
allErrors: true,
|
||||||
allowUnionTypes: true,
|
format: 'full', // strict regexes for format checks
|
||||||
coerceTypes: true,
|
coerceTypes: true,
|
||||||
strict: false,
|
schemas: [
|
||||||
schemas: [commonDefinitions]
|
definitions
|
||||||
|
]
|
||||||
});
|
});
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -27,19 +27,23 @@ function validator (schema, payload) {
|
|||||||
} else {
|
} else {
|
||||||
try {
|
try {
|
||||||
let validate = ajv.compile(schema);
|
let validate = ajv.compile(schema);
|
||||||
let valid = validate(payload);
|
|
||||||
|
|
||||||
|
let valid = validate(payload);
|
||||||
if (valid && !validate.errors) {
|
if (valid && !validate.errors) {
|
||||||
resolve(_.cloneDeep(payload));
|
resolve(_.cloneDeep(payload));
|
||||||
} else {
|
} else {
|
||||||
let message = ajv.errorsText(validate.errors);
|
let message = ajv.errorsText(validate.errors);
|
||||||
reject(new error.InternalValidationError(message));
|
reject(new error.InternalValidationError(message));
|
||||||
}
|
}
|
||||||
|
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
reject(err);
|
reject(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
});
|
});
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = validator;
|
module.exports = validator;
|
||||||
|
@ -7,7 +7,6 @@ module.exports = {
|
|||||||
access: new Signale({scope: 'Access '}),
|
access: new Signale({scope: 'Access '}),
|
||||||
nginx: new Signale({scope: 'Nginx '}),
|
nginx: new Signale({scope: 'Nginx '}),
|
||||||
ssl: new Signale({scope: 'SSL '}),
|
ssl: new Signale({scope: 'SSL '}),
|
||||||
certbot: new Signale({scope: 'Certbot '}),
|
|
||||||
import: new Signale({scope: 'Importer '}),
|
import: new Signale({scope: 'Importer '}),
|
||||||
setup: new Signale({scope: 'Setup '}),
|
setup: new Signale({scope: 'Setup '}),
|
||||||
ip_ranges: new Signale({scope: 'IP Ranges'})
|
ip_ranges: new Signale({scope: 'IP Ranges'})
|
||||||
|
@ -1,50 +0,0 @@
|
|||||||
const migrate_name = 'stream_domain';
|
|
||||||
const logger = require('../logger').migrate;
|
|
||||||
const internalNginx = require('../internal/nginx');
|
|
||||||
|
|
||||||
async function regenerateDefaultHost(knex) {
|
|
||||||
const row = await knex('setting').select('*').where('id', 'default-site').first();
|
|
||||||
|
|
||||||
if (!row) {
|
|
||||||
return Promise.resolve();
|
|
||||||
}
|
|
||||||
|
|
||||||
return internalNginx.deleteConfig('default')
|
|
||||||
.then(() => {
|
|
||||||
return internalNginx.generateConfig('default', row);
|
|
||||||
})
|
|
||||||
.then(() => {
|
|
||||||
return internalNginx.test();
|
|
||||||
})
|
|
||||||
.then(() => {
|
|
||||||
return internalNginx.reload();
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Migrate
|
|
||||||
*
|
|
||||||
* @see http://knexjs.org/#Schema
|
|
||||||
*
|
|
||||||
* @param {Object} knex
|
|
||||||
* @param {Promise} Promise
|
|
||||||
* @returns {Promise}
|
|
||||||
*/
|
|
||||||
exports.up = function (knex) {
|
|
||||||
logger.info('[' + migrate_name + '] Migrating Up...');
|
|
||||||
|
|
||||||
return regenerateDefaultHost(knex);
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Undo Migrate
|
|
||||||
*
|
|
||||||
* @param {Object} knex
|
|
||||||
* @param {Promise} Promise
|
|
||||||
* @returns {Promise}
|
|
||||||
*/
|
|
||||||
exports.down = function (knex) {
|
|
||||||
logger.info('[' + migrate_name + '] Migrating Down...');
|
|
||||||
|
|
||||||
return regenerateDefaultHost(knex);
|
|
||||||
};
|
|
@ -1,38 +0,0 @@
|
|||||||
const migrate_name = 'stream_ssl';
|
|
||||||
const logger = require('../logger').migrate;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Migrate
|
|
||||||
*
|
|
||||||
* @see http://knexjs.org/#Schema
|
|
||||||
*
|
|
||||||
* @param {Object} knex
|
|
||||||
* @returns {Promise}
|
|
||||||
*/
|
|
||||||
exports.up = function (knex) {
|
|
||||||
logger.info('[' + migrate_name + '] Migrating Up...');
|
|
||||||
|
|
||||||
return knex.schema.table('stream', (table) => {
|
|
||||||
table.integer('certificate_id').notNull().unsigned().defaultTo(0);
|
|
||||||
})
|
|
||||||
.then(function () {
|
|
||||||
logger.info('[' + migrate_name + '] stream Table altered');
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Undo Migrate
|
|
||||||
*
|
|
||||||
* @param {Object} knex
|
|
||||||
* @returns {Promise}
|
|
||||||
*/
|
|
||||||
exports.down = function (knex) {
|
|
||||||
logger.info('[' + migrate_name + '] Migrating Down...');
|
|
||||||
|
|
||||||
return knex.schema.table('stream', (table) => {
|
|
||||||
table.dropColumn('certificate_id');
|
|
||||||
})
|
|
||||||
.then(function () {
|
|
||||||
logger.info('[' + migrate_name + '] stream Table altered');
|
|
||||||
});
|
|
||||||
};
|
|
@ -2,7 +2,6 @@
|
|||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
const User = require('./user');
|
const User = require('./user');
|
||||||
const AccessListAuth = require('./access_list_auth');
|
const AccessListAuth = require('./access_list_auth');
|
||||||
@ -11,12 +10,6 @@ const now = require('./now_helper');
|
|||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'satisfy_any',
|
|
||||||
'pass_auth',
|
|
||||||
];
|
|
||||||
|
|
||||||
class AccessList extends Model {
|
class AccessList extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -32,16 +25,6 @@ class AccessList extends Model {
|
|||||||
this.modified_on = now();
|
this.modified_on = now();
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'AccessList';
|
return 'AccessList';
|
||||||
}
|
}
|
||||||
@ -67,6 +50,7 @@ class AccessList extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
items: {
|
items: {
|
||||||
@ -75,6 +59,9 @@ class AccessList extends Model {
|
|||||||
join: {
|
join: {
|
||||||
from: 'access_list.id',
|
from: 'access_list.id',
|
||||||
to: 'access_list_auth.access_list_id'
|
to: 'access_list_auth.access_list_id'
|
||||||
|
},
|
||||||
|
modify: function (qb) {
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
clients: {
|
clients: {
|
||||||
@ -83,6 +70,9 @@ class AccessList extends Model {
|
|||||||
join: {
|
join: {
|
||||||
from: 'access_list.id',
|
from: 'access_list.id',
|
||||||
to: 'access_list_client.access_list_id'
|
to: 'access_list_client.access_list_id'
|
||||||
|
},
|
||||||
|
modify: function (qb) {
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
proxy_hosts: {
|
proxy_hosts: {
|
||||||
@ -94,10 +84,19 @@ class AccessList extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('proxy_host.is_deleted', 0);
|
qb.where('proxy_host.is_deleted', 0);
|
||||||
|
qb.omit(['is_deleted', 'meta']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
get satisfy() {
|
||||||
|
return this.satisfy_any ? 'satisfy any' : 'satisfy all';
|
||||||
|
}
|
||||||
|
|
||||||
|
get passauth() {
|
||||||
|
return this.pass_auth ? '' : 'proxy_set_header Authorization "";';
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = AccessList;
|
module.exports = AccessList;
|
||||||
|
@ -45,6 +45,7 @@ class AccessListAuth extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('access_list.is_deleted', 0);
|
qb.where('access_list.is_deleted', 0);
|
||||||
|
qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -45,10 +45,15 @@ class AccessListClient extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('access_list.is_deleted', 0);
|
qb.where('access_list.is_deleted', 0);
|
||||||
|
qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
get rule() {
|
||||||
|
return `${this.directive} ${this.address}`;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = AccessListClient;
|
module.exports = AccessListClient;
|
||||||
|
@ -43,6 +43,9 @@ class AuditLog extends Model {
|
|||||||
join: {
|
join: {
|
||||||
from: 'audit_log.user_id',
|
from: 'audit_log.user_id',
|
||||||
to: 'user.id'
|
to: 'user.id'
|
||||||
|
},
|
||||||
|
modify: function (qb) {
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'roles']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,19 +1,14 @@
|
|||||||
// Objection Docs:
|
// Objection Docs:
|
||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const bcrypt = require('bcrypt');
|
const bcrypt = require('bcrypt');
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
const Model = require('objection').Model;
|
||||||
const Model = require('objection').Model;
|
const User = require('./user');
|
||||||
const User = require('./user');
|
const now = require('./now_helper');
|
||||||
const now = require('./now_helper');
|
|
||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
];
|
|
||||||
|
|
||||||
function encryptPassword () {
|
function encryptPassword () {
|
||||||
/* jshint -W040 */
|
/* jshint -W040 */
|
||||||
let _this = this;
|
let _this = this;
|
||||||
@ -46,16 +41,6 @@ class Auth extends Model {
|
|||||||
return encryptPassword.apply(this, queryContext);
|
return encryptPassword.apply(this, queryContext);
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Verify a plain password against the encrypted password
|
* Verify a plain password against the encrypted password
|
||||||
*
|
*
|
||||||
@ -89,6 +74,9 @@ class Auth extends Model {
|
|||||||
},
|
},
|
||||||
filter: {
|
filter: {
|
||||||
is_deleted: 0
|
is_deleted: 0
|
||||||
|
},
|
||||||
|
modify: function (qb) {
|
||||||
|
qb.omit(['is_deleted']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,17 +1,13 @@
|
|||||||
// Objection Docs:
|
// Objection Docs:
|
||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
const Model = require('objection').Model;
|
||||||
const Model = require('objection').Model;
|
const User = require('./user');
|
||||||
const now = require('./now_helper');
|
const now = require('./now_helper');
|
||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
];
|
|
||||||
|
|
||||||
class Certificate extends Model {
|
class Certificate extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -44,16 +40,6 @@ class Certificate extends Model {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'Certificate';
|
return 'Certificate';
|
||||||
}
|
}
|
||||||
@ -67,11 +53,6 @@ class Certificate extends Model {
|
|||||||
}
|
}
|
||||||
|
|
||||||
static get relationMappings () {
|
static get relationMappings () {
|
||||||
const ProxyHost = require('./proxy_host');
|
|
||||||
const DeadHost = require('./dead_host');
|
|
||||||
const User = require('./user');
|
|
||||||
const RedirectionHost = require('./redirection_host');
|
|
||||||
|
|
||||||
return {
|
return {
|
||||||
owner: {
|
owner: {
|
||||||
relation: Model.HasOneRelation,
|
relation: Model.HasOneRelation,
|
||||||
@ -82,39 +63,7 @@ class Certificate extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
}
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
},
|
|
||||||
proxy_hosts: {
|
|
||||||
relation: Model.HasManyRelation,
|
|
||||||
modelClass: ProxyHost,
|
|
||||||
join: {
|
|
||||||
from: 'certificate.id',
|
|
||||||
to: 'proxy_host.certificate_id'
|
|
||||||
},
|
|
||||||
modify: function (qb) {
|
|
||||||
qb.where('proxy_host.is_deleted', 0);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
dead_hosts: {
|
|
||||||
relation: Model.HasManyRelation,
|
|
||||||
modelClass: DeadHost,
|
|
||||||
join: {
|
|
||||||
from: 'certificate.id',
|
|
||||||
to: 'dead_host.certificate_id'
|
|
||||||
},
|
|
||||||
modify: function (qb) {
|
|
||||||
qb.where('dead_host.is_deleted', 0);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
redirection_hosts: {
|
|
||||||
relation: Model.HasManyRelation,
|
|
||||||
modelClass: RedirectionHost,
|
|
||||||
join: {
|
|
||||||
from: 'certificate.id',
|
|
||||||
to: 'redirection_host.certificate_id'
|
|
||||||
},
|
|
||||||
modify: function (qb) {
|
|
||||||
qb.where('redirection_host.is_deleted', 0);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -2,7 +2,6 @@
|
|||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
const User = require('./user');
|
const User = require('./user');
|
||||||
const Certificate = require('./certificate');
|
const Certificate = require('./certificate');
|
||||||
@ -10,15 +9,6 @@ const now = require('./now_helper');
|
|||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'ssl_forced',
|
|
||||||
'http2_support',
|
|
||||||
'enabled',
|
|
||||||
'hsts_enabled',
|
|
||||||
'hsts_subdomains',
|
|
||||||
];
|
|
||||||
|
|
||||||
class DeadHost extends Model {
|
class DeadHost extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -46,16 +36,6 @@ class DeadHost extends Model {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'DeadHost';
|
return 'DeadHost';
|
||||||
}
|
}
|
||||||
@ -79,6 +59,7 @@ class DeadHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
certificate: {
|
certificate: {
|
||||||
@ -90,6 +71,7 @@ class DeadHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('certificate.is_deleted', 0);
|
qb.where('certificate.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const config = require('../lib/config');
|
const config = require('config');
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
module.exports = function () {
|
module.exports = function () {
|
||||||
if (config.isSqlite()) {
|
if (config.database.knex && config.database.knex.client === 'sqlite3') {
|
||||||
// eslint-disable-next-line
|
return Model.raw('datetime(\'now\',\'localtime\')');
|
||||||
return Model.raw("datetime('now','localtime')");
|
} else {
|
||||||
|
return Model.raw('NOW()');
|
||||||
}
|
}
|
||||||
return Model.raw('NOW()');
|
|
||||||
};
|
};
|
||||||
|
@ -2,7 +2,6 @@
|
|||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
const User = require('./user');
|
const User = require('./user');
|
||||||
const AccessList = require('./access_list');
|
const AccessList = require('./access_list');
|
||||||
@ -11,18 +10,6 @@ const now = require('./now_helper');
|
|||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'ssl_forced',
|
|
||||||
'caching_enabled',
|
|
||||||
'block_exploits',
|
|
||||||
'allow_websocket_upgrade',
|
|
||||||
'http2_support',
|
|
||||||
'enabled',
|
|
||||||
'hsts_enabled',
|
|
||||||
'hsts_subdomains',
|
|
||||||
];
|
|
||||||
|
|
||||||
class ProxyHost extends Model {
|
class ProxyHost extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -50,16 +37,6 @@ class ProxyHost extends Model {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'ProxyHost';
|
return 'ProxyHost';
|
||||||
}
|
}
|
||||||
@ -83,6 +60,7 @@ class ProxyHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
access_list: {
|
access_list: {
|
||||||
@ -94,6 +72,7 @@ class ProxyHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('access_list.is_deleted', 0);
|
qb.where('access_list.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
certificate: {
|
certificate: {
|
||||||
@ -105,6 +84,7 @@ class ProxyHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('certificate.is_deleted', 0);
|
qb.where('certificate.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,9 +1,7 @@
|
|||||||
|
|
||||||
// Objection Docs:
|
// Objection Docs:
|
||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
const User = require('./user');
|
const User = require('./user');
|
||||||
const Certificate = require('./certificate');
|
const Certificate = require('./certificate');
|
||||||
@ -11,17 +9,6 @@ const now = require('./now_helper');
|
|||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'enabled',
|
|
||||||
'preserve_path',
|
|
||||||
'ssl_forced',
|
|
||||||
'block_exploits',
|
|
||||||
'hsts_enabled',
|
|
||||||
'hsts_subdomains',
|
|
||||||
'http2_support',
|
|
||||||
];
|
|
||||||
|
|
||||||
class RedirectionHost extends Model {
|
class RedirectionHost extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -49,16 +36,6 @@ class RedirectionHost extends Model {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'RedirectionHost';
|
return 'RedirectionHost';
|
||||||
}
|
}
|
||||||
@ -82,6 +59,7 @@ class RedirectionHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
certificate: {
|
certificate: {
|
||||||
@ -93,6 +71,7 @@ class RedirectionHost extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('certificate.is_deleted', 0);
|
qb.where('certificate.is_deleted', 0);
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1,19 +1,13 @@
|
|||||||
const Model = require('objection').Model;
|
// Objection Docs:
|
||||||
const db = require('../db');
|
// http://vincit.github.io/objection.js/
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const User = require('./user');
|
const db = require('../db');
|
||||||
const Certificate = require('./certificate');
|
const Model = require('objection').Model;
|
||||||
const now = require('./now_helper');
|
const User = require('./user');
|
||||||
|
const now = require('./now_helper');
|
||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'enabled',
|
|
||||||
'tcp_forwarding',
|
|
||||||
'udp_forwarding',
|
|
||||||
];
|
|
||||||
|
|
||||||
class Stream extends Model {
|
class Stream extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -29,16 +23,6 @@ class Stream extends Model {
|
|||||||
this.modified_on = now();
|
this.modified_on = now();
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'Stream';
|
return 'Stream';
|
||||||
}
|
}
|
||||||
@ -62,17 +46,7 @@ class Stream extends Model {
|
|||||||
},
|
},
|
||||||
modify: function (qb) {
|
modify: function (qb) {
|
||||||
qb.where('user.is_deleted', 0);
|
qb.where('user.is_deleted', 0);
|
||||||
}
|
qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']);
|
||||||
},
|
|
||||||
certificate: {
|
|
||||||
relation: Model.HasOneRelation,
|
|
||||||
modelClass: Certificate,
|
|
||||||
join: {
|
|
||||||
from: 'stream.certificate_id',
|
|
||||||
to: 'certificate.id'
|
|
||||||
},
|
|
||||||
modify: function (qb) {
|
|
||||||
qb.where('certificate.is_deleted', 0);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -6,36 +6,44 @@
|
|||||||
const _ = require('lodash');
|
const _ = require('lodash');
|
||||||
const jwt = require('jsonwebtoken');
|
const jwt = require('jsonwebtoken');
|
||||||
const crypto = require('crypto');
|
const crypto = require('crypto');
|
||||||
const config = require('../lib/config');
|
|
||||||
const error = require('../lib/error');
|
const error = require('../lib/error');
|
||||||
const logger = require('../logger').global;
|
|
||||||
const ALGO = 'RS256';
|
const ALGO = 'RS256';
|
||||||
|
|
||||||
|
let public_key = null;
|
||||||
|
let private_key = null;
|
||||||
|
|
||||||
|
function checkJWTKeyPair() {
|
||||||
|
if (!public_key || !private_key) {
|
||||||
|
let config = require('config');
|
||||||
|
public_key = config.get('jwt.pub');
|
||||||
|
private_key = config.get('jwt.key');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
module.exports = function () {
|
module.exports = function () {
|
||||||
|
|
||||||
let token_data = {};
|
let token_data = {};
|
||||||
|
|
||||||
const self = {
|
let self = {
|
||||||
/**
|
/**
|
||||||
* @param {Object} payload
|
* @param {Object} payload
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
create: (payload) => {
|
create: (payload) => {
|
||||||
if (!config.getPrivateKey()) {
|
|
||||||
logger.error('Private key is empty!');
|
|
||||||
}
|
|
||||||
// sign with RSA SHA256
|
// sign with RSA SHA256
|
||||||
const options = {
|
let options = {
|
||||||
algorithm: ALGO,
|
algorithm: ALGO,
|
||||||
expiresIn: payload.expiresIn || '1d'
|
expiresIn: payload.expiresIn || '1d'
|
||||||
};
|
};
|
||||||
|
|
||||||
payload.jti = crypto.randomBytes(12)
|
payload.jti = crypto.randomBytes(12)
|
||||||
.toString('base64')
|
.toString('base64')
|
||||||
.substring(-8);
|
.substr(-8);
|
||||||
|
|
||||||
|
checkJWTKeyPair();
|
||||||
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
jwt.sign(payload, config.getPrivateKey(), options, (err, token) => {
|
jwt.sign(payload, private_key, options, (err, token) => {
|
||||||
if (err) {
|
if (err) {
|
||||||
reject(err);
|
reject(err);
|
||||||
} else {
|
} else {
|
||||||
@ -54,15 +62,13 @@ module.exports = function () {
|
|||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
*/
|
*/
|
||||||
load: function (token) {
|
load: function (token) {
|
||||||
if (!config.getPublicKey()) {
|
|
||||||
logger.error('Public key is empty!');
|
|
||||||
}
|
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
|
checkJWTKeyPair();
|
||||||
try {
|
try {
|
||||||
if (!token || token === null || token === 'null') {
|
if (!token || token === null || token === 'null') {
|
||||||
reject(new error.AuthError('Empty token'));
|
reject(new error.AuthError('Empty token'));
|
||||||
} else {
|
} else {
|
||||||
jwt.verify(token, config.getPublicKey(), {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => {
|
jwt.verify(token, public_key, {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => {
|
||||||
if (err) {
|
if (err) {
|
||||||
|
|
||||||
if (err.name === 'TokenExpiredError') {
|
if (err.name === 'TokenExpiredError') {
|
||||||
@ -77,6 +83,8 @@ module.exports = function () {
|
|||||||
// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'.
|
// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'.
|
||||||
// For 30 days at least, we need to replace 'all' with user.
|
// For 30 days at least, we need to replace 'all' with user.
|
||||||
if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) {
|
if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) {
|
||||||
|
//console.log('Warning! Replacing "all" scope with "user"');
|
||||||
|
|
||||||
token_data.scope = ['user'];
|
token_data.scope = ['user'];
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -126,7 +134,7 @@ module.exports = function () {
|
|||||||
* @returns {Integer}
|
* @returns {Integer}
|
||||||
*/
|
*/
|
||||||
getUserId: (default_value) => {
|
getUserId: (default_value) => {
|
||||||
const attrs = self.get('attrs');
|
let attrs = self.get('attrs');
|
||||||
if (attrs && typeof attrs.id !== 'undefined' && attrs.id) {
|
if (attrs && typeof attrs.id !== 'undefined' && attrs.id) {
|
||||||
return attrs.id;
|
return attrs.id;
|
||||||
}
|
}
|
||||||
|
@ -2,18 +2,12 @@
|
|||||||
// http://vincit.github.io/objection.js/
|
// http://vincit.github.io/objection.js/
|
||||||
|
|
||||||
const db = require('../db');
|
const db = require('../db');
|
||||||
const helpers = require('../lib/helpers');
|
|
||||||
const Model = require('objection').Model;
|
const Model = require('objection').Model;
|
||||||
const UserPermission = require('./user_permission');
|
const UserPermission = require('./user_permission');
|
||||||
const now = require('./now_helper');
|
const now = require('./now_helper');
|
||||||
|
|
||||||
Model.knex(db);
|
Model.knex(db);
|
||||||
|
|
||||||
const boolFields = [
|
|
||||||
'is_deleted',
|
|
||||||
'is_disabled',
|
|
||||||
];
|
|
||||||
|
|
||||||
class User extends Model {
|
class User extends Model {
|
||||||
$beforeInsert () {
|
$beforeInsert () {
|
||||||
this.created_on = now();
|
this.created_on = now();
|
||||||
@ -29,16 +23,6 @@ class User extends Model {
|
|||||||
this.modified_on = now();
|
this.modified_on = now();
|
||||||
}
|
}
|
||||||
|
|
||||||
$parseDatabaseJson(json) {
|
|
||||||
json = super.$parseDatabaseJson(json);
|
|
||||||
return helpers.convertIntFieldsToBool(json, boolFields);
|
|
||||||
}
|
|
||||||
|
|
||||||
$formatDatabaseJson(json) {
|
|
||||||
json = helpers.convertBoolFieldsToInt(json, boolFields);
|
|
||||||
return super.$formatDatabaseJson(json);
|
|
||||||
}
|
|
||||||
|
|
||||||
static get name () {
|
static get name () {
|
||||||
return 'User';
|
return 'User';
|
||||||
}
|
}
|
||||||
@ -59,6 +43,9 @@ class User extends Model {
|
|||||||
join: {
|
join: {
|
||||||
from: 'user.id',
|
from: 'user.id',
|
||||||
to: 'user_permission.user_id'
|
to: 'user_permission.user_id'
|
||||||
|
},
|
||||||
|
modify: function (qb) {
|
||||||
|
qb.omit(['id', 'created_on', 'modified_on', 'user_id']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -2,31 +2,37 @@
|
|||||||
"name": "nginx-proxy-manager",
|
"name": "nginx-proxy-manager",
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"description": "A beautiful interface for creating Nginx endpoints",
|
"description": "A beautiful interface for creating Nginx endpoints",
|
||||||
"main": "index.js",
|
"main": "js/index.js",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@apidevtools/json-schema-ref-parser": "^11.7.0",
|
"ajv": "^6.12.0",
|
||||||
"ajv": "^8.17.1",
|
|
||||||
"archiver": "^5.3.0",
|
"archiver": "^5.3.0",
|
||||||
"batchflow": "^0.4.0",
|
"batchflow": "^0.4.0",
|
||||||
"bcrypt": "^5.0.0",
|
"bcrypt": "^5.0.0",
|
||||||
"body-parser": "^1.20.3",
|
"body-parser": "^1.19.0",
|
||||||
"compression": "^1.7.4",
|
"compression": "^1.7.4",
|
||||||
"express": "^4.20.0",
|
"config": "^3.3.1",
|
||||||
|
"diskdb": "^0.1.17",
|
||||||
|
"express": "^4.17.1",
|
||||||
"express-fileupload": "^1.1.9",
|
"express-fileupload": "^1.1.9",
|
||||||
"gravatar": "^1.8.0",
|
"gravatar": "^1.8.0",
|
||||||
"jsonwebtoken": "^9.0.0",
|
"html-entities": "^1.2.1",
|
||||||
"knex": "2.4.2",
|
"json-schema-ref-parser": "^8.0.0",
|
||||||
"liquidjs": "10.6.1",
|
"jsonwebtoken": "^8.5.1",
|
||||||
|
"knex": "^0.20.13",
|
||||||
|
"liquidjs": "^9.11.10",
|
||||||
"lodash": "^4.17.21",
|
"lodash": "^4.17.21",
|
||||||
"moment": "^2.29.4",
|
"moment": "^2.24.0",
|
||||||
"mysql2": "^3.11.1",
|
"mysql": "^2.18.1",
|
||||||
"node-rsa": "^1.0.8",
|
"node-rsa": "^1.0.8",
|
||||||
"objection": "3.0.1",
|
"nodemon": "^2.0.2",
|
||||||
|
"objection": "^2.2.16",
|
||||||
"path": "^0.12.7",
|
"path": "^0.12.7",
|
||||||
"pg": "^8.13.1",
|
"pg": "^7.12.1",
|
||||||
"signale": "1.4.0",
|
"restler": "^3.4.0",
|
||||||
"sqlite3": "5.1.6",
|
"signale": "^1.4.0",
|
||||||
"temp-write": "^4.0.0"
|
"sqlite3": "^4.1.1",
|
||||||
|
"temp-write": "^4.0.0",
|
||||||
|
"unix-timestamp": "^0.2.0"
|
||||||
},
|
},
|
||||||
"signale": {
|
"signale": {
|
||||||
"displayDate": true,
|
"displayDate": true,
|
||||||
@ -35,14 +41,8 @@
|
|||||||
"author": "Jamie Curnow <jc@jc21.com>",
|
"author": "Jamie Curnow <jc@jc21.com>",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@apidevtools/swagger-parser": "^10.1.0",
|
"eslint": "^6.8.0",
|
||||||
"chalk": "4.1.2",
|
|
||||||
"eslint": "^8.36.0",
|
|
||||||
"eslint-plugin-align-assignments": "^1.1.2",
|
"eslint-plugin-align-assignments": "^1.1.2",
|
||||||
"nodemon": "^2.0.2",
|
|
||||||
"prettier": "^2.0.4"
|
"prettier": "^2.0.4"
|
||||||
},
|
|
||||||
"scripts": {
|
|
||||||
"validate-schema": "node validate-schema.js"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../lib/validator');
|
const validator = require('../../lib/validator');
|
||||||
const jwtdecode = require('../lib/express/jwt-decode');
|
const jwtdecode = require('../../lib/express/jwt-decode');
|
||||||
const internalAuditLog = require('../internal/audit-log');
|
const internalAuditLog = require('../../internal/audit-log');
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -14,7 +14,7 @@ let router = express.Router({
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -29,10 +29,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
@ -1,6 +1,6 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const pjson = require('../package.json');
|
const pjson = require('../../package.json');
|
||||||
const error = require('../lib/error');
|
const error = require('../../lib/error');
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -43,7 +43,7 @@ router.use('/nginx/certificates', require('./nginx/certificates'));
|
|||||||
*
|
*
|
||||||
* ALL /api/*
|
* ALL /api/*
|
||||||
*/
|
*/
|
||||||
router.all(/(.+)/, function (req, _, next) {
|
router.all(/(.+)/, function (req, res, next) {
|
||||||
req.params.page = req.params['0'];
|
req.params.page = req.params['0'];
|
||||||
next(new error.ItemNotFoundError(req.params.page));
|
next(new error.ItemNotFoundError(req.params.page));
|
||||||
});
|
});
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../../lib/validator');
|
const validator = require('../../../lib/validator');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const internalAccessList = require('../../../internal/access-list');
|
||||||
const internalAccessList = require('../../internal/access-list');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -31,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -57,7 +56,7 @@ router
|
|||||||
* Create a new access-list
|
* Create a new access-list
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/access-lists', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/access-lists#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalAccessList.create(res.locals.access, payload);
|
return internalAccessList.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -75,7 +74,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:list_id')
|
.route('/:list_id')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -91,10 +90,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
list_id: {
|
list_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -120,7 +119,7 @@ router
|
|||||||
* Update and existing access-list
|
* Update and existing access-list
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/access-lists/{listID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/access-lists#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = parseInt(req.params.list_id, 10);
|
payload.id = parseInt(req.params.list_id, 10);
|
||||||
return internalAccessList.update(res.locals.access, payload);
|
return internalAccessList.update(res.locals.access, payload);
|
@ -1,10 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const error = require('../../lib/error');
|
const validator = require('../../../lib/validator');
|
||||||
const validator = require('../../lib/validator');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const internalCertificate = require('../../../internal/certificate');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const internalCertificate = require('../../internal/certificate');
|
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -17,7 +15,7 @@ let router = express.Router({
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -32,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -58,7 +56,7 @@ router
|
|||||||
* Create a new certificate
|
* Create a new certificate
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/certificates', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/certificates#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
req.setTimeout(900000); // 15 minutes timeout
|
req.setTimeout(900000); // 15 minutes timeout
|
||||||
return internalCertificate.create(res.locals.access, payload);
|
return internalCertificate.create(res.locals.access, payload);
|
||||||
@ -70,37 +68,6 @@ router
|
|||||||
.catch(next);
|
.catch(next);
|
||||||
});
|
});
|
||||||
|
|
||||||
/**
|
|
||||||
* Test HTTP challenge for domains
|
|
||||||
*
|
|
||||||
* /api/nginx/certificates/test-http
|
|
||||||
*/
|
|
||||||
router
|
|
||||||
.route('/test-http')
|
|
||||||
.options((_, res) => {
|
|
||||||
res.sendStatus(204);
|
|
||||||
})
|
|
||||||
.all(jwtdecode())
|
|
||||||
|
|
||||||
/**
|
|
||||||
* GET /api/nginx/certificates/test-http
|
|
||||||
*
|
|
||||||
* Test HTTP challenge for domains
|
|
||||||
*/
|
|
||||||
.get((req, res, next) => {
|
|
||||||
if (req.query.domains === undefined) {
|
|
||||||
next(new error.ValidationError('Domains are required as query parameters'));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
internalCertificate.testHttpsChallenge(res.locals.access, JSON.parse(req.query.domains))
|
|
||||||
.then((result) => {
|
|
||||||
res.status(200)
|
|
||||||
.send(result);
|
|
||||||
})
|
|
||||||
.catch(next);
|
|
||||||
});
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Specific certificate
|
* Specific certificate
|
||||||
*
|
*
|
||||||
@ -108,7 +75,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:certificate_id')
|
.route('/:certificate_id')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -124,10 +91,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
certificate_id: {
|
certificate_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -147,6 +114,24 @@ router
|
|||||||
.catch(next);
|
.catch(next);
|
||||||
})
|
})
|
||||||
|
|
||||||
|
/**
|
||||||
|
* PUT /api/nginx/certificates/123
|
||||||
|
*
|
||||||
|
* Update and existing certificate
|
||||||
|
*/
|
||||||
|
.put((req, res, next) => {
|
||||||
|
apiValidator({$ref: 'endpoints/certificates#/links/2/schema'}, req.body)
|
||||||
|
.then((payload) => {
|
||||||
|
payload.id = parseInt(req.params.certificate_id, 10);
|
||||||
|
return internalCertificate.update(res.locals.access, payload);
|
||||||
|
})
|
||||||
|
.then((result) => {
|
||||||
|
res.status(200)
|
||||||
|
.send(result);
|
||||||
|
})
|
||||||
|
.catch(next);
|
||||||
|
})
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* DELETE /api/nginx/certificates/123
|
* DELETE /api/nginx/certificates/123
|
||||||
*
|
*
|
||||||
@ -168,7 +153,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:certificate_id/upload')
|
.route('/:certificate_id/upload')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -202,7 +187,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:certificate_id/renew')
|
.route('/:certificate_id/renew')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -224,6 +209,7 @@ router
|
|||||||
.catch(next);
|
.catch(next);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Download LE Certs
|
* Download LE Certs
|
||||||
*
|
*
|
||||||
@ -259,7 +245,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/validate')
|
.route('/validate')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../../lib/validator');
|
const validator = require('../../../lib/validator');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const internalDeadHost = require('../../../internal/dead-host');
|
||||||
const internalDeadHost = require('../../internal/dead-host');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -16,7 +15,7 @@ let router = express.Router({
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -31,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -57,7 +56,7 @@ router
|
|||||||
* Create a new dead-host
|
* Create a new dead-host
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/dead-hosts', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/dead-hosts#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalDeadHost.create(res.locals.access, payload);
|
return internalDeadHost.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -91,10 +90,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
host_id: {
|
host_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -120,7 +119,7 @@ router
|
|||||||
* Update and existing dead-host
|
* Update and existing dead-host
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/dead-hosts/{hostID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/dead-hosts#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = parseInt(req.params.host_id, 10);
|
payload.id = parseInt(req.params.host_id, 10);
|
||||||
return internalDeadHost.update(res.locals.access, payload);
|
return internalDeadHost.update(res.locals.access, payload);
|
||||||
@ -153,7 +152,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/enable')
|
.route('/:host_id/enable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -177,7 +176,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/disable')
|
.route('/:host_id/disable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../../lib/validator');
|
const validator = require('../../../lib/validator');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const internalProxyHost = require('../../../internal/proxy-host');
|
||||||
const internalProxyHost = require('../../internal/proxy-host');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -31,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -57,7 +56,7 @@ router
|
|||||||
* Create a new proxy-host
|
* Create a new proxy-host
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/proxy-hosts', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/proxy-hosts#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalProxyHost.create(res.locals.access, payload);
|
return internalProxyHost.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -91,10 +90,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
host_id: {
|
host_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -120,7 +119,7 @@ router
|
|||||||
* Update and existing proxy-host
|
* Update and existing proxy-host
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/proxy-hosts/{hostID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/proxy-hosts#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = parseInt(req.params.host_id, 10);
|
payload.id = parseInt(req.params.host_id, 10);
|
||||||
return internalProxyHost.update(res.locals.access, payload);
|
return internalProxyHost.update(res.locals.access, payload);
|
||||||
@ -153,7 +152,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/enable')
|
.route('/:host_id/enable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -177,7 +176,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/disable')
|
.route('/:host_id/disable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../../lib/validator');
|
const validator = require('../../../lib/validator');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const internalRedirectionHost = require('../../../internal/redirection-host');
|
||||||
const internalRedirectionHost = require('../../internal/redirection-host');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -31,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -57,7 +56,7 @@ router
|
|||||||
* Create a new redirection-host
|
* Create a new redirection-host
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/redirection-hosts', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/redirection-hosts#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalRedirectionHost.create(res.locals.access, payload);
|
return internalRedirectionHost.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -91,10 +90,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
host_id: {
|
host_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -120,7 +119,7 @@ router
|
|||||||
* Update and existing redirection-host
|
* Update and existing redirection-host
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/redirection-hosts/{hostID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/redirection-hosts#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = parseInt(req.params.host_id, 10);
|
payload.id = parseInt(req.params.host_id, 10);
|
||||||
return internalRedirectionHost.update(res.locals.access, payload);
|
return internalRedirectionHost.update(res.locals.access, payload);
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../../lib/validator');
|
const validator = require('../../../lib/validator');
|
||||||
const jwtdecode = require('../../lib/express/jwt-decode');
|
const jwtdecode = require('../../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../../lib/validator/api');
|
const internalStream = require('../../../internal/stream');
|
||||||
const internalStream = require('../../internal/stream');
|
const apiValidator = require('../../../lib/validator/api');
|
||||||
const schema = require('../../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -31,10 +30,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -57,7 +56,7 @@ router
|
|||||||
* Create a new stream
|
* Create a new stream
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/streams', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/streams#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalStream.create(res.locals.access, payload);
|
return internalStream.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -91,10 +90,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
stream_id: {
|
stream_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -120,7 +119,7 @@ router
|
|||||||
* Update and existing stream
|
* Update and existing stream
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/nginx/streams/{streamID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/streams#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = parseInt(req.params.stream_id, 10);
|
payload.id = parseInt(req.params.stream_id, 10);
|
||||||
return internalStream.update(res.locals.access, payload);
|
return internalStream.update(res.locals.access, payload);
|
||||||
@ -153,7 +152,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/enable')
|
.route('/:host_id/enable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -177,7 +176,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:host_id/disable')
|
.route('/:host_id/disable')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
@ -1,6 +1,6 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const jwtdecode = require('../lib/express/jwt-decode');
|
const jwtdecode = require('../../lib/express/jwt-decode');
|
||||||
const internalReport = require('../internal/report');
|
const internalReport = require('../../internal/report');
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -10,14 +10,14 @@ let router = express.Router({
|
|||||||
|
|
||||||
router
|
router
|
||||||
.route('/hosts')
|
.route('/hosts')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* GET /reports/hosts
|
* GET /reports/hosts
|
||||||
*/
|
*/
|
||||||
.get(jwtdecode(), (_, res, next) => {
|
.get(jwtdecode(), (req, res, next) => {
|
||||||
internalReport.getHostsReport(res.locals.access)
|
internalReport.getHostsReport(res.locals.access)
|
||||||
.then((data) => {
|
.then((data) => {
|
||||||
res.status(200)
|
res.status(200)
|
@ -1,8 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const schema = require('../schema');
|
const swaggerJSON = require('../../doc/api.swagger.json');
|
||||||
const PACKAGE = require('../package.json');
|
const PACKAGE = require('../../package.json');
|
||||||
|
|
||||||
const router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
strict: true,
|
strict: true,
|
||||||
mergeParams: true
|
mergeParams: true
|
||||||
@ -10,16 +10,14 @@ const router = express.Router({
|
|||||||
|
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* GET /schema
|
* GET /schema
|
||||||
*/
|
*/
|
||||||
.get(async (req, res) => {
|
.get((req, res/*, next*/) => {
|
||||||
let swaggerJSON = await schema.getCompiledSchema();
|
|
||||||
|
|
||||||
let proto = req.protocol;
|
let proto = req.protocol;
|
||||||
if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) {
|
if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) {
|
||||||
proto = req.headers['x-forwarded-proto'];
|
proto = req.headers['x-forwarded-proto'];
|
@ -1,9 +1,8 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../lib/validator');
|
const validator = require('../../lib/validator');
|
||||||
const jwtdecode = require('../lib/express/jwt-decode');
|
const jwtdecode = require('../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../lib/validator/api');
|
const internalSetting = require('../../internal/setting');
|
||||||
const internalSetting = require('../internal/setting');
|
const apiValidator = require('../../lib/validator/api');
|
||||||
const schema = require('../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -16,7 +15,7 @@ let router = express.Router({
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -26,7 +25,7 @@ router
|
|||||||
*
|
*
|
||||||
* Retrieve all settings
|
* Retrieve all settings
|
||||||
*/
|
*/
|
||||||
.get((_, res, next) => {
|
.get((req, res, next) => {
|
||||||
internalSetting.getAll(res.locals.access)
|
internalSetting.getAll(res.locals.access)
|
||||||
.then((rows) => {
|
.then((rows) => {
|
||||||
res.status(200)
|
res.status(200)
|
||||||
@ -42,7 +41,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:setting_id')
|
.route('/:setting_id')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -58,8 +57,7 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
setting_id: {
|
setting_id: {
|
||||||
type: 'string',
|
$ref: 'definitions#/definitions/setting_id'
|
||||||
minLength: 1
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -83,7 +81,7 @@ router
|
|||||||
* Update and existing setting
|
* Update and existing setting
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/settings/{settingID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/settings#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = req.params.setting_id;
|
payload.id = req.params.setting_id;
|
||||||
return internalSetting.update(res.locals.access, payload);
|
return internalSetting.update(res.locals.access, payload);
|
@ -1,8 +1,7 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const jwtdecode = require('../lib/express/jwt-decode');
|
const jwtdecode = require('../../lib/express/jwt-decode');
|
||||||
const apiValidator = require('../lib/validator/api');
|
const internalToken = require('../../internal/token');
|
||||||
const internalToken = require('../internal/token');
|
const apiValidator = require('../../lib/validator/api');
|
||||||
const schema = require('../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -12,7 +11,7 @@ let router = express.Router({
|
|||||||
|
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
|
|
||||||
@ -40,9 +39,11 @@ router
|
|||||||
*
|
*
|
||||||
* Create a new Token
|
* Create a new Token
|
||||||
*/
|
*/
|
||||||
.post(async (req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/tokens', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/tokens#/links/0/schema'}, req.body)
|
||||||
.then(internalToken.getTokenFromEmail)
|
.then((payload) => {
|
||||||
|
return internalToken.getTokenFromEmail(payload);
|
||||||
|
})
|
||||||
.then((data) => {
|
.then((data) => {
|
||||||
res.status(200)
|
res.status(200)
|
||||||
.send(data);
|
.send(data);
|
@ -1,10 +1,9 @@
|
|||||||
const express = require('express');
|
const express = require('express');
|
||||||
const validator = require('../lib/validator');
|
const validator = require('../../lib/validator');
|
||||||
const jwtdecode = require('../lib/express/jwt-decode');
|
const jwtdecode = require('../../lib/express/jwt-decode');
|
||||||
const userIdFromMe = require('../lib/express/user-id-from-me');
|
const userIdFromMe = require('../../lib/express/user-id-from-me');
|
||||||
const internalUser = require('../internal/user');
|
const internalUser = require('../../internal/user');
|
||||||
const apiValidator = require('../lib/validator/api');
|
const apiValidator = require('../../lib/validator/api');
|
||||||
const schema = require('../schema');
|
|
||||||
|
|
||||||
let router = express.Router({
|
let router = express.Router({
|
||||||
caseSensitive: true,
|
caseSensitive: true,
|
||||||
@ -17,7 +16,7 @@ let router = express.Router({
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/')
|
.route('/')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -32,10 +31,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
},
|
},
|
||||||
query: {
|
query: {
|
||||||
$ref: 'common#/properties/query'
|
$ref: 'definitions#/definitions/query'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -49,11 +48,7 @@ router
|
|||||||
res.status(200)
|
res.status(200)
|
||||||
.send(users);
|
.send(users);
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch(next);
|
||||||
console.log(err);
|
|
||||||
next(err);
|
|
||||||
});
|
|
||||||
//.catch(next);
|
|
||||||
})
|
})
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -62,7 +57,7 @@ router
|
|||||||
* Create a new User
|
* Create a new User
|
||||||
*/
|
*/
|
||||||
.post((req, res, next) => {
|
.post((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/users', 'post'), req.body)
|
apiValidator({$ref: 'endpoints/users#/links/1/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
return internalUser.create(res.locals.access, payload);
|
return internalUser.create(res.locals.access, payload);
|
||||||
})
|
})
|
||||||
@ -80,7 +75,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:user_id')
|
.route('/:user_id')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
||||||
@ -97,10 +92,10 @@ router
|
|||||||
additionalProperties: false,
|
additionalProperties: false,
|
||||||
properties: {
|
properties: {
|
||||||
user_id: {
|
user_id: {
|
||||||
$ref: 'common#/properties/id'
|
$ref: 'definitions#/definitions/id'
|
||||||
},
|
},
|
||||||
expand: {
|
expand: {
|
||||||
$ref: 'common#/properties/expand'
|
$ref: 'definitions#/definitions/expand'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, {
|
}, {
|
||||||
@ -118,10 +113,7 @@ router
|
|||||||
res.status(200)
|
res.status(200)
|
||||||
.send(user);
|
.send(user);
|
||||||
})
|
})
|
||||||
.catch((err) => {
|
.catch(next);
|
||||||
console.log(err);
|
|
||||||
next(err);
|
|
||||||
});
|
|
||||||
})
|
})
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -130,7 +122,7 @@ router
|
|||||||
* Update and existing user
|
* Update and existing user
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/users/{userID}', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/users#/links/2/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = req.params.user_id;
|
payload.id = req.params.user_id;
|
||||||
return internalUser.update(res.locals.access, payload);
|
return internalUser.update(res.locals.access, payload);
|
||||||
@ -175,7 +167,7 @@ router
|
|||||||
* Update password for a user
|
* Update password for a user
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/users/{userID}/auth', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/users#/links/4/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = req.params.user_id;
|
payload.id = req.params.user_id;
|
||||||
return internalUser.setPassword(res.locals.access, payload);
|
return internalUser.setPassword(res.locals.access, payload);
|
||||||
@ -206,7 +198,7 @@ router
|
|||||||
* Set some or all permissions for a user
|
* Set some or all permissions for a user
|
||||||
*/
|
*/
|
||||||
.put((req, res, next) => {
|
.put((req, res, next) => {
|
||||||
apiValidator(schema.getValidationSchema('/users/{userID}/permissions', 'put'), req.body)
|
apiValidator({$ref: 'endpoints/users#/links/5/schema'}, req.body)
|
||||||
.then((payload) => {
|
.then((payload) => {
|
||||||
payload.id = req.params.user_id;
|
payload.id = req.params.user_id;
|
||||||
return internalUser.setPermissions(res.locals.access, payload);
|
return internalUser.setPermissions(res.locals.access, payload);
|
||||||
@ -225,7 +217,7 @@ router
|
|||||||
*/
|
*/
|
||||||
router
|
router
|
||||||
.route('/:user_id/login')
|
.route('/:user_id/login')
|
||||||
.options((_, res) => {
|
.options((req, res) => {
|
||||||
res.sendStatus(204);
|
res.sendStatus(204);
|
||||||
})
|
})
|
||||||
.all(jwtdecode())
|
.all(jwtdecode())
|
@ -1,115 +0,0 @@
|
|||||||
{
|
|
||||||
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
|
||||||
"$id": "common",
|
|
||||||
"type": "object",
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"description": "Unique identifier",
|
|
||||||
"readOnly": true,
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 1
|
|
||||||
},
|
|
||||||
"expand": {
|
|
||||||
"anyOf": [
|
|
||||||
{
|
|
||||||
"type": "null"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"minItems": 1,
|
|
||||||
"items": {
|
|
||||||
"type": "string"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"query": {
|
|
||||||
"anyOf": [
|
|
||||||
{
|
|
||||||
"type": "null"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1,
|
|
||||||
"maxLength": 255
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"description": "Date and time of creation",
|
|
||||||
"readOnly": true,
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"description": "Date and time of last update",
|
|
||||||
"readOnly": true,
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"user_id": {
|
|
||||||
"description": "User ID",
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 1
|
|
||||||
},
|
|
||||||
"certificate_id": {
|
|
||||||
"description": "Certificate ID",
|
|
||||||
"anyOf": [
|
|
||||||
{
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^new$"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"access_list_id": {
|
|
||||||
"description": "Access List ID",
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
},
|
|
||||||
"domain_names": {
|
|
||||||
"description": "Domain Names separated by a comma",
|
|
||||||
"type": "array",
|
|
||||||
"minItems": 1,
|
|
||||||
"maxItems": 100,
|
|
||||||
"uniqueItems": true,
|
|
||||||
"items": {
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"enabled": {
|
|
||||||
"description": "Is Enabled",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"ssl_forced": {
|
|
||||||
"description": "Is SSL Forced",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"hsts_enabled": {
|
|
||||||
"description": "Is HSTS Enabled",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"hsts_subdomains": {
|
|
||||||
"description": "Is HSTS applicable to all subdomains",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"ssl_provider": {
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^(letsencrypt|other)$"
|
|
||||||
},
|
|
||||||
"http2_support": {
|
|
||||||
"description": "HTTP2 Protocol Support",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"block_exploits": {
|
|
||||||
"description": "Should we block common exploits",
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"caching_enabled": {
|
|
||||||
"description": "Should we cache assets",
|
|
||||||
"type": "boolean"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,53 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Access List object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "owner_user_id", "name", "directive", "address", "satisfy_any", "pass_auth", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"name": {
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1
|
|
||||||
},
|
|
||||||
"directive": {
|
|
||||||
"type": "string",
|
|
||||||
"enum": ["allow", "deny"]
|
|
||||||
},
|
|
||||||
"address": {
|
|
||||||
"oneOf": [
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}(/([0-9]|[1-2][0-9]|3[0-2]))?$"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^all$"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"satisfy_any": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"pass_auth": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,32 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Audit Log object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "user_id", "object_type", "object_id", "action", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"object_type": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"object_id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"action": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "Certificates list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./certificate-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,81 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Certificate object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "owner_user_id", "provider", "nice_name", "domain_names", "expires_on", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"provider": {
|
|
||||||
"$ref": "../common.json#/properties/ssl_provider"
|
|
||||||
},
|
|
||||||
"nice_name": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Nice Name for the custom certificate"
|
|
||||||
},
|
|
||||||
"domain_names": {
|
|
||||||
"description": "Domain Names separated by a comma",
|
|
||||||
"type": "array",
|
|
||||||
"maxItems": 100,
|
|
||||||
"uniqueItems": true,
|
|
||||||
"items": {
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"expires_on": {
|
|
||||||
"description": "Date and time of expiration",
|
|
||||||
"readOnly": true,
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"owner": {
|
|
||||||
"$ref": "./user-object.json"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object",
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"certificate": {
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1
|
|
||||||
},
|
|
||||||
"certificate_key": {
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1
|
|
||||||
},
|
|
||||||
"dns_challenge": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"dns_provider": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"dns_provider_credentials": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"letsencrypt_agree": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"letsencrypt_certificate": {
|
|
||||||
"type": "object"
|
|
||||||
},
|
|
||||||
"letsencrypt_email": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"propagation_seconds": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "404 Hosts list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./dead-host-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,47 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "404 Host object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "advanced_config", "enabled", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"domain_names": {
|
|
||||||
"$ref": "../common.json#/properties/domain_names"
|
|
||||||
},
|
|
||||||
"certificate_id": {
|
|
||||||
"$ref": "../common.json#/properties/certificate_id"
|
|
||||||
},
|
|
||||||
"ssl_forced": {
|
|
||||||
"$ref": "../common.json#/properties/ssl_forced"
|
|
||||||
},
|
|
||||||
"hsts_enabled": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_enabled"
|
|
||||||
},
|
|
||||||
"hsts_subdomains": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_subdomains"
|
|
||||||
},
|
|
||||||
"http2_support": {
|
|
||||||
"$ref": "../common.json#/properties/http2_support"
|
|
||||||
},
|
|
||||||
"advanced_config": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"enabled": {
|
|
||||||
"$ref": "../common.json#/properties/enabled"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,14 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Error object",
|
|
||||||
"additionalProperties": false,
|
|
||||||
"required": ["code", "message"],
|
|
||||||
"properties": {
|
|
||||||
"code": {
|
|
||||||
"type": "integer"
|
|
||||||
},
|
|
||||||
"message": {
|
|
||||||
"type": "string"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Error",
|
|
||||||
"properties": {
|
|
||||||
"error": {
|
|
||||||
"$ref": "./error-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,38 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Health object",
|
|
||||||
"additionalProperties": false,
|
|
||||||
"required": ["status", "version"],
|
|
||||||
"properties": {
|
|
||||||
"status": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Healthy",
|
|
||||||
"example": "OK"
|
|
||||||
},
|
|
||||||
"version": {
|
|
||||||
"type": "object",
|
|
||||||
"description": "The version object",
|
|
||||||
"example": {
|
|
||||||
"major": 2,
|
|
||||||
"minor": 0,
|
|
||||||
"revision": 0
|
|
||||||
},
|
|
||||||
"additionalProperties": false,
|
|
||||||
"required": ["major", "minor", "revision"],
|
|
||||||
"properties": {
|
|
||||||
"major": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
},
|
|
||||||
"minor": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
},
|
|
||||||
"revision": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,41 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"minProperties": 1,
|
|
||||||
"properties": {
|
|
||||||
"visibility": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Visibility Type",
|
|
||||||
"enum": ["all", "user"]
|
|
||||||
},
|
|
||||||
"access_lists": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Access Lists Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
},
|
|
||||||
"dead_hosts": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "404 Hosts Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
},
|
|
||||||
"proxy_hosts": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Proxy Hosts Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
},
|
|
||||||
"redirection_hosts": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Redirection Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
},
|
|
||||||
"streams": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Streams Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
},
|
|
||||||
"certificates": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Certificates Permissions",
|
|
||||||
"enum": ["hidden", "view", "manage"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "Proxy Hosts list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./proxy-host-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,153 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Proxy Host object",
|
|
||||||
"required": [
|
|
||||||
"id",
|
|
||||||
"created_on",
|
|
||||||
"modified_on",
|
|
||||||
"owner_user_id",
|
|
||||||
"domain_names",
|
|
||||||
"forward_host",
|
|
||||||
"forward_port",
|
|
||||||
"access_list_id",
|
|
||||||
"certificate_id",
|
|
||||||
"ssl_forced",
|
|
||||||
"caching_enabled",
|
|
||||||
"block_exploits",
|
|
||||||
"advanced_config",
|
|
||||||
"meta",
|
|
||||||
"allow_websocket_upgrade",
|
|
||||||
"http2_support",
|
|
||||||
"forward_scheme",
|
|
||||||
"enabled",
|
|
||||||
"locations",
|
|
||||||
"hsts_enabled",
|
|
||||||
"hsts_subdomains"
|
|
||||||
],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"domain_names": {
|
|
||||||
"$ref": "../common.json#/properties/domain_names"
|
|
||||||
},
|
|
||||||
"forward_host": {
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1,
|
|
||||||
"maxLength": 255
|
|
||||||
},
|
|
||||||
"forward_port": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 1,
|
|
||||||
"maximum": 65535
|
|
||||||
},
|
|
||||||
"access_list_id": {
|
|
||||||
"$ref": "../common.json#/properties/access_list_id"
|
|
||||||
},
|
|
||||||
"certificate_id": {
|
|
||||||
"$ref": "../common.json#/properties/certificate_id"
|
|
||||||
},
|
|
||||||
"ssl_forced": {
|
|
||||||
"$ref": "../common.json#/properties/ssl_forced"
|
|
||||||
},
|
|
||||||
"caching_enabled": {
|
|
||||||
"$ref": "../common.json#/properties/caching_enabled"
|
|
||||||
},
|
|
||||||
"block_exploits": {
|
|
||||||
"$ref": "../common.json#/properties/block_exploits"
|
|
||||||
},
|
|
||||||
"advanced_config": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
},
|
|
||||||
"allow_websocket_upgrade": {
|
|
||||||
"description": "Allow Websocket Upgrade for all paths",
|
|
||||||
"example": true,
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"http2_support": {
|
|
||||||
"$ref": "../common.json#/properties/http2_support"
|
|
||||||
},
|
|
||||||
"forward_scheme": {
|
|
||||||
"type": "string",
|
|
||||||
"enum": ["http", "https"]
|
|
||||||
},
|
|
||||||
"enabled": {
|
|
||||||
"$ref": "../common.json#/properties/enabled"
|
|
||||||
},
|
|
||||||
"locations": {
|
|
||||||
"type": "array",
|
|
||||||
"minItems": 0,
|
|
||||||
"items": {
|
|
||||||
"type": "object",
|
|
||||||
"required": ["forward_scheme", "forward_host", "forward_port", "path"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"type": ["integer", "null"]
|
|
||||||
},
|
|
||||||
"path": {
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1
|
|
||||||
},
|
|
||||||
"forward_scheme": {
|
|
||||||
"$ref": "#/properties/forward_scheme"
|
|
||||||
},
|
|
||||||
"forward_host": {
|
|
||||||
"$ref": "#/properties/forward_host"
|
|
||||||
},
|
|
||||||
"forward_port": {
|
|
||||||
"$ref": "#/properties/forward_port"
|
|
||||||
},
|
|
||||||
"forward_path": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"advanced_config": {
|
|
||||||
"type": "string"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"hsts_enabled": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_enabled"
|
|
||||||
},
|
|
||||||
"hsts_subdomains": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_subdomains"
|
|
||||||
},
|
|
||||||
"certificate": {
|
|
||||||
"oneOf": [
|
|
||||||
{
|
|
||||||
"type": "null"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"$ref": "./certificate-object.json"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"owner": {
|
|
||||||
"$ref": "./user-object.json"
|
|
||||||
},
|
|
||||||
"access_list": {
|
|
||||||
"oneOf": [
|
|
||||||
{
|
|
||||||
"type": "null"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"$ref": "./access-list-object.json"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "Redirection Hosts list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./redirection-host-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,72 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Redirection Host object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "forward_http_code", "forward_scheme", "forward_domain_name", "preserve_path", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "block_exploits", "advanced_config", "enabled", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"domain_names": {
|
|
||||||
"$ref": "../common.json#/properties/domain_names"
|
|
||||||
},
|
|
||||||
"forward_http_code": {
|
|
||||||
"description": "Redirect HTTP Status Code",
|
|
||||||
"example": 302,
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 300,
|
|
||||||
"maximum": 308
|
|
||||||
},
|
|
||||||
"forward_scheme": {
|
|
||||||
"type": "string",
|
|
||||||
"enum": ["auto", "http", "https"]
|
|
||||||
},
|
|
||||||
"forward_domain_name": {
|
|
||||||
"description": "Domain Name",
|
|
||||||
"example": "jc21.com",
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^(?:[^.*]+\\.?)+[^.]$"
|
|
||||||
},
|
|
||||||
"preserve_path": {
|
|
||||||
"description": "Should the path be preserved",
|
|
||||||
"example": true,
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"certificate_id": {
|
|
||||||
"$ref": "../common.json#/properties/certificate_id"
|
|
||||||
},
|
|
||||||
"ssl_forced": {
|
|
||||||
"$ref": "../common.json#/properties/ssl_forced"
|
|
||||||
},
|
|
||||||
"hsts_enabled": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_enabled"
|
|
||||||
},
|
|
||||||
"hsts_subdomains": {
|
|
||||||
"$ref": "../common.json#/properties/hsts_subdomains"
|
|
||||||
},
|
|
||||||
"http2_support": {
|
|
||||||
"$ref": "../common.json#/properties/http2_support"
|
|
||||||
},
|
|
||||||
"block_exploits": {
|
|
||||||
"$ref": "../common.json#/properties/block_exploits"
|
|
||||||
},
|
|
||||||
"advanced_config": {
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"enabled": {
|
|
||||||
"$ref": "../common.json#/properties/enabled"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,6 +0,0 @@
|
|||||||
{
|
|
||||||
"BearerAuth": {
|
|
||||||
"type": "http",
|
|
||||||
"scheme": "bearer"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "Setting list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./setting-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,56 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Setting object",
|
|
||||||
"required": ["id", "name", "description", "value", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Setting ID",
|
|
||||||
"minLength": 1,
|
|
||||||
"example": "default-site"
|
|
||||||
},
|
|
||||||
"name": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Setting Display Name",
|
|
||||||
"minLength": 1,
|
|
||||||
"example": "Default Site"
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Meaningful description",
|
|
||||||
"minLength": 1,
|
|
||||||
"example": "What to show when Nginx is hit with an unknown Host"
|
|
||||||
},
|
|
||||||
"value": {
|
|
||||||
"description": "Value in almost any form",
|
|
||||||
"example": "congratulations",
|
|
||||||
"anyOf": [
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"minLength": 1
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "integer"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "object"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "number"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "array"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"description": "Extra metadata",
|
|
||||||
"example": {
|
|
||||||
"redirect": "http://example.com",
|
|
||||||
"html": "<h1>404</h1>"
|
|
||||||
},
|
|
||||||
"type": "object"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "Proxy Hosts list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./proxy-host-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,76 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Stream object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "owner_user_id", "incoming_port", "forwarding_host", "forwarding_port", "tcp_forwarding", "udp_forwarding", "enabled", "meta"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"$ref": "../common.json#/properties/id"
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"$ref": "../common.json#/properties/created_on"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"$ref": "../common.json#/properties/modified_on"
|
|
||||||
},
|
|
||||||
"owner_user_id": {
|
|
||||||
"$ref": "../common.json#/properties/user_id"
|
|
||||||
},
|
|
||||||
"incoming_port": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 1,
|
|
||||||
"maximum": 65535
|
|
||||||
},
|
|
||||||
"forwarding_host": {
|
|
||||||
"anyOf": [
|
|
||||||
{
|
|
||||||
"description": "Domain Name",
|
|
||||||
"example": "jc21.com",
|
|
||||||
"type": "string",
|
|
||||||
"pattern": "^(?:[^.*]+\\.?)+[^.]$"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"format": "ipv4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"type": "string",
|
|
||||||
"format": "ipv6"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"forwarding_port": {
|
|
||||||
"type": "integer",
|
|
||||||
"minimum": 1,
|
|
||||||
"maximum": 65535
|
|
||||||
},
|
|
||||||
"tcp_forwarding": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"udp_forwarding": {
|
|
||||||
"type": "boolean"
|
|
||||||
},
|
|
||||||
"enabled": {
|
|
||||||
"$ref": "../common.json#/properties/enabled"
|
|
||||||
},
|
|
||||||
"certificate_id": {
|
|
||||||
"$ref": "../common.json#/properties/certificate_id"
|
|
||||||
},
|
|
||||||
"meta": {
|
|
||||||
"type": "object"
|
|
||||||
},
|
|
||||||
"owner": {
|
|
||||||
"$ref": "./user-object.json"
|
|
||||||
},
|
|
||||||
"certificate": {
|
|
||||||
"oneOf": [
|
|
||||||
{
|
|
||||||
"type": "null"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"$ref": "./certificate-object.json"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,18 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "Token object",
|
|
||||||
"required": ["expires", "token"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"expires": {
|
|
||||||
"description": "Token Expiry ISO Time String",
|
|
||||||
"example": "2025-02-04T20:40:46.340Z",
|
|
||||||
"type": "string"
|
|
||||||
},
|
|
||||||
"token": {
|
|
||||||
"description": "JWT Token",
|
|
||||||
"example": "eyJhbGciOiJSUzUxMiIsInR5cCI6IkpXVCJ9.ey...xaHKYr3Kk6MvkUjcC4",
|
|
||||||
"type": "string"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "array",
|
|
||||||
"description": "User list",
|
|
||||||
"items": {
|
|
||||||
"$ref": "./user-object.json"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,59 +0,0 @@
|
|||||||
{
|
|
||||||
"type": "object",
|
|
||||||
"description": "User object",
|
|
||||||
"required": ["id", "created_on", "modified_on", "is_disabled", "email", "name", "nickname", "avatar", "roles"],
|
|
||||||
"additionalProperties": false,
|
|
||||||
"properties": {
|
|
||||||
"id": {
|
|
||||||
"type": "integer",
|
|
||||||
"description": "User ID",
|
|
||||||
"minimum": 1,
|
|
||||||
"example": 1
|
|
||||||
},
|
|
||||||
"created_on": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Created Date",
|
|
||||||
"example": "2020-01-30T09:36:08.000Z"
|
|
||||||
},
|
|
||||||
"modified_on": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Modified Date",
|
|
||||||
"example": "2020-01-30T09:41:04.000Z"
|
|
||||||
},
|
|
||||||
"is_disabled": {
|
|
||||||
"type": "boolean",
|
|
||||||
"description": "Is user Disabled",
|
|
||||||
"example": true
|
|
||||||
},
|
|
||||||
"email": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Email",
|
|
||||||
"minLength": 3,
|
|
||||||
"example": "jc@jc21.com"
|
|
||||||
},
|
|
||||||
"name": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Name",
|
|
||||||
"minLength": 1,
|
|
||||||
"example": "Jamie Curnow"
|
|
||||||
},
|
|
||||||
"nickname": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Nickname",
|
|
||||||
"example": "James"
|
|
||||||
},
|
|
||||||
"avatar": {
|
|
||||||
"type": "string",
|
|
||||||
"description": "Gravatar URL based on email, without scheme",
|
|
||||||
"example": "//www.gravatar.com/avatar/6193176330f8d38747f038c170ddb193?default=mm"
|
|
||||||
},
|
|
||||||
"roles": {
|
|
||||||
"description": "Roles applied",
|
|
||||||
"example": ["admin"],
|
|
||||||
"type": "array",
|
|
||||||
"items": {
|
|
||||||
"type": "string"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
240
backend/schema/definitions.json
Normal file
240
backend/schema/definitions.json
Normal file
@ -0,0 +1,240 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "definitions",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"description": "Unique identifier",
|
||||||
|
"example": 123456,
|
||||||
|
"readOnly": true,
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 1
|
||||||
|
},
|
||||||
|
"setting_id": {
|
||||||
|
"description": "Unique identifier for a Setting",
|
||||||
|
"example": "default-site",
|
||||||
|
"readOnly": true,
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2
|
||||||
|
},
|
||||||
|
"token": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 10
|
||||||
|
},
|
||||||
|
"expand": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "null"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 1,
|
||||||
|
"items": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"sort": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 1,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"required": [
|
||||||
|
"field",
|
||||||
|
"dir"
|
||||||
|
],
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"field": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"dir": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(asc|desc)$"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"query": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "null"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1,
|
||||||
|
"maxLength": 255
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"criteria": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "null"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"fields": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "null"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 1,
|
||||||
|
"items": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"omit": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "null"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 1,
|
||||||
|
"items": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"description": "Date and time of creation",
|
||||||
|
"format": "date-time",
|
||||||
|
"readOnly": true,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"description": "Date and time of last update",
|
||||||
|
"format": "date-time",
|
||||||
|
"readOnly": true,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"description": "User ID",
|
||||||
|
"example": 1234,
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 1
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"description": "Certificate ID",
|
||||||
|
"example": 1234,
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^new$"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"access_list_id": {
|
||||||
|
"description": "Access List ID",
|
||||||
|
"example": 1234,
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 0
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1,
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"email": {
|
||||||
|
"description": "Email Address",
|
||||||
|
"example": "john@example.com",
|
||||||
|
"format": "email",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 6,
|
||||||
|
"maxLength": 100
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"description": "Password",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 8,
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"domain_name": {
|
||||||
|
"description": "Domain Name",
|
||||||
|
"example": "jc21.com",
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(?:[^.*]+\\.?)+[^.]$"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"description": "Domain Names separated by a comma",
|
||||||
|
"example": "*.jc21.com,blog.jc21.com",
|
||||||
|
"type": "array",
|
||||||
|
"maxItems": 15,
|
||||||
|
"uniqueItems": true,
|
||||||
|
"items": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(?:\\*\\.)?(?:[^.*]+\\.?)+[^.]$"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http_code": {
|
||||||
|
"description": "Redirect HTTP Status Code",
|
||||||
|
"example": 302,
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 300,
|
||||||
|
"maximum": 308
|
||||||
|
},
|
||||||
|
"scheme": {
|
||||||
|
"description": "RFC Protocol",
|
||||||
|
"example": "HTTPS or $scheme",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 4
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"description": "Is Enabled",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"ssl_enabled": {
|
||||||
|
"description": "Is SSL Enabled",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"description": "Is SSL Forced",
|
||||||
|
"example": false,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"description": "Is HSTS Enabled",
|
||||||
|
"example": false,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"description": "Is HSTS applicable to all subdomains",
|
||||||
|
"example": false,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"ssl_provider": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(letsencrypt|other)$"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"description": "HTTP2 Protocol Support",
|
||||||
|
"example": false,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"description": "Should we block common exploits",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"caching_enabled": {
|
||||||
|
"description": "Should we cache assets",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
236
backend/schema/endpoints/access-lists.json
Normal file
236
backend/schema/endpoints/access-lists.json
Normal file
@ -0,0 +1,236 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/access-lists",
|
||||||
|
"title": "Access Lists",
|
||||||
|
"description": "Endpoints relating to Access Lists",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "Name of the Access List"
|
||||||
|
},
|
||||||
|
"directive": {
|
||||||
|
"type": "string",
|
||||||
|
"enum": ["allow", "deny"]
|
||||||
|
},
|
||||||
|
"address": {
|
||||||
|
"oneOf": [
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}(/([0-9]|[1-2][0-9]|3[0-2]))?$"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^all$"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"satisfy_any": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"pass_auth": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Access Lists",
|
||||||
|
"href": "/nginx/access-lists",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new Access List",
|
||||||
|
"href": "/nginx/access-list",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": ["name"],
|
||||||
|
"properties": {
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"satisfy_any": {
|
||||||
|
"$ref": "#/definitions/satisfy_any"
|
||||||
|
},
|
||||||
|
"pass_auth": {
|
||||||
|
"$ref": "#/definitions/pass_auth"
|
||||||
|
},
|
||||||
|
"items": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 0,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"username": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"clients": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 0,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"address": {
|
||||||
|
"$ref": "#/definitions/address"
|
||||||
|
},
|
||||||
|
"directive": {
|
||||||
|
"$ref": "#/definitions/directive"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing Access List",
|
||||||
|
"href": "/nginx/access-list/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"satisfy_any": {
|
||||||
|
"$ref": "#/definitions/satisfy_any"
|
||||||
|
},
|
||||||
|
"pass_auth": {
|
||||||
|
"$ref": "#/definitions/pass_auth"
|
||||||
|
},
|
||||||
|
"items": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 0,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"username": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"clients": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 0,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"address": {
|
||||||
|
"$ref": "#/definitions/address"
|
||||||
|
},
|
||||||
|
"directive": {
|
||||||
|
"$ref": "#/definitions/directive"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing Access List",
|
||||||
|
"href": "/nginx/access-list/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
162
backend/schema/endpoints/certificates.json
Normal file
162
backend/schema/endpoints/certificates.json
Normal file
@ -0,0 +1,162 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/certificates",
|
||||||
|
"title": "Certificates",
|
||||||
|
"description": "Endpoints relating to Certificates",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"provider": {
|
||||||
|
"$ref": "../definitions.json#/definitions/ssl_provider"
|
||||||
|
},
|
||||||
|
"nice_name": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "Nice Name for the custom certificate"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"expires_on": {
|
||||||
|
"description": "Date and time of expiration",
|
||||||
|
"format": "date-time",
|
||||||
|
"readOnly": true,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"letsencrypt_email": {
|
||||||
|
"type": "string",
|
||||||
|
"format": "email"
|
||||||
|
},
|
||||||
|
"letsencrypt_agree": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"dns_challenge": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"dns_provider": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"dns_provider_credentials": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"propagation_seconds": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"provider": {
|
||||||
|
"$ref": "#/definitions/provider"
|
||||||
|
},
|
||||||
|
"nice_name": {
|
||||||
|
"$ref": "#/definitions/nice_name"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"expires_on": {
|
||||||
|
"$ref": "#/definitions/expires_on"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Certificates",
|
||||||
|
"href": "/nginx/certificates",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new Certificate",
|
||||||
|
"href": "/nginx/certificates",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": [
|
||||||
|
"provider"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"provider": {
|
||||||
|
"$ref": "#/definitions/provider"
|
||||||
|
},
|
||||||
|
"nice_name": {
|
||||||
|
"$ref": "#/definitions/nice_name"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing Certificate",
|
||||||
|
"href": "/nginx/certificates/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
240
backend/schema/endpoints/dead-hosts.json
Normal file
240
backend/schema/endpoints/dead-hosts.json
Normal file
@ -0,0 +1,240 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/dead-hosts",
|
||||||
|
"title": "404 Hosts",
|
||||||
|
"description": "Endpoints relating to 404 Hosts",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "../definitions.json#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "../definitions.json#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of 404 Hosts",
|
||||||
|
"href": "/nginx/dead-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new 404 Host",
|
||||||
|
"href": "/nginx/dead-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": [
|
||||||
|
"domain_names"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing 404 Host",
|
||||||
|
"href": "/nginx/dead-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing 404 Host",
|
||||||
|
"href": "/nginx/dead-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Enable",
|
||||||
|
"description": "Enables a existing 404 Host",
|
||||||
|
"href": "/nginx/dead-hosts/{definitions.identity.example}/enable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Disable",
|
||||||
|
"description": "Disables a existing 404 Host",
|
||||||
|
"href": "/nginx/dead-hosts/{definitions.identity.example}/disable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
387
backend/schema/endpoints/proxy-hosts.json
Normal file
387
backend/schema/endpoints/proxy-hosts.json
Normal file
@ -0,0 +1,387 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/proxy-hosts",
|
||||||
|
"title": "Proxy Hosts",
|
||||||
|
"description": "Endpoints relating to Proxy Hosts",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"type": "string",
|
||||||
|
"enum": ["http", "https"]
|
||||||
|
},
|
||||||
|
"forward_host": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1,
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"forward_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 1,
|
||||||
|
"maximum": 65535
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "../definitions.json#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "../definitions.json#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "../definitions.json#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"caching_enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/caching_enabled"
|
||||||
|
},
|
||||||
|
"allow_websocket_upgrade": {
|
||||||
|
"description": "Allow Websocket Upgrade for all paths",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"access_list_id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/access_list_id"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"locations": {
|
||||||
|
"type": "array",
|
||||||
|
"minItems": 0,
|
||||||
|
"items": {
|
||||||
|
"type": "object",
|
||||||
|
"required": [
|
||||||
|
"forward_scheme",
|
||||||
|
"forward_host",
|
||||||
|
"forward_port",
|
||||||
|
"path"
|
||||||
|
],
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"type": ["integer", "null"]
|
||||||
|
},
|
||||||
|
"path": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_host": {
|
||||||
|
"$ref": "#/definitions/forward_host"
|
||||||
|
},
|
||||||
|
"forward_port": {
|
||||||
|
"$ref": "#/definitions/forward_port"
|
||||||
|
},
|
||||||
|
"forward_path": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_host": {
|
||||||
|
"$ref": "#/definitions/forward_host"
|
||||||
|
},
|
||||||
|
"forward_port": {
|
||||||
|
"$ref": "#/definitions/forward_port"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"caching_enabled": {
|
||||||
|
"$ref": "#/definitions/caching_enabled"
|
||||||
|
},
|
||||||
|
"allow_websocket_upgrade": {
|
||||||
|
"$ref": "#/definitions/allow_websocket_upgrade"
|
||||||
|
},
|
||||||
|
"access_list_id": {
|
||||||
|
"$ref": "#/definitions/access_list_id"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
},
|
||||||
|
"locations": {
|
||||||
|
"$ref": "#/definitions/locations"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Proxy Hosts",
|
||||||
|
"href": "/nginx/proxy-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new Proxy Host",
|
||||||
|
"href": "/nginx/proxy-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": [
|
||||||
|
"domain_names",
|
||||||
|
"forward_scheme",
|
||||||
|
"forward_host",
|
||||||
|
"forward_port"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_host": {
|
||||||
|
"$ref": "#/definitions/forward_host"
|
||||||
|
},
|
||||||
|
"forward_port": {
|
||||||
|
"$ref": "#/definitions/forward_port"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"caching_enabled": {
|
||||||
|
"$ref": "#/definitions/caching_enabled"
|
||||||
|
},
|
||||||
|
"allow_websocket_upgrade": {
|
||||||
|
"$ref": "#/definitions/allow_websocket_upgrade"
|
||||||
|
},
|
||||||
|
"access_list_id": {
|
||||||
|
"$ref": "#/definitions/access_list_id"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
},
|
||||||
|
"locations": {
|
||||||
|
"$ref": "#/definitions/locations"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing Proxy Host",
|
||||||
|
"href": "/nginx/proxy-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_host": {
|
||||||
|
"$ref": "#/definitions/forward_host"
|
||||||
|
},
|
||||||
|
"forward_port": {
|
||||||
|
"$ref": "#/definitions/forward_port"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"caching_enabled": {
|
||||||
|
"$ref": "#/definitions/caching_enabled"
|
||||||
|
},
|
||||||
|
"allow_websocket_upgrade": {
|
||||||
|
"$ref": "#/definitions/allow_websocket_upgrade"
|
||||||
|
},
|
||||||
|
"access_list_id": {
|
||||||
|
"$ref": "#/definitions/access_list_id"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
},
|
||||||
|
"locations": {
|
||||||
|
"$ref": "#/definitions/locations"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing Proxy Host",
|
||||||
|
"href": "/nginx/proxy-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Enable",
|
||||||
|
"description": "Enables a existing Proxy Host",
|
||||||
|
"href": "/nginx/proxy-hosts/{definitions.identity.example}/enable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Disable",
|
||||||
|
"description": "Disables a existing Proxy Host",
|
||||||
|
"href": "/nginx/proxy-hosts/{definitions.identity.example}/disable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
305
backend/schema/endpoints/redirection-hosts.json
Normal file
305
backend/schema/endpoints/redirection-hosts.json
Normal file
@ -0,0 +1,305 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/redirection-hosts",
|
||||||
|
"title": "Redirection Hosts",
|
||||||
|
"description": "Endpoints relating to Redirection Hosts",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_http_code": {
|
||||||
|
"$ref": "../definitions.json#/definitions/http_code"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "../definitions.json#/definitions/scheme"
|
||||||
|
},
|
||||||
|
"forward_domain_name": {
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_name"
|
||||||
|
},
|
||||||
|
"preserve_path": {
|
||||||
|
"description": "Should the path be preserved",
|
||||||
|
"example": true,
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "../definitions.json#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "../definitions.json#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "../definitions.json#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "../definitions.json#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_http_code": {
|
||||||
|
"$ref": "#/definitions/forward_http_code"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_domain_name": {
|
||||||
|
"$ref": "#/definitions/forward_domain_name"
|
||||||
|
},
|
||||||
|
"preserve_path": {
|
||||||
|
"$ref": "#/definitions/preserve_path"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_subdomains"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Redirection Hosts",
|
||||||
|
"href": "/nginx/redirection-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new Redirection Host",
|
||||||
|
"href": "/nginx/redirection-hosts",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": [
|
||||||
|
"domain_names",
|
||||||
|
"forward_scheme",
|
||||||
|
"forward_http_code",
|
||||||
|
"forward_domain_name"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_http_code": {
|
||||||
|
"$ref": "#/definitions/forward_http_code"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_domain_name": {
|
||||||
|
"$ref": "#/definitions/forward_domain_name"
|
||||||
|
},
|
||||||
|
"preserve_path": {
|
||||||
|
"$ref": "#/definitions/preserve_path"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing Redirection Host",
|
||||||
|
"href": "/nginx/redirection-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"domain_names": {
|
||||||
|
"$ref": "#/definitions/domain_names"
|
||||||
|
},
|
||||||
|
"forward_http_code": {
|
||||||
|
"$ref": "#/definitions/forward_http_code"
|
||||||
|
},
|
||||||
|
"forward_scheme": {
|
||||||
|
"$ref": "#/definitions/forward_scheme"
|
||||||
|
},
|
||||||
|
"forward_domain_name": {
|
||||||
|
"$ref": "#/definitions/forward_domain_name"
|
||||||
|
},
|
||||||
|
"preserve_path": {
|
||||||
|
"$ref": "#/definitions/preserve_path"
|
||||||
|
},
|
||||||
|
"certificate_id": {
|
||||||
|
"$ref": "#/definitions/certificate_id"
|
||||||
|
},
|
||||||
|
"ssl_forced": {
|
||||||
|
"$ref": "#/definitions/ssl_forced"
|
||||||
|
},
|
||||||
|
"hsts_enabled": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"hsts_subdomains": {
|
||||||
|
"$ref": "#/definitions/hsts_enabled"
|
||||||
|
},
|
||||||
|
"http2_support": {
|
||||||
|
"$ref": "#/definitions/http2_support"
|
||||||
|
},
|
||||||
|
"block_exploits": {
|
||||||
|
"$ref": "#/definitions/block_exploits"
|
||||||
|
},
|
||||||
|
"advanced_config": {
|
||||||
|
"$ref": "#/definitions/advanced_config"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing Redirection Host",
|
||||||
|
"href": "/nginx/redirection-hosts/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Enable",
|
||||||
|
"description": "Enables a existing Redirection Host",
|
||||||
|
"href": "/nginx/redirection-hosts/{definitions.identity.example}/enable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Disable",
|
||||||
|
"description": "Disables a existing Redirection Host",
|
||||||
|
"href": "/nginx/redirection-hosts/{definitions.identity.example}/disable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
99
backend/schema/endpoints/settings.json
Normal file
99
backend/schema/endpoints/settings.json
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/settings",
|
||||||
|
"title": "Settings",
|
||||||
|
"description": "Endpoints relating to Settings",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/setting_id"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"description": "Name",
|
||||||
|
"example": "Default Site",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2,
|
||||||
|
"maxLength": 100
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description": "Description",
|
||||||
|
"example": "Default Site",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2,
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"value": {
|
||||||
|
"description": "Value",
|
||||||
|
"example": "404",
|
||||||
|
"type": "string",
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Settings",
|
||||||
|
"href": "/settings",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing Setting",
|
||||||
|
"href": "/settings/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"value": {
|
||||||
|
"$ref": "#/definitions/value"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/description"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"$ref": "#/definitions/description"
|
||||||
|
},
|
||||||
|
"value": {
|
||||||
|
"$ref": "#/definitions/value"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
234
backend/schema/endpoints/streams.json
Normal file
234
backend/schema/endpoints/streams.json
Normal file
@ -0,0 +1,234 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/streams",
|
||||||
|
"title": "Streams",
|
||||||
|
"description": "Endpoints relating to Streams",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"incoming_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 1,
|
||||||
|
"maximum": 65535
|
||||||
|
},
|
||||||
|
"forwarding_host": {
|
||||||
|
"anyOf": [
|
||||||
|
{
|
||||||
|
"$ref": "../definitions.json#/definitions/domain_name"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"format": "ipv4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "string",
|
||||||
|
"format": "ipv6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"forwarding_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"minimum": 1,
|
||||||
|
"maximum": 65535
|
||||||
|
},
|
||||||
|
"tcp_forwarding": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"udp_forwarding": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "../definitions.json#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"incoming_port": {
|
||||||
|
"$ref": "#/definitions/incoming_port"
|
||||||
|
},
|
||||||
|
"forwarding_host": {
|
||||||
|
"$ref": "#/definitions/forwarding_host"
|
||||||
|
},
|
||||||
|
"forwarding_port": {
|
||||||
|
"$ref": "#/definitions/forwarding_port"
|
||||||
|
},
|
||||||
|
"tcp_forwarding": {
|
||||||
|
"$ref": "#/definitions/tcp_forwarding"
|
||||||
|
},
|
||||||
|
"udp_forwarding": {
|
||||||
|
"$ref": "#/definitions/udp_forwarding"
|
||||||
|
},
|
||||||
|
"enabled": {
|
||||||
|
"$ref": "#/definitions/enabled"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Steams",
|
||||||
|
"href": "/nginx/streams",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new Stream",
|
||||||
|
"href": "/nginx/streams",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"required": [
|
||||||
|
"incoming_port",
|
||||||
|
"forwarding_host",
|
||||||
|
"forwarding_port"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"incoming_port": {
|
||||||
|
"$ref": "#/definitions/incoming_port"
|
||||||
|
},
|
||||||
|
"forwarding_host": {
|
||||||
|
"$ref": "#/definitions/forwarding_host"
|
||||||
|
},
|
||||||
|
"forwarding_port": {
|
||||||
|
"$ref": "#/definitions/forwarding_port"
|
||||||
|
},
|
||||||
|
"tcp_forwarding": {
|
||||||
|
"$ref": "#/definitions/tcp_forwarding"
|
||||||
|
},
|
||||||
|
"udp_forwarding": {
|
||||||
|
"$ref": "#/definitions/udp_forwarding"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing Stream",
|
||||||
|
"href": "/nginx/streams/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"incoming_port": {
|
||||||
|
"$ref": "#/definitions/incoming_port"
|
||||||
|
},
|
||||||
|
"forwarding_host": {
|
||||||
|
"$ref": "#/definitions/forwarding_host"
|
||||||
|
},
|
||||||
|
"forwarding_port": {
|
||||||
|
"$ref": "#/definitions/forwarding_port"
|
||||||
|
},
|
||||||
|
"tcp_forwarding": {
|
||||||
|
"$ref": "#/definitions/tcp_forwarding"
|
||||||
|
},
|
||||||
|
"udp_forwarding": {
|
||||||
|
"$ref": "#/definitions/udp_forwarding"
|
||||||
|
},
|
||||||
|
"meta": {
|
||||||
|
"$ref": "#/definitions/meta"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing Stream",
|
||||||
|
"href": "/nginx/streams/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Enable",
|
||||||
|
"description": "Enables a existing Stream",
|
||||||
|
"href": "/nginx/streams/{definitions.identity.example}/enable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Disable",
|
||||||
|
"description": "Disables a existing Stream",
|
||||||
|
"href": "/nginx/streams/{definitions.identity.example}/disable",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
100
backend/schema/endpoints/tokens.json
Normal file
100
backend/schema/endpoints/tokens.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/tokens",
|
||||||
|
"title": "Token",
|
||||||
|
"description": "Tokens are required to authenticate against the API",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"identity": {
|
||||||
|
"description": "Email Address or other 3rd party providers identifier",
|
||||||
|
"example": "john@example.com",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"description": "A password or key",
|
||||||
|
"example": "correct horse battery staple",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"token": {
|
||||||
|
"description": "JWT",
|
||||||
|
"example": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.e30.O_frfYM8RzmRsUNigHtu0_jZ_utSejyr1axMGa8rlsk",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"expires": {
|
||||||
|
"description": "Token expiry time",
|
||||||
|
"format": "date-time",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"scope": {
|
||||||
|
"description": "Scope of the Token, defaults to 'user'",
|
||||||
|
"example": "user",
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new token.",
|
||||||
|
"href": "/tokens",
|
||||||
|
"access": "public",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"required": [
|
||||||
|
"identity",
|
||||||
|
"secret"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"identity": {
|
||||||
|
"$ref": "#/definitions/identity"
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"$ref": "#/definitions/secret"
|
||||||
|
},
|
||||||
|
"scope": {
|
||||||
|
"$ref": "#/definitions/scope"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"token": {
|
||||||
|
"$ref": "#/definitions/token"
|
||||||
|
},
|
||||||
|
"expires": {
|
||||||
|
"$ref": "#/definitions/expires"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Refresh",
|
||||||
|
"description": "Returns a new token.",
|
||||||
|
"href": "/tokens",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"token": {
|
||||||
|
"$ref": "#/definitions/token"
|
||||||
|
},
|
||||||
|
"expires": {
|
||||||
|
"$ref": "#/definitions/expires"
|
||||||
|
},
|
||||||
|
"scope": {
|
||||||
|
"$ref": "#/definitions/scope"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
287
backend/schema/endpoints/users.json
Normal file
287
backend/schema/endpoints/users.json
Normal file
@ -0,0 +1,287 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "endpoints/users",
|
||||||
|
"title": "Users",
|
||||||
|
"description": "Endpoints relating to Users",
|
||||||
|
"stability": "stable",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "../definitions.json#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "../definitions.json#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"description": "Name",
|
||||||
|
"example": "Jamie Curnow",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2,
|
||||||
|
"maxLength": 100
|
||||||
|
},
|
||||||
|
"nickname": {
|
||||||
|
"description": "Nickname",
|
||||||
|
"example": "Jamie",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2,
|
||||||
|
"maxLength": 50
|
||||||
|
},
|
||||||
|
"email": {
|
||||||
|
"$ref": "../definitions.json#/definitions/email"
|
||||||
|
},
|
||||||
|
"avatar": {
|
||||||
|
"description": "Avatar",
|
||||||
|
"example": "http://somewhere.jpg",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 2,
|
||||||
|
"maxLength": 150,
|
||||||
|
"readOnly": true
|
||||||
|
},
|
||||||
|
"roles": {
|
||||||
|
"description": "Roles",
|
||||||
|
"example": [
|
||||||
|
"admin"
|
||||||
|
],
|
||||||
|
"type": "array"
|
||||||
|
},
|
||||||
|
"is_disabled": {
|
||||||
|
"description": "Is Disabled",
|
||||||
|
"example": false,
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"links": [
|
||||||
|
{
|
||||||
|
"title": "List",
|
||||||
|
"description": "Returns a list of Users",
|
||||||
|
"href": "/users",
|
||||||
|
"access": "private",
|
||||||
|
"method": "GET",
|
||||||
|
"rel": "self",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Create",
|
||||||
|
"description": "Creates a new User",
|
||||||
|
"href": "/users",
|
||||||
|
"access": "private",
|
||||||
|
"method": "POST",
|
||||||
|
"rel": "create",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"required": [
|
||||||
|
"name",
|
||||||
|
"nickname",
|
||||||
|
"email"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"nickname": {
|
||||||
|
"$ref": "#/definitions/nickname"
|
||||||
|
},
|
||||||
|
"email": {
|
||||||
|
"$ref": "#/definitions/email"
|
||||||
|
},
|
||||||
|
"roles": {
|
||||||
|
"$ref": "#/definitions/roles"
|
||||||
|
},
|
||||||
|
"is_disabled": {
|
||||||
|
"$ref": "#/definitions/is_disabled"
|
||||||
|
},
|
||||||
|
"auth": {
|
||||||
|
"type": "object",
|
||||||
|
"description": "Auth Credentials",
|
||||||
|
"example": {
|
||||||
|
"type": "password",
|
||||||
|
"secret": "bigredhorsebanana"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Update",
|
||||||
|
"description": "Updates a existing User",
|
||||||
|
"href": "/users/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"nickname": {
|
||||||
|
"$ref": "#/definitions/nickname"
|
||||||
|
},
|
||||||
|
"email": {
|
||||||
|
"$ref": "#/definitions/email"
|
||||||
|
},
|
||||||
|
"roles": {
|
||||||
|
"$ref": "#/definitions/roles"
|
||||||
|
},
|
||||||
|
"is_disabled": {
|
||||||
|
"$ref": "#/definitions/is_disabled"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"properties": {
|
||||||
|
"$ref": "#/properties"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Delete",
|
||||||
|
"description": "Deletes a existing User",
|
||||||
|
"href": "/users/{definitions.identity.example}",
|
||||||
|
"access": "private",
|
||||||
|
"method": "DELETE",
|
||||||
|
"rel": "delete",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Set Password",
|
||||||
|
"description": "Sets a password for an existing User",
|
||||||
|
"href": "/users/{definitions.identity.example}/auth",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"required": [
|
||||||
|
"type",
|
||||||
|
"secret"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"type": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^password$"
|
||||||
|
},
|
||||||
|
"current": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1,
|
||||||
|
"maxLength": 64
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 8,
|
||||||
|
"maxLength": 64
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Set Permissions",
|
||||||
|
"description": "Sets Permissions for a User",
|
||||||
|
"href": "/users/{definitions.identity.example}/permissions",
|
||||||
|
"access": "private",
|
||||||
|
"method": "PUT",
|
||||||
|
"rel": "update",
|
||||||
|
"http_header": {
|
||||||
|
"$ref": "../examples.json#/definitions/auth_header"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"visibility": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(all|user)$"
|
||||||
|
},
|
||||||
|
"access_lists": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
},
|
||||||
|
"dead_hosts": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
},
|
||||||
|
"proxy_hosts": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
},
|
||||||
|
"redirection_hosts": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
},
|
||||||
|
"streams": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
},
|
||||||
|
"certificates": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^(hidden|view|manage)$"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"targetSchema": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"id": {
|
||||||
|
"$ref": "#/definitions/id"
|
||||||
|
},
|
||||||
|
"created_on": {
|
||||||
|
"$ref": "#/definitions/created_on"
|
||||||
|
},
|
||||||
|
"modified_on": {
|
||||||
|
"$ref": "#/definitions/modified_on"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"$ref": "#/definitions/name"
|
||||||
|
},
|
||||||
|
"nickname": {
|
||||||
|
"$ref": "#/definitions/nickname"
|
||||||
|
},
|
||||||
|
"email": {
|
||||||
|
"$ref": "#/definitions/email"
|
||||||
|
},
|
||||||
|
"avatar": {
|
||||||
|
"$ref": "#/definitions/avatar"
|
||||||
|
},
|
||||||
|
"roles": {
|
||||||
|
"$ref": "#/definitions/roles"
|
||||||
|
},
|
||||||
|
"is_disabled": {
|
||||||
|
"$ref": "#/definitions/is_disabled"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
23
backend/schema/examples.json
Normal file
23
backend/schema/examples.json
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"$id": "examples",
|
||||||
|
"type": "object",
|
||||||
|
"definitions": {
|
||||||
|
"name": {
|
||||||
|
"description": "Name",
|
||||||
|
"example": "John Smith",
|
||||||
|
"type": "string",
|
||||||
|
"minLength": 1,
|
||||||
|
"maxLength": 255
|
||||||
|
},
|
||||||
|
"auth_header": {
|
||||||
|
"Authorization": "Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.e30.O_frfYM8RzmRsUNigHtu0_jZ_utSejyr1axMGa8rlsk",
|
||||||
|
"X-API-Version": "next"
|
||||||
|
},
|
||||||
|
"token": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "JWT",
|
||||||
|
"example": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.e30.O_frfYM8RzmRsUNigHtu0_jZ_utSejyr1axMGa8rlsk"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -1,41 +0,0 @@
|
|||||||
const refParser = require('@apidevtools/json-schema-ref-parser');
|
|
||||||
|
|
||||||
let compiledSchema = null;
|
|
||||||
|
|
||||||
module.exports = {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Compiles the schema, by dereferencing it, only once
|
|
||||||
* and returns the memory cached value
|
|
||||||
*/
|
|
||||||
getCompiledSchema: async () => {
|
|
||||||
if (compiledSchema === null) {
|
|
||||||
compiledSchema = await refParser.dereference(__dirname + '/swagger.json', {
|
|
||||||
mutateInputSchema: false,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
return compiledSchema;
|
|
||||||
},
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Scans the schema for the validation schema for the given path and method
|
|
||||||
* and returns it.
|
|
||||||
*
|
|
||||||
* @param {string} path
|
|
||||||
* @param {string} method
|
|
||||||
* @returns string|null
|
|
||||||
*/
|
|
||||||
getValidationSchema: (path, method) => {
|
|
||||||
if (compiledSchema !== null &&
|
|
||||||
typeof compiledSchema.paths[path] !== 'undefined' &&
|
|
||||||
typeof compiledSchema.paths[path][method] !== 'undefined' &&
|
|
||||||
typeof compiledSchema.paths[path][method].requestBody !== 'undefined' &&
|
|
||||||
typeof compiledSchema.paths[path][method].requestBody.content !== 'undefined' &&
|
|
||||||
typeof compiledSchema.paths[path][method].requestBody.content['application/json'] !== 'undefined' &&
|
|
||||||
typeof compiledSchema.paths[path][method].requestBody.content['application/json'].schema !== 'undefined'
|
|
||||||
) {
|
|
||||||
return compiledSchema.paths[path][method].requestBody.content['application/json'].schema;
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
};
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user