mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-11-03 09:13:32 +00:00 
			
		
		
		
	Compare commits
	
		
			336 Commits
		
	
	
		
			openidc
			...
			lang-persi
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					32208f3864 | ||
| 
						 | 
					52ab4844dc | ||
| 
						 | 
					24216f1f2f | ||
| 
						 | 
					52e528f217 | ||
| 
						 | 
					4709f9826c | ||
| 
						 | 
					74a8c5d806 | ||
| 
						 | 
					82a1a86c3a | ||
| 
						 | 
					95957a192c | ||
| 
						 | 
					906ce8ced2 | ||
| 
						 | 
					89abb9d559 | ||
| 
						 | 
					5d6916dcf0 | ||
| 
						 | 
					0f718570d6 | ||
| 
						 | 
					fac5f2cbc5 | ||
| 
						 | 
					3b9beaeae5 | ||
| 
						 | 
					7331cb3675 | ||
| 
						 | 
					678593111e | ||
| 
						 | 
					c08b1be3cb | ||
| 
						 | 
					ca3c9aa39a | ||
| 
						 | 
					e4e5fb3b58 | ||
| 
						 | 
					83a2c79e16 | ||
| 
						 | 
					0de26f2950 | ||
| 
						 | 
					7b5c70ed35 | ||
| 
						 | 
					e4d9f48870 | ||
| 
						 | 
					2893ffb1e4 | ||
| 
						 | 
					1a117a267c | ||
| 
						 | 
					c303b69649 | ||
| 
						 | 
					bb6c9c8daf | ||
| 
						 | 
					5b7013b8d5 | ||
| 
						 | 
					b8e3e594fb | ||
| 
						 | 
					71251d2a0d | ||
| 
						 | 
					f2b5b19a83 | ||
| 
						 | 
					7af01d0fc7 | ||
| 
						 | 
					e6f7ae3fba | ||
| 
						 | 
					43599b4028 | ||
| 
						 | 
					227e818040 | ||
| 
						 | 
					fcb08d3003 | ||
| 
						 | 
					d0767baafa | ||
| 
						 | 
					abdf8866e0 | ||
| 
						 | 
					e36c1b99a5 | ||
| 
						 | 
					9339626933 | ||
| 
						 | 
					100a7e3ff8 | ||
| 
						 | 
					4866988772 | ||
| 
						 | 
					8884e3b261 | ||
| 
						 | 
					a3d17249d0 | ||
| 
						 | 
					fc8a5e8b97 | ||
| 
						 | 
					da68fe29ac | ||
| 
						 | 
					18537b9288 | ||
| 
						 | 
					d85e515ab9 | ||
| 
						 | 
					94375bbc5f | ||
| 
						 | 
					54e036276a | ||
| 
						 | 
					058f49ceea | ||
| 
						 | 
					efcefe0c17 | ||
| 
						 | 
					429046f32e | ||
| 
						 | 
					8ad95c5695 | ||
| 
						 | 
					038de3e5f9 | ||
| 
						 | 
					1928e554fd | ||
| 
						 | 
					d40e290a89 | ||
| 
						 | 
					fb2708d81d | ||
| 
						 | 
					7a6efd8ebb | ||
| 
						 | 
					0b2fa826e0 | ||
| 
						 | 
					6ab7198e61 | ||
| 
						 | 
					61a92906f3 | ||
| 
						 | 
					fadec9751e | ||
| 
						 | 
					330993f028 | ||
| 
						 | 
					487fa6d31b | ||
| 
						 | 
					5b6ca1bf00 | ||
| 
						 | 
					5039738aa3 | ||
| 
						 | 
					4451be8f1c | ||
| 
						 | 
					bee2fd1978 | ||
| 
						 | 
					c8adbdfc15 | ||
| 
						 | 
					aff4182ab8 | ||
| 
						 | 
					8c9d2745e2 | ||
| 
						 | 
					076d14b5e4 | ||
| 
						 | 
					8a6d815152 | ||
| 
						 | 
					54d463ac36 | ||
| 
						 | 
					a23dc24021 | ||
| 
						 | 
					4f9df893c8 | ||
| 
						 | 
					304b38e82b | ||
| 
						 | 
					1b0929ade6 | ||
| 
						 | 
					ddbafb62a6 | ||
| 
						 | 
					9a0383bc73 | ||
| 
						 | 
					307cb94e84 | ||
| 
						 | 
					63ae924fbc | ||
| 
						 | 
					1710a263c0 | ||
| 
						 | 
					1357774f21 | ||
| 
						 | 
					5f54490d86 | ||
| 
						 | 
					c97b8a339d | ||
| 
						 | 
					ed1d90ee7f | ||
| 
						 | 
					70894e55b8 | ||
| 
						 | 
					817021a43d | ||
| 
						 | 
					36e3449a56 | ||
| 
						 | 
					db9f25638f | ||
| 
						 | 
					ddd3355d95 | ||
| 
						 | 
					aade8b42fc | ||
| 
						 | 
					3735f3c11d | ||
| 
						 | 
					b84762b5b9 | ||
| 
						 | 
					953faeac15 | ||
| 
						 | 
					c58f3f3ec9 | ||
| 
						 | 
					0ee4d04d5f | ||
| 
						 | 
					94f6756250 | ||
| 
						 | 
					27e3f73854 | ||
| 
						 | 
					d98f4b43dc | ||
| 
						 | 
					ff3116a626 | ||
| 
						 | 
					7047750b04 | ||
| 
						 | 
					0792fc0768 | ||
| 
						 | 
					9758c12ca3 | ||
| 
						 | 
					ccd69c8867 | ||
| 
						 | 
					23fd1fec6c | ||
| 
						 | 
					6f04543744 | ||
| 
						 | 
					cbb1fe44ca | ||
| 
						 | 
					4c23f22d5b | ||
| 
						 | 
					af5d3eccd6 | ||
| 
						 | 
					a87283b030 | ||
| 
						 | 
					97dbbdd60f | ||
| 
						 | 
					ec81f2489a | ||
| 
						 | 
					d0ec8e89aa | ||
| 
						 | 
					9a96fbb5f4 | ||
| 
						 | 
					a573450bb8 | ||
| 
						 | 
					60a25ffbd5 | ||
| 
						 | 
					7d2369b380 | ||
| 
						 | 
					64f00e8dba | ||
| 
						 | 
					c99143f548 | ||
| 
						 | 
					cc4ee6919a | ||
| 
						 | 
					8a69c65b40 | ||
| 
						 | 
					95ee5ca958 | ||
| 
						 | 
					40f22d30c4 | ||
| 
						 | 
					30dfa9e3de | ||
| 
						 | 
					b873499feb | ||
| 
						 | 
					ef69be2036 | ||
| 
						 | 
					7580e65dd4 | ||
| 
						 | 
					f11dc5d7c1 | ||
| 
						 | 
					77061a7bd6 | ||
| 
						 | 
					b6afc19135 | ||
| 
						 | 
					09ba400d09 | ||
| 
						 | 
					0291cfc270 | ||
| 
						 | 
					34267e0af9 | ||
| 
						 | 
					f327c1e825 | ||
| 
						 | 
					6f539979ec | ||
| 
						 | 
					3d8079a137 | ||
| 
						 | 
					6d6d83c0d0 | ||
| 
						 | 
					100a4888d0 | ||
| 
						 | 
					34a46bd733 | ||
| 
						 | 
					7f8adc7e50 | ||
| 
						 | 
					98d118cb74 | ||
| 
						 | 
					4fb93542c3 | ||
| 
						 | 
					4fe305520a | ||
| 
						 | 
					76be31cf76 | ||
| 
						 | 
					55dadb2004 | ||
| 
						 | 
					d9cdb3dc2c | ||
| 
						 | 
					0cab720f23 | ||
| 
						 | 
					f5879dff6c | ||
| 
						 | 
					5e66d677f1 | ||
| 
						 | 
					18830f81b0 | ||
| 
						 | 
					341ac65587 | ||
| 
						 | 
					078baa255a | ||
| 
						 | 
					bf9d9bd43b | ||
| 
						 | 
					a394b25e61 | ||
| 
						 | 
					1c47fc2ba4 | ||
| 
						 | 
					312e2ab80c | ||
| 
						 | 
					d147ccd88d | ||
| 
						 | 
					03fd292c61 | ||
| 
						 | 
					79d28f03d0 | ||
| 
						 | 
					b09147eca8 | ||
| 
						 | 
					c5a319cb20 | ||
| 
						 | 
					c4df89df1f | ||
| 
						 | 
					34c703f8b4 | ||
| 
						 | 
					0a05d8f0ad | ||
| 
						 | 
					0a9141fad5 | ||
| 
						 | 
					42836774b7 | ||
| 
						 | 
					2a07544f58 | ||
| 
						 | 
					dc9d884743 | ||
| 
						 | 
					0d5d2b1b7c | ||
| 
						 | 
					df48b835c4 | ||
| 
						 | 
					8a1557154a | ||
| 
						 | 
					a6af5ec2c7 | ||
| 
						 | 
					14d7c35fd7 | ||
| 
						 | 
					cfcf78aaee | ||
| 
						 | 
					3a01b2c84f | ||
| 
						 | 
					e1c84a5c10 | ||
| 
						 | 
					c56c95a59a | ||
| 
						 | 
					6a60627833 | ||
| 
						 | 
					b4793d3c16 | ||
| 
						 | 
					68a7803513 | ||
| 
						 | 
					2657af97cf | ||
| 
						 | 
					4452f014b9 | ||
| 
						 | 
					cd80cc8e4d | ||
| 
						 | 
					ee4250d770 | ||
| 
						 | 
					3dbc70faa6 | ||
| 
						 | 
					3091c21cae | ||
| 
						 | 
					57cd2a1919 | ||
| 
						 | 
					ad5936c530 | ||
| 
						 | 
					498109addb | ||
| 
						 | 
					3f3aacd7ec | ||
| 
						 | 
					bb4ecf812d | ||
| 
						 | 
					c05f9695d0 | ||
| 
						 | 
					6343b398f0 | ||
| 
						 | 
					59362b7477 | ||
| 
						 | 
					aedaaa18e0 | ||
| 
						 | 
					080bd0b749 | ||
| 
						 | 
					9687e9e450 | ||
| 
						 | 
					5a234bb88c | ||
| 
						 | 
					4de4b65036 | ||
| 
						 | 
					f1c97c7c36 | ||
| 
						 | 
					b4f49969d6 | ||
| 
						 | 
					ec12d8f9bf | ||
| 
						 | 
					e50e3def9d | ||
| 
						 | 
					6415f284f9 | ||
| 
						 | 
					98e5997f0a | ||
| 
						 | 
					fc30a92bd4 | ||
| 
						 | 
					e2011ee45c | ||
| 
						 | 
					1406e75c2c | ||
| 
						 | 
					ca3ee98c68 | ||
| 
						 | 
					f90d839ebe | ||
| 
						 | 
					be5278f31e | ||
| 
						 | 
					73110d5e1e | ||
| 
						 | 
					356b98bf7e | ||
| 
						 | 
					3eecf7a38b | ||
| 
						 | 
					7f9240dda7 | ||
| 
						 | 
					f537619ffe | ||
| 
						 | 
					805968aac6 | ||
| 
						 | 
					2a4093c1b8 | ||
| 
						 | 
					ae2ac8a733 | ||
| 
						 | 
					5d087f1256 | ||
| 
						 | 
					c6eca2578e | ||
| 
						 | 
					56033bee9c | ||
| 
						 | 
					c6630e87bb | ||
| 
						 | 
					d6b98f51b0 | ||
| 
						 | 
					1e322804ce | ||
| 
						 | 
					b3de76c945 | ||
| 
						 | 
					fcf4117f8e | ||
| 
						 | 
					d26e8c1d0c | ||
| 
						 | 
					19ed4c1212 | ||
| 
						 | 
					03018d252b | ||
| 
						 | 
					8351dd41f6 | ||
| 
						 | 
					97212f2686 | ||
| 
						 | 
					fe068a8b51 | ||
| 
						 | 
					61e2bde98f | ||
| 
						 | 
					81c9038929 | ||
| 
						 | 
					4ea50ca40c | ||
| 
						 | 
					53ed12bcf2 | ||
| 
						 | 
					cb3e4ed59c | ||
| 
						 | 
					b20dc5eade | ||
| 
						 | 
					586afc0c91 | ||
| 
						 | 
					93ea17a9bb | ||
| 
						 | 
					151160a834 | ||
| 
						 | 
					2075f98cad | ||
| 
						 | 
					07a4e5791f | ||
| 
						 | 
					640a1eeb68 | ||
| 
						 | 
					126d3d44ca | ||
| 
						 | 
					20646e7bb5 | ||
| 
						 | 
					87998a03ce | ||
| 
						 | 
					2cee211fb0 | ||
| 
						 | 
					a56342c76a | ||
| 
						 | 
					4c89379671 | ||
| 
						 | 
					10b9a49274 | ||
| 
						 | 
					595a742c40 | ||
| 
						 | 
					c171752137 | ||
| 
						 | 
					a0b26b9e98 | ||
| 
						 | 
					d6791f4e38 | ||
| 
						 | 
					62c94f3099 | ||
| 
						 | 
					25a26d6175 | ||
| 
						 | 
					17246e418f | ||
| 
						 | 
					f7d3ca0b07 | ||
| 
						 | 
					a55de386e7 | ||
| 
						 | 
					e9d4f5b827 | ||
| 
						 | 
					1c1cee3836 | ||
| 
						 | 
					eaf6335694 | ||
| 
						 | 
					ffe05ebd41 | ||
| 
						 | 
					2e9a4f1aed | ||
| 
						 | 
					d17c85e4c8 | ||
| 
						 | 
					dad8d0ca00 | ||
| 
						 | 
					d7e0558a35 | ||
| 
						 | 
					ee41bb5562 | ||
| 
						 | 
					0cf6b9caa4 | ||
| 
						 | 
					68a9baf206 | ||
| 
						 | 
					d92421d098 | ||
| 
						 | 
					96c58b203e | ||
| 
						 | 
					d499e2bfef | ||
| 
						 | 
					5084cb7296 | ||
| 
						 | 
					2f9e062718 | ||
| 
						 | 
					edbed1af90 | ||
| 
						 | 
					8497022e41 | ||
| 
						 | 
					fa2c814fcb | ||
| 
						 | 
					d96a3987c0 | ||
| 
						 | 
					e677bfa2e8 | ||
| 
						 | 
					fe2d8895d6 | ||
| 
						 | 
					5bdc05878f | ||
| 
						 | 
					929ac3bd7c | ||
| 
						 | 
					f48e1b46a8 | ||
| 
						 | 
					351ba8dacd | ||
| 
						 | 
					3b89d5f380 | ||
| 
						 | 
					e5aa880ec4 | ||
| 
						 | 
					7322d35bd7 | ||
| 
						 | 
					81b89185f2 | ||
| 
						 | 
					f2bb8f2b3d | ||
| 
						 | 
					b01817bc7f | ||
| 
						 | 
					5aeb99b856 | ||
| 
						 | 
					e7e4003d15 | ||
| 
						 | 
					78f3e7281b | ||
| 
						 | 
					c9d97aff38 | ||
| 
						 | 
					9813071e76 | ||
| 
						 | 
					d7a7fa3496 | ||
| 
						 | 
					2e72f253a0 | ||
| 
						 | 
					ac47eab23b | ||
| 
						 | 
					0bfa6c9d4f | ||
| 
						 | 
					f71de7474d | ||
| 
						 | 
					3a2617e6bf | ||
| 
						 | 
					6c6722464d | ||
| 
						 | 
					02a7b43932 | ||
| 
						 | 
					42a5bb6af3 | ||
| 
						 | 
					a08d18bdb2 | ||
| 
						 | 
					d2d104b723 | ||
| 
						 | 
					e0352ecc48 | ||
| 
						 | 
					4e035f285d | ||
| 
						 | 
					b046bb3229 | ||
| 
						 | 
					304899e604 | ||
| 
						 | 
					e525b5470e | ||
| 
						 | 
					aacb2302bf | ||
| 
						 | 
					d21403ca1e | ||
| 
						 | 
					c39d5433bc | ||
| 
						 | 
					7c97516de6 | ||
| 
						 | 
					4572b205c9 | ||
| 
						 | 
					6f7963ee08 | ||
| 
						 | 
					dfe2588523 | ||
| 
						 | 
					a8f1f7f017 | ||
| 
						 | 
					e401095707 | ||
| 
						 | 
					d69cb26157 | ||
| 
						 | 
					48a9f5f9db | ||
| 
						 | 
					ca9eeb5118 | ||
| 
						 | 
					a03009056c | ||
| 
						 | 
					554d1ff2b6 | ||
| 
						 | 
					0042726477 | ||
| 
						 | 
					ed5d87b021 | ||
| 
						 | 
					894cd25534 | ||
| 
						 | 
					4446e2f760 | ||
| 
						 | 
					35d7a3a407 | 
							
								
								
									
										1
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							@@ -1,5 +1,6 @@
 | 
				
			|||||||
.DS_Store
 | 
					.DS_Store
 | 
				
			||||||
.idea
 | 
					.idea
 | 
				
			||||||
 | 
					.qodo
 | 
				
			||||||
._*
 | 
					._*
 | 
				
			||||||
.vscode
 | 
					.vscode
 | 
				
			||||||
certbot-help.txt
 | 
					certbot-help.txt
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										108
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										108
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							@@ -43,7 +43,7 @@ pipeline {
 | 
				
			|||||||
					steps {
 | 
										steps {
 | 
				
			||||||
						script {
 | 
											script {
 | 
				
			||||||
							// Defaults to the Branch name, which is applies to all branches AND pr's
 | 
												// Defaults to the Branch name, which is applies to all branches AND pr's
 | 
				
			||||||
							buildxPushTags = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}"
 | 
												buildxPushTags = "-t docker.io/nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}"
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
@@ -56,6 +56,13 @@ pipeline {
 | 
				
			|||||||
						sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md'
 | 
											sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md'
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									stage('Docker Login') {
 | 
				
			||||||
 | 
										steps {
 | 
				
			||||||
 | 
											withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) {
 | 
				
			||||||
 | 
												sh 'docker login -u "${duser}" -p "${dpass}"'
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		stage('Builds') {
 | 
							stage('Builds') {
 | 
				
			||||||
@@ -112,13 +119,18 @@ pipeline {
 | 
				
			|||||||
				always {
 | 
									always {
 | 
				
			||||||
					// Dumps to analyze later
 | 
										// Dumps to analyze later
 | 
				
			||||||
					sh 'mkdir -p debug/sqlite'
 | 
										sh 'mkdir -p debug/sqlite'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1'
 | 
				
			||||||
					junit 'test/results/junit/*'
 | 
										junit 'test/results/junit/*'
 | 
				
			||||||
					sh 'docker-compose down --remove-orphans --volumes -t 30 || true'
 | 
										sh 'docker compose down --remove-orphans --volumes -t 30 || true'
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									unstable {
 | 
				
			||||||
 | 
										dir(path: 'test/results') {
 | 
				
			||||||
 | 
											archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -140,13 +152,56 @@ pipeline {
 | 
				
			|||||||
				always {
 | 
									always {
 | 
				
			||||||
					// Dumps to analyze later
 | 
										// Dumps to analyze later
 | 
				
			||||||
					sh 'mkdir -p debug/mysql'
 | 
										sh 'mkdir -p debug/mysql'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1'
 | 
				
			||||||
					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1'
 | 
										sh 'docker logs $(docker compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1'
 | 
				
			||||||
					junit 'test/results/junit/*'
 | 
										junit 'test/results/junit/*'
 | 
				
			||||||
					sh 'docker-compose down --remove-orphans --volumes -t 30 || true'
 | 
										sh 'docker compose down --remove-orphans --volumes -t 30 || true'
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									unstable {
 | 
				
			||||||
 | 
										dir(path: 'test/results') {
 | 
				
			||||||
 | 
											archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							stage('Test Postgres') {
 | 
				
			||||||
 | 
								environment {
 | 
				
			||||||
 | 
									COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_postgres"
 | 
				
			||||||
 | 
									COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.postgres.yml'
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								when {
 | 
				
			||||||
 | 
									not {
 | 
				
			||||||
 | 
										equals expected: 'UNSTABLE', actual: currentBuild.result
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								steps {
 | 
				
			||||||
 | 
									sh 'rm -rf ./test/results/junit/*'
 | 
				
			||||||
 | 
									sh './scripts/ci/fulltest-cypress'
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								post {
 | 
				
			||||||
 | 
									always {
 | 
				
			||||||
 | 
										// Dumps to analyze later
 | 
				
			||||||
 | 
										sh 'mkdir -p debug/postgres'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q fullstack) > debug/postgres/docker_fullstack.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q stepca) > debug/postgres/docker_stepca.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q pdns) > debug/postgres/docker_pdns.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q pdns-db) > debug/postgres/docker_pdns-db.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q dnsrouter) > debug/postgres/docker_dnsrouter.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q db-postgres) > debug/postgres/docker_db-postgres.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q authentik) > debug/postgres/docker_authentik.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docker compose ps --all -q authentik-redis) > debug/postgres/docker_authentik-redis.log 2>&1'
 | 
				
			||||||
 | 
										sh 'docker logs $(docke rcompose ps --all -q authentik-ldap) > debug/postgres/docker_authentik-ldap.log 2>&1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
										junit 'test/results/junit/*'
 | 
				
			||||||
 | 
										sh 'docker compose down --remove-orphans --volumes -t 30 || true'
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									unstable {
 | 
				
			||||||
 | 
										dir(path: 'test/results') {
 | 
				
			||||||
 | 
											archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml')
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -157,10 +212,7 @@ pipeline {
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			steps {
 | 
								steps {
 | 
				
			||||||
				withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) {
 | 
									sh "./scripts/buildx --push ${buildxPushTags}"
 | 
				
			||||||
					sh 'docker login -u "${duser}" -p "${dpass}"'
 | 
					 | 
				
			||||||
					sh "./scripts/buildx --push ${buildxPushTags}"
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		stage('Docs / Comment') {
 | 
							stage('Docs / Comment') {
 | 
				
			||||||
@@ -189,7 +241,18 @@ pipeline {
 | 
				
			|||||||
					}
 | 
										}
 | 
				
			||||||
					steps {
 | 
										steps {
 | 
				
			||||||
						script {
 | 
											script {
 | 
				
			||||||
							npmGithubPrComment("Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`\n\n**Note:** ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes.", true)
 | 
												npmGithubPrComment("""Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/nginxproxymanager/${IMAGE}-dev):
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					> [!NOTE]
 | 
				
			||||||
 | 
					> Ensure you backup your NPM instance before testing this image! Especially if there are database changes.
 | 
				
			||||||
 | 
					> This is a different docker image namespace than the official image.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					> [!WARNING]
 | 
				
			||||||
 | 
					> Changes and additions to DNS Providers require verification by at least 2 members of the community!
 | 
				
			||||||
 | 
					""", true)
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
@@ -200,20 +263,13 @@ pipeline {
 | 
				
			|||||||
		always {
 | 
							always {
 | 
				
			||||||
			sh 'echo Reverting ownership'
 | 
								sh 'echo Reverting ownership'
 | 
				
			||||||
			sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data'
 | 
								sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data'
 | 
				
			||||||
		}
 | 
								printResult(true)
 | 
				
			||||||
		success {
 | 
					 | 
				
			||||||
			juxtapose event: 'success'
 | 
					 | 
				
			||||||
			sh 'figlet "SUCCESS"'
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		failure {
 | 
							failure {
 | 
				
			||||||
			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
 | 
								archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
 | 
				
			||||||
			juxtapose event: 'failure'
 | 
					 | 
				
			||||||
			sh 'figlet "FAILURE"'
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		unstable {
 | 
							unstable {
 | 
				
			||||||
			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
 | 
								archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true)
 | 
				
			||||||
			juxtapose event: 'unstable'
 | 
					 | 
				
			||||||
			sh 'figlet "UNSTABLE"'
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										14
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								README.md
									
									
									
									
									
								
							@@ -1,7 +1,7 @@
 | 
				
			|||||||
<p align="center">
 | 
					<p align="center">
 | 
				
			||||||
	<img src="https://nginxproxymanager.com/github.png">
 | 
						<img src="https://nginxproxymanager.com/github.png">
 | 
				
			||||||
	<br><br>
 | 
						<br><br>
 | 
				
			||||||
	<img src="https://img.shields.io/badge/version-2.11.3-green.svg?style=for-the-badge">
 | 
						<img src="https://img.shields.io/badge/version-2.13.0-green.svg?style=for-the-badge">
 | 
				
			||||||
	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
 | 
						<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager">
 | 
				
			||||||
		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge">
 | 
							<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge">
 | 
				
			||||||
	</a>
 | 
						</a>
 | 
				
			||||||
@@ -74,11 +74,7 @@ This is the bare minimum configuration required. See the [documentation](https:/
 | 
				
			|||||||
3. Bring up your stack by running
 | 
					3. Bring up your stack by running
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```bash
 | 
					```bash
 | 
				
			||||||
docker-compose up -d
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# If using docker-compose-plugin
 | 
					 | 
				
			||||||
docker compose up -d
 | 
					docker compose up -d
 | 
				
			||||||
 | 
					 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
4. Log in to the Admin UI
 | 
					4. Log in to the Admin UI
 | 
				
			||||||
@@ -88,14 +84,6 @@ Sometimes this can take a little bit because of the entropy of keys.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
[http://127.0.0.1:81](http://127.0.0.1:81)
 | 
					[http://127.0.0.1:81](http://127.0.0.1:81)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Default Admin User:
 | 
					 | 
				
			||||||
```
 | 
					 | 
				
			||||||
Email:    admin@example.com
 | 
					 | 
				
			||||||
Password: changeme
 | 
					 | 
				
			||||||
```
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Immediately after logging in with this default user you will be asked to modify your details and change your password.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Contributing
 | 
					## Contributing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,73 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
	"env": {
 | 
					 | 
				
			||||||
		"node": true,
 | 
					 | 
				
			||||||
		"es6": true
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
	"extends": [
 | 
					 | 
				
			||||||
		"eslint:recommended"
 | 
					 | 
				
			||||||
	],
 | 
					 | 
				
			||||||
	"globals": {
 | 
					 | 
				
			||||||
		"Atomics": "readonly",
 | 
					 | 
				
			||||||
		"SharedArrayBuffer": "readonly"
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
	"parserOptions": {
 | 
					 | 
				
			||||||
		"ecmaVersion": 2018,
 | 
					 | 
				
			||||||
		"sourceType": "module"
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
	"plugins": [
 | 
					 | 
				
			||||||
		"align-assignments"
 | 
					 | 
				
			||||||
	],
 | 
					 | 
				
			||||||
	"rules": {
 | 
					 | 
				
			||||||
		"arrow-parens": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"always"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"indent": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"tab"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"linebreak-style": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"unix"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"quotes": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"single"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"semi": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"always"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"key-spacing": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
				"align": "value"
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"comma-spacing": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
				"before": false,
 | 
					 | 
				
			||||||
				"after": true
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"func-call-spacing": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			"never"
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"keyword-spacing": [
 | 
					 | 
				
			||||||
			"error",
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
				"before": true
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		],
 | 
					 | 
				
			||||||
		"no-irregular-whitespace": "error",
 | 
					 | 
				
			||||||
		"no-unused-expressions": 0,
 | 
					 | 
				
			||||||
		"align-assignments/align-assignments": [
 | 
					 | 
				
			||||||
			2,
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
				"requiresOnly": false
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		]
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,11 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
	"printWidth": 320,
 | 
					 | 
				
			||||||
	"tabWidth": 4,
 | 
					 | 
				
			||||||
	"useTabs": true,
 | 
					 | 
				
			||||||
	"semi": true,
 | 
					 | 
				
			||||||
	"singleQuote": true,
 | 
					 | 
				
			||||||
	"bracketSpacing": true,
 | 
					 | 
				
			||||||
	"jsxBracketSameLine": true,
 | 
					 | 
				
			||||||
	"trailingComma": "all",
 | 
					 | 
				
			||||||
	"proseWrap": "always"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
							
								
								
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							@@ -1,8 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
	"editor.insertSpaces": false,
 | 
					 | 
				
			||||||
	"editor.formatOnSave": true,
 | 
					 | 
				
			||||||
	"files.trimTrailingWhitespace": true,
 | 
					 | 
				
			||||||
	"editor.codeActionsOnSave": {
 | 
					 | 
				
			||||||
		"source.fixAll.eslint": true
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,9 +1,12 @@
 | 
				
			|||||||
const express     = require('express');
 | 
					import bodyParser from "body-parser";
 | 
				
			||||||
const bodyParser  = require('body-parser');
 | 
					import compression from "compression";
 | 
				
			||||||
const fileUpload  = require('express-fileupload');
 | 
					import express from "express";
 | 
				
			||||||
const compression = require('compression');
 | 
					import fileUpload from "express-fileupload";
 | 
				
			||||||
const config      = require('./lib/config');
 | 
					import { isDebugMode } from "./lib/config.js";
 | 
				
			||||||
const log         = require('./logger').express;
 | 
					import cors from "./lib/express/cors.js";
 | 
				
			||||||
 | 
					import jwt from "./lib/express/jwt.js";
 | 
				
			||||||
 | 
					import { express as logger } from "./logger.js";
 | 
				
			||||||
 | 
					import mainRoutes from "./routes/main.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * App
 | 
					 * App
 | 
				
			||||||
@@ -11,7 +14,7 @@ const log         = require('./logger').express;
 | 
				
			|||||||
const app = express();
 | 
					const app = express();
 | 
				
			||||||
app.use(fileUpload());
 | 
					app.use(fileUpload());
 | 
				
			||||||
app.use(bodyParser.json());
 | 
					app.use(bodyParser.json());
 | 
				
			||||||
app.use(bodyParser.urlencoded({extended: true}));
 | 
					app.use(bodyParser.urlencoded({ extended: true }));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Gzip
 | 
					// Gzip
 | 
				
			||||||
app.use(compression());
 | 
					app.use(compression());
 | 
				
			||||||
@@ -20,71 +23,70 @@ app.use(compression());
 | 
				
			|||||||
 * General Logging, BEFORE routes
 | 
					 * General Logging, BEFORE routes
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
app.disable('x-powered-by');
 | 
					app.disable("x-powered-by");
 | 
				
			||||||
app.enable('trust proxy', ['loopback', 'linklocal', 'uniquelocal']);
 | 
					app.enable("trust proxy", ["loopback", "linklocal", "uniquelocal"]);
 | 
				
			||||||
app.enable('strict routing');
 | 
					app.enable("strict routing");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// pretty print JSON when not live
 | 
					// pretty print JSON when not live
 | 
				
			||||||
if (config.debug()) {
 | 
					if (isDebugMode()) {
 | 
				
			||||||
	app.set('json spaces', 2);
 | 
						app.set("json spaces", 2);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// CORS for everything
 | 
					// CORS for everything
 | 
				
			||||||
app.use(require('./lib/express/cors'));
 | 
					app.use(cors);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// General security/cache related headers + server header
 | 
					// General security/cache related headers + server header
 | 
				
			||||||
app.use(function (req, res, next) {
 | 
					app.use((_, res, next) => {
 | 
				
			||||||
	let x_frame_options = 'DENY';
 | 
						let x_frame_options = "DENY";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (typeof process.env.X_FRAME_OPTIONS !== 'undefined' && process.env.X_FRAME_OPTIONS) {
 | 
						if (typeof process.env.X_FRAME_OPTIONS !== "undefined" && process.env.X_FRAME_OPTIONS) {
 | 
				
			||||||
		x_frame_options = process.env.X_FRAME_OPTIONS;
 | 
							x_frame_options = process.env.X_FRAME_OPTIONS;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	res.set({
 | 
						res.set({
 | 
				
			||||||
		'X-XSS-Protection':       '1; mode=block',
 | 
							"X-XSS-Protection": "1; mode=block",
 | 
				
			||||||
		'X-Content-Type-Options': 'nosniff',
 | 
							"X-Content-Type-Options": "nosniff",
 | 
				
			||||||
		'X-Frame-Options':        x_frame_options,
 | 
							"X-Frame-Options": x_frame_options,
 | 
				
			||||||
		'Cache-Control':          'no-cache, no-store, max-age=0, must-revalidate',
 | 
							"Cache-Control": "no-cache, no-store, max-age=0, must-revalidate",
 | 
				
			||||||
		Pragma:                   'no-cache',
 | 
							Pragma: "no-cache",
 | 
				
			||||||
		Expires:                  0
 | 
							Expires: 0,
 | 
				
			||||||
	});
 | 
						});
 | 
				
			||||||
	next();
 | 
						next();
 | 
				
			||||||
});
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
app.use(require('./lib/express/jwt')());
 | 
					app.use(jwt());
 | 
				
			||||||
app.use('/', require('./routes/api/main'));
 | 
					app.use("/", mainRoutes);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// production error handler
 | 
					// production error handler
 | 
				
			||||||
// no stacktraces leaked to user
 | 
					// no stacktraces leaked to user
 | 
				
			||||||
// eslint-disable-next-line
 | 
					app.use((err, req, res, _) => {
 | 
				
			||||||
app.use(function (err, req, res, next) {
 | 
						const payload = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	let payload = {
 | 
					 | 
				
			||||||
		error: {
 | 
							error: {
 | 
				
			||||||
			code:    err.status,
 | 
								code: err.status,
 | 
				
			||||||
			message: err.public ? err.message : 'Internal Error'
 | 
								message: err.public ? err.message : "Internal Error",
 | 
				
			||||||
		}
 | 
							},
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (config.debug() || (req.baseUrl + req.path).includes('nginx/certificates')) {
 | 
						if (typeof err.message_i18n !== "undefined") {
 | 
				
			||||||
 | 
							payload.error.message_i18n = err.message_i18n;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (isDebugMode() || (req.baseUrl + req.path).includes("nginx/certificates")) {
 | 
				
			||||||
		payload.debug = {
 | 
							payload.debug = {
 | 
				
			||||||
			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null,
 | 
								stack: typeof err.stack !== "undefined" && err.stack ? err.stack.split("\n") : null,
 | 
				
			||||||
			previous: err.previous
 | 
								previous: err.previous,
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Not every error is worth logging - but this is good for now until it gets annoying.
 | 
						// Not every error is worth logging - but this is good for now until it gets annoying.
 | 
				
			||||||
	if (typeof err.stack !== 'undefined' && err.stack) {
 | 
						if (typeof err.stack !== "undefined" && err.stack) {
 | 
				
			||||||
		if (config.debug()) {
 | 
							logger.debug(err.stack);
 | 
				
			||||||
			log.debug(err.stack);
 | 
							if (typeof err.public === "undefined" || !err.public) {
 | 
				
			||||||
		} else if (typeof err.public == 'undefined' || !err.public) {
 | 
								logger.warn(err.message);
 | 
				
			||||||
			log.warn(err.message);
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	res
 | 
						res.status(err.status || 500).send(payload);
 | 
				
			||||||
		.status(err.status || 500)
 | 
					 | 
				
			||||||
		.send(payload);
 | 
					 | 
				
			||||||
});
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = app;
 | 
					export default app;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										91
									
								
								backend/biome.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										91
									
								
								backend/biome.json
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,91 @@
 | 
				
			|||||||
 | 
					{
 | 
				
			||||||
 | 
					    "$schema": "https://biomejs.dev/schemas/2.3.1/schema.json",
 | 
				
			||||||
 | 
					    "vcs": {
 | 
				
			||||||
 | 
					        "enabled": true,
 | 
				
			||||||
 | 
					        "clientKind": "git",
 | 
				
			||||||
 | 
					        "useIgnoreFile": true
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    "files": {
 | 
				
			||||||
 | 
					        "ignoreUnknown": false,
 | 
				
			||||||
 | 
					        "includes": [
 | 
				
			||||||
 | 
					            "**/*.ts",
 | 
				
			||||||
 | 
					            "**/*.tsx",
 | 
				
			||||||
 | 
					            "**/*.js",
 | 
				
			||||||
 | 
					            "**/*.jsx",
 | 
				
			||||||
 | 
					            "!**/dist/**/*"
 | 
				
			||||||
 | 
					        ]
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    "formatter": {
 | 
				
			||||||
 | 
					        "enabled": true,
 | 
				
			||||||
 | 
					        "indentStyle": "tab",
 | 
				
			||||||
 | 
					        "indentWidth": 4,
 | 
				
			||||||
 | 
					        "lineWidth": 120,
 | 
				
			||||||
 | 
					        "formatWithErrors": true
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    "assist": {
 | 
				
			||||||
 | 
					        "actions": {
 | 
				
			||||||
 | 
					            "source": {
 | 
				
			||||||
 | 
					                "organizeImports": {
 | 
				
			||||||
 | 
					                    "level": "on",
 | 
				
			||||||
 | 
					                    "options": {
 | 
				
			||||||
 | 
					                        "groups": [
 | 
				
			||||||
 | 
					                            ":BUN:",
 | 
				
			||||||
 | 
					                            ":NODE:",
 | 
				
			||||||
 | 
					                            [
 | 
				
			||||||
 | 
					                                "npm:*",
 | 
				
			||||||
 | 
					                                "npm:*/**"
 | 
				
			||||||
 | 
					                            ],
 | 
				
			||||||
 | 
					                            ":PACKAGE_WITH_PROTOCOL:",
 | 
				
			||||||
 | 
					                            ":URL:",
 | 
				
			||||||
 | 
					                            ":PACKAGE:",
 | 
				
			||||||
 | 
					                            [
 | 
				
			||||||
 | 
					                                "/src/*",
 | 
				
			||||||
 | 
					                                "/src/**"
 | 
				
			||||||
 | 
					                            ],
 | 
				
			||||||
 | 
					                            [
 | 
				
			||||||
 | 
					                                "/**"
 | 
				
			||||||
 | 
					                            ],
 | 
				
			||||||
 | 
					                            [
 | 
				
			||||||
 | 
					                                "#*",
 | 
				
			||||||
 | 
					                                "#*/**"
 | 
				
			||||||
 | 
					                            ],
 | 
				
			||||||
 | 
					                            ":PATH:"
 | 
				
			||||||
 | 
					                        ]
 | 
				
			||||||
 | 
					                    }
 | 
				
			||||||
 | 
					                }
 | 
				
			||||||
 | 
					            }
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    "linter": {
 | 
				
			||||||
 | 
					        "enabled": true,
 | 
				
			||||||
 | 
					        "rules": {
 | 
				
			||||||
 | 
					            "recommended": true,
 | 
				
			||||||
 | 
					            "correctness": {
 | 
				
			||||||
 | 
					                "useUniqueElementIds": "off"
 | 
				
			||||||
 | 
					            },
 | 
				
			||||||
 | 
					            "suspicious": {
 | 
				
			||||||
 | 
					                "noExplicitAny": "off"
 | 
				
			||||||
 | 
					            },
 | 
				
			||||||
 | 
					            "performance": {
 | 
				
			||||||
 | 
					                "noDelete": "off"
 | 
				
			||||||
 | 
					            },
 | 
				
			||||||
 | 
					            "nursery": "off",
 | 
				
			||||||
 | 
					            "a11y": {
 | 
				
			||||||
 | 
					                "useSemanticElements": "off",
 | 
				
			||||||
 | 
					                "useValidAnchor": "off"
 | 
				
			||||||
 | 
					            },
 | 
				
			||||||
 | 
					            "style": {
 | 
				
			||||||
 | 
					                "noParameterAssign": "error",
 | 
				
			||||||
 | 
					                "useAsConstAssertion": "error",
 | 
				
			||||||
 | 
					                "useDefaultParameterLast": "error",
 | 
				
			||||||
 | 
					                "useEnumInitializers": "error",
 | 
				
			||||||
 | 
					                "useSelfClosingElements": "error",
 | 
				
			||||||
 | 
					                "useSingleVarDeclarator": "error",
 | 
				
			||||||
 | 
					                "noUnusedTemplateLiteral": "error",
 | 
				
			||||||
 | 
					                "useNumberNamespace": "error",
 | 
				
			||||||
 | 
					                "noInferrableTypes": "error",
 | 
				
			||||||
 | 
					                "noUselessElse": "error"
 | 
				
			||||||
 | 
					            }
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
@@ -1,4 +1,4 @@
 | 
				
			|||||||
# certbot-dns-plugins
 | 
					# Certbot dns-plugins
 | 
				
			||||||
 | 
					
 | 
				
			||||||
This file contains info about available Certbot DNS plugins.
 | 
					This file contains info about available Certbot DNS plugins.
 | 
				
			||||||
This only works for plugins which use the standard argument structure, so:
 | 
					This only works for plugins which use the standard argument structure, so:
 | 
				
			||||||
@@ -7,10 +7,18 @@
 | 
				
			|||||||
		"credentials": "dns_acmedns_api_url = http://acmedns-server/\ndns_acmedns_registration_file = /data/acme-registration.json",
 | 
							"credentials": "dns_acmedns_api_url = http://acmedns-server/\ndns_acmedns_registration_file = /data/acme-registration.json",
 | 
				
			||||||
		"full_plugin_name": "dns-acmedns"
 | 
							"full_plugin_name": "dns-acmedns"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"active24": {
 | 
				
			||||||
 | 
							"name": "Active24",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-active24",
 | 
				
			||||||
 | 
							"version": "~=2.0.0",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_active24_api_key = <identifier>\ndns_active24_secret = <secret>",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-active24"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"aliyun": {
 | 
						"aliyun": {
 | 
				
			||||||
		"name": "Aliyun",
 | 
							"name": "Aliyun",
 | 
				
			||||||
		"package_name": "certbot-dns-aliyun",
 | 
							"package_name": "certbot-dns-aliyun",
 | 
				
			||||||
		"version": "~=0.38.1",
 | 
							"version": "~=2.0.0",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "dns_aliyun_access_key = 12345678\ndns_aliyun_access_key_secret = 1234567890abcdef1234567890abcdef",
 | 
							"credentials": "dns_aliyun_access_key = 12345678\ndns_aliyun_access_key_secret = 1234567890abcdef1234567890abcdef",
 | 
				
			||||||
		"full_plugin_name": "dns-aliyun"
 | 
							"full_plugin_name": "dns-aliyun"
 | 
				
			||||||
@@ -23,6 +31,22 @@
 | 
				
			|||||||
		"credentials": "# This plugin supported API authentication using either Service Principals or utilizing a Managed Identity assigned to the virtual machine.\n# Regardless which authentication method used, the identity will need the “DNS Zone Contributor” role assigned to it.\n# As multiple Azure DNS Zones in multiple resource groups can exist, the config file needs a mapping of zone to resource group ID. Multiple zones -> ID mappings can be listed by using the key dns_azure_zoneX where X is a unique number. At least 1 zone mapping is required.\n\n# Using a service principal (option 1)\ndns_azure_sp_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5\ndns_azure_sp_client_secret = E-xqXU83Y-jzTI6xe9fs2YC~mck3ZzUih9\ndns_azure_tenant_id = ed1090f3-ab18-4b12-816c-599af8a88cf7\n\n# Using used assigned MSI (option 2)\n# dns_azure_msi_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5\n\n# Using system assigned MSI (option 3)\n# dns_azure_msi_system_assigned = true\n\n# Zones (at least one always required)\ndns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1\ndns_azure_zone2 = example.org:/subscriptions/99800903-fb14-4992-9aff-12eaf2744622/resourceGroups/dns2",
 | 
							"credentials": "# This plugin supported API authentication using either Service Principals or utilizing a Managed Identity assigned to the virtual machine.\n# Regardless which authentication method used, the identity will need the “DNS Zone Contributor” role assigned to it.\n# As multiple Azure DNS Zones in multiple resource groups can exist, the config file needs a mapping of zone to resource group ID. Multiple zones -> ID mappings can be listed by using the key dns_azure_zoneX where X is a unique number. At least 1 zone mapping is required.\n\n# Using a service principal (option 1)\ndns_azure_sp_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5\ndns_azure_sp_client_secret = E-xqXU83Y-jzTI6xe9fs2YC~mck3ZzUih9\ndns_azure_tenant_id = ed1090f3-ab18-4b12-816c-599af8a88cf7\n\n# Using used assigned MSI (option 2)\n# dns_azure_msi_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5\n\n# Using system assigned MSI (option 3)\n# dns_azure_msi_system_assigned = true\n\n# Zones (at least one always required)\ndns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1\ndns_azure_zone2 = example.org:/subscriptions/99800903-fb14-4992-9aff-12eaf2744622/resourceGroups/dns2",
 | 
				
			||||||
		"full_plugin_name": "dns-azure"
 | 
							"full_plugin_name": "dns-azure"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"baidu": {
 | 
				
			||||||
 | 
							"name": "baidu",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-baidu",
 | 
				
			||||||
 | 
							"version": "~=0.1.1",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_baidu_access_key = 12345678\ndns_baidu_secret_key = 1234567890abcdef1234567890abcdef",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-baidu"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
						"beget": {
 | 
				
			||||||
 | 
							"name":"Beget",
 | 
				
			||||||
 | 
							"package_name": "certbot-beget-plugin",
 | 
				
			||||||
 | 
							"version": "~=1.0.0.dev9",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "# Beget API credentials used by Certbot\nbeget_plugin_username = username\nbeget_plugin_password = password",
 | 
				
			||||||
 | 
							"full_plugin_name": "beget-plugin"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"bunny": {
 | 
						"bunny": {
 | 
				
			||||||
		"name": "bunny.net",
 | 
							"name": "bunny.net",
 | 
				
			||||||
		"package_name": "certbot-dns-bunny",
 | 
							"package_name": "certbot-dns-bunny",
 | 
				
			||||||
@@ -31,11 +55,19 @@
 | 
				
			|||||||
		"credentials": "# Bunny API token used by Certbot (see https://dash.bunny.net/account/settings)\ndns_bunny_api_key = xxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx",
 | 
							"credentials": "# Bunny API token used by Certbot (see https://dash.bunny.net/account/settings)\ndns_bunny_api_key = xxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx",
 | 
				
			||||||
		"full_plugin_name": "dns-bunny"
 | 
							"full_plugin_name": "dns-bunny"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"cdmon": {
 | 
				
			||||||
 | 
							"name": "cdmon",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-cdmon",
 | 
				
			||||||
 | 
							"version": "~=0.4.1",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_cdmon_api_key=your-cdmon-api-token\ndns_cdmon_domain=your_domain_is_optional",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-cdmon"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"cloudflare": {
 | 
						"cloudflare": {
 | 
				
			||||||
		"name": "Cloudflare",
 | 
							"name": "Cloudflare",
 | 
				
			||||||
		"package_name": "certbot-dns-cloudflare",
 | 
							"package_name": "certbot-dns-cloudflare",
 | 
				
			||||||
		"version": "=={{certbot-version}}",
 | 
							"version": "=={{certbot-version}}",
 | 
				
			||||||
		"dependencies": "cloudflare==2.19.* acme=={{certbot-version}}",
 | 
							"dependencies": "acme=={{certbot-version}}",
 | 
				
			||||||
		"credentials": "# Cloudflare API token\ndns_cloudflare_api_token=0123456789abcdef0123456789abcdef01234567",
 | 
							"credentials": "# Cloudflare API token\ndns_cloudflare_api_token=0123456789abcdef0123456789abcdef01234567",
 | 
				
			||||||
		"full_plugin_name": "dns-cloudflare"
 | 
							"full_plugin_name": "dns-cloudflare"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
@@ -74,11 +106,19 @@
 | 
				
			|||||||
	"cpanel": {
 | 
						"cpanel": {
 | 
				
			||||||
		"name": "cPanel",
 | 
							"name": "cPanel",
 | 
				
			||||||
		"package_name": "certbot-dns-cpanel",
 | 
							"package_name": "certbot-dns-cpanel",
 | 
				
			||||||
		"version": "~=0.2.2",
 | 
							"version": "~=0.4.0",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "cpanel_url = https://cpanel.example.com:2083\ncpanel_username = user\ncpanel_password = hunter2",
 | 
							"credentials": "cpanel_url = https://cpanel.example.com:2083\ncpanel_username = your_username\ncpanel_password = your_password\ncpanel_token = your_api_token",
 | 
				
			||||||
		"full_plugin_name": "cpanel"
 | 
							"full_plugin_name": "cpanel"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"ddnss": {
 | 
				
			||||||
 | 
							"name": "DDNSS",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-ddnss",
 | 
				
			||||||
 | 
							"version": "~=1.1.0",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_ddnss_token = YOUR_DDNSS_API_TOKEN",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-ddnss"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"desec": {
 | 
						"desec": {
 | 
				
			||||||
		"name": "deSEC",
 | 
							"name": "deSEC",
 | 
				
			||||||
		"package_name": "certbot-dns-desec",
 | 
							"package_name": "certbot-dns-desec",
 | 
				
			||||||
@@ -145,11 +185,11 @@
 | 
				
			|||||||
	},
 | 
						},
 | 
				
			||||||
	"domainoffensive": {
 | 
						"domainoffensive": {
 | 
				
			||||||
		"name": "DomainOffensive (do.de)",
 | 
							"name": "DomainOffensive (do.de)",
 | 
				
			||||||
		"package_name": "certbot-dns-do",
 | 
							"package_name": "certbot-dns-domainoffensive",
 | 
				
			||||||
		"version": "~=0.31.0",
 | 
							"version": "~=2.0.0",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "dns_do_api_token = YOUR_DO_DE_AUTH_TOKEN",
 | 
							"credentials": "dns_domainoffensive_api_token = YOUR_DO_DE_AUTH_TOKEN",
 | 
				
			||||||
		"full_plugin_name": "dns-do"
 | 
							"full_plugin_name": "dns-domainoffensive"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
	"domeneshop": {
 | 
						"domeneshop": {
 | 
				
			||||||
		"name": "Domeneshop",
 | 
							"name": "Domeneshop",
 | 
				
			||||||
@@ -183,6 +223,14 @@
 | 
				
			|||||||
		"credentials": "dns_eurodns_applicationId = myuser\ndns_eurodns_apiKey = mysecretpassword\ndns_eurodns_endpoint = https://rest-api.eurodns.com/user-api-gateway/proxy",
 | 
							"credentials": "dns_eurodns_applicationId = myuser\ndns_eurodns_apiKey = mysecretpassword\ndns_eurodns_endpoint = https://rest-api.eurodns.com/user-api-gateway/proxy",
 | 
				
			||||||
		"full_plugin_name": "dns-eurodns"
 | 
							"full_plugin_name": "dns-eurodns"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"firstdomains": {
 | 
				
			||||||
 | 
					                "name": "First Domains",
 | 
				
			||||||
 | 
					                "package_name": "certbot-dns-firstdomains",
 | 
				
			||||||
 | 
					                "version": ">=1.0",
 | 
				
			||||||
 | 
					                "dependencies": "",
 | 
				
			||||||
 | 
					                "credentials": "dns_firstdomains_username = myremoteuser\ndns_firstdomains_password = verysecureremoteuserpassword",
 | 
				
			||||||
 | 
					                "full_plugin_name": "dns-firstdomains"
 | 
				
			||||||
 | 
					        },
 | 
				
			||||||
	"freedns": {
 | 
						"freedns": {
 | 
				
			||||||
		"name": "FreeDNS",
 | 
							"name": "FreeDNS",
 | 
				
			||||||
		"package_name": "certbot-dns-freedns",
 | 
							"package_name": "certbot-dns-freedns",
 | 
				
			||||||
@@ -193,12 +241,20 @@
 | 
				
			|||||||
	},
 | 
						},
 | 
				
			||||||
	"gandi": {
 | 
						"gandi": {
 | 
				
			||||||
		"name": "Gandi Live DNS",
 | 
							"name": "Gandi Live DNS",
 | 
				
			||||||
		"package_name": "certbot_plugin_gandi",
 | 
							"package_name": "certbot-dns-gandi",
 | 
				
			||||||
		"version": "~=1.5.0",
 | 
							"version": "~=1.6.1",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "# Gandi personal access token\ndns_gandi_token=PERSONAL_ACCESS_TOKEN",
 | 
							"credentials": "# Gandi personal access token\ndns_gandi_token=PERSONAL_ACCESS_TOKEN",
 | 
				
			||||||
		"full_plugin_name": "dns-gandi"
 | 
							"full_plugin_name": "dns-gandi"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"gcore": {
 | 
				
			||||||
 | 
							"name": "Gcore DNS",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-gcore",
 | 
				
			||||||
 | 
							"version": "~=0.1.8",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_gcore_apitoken = 0123456789abcdef0123456789abcdef01234567",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-gcore"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"godaddy": {
 | 
						"godaddy": {
 | 
				
			||||||
		"name": "GoDaddy",
 | 
							"name": "GoDaddy",
 | 
				
			||||||
		"package_name": "certbot-dns-godaddy",
 | 
							"package_name": "certbot-dns-godaddy",
 | 
				
			||||||
@@ -239,6 +295,14 @@
 | 
				
			|||||||
		"credentials": "dns_hetzner_api_token = 0123456789abcdef0123456789abcdef",
 | 
							"credentials": "dns_hetzner_api_token = 0123456789abcdef0123456789abcdef",
 | 
				
			||||||
		"full_plugin_name": "dns-hetzner"
 | 
							"full_plugin_name": "dns-hetzner"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"hostingnl": {
 | 
				
			||||||
 | 
							"name": "Hosting.nl",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-hostingnl",
 | 
				
			||||||
 | 
							"version": "~=0.1.5",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_hostingnl_api_key = 0123456789abcdef0123456789abcdef",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-hostingnl"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"hover": {
 | 
						"hover": {
 | 
				
			||||||
		"name": "Hover",
 | 
							"name": "Hover",
 | 
				
			||||||
		"package_name": "certbot-dns-hover",
 | 
							"package_name": "certbot-dns-hover",
 | 
				
			||||||
@@ -295,6 +359,14 @@
 | 
				
			|||||||
		"credentials": "dns_joker_username = <Dynamic DNS Authentication Username>\ndns_joker_password = <Dynamic DNS Authentication Password>\ndns_joker_domain = <Dynamic DNS Domain>",
 | 
							"credentials": "dns_joker_username = <Dynamic DNS Authentication Username>\ndns_joker_password = <Dynamic DNS Authentication Password>\ndns_joker_domain = <Dynamic DNS Domain>",
 | 
				
			||||||
		"full_plugin_name": "dns-joker"
 | 
							"full_plugin_name": "dns-joker"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"leaseweb": {
 | 
				
			||||||
 | 
							"name": "LeaseWeb",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-leaseweb",
 | 
				
			||||||
 | 
							"version": "~=1.0.1",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_leaseweb_api_token = 01234556789",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-leaseweb"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"linode": {
 | 
						"linode": {
 | 
				
			||||||
		"name": "Linode",
 | 
							"name": "Linode",
 | 
				
			||||||
		"package_name": "certbot-dns-linode",
 | 
							"package_name": "certbot-dns-linode",
 | 
				
			||||||
@@ -319,6 +391,14 @@
 | 
				
			|||||||
		"credentials": "dns_luadns_email = user@example.com\ndns_luadns_token = 0123456789abcdef0123456789abcdef",
 | 
							"credentials": "dns_luadns_email = user@example.com\ndns_luadns_token = 0123456789abcdef0123456789abcdef",
 | 
				
			||||||
		"full_plugin_name": "dns-luadns"
 | 
							"full_plugin_name": "dns-luadns"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"mijnhost": {
 | 
				
			||||||
 | 
							"name": "mijn.host",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-mijn-host",
 | 
				
			||||||
 | 
							"version": "~=0.0.4",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_mijn_host_api_key=0123456789abcdef0123456789abcdef",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-mijn-host"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"namecheap": {
 | 
						"namecheap": {
 | 
				
			||||||
		"name": "Namecheap",
 | 
							"name": "Namecheap",
 | 
				
			||||||
		"package_name": "certbot-dns-namecheap",
 | 
							"package_name": "certbot-dns-namecheap",
 | 
				
			||||||
@@ -335,6 +415,14 @@
 | 
				
			|||||||
		"credentials": "dns_netcup_customer_id  = 123456\ndns_netcup_api_key      = 0123456789abcdef0123456789abcdef01234567\ndns_netcup_api_password = abcdef0123456789abcdef01234567abcdef0123",
 | 
							"credentials": "dns_netcup_customer_id  = 123456\ndns_netcup_api_key      = 0123456789abcdef0123456789abcdef01234567\ndns_netcup_api_password = abcdef0123456789abcdef01234567abcdef0123",
 | 
				
			||||||
		"full_plugin_name": "dns-netcup"
 | 
							"full_plugin_name": "dns-netcup"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"nicru": {
 | 
				
			||||||
 | 
							"name": "nic.ru",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-nicru",
 | 
				
			||||||
 | 
							"version": "~=1.0.3",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_nicru_client_id = application-id\ndns_nicru_client_secret = application-token\ndns_nicru_username = 0001110/NIC-D\ndns_nicru_password = password\ndns_nicru_scope = .+:.+/zones/example.com(/.+)?\ndns_nicru_service = DNS_SERVICE_NAME\ndns_nicru_zone = example.com",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-nicru"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"njalla": {
 | 
						"njalla": {
 | 
				
			||||||
		"name": "Njalla",
 | 
							"name": "Njalla",
 | 
				
			||||||
		"package_name": "certbot-dns-njalla",
 | 
							"package_name": "certbot-dns-njalla",
 | 
				
			||||||
@@ -378,7 +466,7 @@
 | 
				
			|||||||
	"porkbun": {
 | 
						"porkbun": {
 | 
				
			||||||
		"name": "Porkbun",
 | 
							"name": "Porkbun",
 | 
				
			||||||
		"package_name": "certbot-dns-porkbun",
 | 
							"package_name": "certbot-dns-porkbun",
 | 
				
			||||||
		"version": "~=0.2",
 | 
							"version": "~=0.9",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "dns_porkbun_key=your-porkbun-api-key\ndns_porkbun_secret=your-porkbun-api-secret",
 | 
							"credentials": "dns_porkbun_key=your-porkbun-api-key\ndns_porkbun_secret=your-porkbun-api-secret",
 | 
				
			||||||
		"full_plugin_name": "dns-porkbun"
 | 
							"full_plugin_name": "dns-porkbun"
 | 
				
			||||||
@@ -407,6 +495,14 @@
 | 
				
			|||||||
		"credentials": "# Target DNS server\ndns_rfc2136_server = 192.0.2.1\n# Target DNS port\ndns_rfc2136_port = 53\n# TSIG key name\ndns_rfc2136_name = keyname.\n# TSIG key secret\ndns_rfc2136_secret = 4q4wM/2I180UXoMyN4INVhJNi8V9BCV+jMw2mXgZw/CSuxUT8C7NKKFs AmKd7ak51vWKgSl12ib86oQRPkpDjg==\n# TSIG key algorithm\ndns_rfc2136_algorithm = HMAC-SHA512",
 | 
							"credentials": "# Target DNS server\ndns_rfc2136_server = 192.0.2.1\n# Target DNS port\ndns_rfc2136_port = 53\n# TSIG key name\ndns_rfc2136_name = keyname.\n# TSIG key secret\ndns_rfc2136_secret = 4q4wM/2I180UXoMyN4INVhJNi8V9BCV+jMw2mXgZw/CSuxUT8C7NKKFs AmKd7ak51vWKgSl12ib86oQRPkpDjg==\n# TSIG key algorithm\ndns_rfc2136_algorithm = HMAC-SHA512",
 | 
				
			||||||
		"full_plugin_name": "dns-rfc2136"
 | 
							"full_plugin_name": "dns-rfc2136"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"rockenstein": {
 | 
				
			||||||
 | 
							"name": "rockenstein AG",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-rockenstein",
 | 
				
			||||||
 | 
							"version": "~=1.0.0",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "dns_rockenstein_token=<token>",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-rockenstein"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"route53": {
 | 
						"route53": {
 | 
				
			||||||
		"name": "Route 53 (Amazon)",
 | 
							"name": "Route 53 (Amazon)",
 | 
				
			||||||
		"package_name": "certbot-dns-route53",
 | 
							"package_name": "certbot-dns-route53",
 | 
				
			||||||
@@ -415,14 +511,30 @@
 | 
				
			|||||||
		"credentials": "[default]\naws_access_key_id=AKIAIOSFODNN7EXAMPLE\naws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
 | 
							"credentials": "[default]\naws_access_key_id=AKIAIOSFODNN7EXAMPLE\naws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
 | 
				
			||||||
		"full_plugin_name": "dns-route53"
 | 
							"full_plugin_name": "dns-route53"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"spaceship": {
 | 
				
			||||||
 | 
							"name": "Spaceship",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-spaceship",
 | 
				
			||||||
 | 
							"version": "~=1.0.4",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "[spaceship]\napi_key=your_api_key\napi_secret=your_api_secret",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-spaceship"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"strato": {
 | 
						"strato": {
 | 
				
			||||||
		"name": "Strato",
 | 
							"name": "Strato",
 | 
				
			||||||
		"package_name": "certbot-dns-strato",
 | 
							"package_name": "certbot-dns-strato",
 | 
				
			||||||
		"version": "~=0.2.1",
 | 
							"version": "~=0.2.2",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "dns_strato_username = user\ndns_strato_password = pass\n# uncomment if youre using two factor authentication:\n# dns_strato_totp_devicename = 2fa_device\n# dns_strato_totp_secret = 2fa_secret\n#\n# uncomment if domain name contains special characters\n# insert domain display name as seen on your account page here\n# dns_strato_domain_display_name = my-punicode-url.de\n#\n# if youre not using strato.de or another special endpoint you can customise it below\n# you will probably only need to adjust the host, but you can also change the complete endpoint url\n# dns_strato_custom_api_scheme = https\n# dns_strato_custom_api_host = www.strato.de\n# dns_strato_custom_api_port = 443\n# dns_strato_custom_api_path = \"/apps/CustomerService\"",
 | 
							"credentials": "dns_strato_username = user\ndns_strato_password = pass\n# uncomment if youre using two factor authentication:\n# dns_strato_totp_devicename = 2fa_device\n# dns_strato_totp_secret = 2fa_secret\n#\n# uncomment if domain name contains special characters\n# insert domain display name as seen on your account page here\n# dns_strato_domain_display_name = my-punicode-url.de\n#\n# if youre not using strato.de or another special endpoint you can customise it below\n# you will probably only need to adjust the host, but you can also change the complete endpoint url\n# dns_strato_custom_api_scheme = https\n# dns_strato_custom_api_host = www.strato.de\n# dns_strato_custom_api_port = 443\n# dns_strato_custom_api_path = \"/apps/CustomerService\"",
 | 
				
			||||||
		"full_plugin_name": "dns-strato"
 | 
							"full_plugin_name": "dns-strato"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						        "selectelv2": {
 | 
				
			||||||
 | 
					                "name": "Selectel api v2",
 | 
				
			||||||
 | 
					                "package_name": "certbot-dns-selectel-api-v2",
 | 
				
			||||||
 | 
					                "version": "~=0.3.0",
 | 
				
			||||||
 | 
					                "dependencies": "",
 | 
				
			||||||
 | 
					                "credentials": "dns_selectel_api_v2_account_id = your_account_id\ndns_selectel_api_v2_project_name = your_project\ndns_selectel_api_v2_username = your_username\ndns_selectel_api_v2_password = your_password",
 | 
				
			||||||
 | 
					                "full_plugin_name": "dns-selectel-api-v2"
 | 
				
			||||||
 | 
					        },
 | 
				
			||||||
	"timeweb": {
 | 
						"timeweb": {
 | 
				
			||||||
		"name": "Timeweb Cloud",
 | 
							"name": "Timeweb Cloud",
 | 
				
			||||||
		"package_name": "certbot-dns-timeweb",
 | 
							"package_name": "certbot-dns-timeweb",
 | 
				
			||||||
@@ -463,12 +575,28 @@
 | 
				
			|||||||
		"credentials": "dns_websupport_identifier = <api_key>\ndns_websupport_secret_key = <secret>",
 | 
							"credentials": "dns_websupport_identifier = <api_key>\ndns_websupport_secret_key = <secret>",
 | 
				
			||||||
		"full_plugin_name": "dns-websupport"
 | 
							"full_plugin_name": "dns-websupport"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
	"wedos":{
 | 
						"wedos": {
 | 
				
			||||||
		"name": "Wedos",
 | 
							"name": "Wedos",
 | 
				
			||||||
		"package_name": "certbot-dns-wedos",
 | 
							"package_name": "certbot-dns-wedos",
 | 
				
			||||||
		"version": "~=2.2",
 | 
							"version": "~=2.2",
 | 
				
			||||||
		"dependencies": "",
 | 
							"dependencies": "",
 | 
				
			||||||
		"credentials": "dns_wedos_user = <wedos_registration>\ndns_wedos_auth = <wapi_sha256_password>",
 | 
							"credentials": "dns_wedos_user = <wedos_registration>\ndns_wedos_auth = <wapi_password>",
 | 
				
			||||||
		"full_plugin_name": "dns-wedos"
 | 
							"full_plugin_name": "dns-wedos"
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
 | 
						"edgedns": {
 | 
				
			||||||
 | 
							"name": "Akamai Edge DNS",
 | 
				
			||||||
 | 
							"package_name": "certbot-plugin-edgedns",
 | 
				
			||||||
 | 
							"version": "~=0.1.0",
 | 
				
			||||||
 | 
							"dependencies": "",
 | 
				
			||||||
 | 
							"credentials": "edgedns_client_secret = as3d1asd5d1a32sdfsdfs2d1asd5=\nedgedns_host = sdflskjdf-dfsdfsdf-sdfsdfsdf.luna.akamaiapis.net\nedgedns_access_token = kjdsi3-34rfsdfsdf-234234fsdfsdf\nedgedns_client_token = dkfjdf-342fsdfsd-23fsdfsdfsdf",
 | 
				
			||||||
 | 
							"full_plugin_name": "edgedns"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
						"zoneedit": {
 | 
				
			||||||
 | 
							"name": "ZoneEdit",
 | 
				
			||||||
 | 
							"package_name": "certbot-dns-zoneedit",
 | 
				
			||||||
 | 
							"version": "~=0.3.2",
 | 
				
			||||||
 | 
							"dependencies": "--no-deps dnspython",
 | 
				
			||||||
 | 
							"credentials": "dns_zoneedit_user = <login-user-id>\ndns_zoneedit_token = <dyn-authentication-token>",
 | 
				
			||||||
 | 
							"full_plugin_name": "dns-zoneedit"
 | 
				
			||||||
 | 
					 	}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -1,6 +1,6 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
  "database": {
 | 
					  "database": {
 | 
				
			||||||
    "engine": "mysql",
 | 
					    "engine": "mysql2",
 | 
				
			||||||
    "host": "db",
 | 
					    "host": "db",
 | 
				
			||||||
    "name": "npm",
 | 
					    "name": "npm",
 | 
				
			||||||
    "user": "npm",
 | 
					    "user": "npm",
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,27 +1,32 @@
 | 
				
			|||||||
const config = require('./lib/config');
 | 
					import knex from "knex";
 | 
				
			||||||
 | 
					import {configGet, configHas} from "./lib/config.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
if (!config.has('database')) {
 | 
					const generateDbConfig = () => {
 | 
				
			||||||
	throw new Error('Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/');
 | 
						if (!configHas("database")) {
 | 
				
			||||||
}
 | 
							throw new Error(
 | 
				
			||||||
 | 
								"Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/",
 | 
				
			||||||
 | 
							);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function generateDbConfig() {
 | 
						const cfg = configGet("database");
 | 
				
			||||||
	const cfg = config.get('database');
 | 
					
 | 
				
			||||||
	if (cfg.engine === 'knex-native') {
 | 
						if (cfg.engine === "knex-native") {
 | 
				
			||||||
		return cfg.knex;
 | 
							return cfg.knex;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return {
 | 
						return {
 | 
				
			||||||
		client:     cfg.engine,
 | 
							client: cfg.engine,
 | 
				
			||||||
		connection: {
 | 
							connection: {
 | 
				
			||||||
			host:     cfg.host,
 | 
								host: cfg.host,
 | 
				
			||||||
			user:     cfg.user,
 | 
								user: cfg.user,
 | 
				
			||||||
			password: cfg.password,
 | 
								password: cfg.password,
 | 
				
			||||||
			database: cfg.name,
 | 
								database: cfg.name,
 | 
				
			||||||
			port:     cfg.port
 | 
								port: cfg.port,
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
		migrations: {
 | 
							migrations: {
 | 
				
			||||||
			tableName: 'migrations'
 | 
								tableName: "migrations",
 | 
				
			||||||
		}
 | 
							},
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = require('knex')(generateDbConfig());
 | 
					export default knex(generateDbConfig());
 | 
				
			||||||
 
 | 
				
			|||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -1,40 +1,47 @@
 | 
				
			|||||||
#!/usr/bin/env node
 | 
					#!/usr/bin/env node
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const logger = require('./logger').global;
 | 
					import app from "./app.js";
 | 
				
			||||||
 | 
					import internalCertificate from "./internal/certificate.js";
 | 
				
			||||||
 | 
					import internalIpRanges from "./internal/ip_ranges.js";
 | 
				
			||||||
 | 
					import { global as logger } from "./logger.js";
 | 
				
			||||||
 | 
					import { migrateUp } from "./migrate.js";
 | 
				
			||||||
 | 
					import { getCompiledSchema } from "./schema/index.js";
 | 
				
			||||||
 | 
					import setup from "./setup.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
async function appStart () {
 | 
					const IP_RANGES_FETCH_ENABLED = process.env.IP_RANGES_FETCH_ENABLED !== "false";
 | 
				
			||||||
	const migrate             = require('./migrate');
 | 
					 | 
				
			||||||
	const setup               = require('./setup');
 | 
					 | 
				
			||||||
	const app                 = require('./app');
 | 
					 | 
				
			||||||
	const apiValidator        = require('./lib/validator/api');
 | 
					 | 
				
			||||||
	const internalCertificate = require('./internal/certificate');
 | 
					 | 
				
			||||||
	const internalIpRanges    = require('./internal/ip_ranges');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return migrate.latest()
 | 
					async function appStart() {
 | 
				
			||||||
 | 
						return migrateUp()
 | 
				
			||||||
		.then(setup)
 | 
							.then(setup)
 | 
				
			||||||
 | 
							.then(getCompiledSchema)
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			return apiValidator.loadSchemas;
 | 
								if (!IP_RANGES_FETCH_ENABLED) {
 | 
				
			||||||
 | 
									logger.info("IP Ranges fetch is disabled by environment variable");
 | 
				
			||||||
 | 
									return;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								logger.info("IP Ranges fetch is enabled");
 | 
				
			||||||
 | 
								return internalIpRanges.fetch().catch((err) => {
 | 
				
			||||||
 | 
									logger.error("IP Ranges fetch failed, continuing anyway:", err.message);
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(internalIpRanges.fetch)
 | 
					 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
 | 
					 | 
				
			||||||
			internalCertificate.initTimer();
 | 
								internalCertificate.initTimer();
 | 
				
			||||||
			internalIpRanges.initTimer();
 | 
								internalIpRanges.initTimer();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			const server = app.listen(3000, () => {
 | 
								const server = app.listen(3000, () => {
 | 
				
			||||||
				logger.info('Backend PID ' + process.pid + ' listening on port 3000 ...');
 | 
									logger.info(`Backend PID ${process.pid} listening on port 3000 ...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				process.on('SIGTERM', () => {
 | 
									process.on("SIGTERM", () => {
 | 
				
			||||||
					logger.info('PID ' + process.pid + ' received SIGTERM');
 | 
										logger.info(`PID ${process.pid} received SIGTERM`);
 | 
				
			||||||
					server.close(() => {
 | 
										server.close(() => {
 | 
				
			||||||
						logger.info('Stopping.');
 | 
											logger.info("Stopping.");
 | 
				
			||||||
						process.exit(0);
 | 
											process.exit(0);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.catch((err) => {
 | 
							.catch((err) => {
 | 
				
			||||||
			logger.error(err.message);
 | 
								logger.error(`Startup Error: ${err.message}`, err);
 | 
				
			||||||
			setTimeout(appStart, 1000);
 | 
								setTimeout(appStart, 1000);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -42,7 +49,6 @@ async function appStart () {
 | 
				
			|||||||
try {
 | 
					try {
 | 
				
			||||||
	appStart();
 | 
						appStart();
 | 
				
			||||||
} catch (err) {
 | 
					} catch (err) {
 | 
				
			||||||
	logger.error(err.message, err);
 | 
						logger.fatal(err);
 | 
				
			||||||
	process.exit(1);
 | 
						process.exit(1);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,103 +1,94 @@
 | 
				
			|||||||
const _                     = require('lodash');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const fs                    = require('fs');
 | 
					import batchflow from "batchflow";
 | 
				
			||||||
const batchflow             = require('batchflow');
 | 
					import _ from "lodash";
 | 
				
			||||||
const logger                = require('../logger').access;
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const error                 = require('../lib/error');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const utils                 = require('../lib/utils');
 | 
					import { access as logger } from "../logger.js";
 | 
				
			||||||
const accessListModel       = require('../models/access_list');
 | 
					import accessListModel from "../models/access_list.js";
 | 
				
			||||||
const accessListAuthModel   = require('../models/access_list_auth');
 | 
					import accessListAuthModel from "../models/access_list_auth.js";
 | 
				
			||||||
const accessListClientModel = require('../models/access_list_client');
 | 
					import accessListClientModel from "../models/access_list_client.js";
 | 
				
			||||||
const proxyHostModel        = require('../models/proxy_host');
 | 
					import proxyHostModel from "../models/proxy_host.js";
 | 
				
			||||||
const internalAuditLog      = require('./audit-log');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
const internalNginx         = require('./nginx');
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalAccessList = {
 | 
					const internalAccessList = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: async (access, data) => {
 | 
				
			||||||
		return access.can('access_lists:create', data)
 | 
							await access.can("access_lists:create", data);
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
							const row = await accessListModel
 | 
				
			||||||
				return accessListModel
 | 
								.query()
 | 
				
			||||||
					.query()
 | 
								.insertAndFetch({
 | 
				
			||||||
					.insertAndFetch({
 | 
									name: data.name,
 | 
				
			||||||
						name:          data.name,
 | 
									satisfy_any: data.satisfy_any,
 | 
				
			||||||
						satisfy_any:   data.satisfy_any,
 | 
									pass_auth: data.pass_auth,
 | 
				
			||||||
						pass_auth:     data.pass_auth,
 | 
									owner_user_id: access.token.getUserId(1),
 | 
				
			||||||
						owner_user_id: access.token.getUserId(1)
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then(utils.omitRow(omissions()));
 | 
				
			||||||
				data.id = row.id;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				let promises = [];
 | 
							data.id = row.id;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Now add the items
 | 
							const promises = [];
 | 
				
			||||||
				data.items.map((item) => {
 | 
							// Items
 | 
				
			||||||
					promises.push(accessListAuthModel
 | 
							data.items.map((item) => {
 | 
				
			||||||
						.query()
 | 
								promises.push(
 | 
				
			||||||
						.insert({
 | 
									accessListAuthModel.query().insert({
 | 
				
			||||||
							access_list_id: row.id,
 | 
										access_list_id: row.id,
 | 
				
			||||||
							username:       item.username,
 | 
										username: item.username,
 | 
				
			||||||
							password:       item.password
 | 
										password: item.password,
 | 
				
			||||||
						})
 | 
									}),
 | 
				
			||||||
					);
 | 
								);
 | 
				
			||||||
				});
 | 
								return true;
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Now add the clients
 | 
							// Clients
 | 
				
			||||||
				if (typeof data.clients !== 'undefined' && data.clients) {
 | 
							data.clients?.map((client) => {
 | 
				
			||||||
					data.clients.map((client) => {
 | 
								promises.push(
 | 
				
			||||||
						promises.push(accessListClientModel
 | 
									accessListClientModel.query().insert({
 | 
				
			||||||
							.query()
 | 
										access_list_id: row.id,
 | 
				
			||||||
							.insert({
 | 
										address: client.address,
 | 
				
			||||||
								access_list_id: row.id,
 | 
										directive: client.directive,
 | 
				
			||||||
								address:        client.address,
 | 
									}),
 | 
				
			||||||
								directive:      client.directive
 | 
								);
 | 
				
			||||||
							})
 | 
								return true;
 | 
				
			||||||
						);
 | 
							});
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return Promise.all(promises);
 | 
							await Promise.all(promises);
 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// re-fetch with expansions
 | 
					 | 
				
			||||||
				return internalAccessList.get(access, {
 | 
					 | 
				
			||||||
					id:     data.id,
 | 
					 | 
				
			||||||
					expand: ['owner', 'items', 'clients', 'proxy_hosts.access_list.[clients,items]']
 | 
					 | 
				
			||||||
				}, true /* <- skip masking */);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				// Audit log
 | 
					 | 
				
			||||||
				data.meta = _.assign({}, data.meta || {}, row.meta);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return internalAccessList.build(row)
 | 
							// re-fetch with expansions
 | 
				
			||||||
					.then(() => {
 | 
							const freshRow = await internalAccessList.get(
 | 
				
			||||||
						if (row.proxy_host_count) {
 | 
								access,
 | 
				
			||||||
							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
 | 
								{
 | 
				
			||||||
						}
 | 
									id: data.id,
 | 
				
			||||||
					})
 | 
									expand: ["owner", "items", "clients", "proxy_hosts.access_list.[clients,items]"],
 | 
				
			||||||
					.then(() => {
 | 
								},
 | 
				
			||||||
						// Add to audit log
 | 
								true // skip masking
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
							);
 | 
				
			||||||
							action:      'created',
 | 
					
 | 
				
			||||||
							object_type: 'access-list',
 | 
							// Audit log
 | 
				
			||||||
							object_id:   row.id,
 | 
							data.meta = _.assign({}, data.meta || {}, freshRow.meta);
 | 
				
			||||||
							meta:        internalAccessList.maskItems(data)
 | 
							await internalAccessList.build(freshRow);
 | 
				
			||||||
						});
 | 
					
 | 
				
			||||||
					})
 | 
							if (Number.parseInt(freshRow.proxy_host_count, 10)) {
 | 
				
			||||||
					.then(() => {
 | 
								await internalNginx.bulkGenerateConfigs("proxy_host", freshRow.proxy_hosts);
 | 
				
			||||||
						return internalAccessList.maskItems(row);
 | 
							}
 | 
				
			||||||
					});
 | 
					
 | 
				
			||||||
			});
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "created",
 | 
				
			||||||
 | 
								object_type: "access-list",
 | 
				
			||||||
 | 
								object_id: freshRow.id,
 | 
				
			||||||
 | 
								meta: internalAccessList.maskItems(data),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return internalAccessList.maskItems(freshRow);
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -108,129 +99,107 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @param  {String}  [data.items]
 | 
						 * @param  {String}  [data.items]
 | 
				
			||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: async (access, data) => {
 | 
				
			||||||
		return access.can('access_lists:update', data.id)
 | 
							await access.can("access_lists:update", data.id);
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
							const row = await internalAccessList.get(access, { id: data.id });
 | 
				
			||||||
				return internalAccessList.get(access, {id: data.id});
 | 
							if (row.id !== data.id) {
 | 
				
			||||||
			})
 | 
								// Sanity check that something crazy hasn't happened
 | 
				
			||||||
			.then((row) => {
 | 
								throw new errs.InternalValidationError(
 | 
				
			||||||
				if (row.id !== data.id) {
 | 
									`Access List could not be updated, IDs do not match: ${row.id} !== ${data.id}`,
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
								);
 | 
				
			||||||
					throw new error.InternalValidationError('Access List could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
							}
 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// patch name if specified
 | 
					 | 
				
			||||||
				if (typeof data.name !== 'undefined' && data.name) {
 | 
					 | 
				
			||||||
					return accessListModel
 | 
					 | 
				
			||||||
						.query()
 | 
					 | 
				
			||||||
						.where({id: data.id})
 | 
					 | 
				
			||||||
						.patch({
 | 
					 | 
				
			||||||
							name:        data.name,
 | 
					 | 
				
			||||||
							satisfy_any: data.satisfy_any,
 | 
					 | 
				
			||||||
							pass_auth:   data.pass_auth,
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// Check for items and add/update/remove them
 | 
					 | 
				
			||||||
				if (typeof data.items !== 'undefined' && data.items) {
 | 
					 | 
				
			||||||
					let promises      = [];
 | 
					 | 
				
			||||||
					let items_to_keep = [];
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
					data.items.map(function (item) {
 | 
							// patch name if specified
 | 
				
			||||||
						if (item.password) {
 | 
							if (typeof data.name !== "undefined" && data.name) {
 | 
				
			||||||
							promises.push(accessListAuthModel
 | 
								await accessListModel.query().where({ id: data.id }).patch({
 | 
				
			||||||
								.query()
 | 
									name: data.name,
 | 
				
			||||||
								.insert({
 | 
									satisfy_any: data.satisfy_any,
 | 
				
			||||||
									access_list_id: data.id,
 | 
									pass_auth: data.pass_auth,
 | 
				
			||||||
									username:       item.username,
 | 
					 | 
				
			||||||
									password:       item.password
 | 
					 | 
				
			||||||
								})
 | 
					 | 
				
			||||||
							);
 | 
					 | 
				
			||||||
						} else {
 | 
					 | 
				
			||||||
							// This was supplied with an empty password, which means keep it but don't change the password
 | 
					 | 
				
			||||||
							items_to_keep.push(item.username);
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					let query = accessListAuthModel
 | 
					 | 
				
			||||||
						.query()
 | 
					 | 
				
			||||||
						.delete()
 | 
					 | 
				
			||||||
						.where('access_list_id', data.id);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					if (items_to_keep.length) {
 | 
					 | 
				
			||||||
						query.andWhere('username', 'NOT IN', items_to_keep);
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					return query
 | 
					 | 
				
			||||||
						.then(() => {
 | 
					 | 
				
			||||||
							// Add new items
 | 
					 | 
				
			||||||
							if (promises.length) {
 | 
					 | 
				
			||||||
								return Promise.all(promises);
 | 
					 | 
				
			||||||
							}
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// Check for clients and add/update/remove them
 | 
					 | 
				
			||||||
				if (typeof data.clients !== 'undefined' && data.clients) {
 | 
					 | 
				
			||||||
					let promises = [];
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					data.clients.map(function (client) {
 | 
					 | 
				
			||||||
						if (client.address) {
 | 
					 | 
				
			||||||
							promises.push(accessListClientModel
 | 
					 | 
				
			||||||
								.query()
 | 
					 | 
				
			||||||
								.insert({
 | 
					 | 
				
			||||||
									access_list_id: data.id,
 | 
					 | 
				
			||||||
									address:        client.address,
 | 
					 | 
				
			||||||
									directive:      client.directive
 | 
					 | 
				
			||||||
								})
 | 
					 | 
				
			||||||
							);
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					let query = accessListClientModel
 | 
					 | 
				
			||||||
						.query()
 | 
					 | 
				
			||||||
						.delete()
 | 
					 | 
				
			||||||
						.where('access_list_id', data.id);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					return query
 | 
					 | 
				
			||||||
						.then(() => {
 | 
					 | 
				
			||||||
							// Add new items
 | 
					 | 
				
			||||||
							if (promises.length) {
 | 
					 | 
				
			||||||
								return Promise.all(promises);
 | 
					 | 
				
			||||||
							}
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// Add to audit log
 | 
					 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
					action:      'updated',
 | 
					 | 
				
			||||||
					object_type: 'access-list',
 | 
					 | 
				
			||||||
					object_id:   data.id,
 | 
					 | 
				
			||||||
					meta:        internalAccessList.maskItems(data)
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// re-fetch with expansions
 | 
					 | 
				
			||||||
				return internalAccessList.get(access, {
 | 
					 | 
				
			||||||
					id:     data.id,
 | 
					 | 
				
			||||||
					expand: ['owner', 'items', 'clients', 'proxy_hosts.[certificate,access_list.[clients,items]]']
 | 
					 | 
				
			||||||
				}, true /* <- skip masking */);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				return internalAccessList.build(row)
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						if (row.proxy_host_count) {
 | 
					 | 
				
			||||||
							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					}).then(internalNginx.reload)
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						return internalAccessList.maskItems(row);
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check for items and add/update/remove them
 | 
				
			||||||
 | 
							if (typeof data.items !== "undefined" && data.items) {
 | 
				
			||||||
 | 
								const promises = [];
 | 
				
			||||||
 | 
								const itemsToKeep = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								data.items.map((item) => {
 | 
				
			||||||
 | 
									if (item.password) {
 | 
				
			||||||
 | 
										promises.push(
 | 
				
			||||||
 | 
											accessListAuthModel.query().insert({
 | 
				
			||||||
 | 
												access_list_id: data.id,
 | 
				
			||||||
 | 
												username: item.username,
 | 
				
			||||||
 | 
												password: item.password,
 | 
				
			||||||
 | 
											}),
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
 | 
									} else {
 | 
				
			||||||
 | 
										// This was supplied with an empty password, which means keep it but don't change the password
 | 
				
			||||||
 | 
										itemsToKeep.push(item.username);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								const query = accessListAuthModel.query().delete().where("access_list_id", data.id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if (itemsToKeep.length) {
 | 
				
			||||||
 | 
									query.andWhere("username", "NOT IN", itemsToKeep);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								await query;
 | 
				
			||||||
 | 
								// Add new items
 | 
				
			||||||
 | 
								if (promises.length) {
 | 
				
			||||||
 | 
									await Promise.all(promises);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check for clients and add/update/remove them
 | 
				
			||||||
 | 
							if (typeof data.clients !== "undefined" && data.clients) {
 | 
				
			||||||
 | 
								const clientPromises = [];
 | 
				
			||||||
 | 
								data.clients.map((client) => {
 | 
				
			||||||
 | 
									if (client.address) {
 | 
				
			||||||
 | 
										clientPromises.push(
 | 
				
			||||||
 | 
											accessListClientModel.query().insert({
 | 
				
			||||||
 | 
												access_list_id: data.id,
 | 
				
			||||||
 | 
												address: client.address,
 | 
				
			||||||
 | 
												directive: client.directive,
 | 
				
			||||||
 | 
											}),
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								const query = accessListClientModel.query().delete().where("access_list_id", data.id);
 | 
				
			||||||
 | 
								await query;
 | 
				
			||||||
 | 
								// Add new clitens
 | 
				
			||||||
 | 
								if (clientPromises.length) {
 | 
				
			||||||
 | 
									await Promise.all(clientPromises);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "updated",
 | 
				
			||||||
 | 
								object_type: "access-list",
 | 
				
			||||||
 | 
								object_id: data.id,
 | 
				
			||||||
 | 
								meta: internalAccessList.maskItems(data),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// re-fetch with expansions
 | 
				
			||||||
 | 
							const freshRow = await internalAccessList.get(
 | 
				
			||||||
 | 
								access,
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
									id: data.id,
 | 
				
			||||||
 | 
									expand: ["owner", "items", "clients", "proxy_hosts.[certificate,access_list.[clients,items]]"],
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								true // skip masking
 | 
				
			||||||
 | 
							);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							await internalAccessList.build(freshRow)
 | 
				
			||||||
 | 
							if (Number.parseInt(freshRow.proxy_host_count, 10)) {
 | 
				
			||||||
 | 
								await internalNginx.bulkGenerateConfigs("proxy_host", freshRow.proxy_hosts);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							await internalNginx.reload();
 | 
				
			||||||
 | 
							return internalAccessList.maskItems(freshRow);
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -239,48 +208,50 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @param  {Integer}  data.id
 | 
						 * @param  {Integer}  data.id
 | 
				
			||||||
	 * @param  {Array}    [data.expand]
 | 
						 * @param  {Array}    [data.expand]
 | 
				
			||||||
	 * @param  {Array}    [data.omit]
 | 
						 * @param  {Array}    [data.omit]
 | 
				
			||||||
	 * @param  {Boolean}  [skip_masking]
 | 
						 * @param  {Boolean}  [skipMasking]
 | 
				
			||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data, skip_masking) => {
 | 
						get: async (access, data, skipMasking) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const thisData = data || {};
 | 
				
			||||||
			data = {};
 | 
							const accessData = await access.can("access_lists:get", thisData.id)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const query = accessListModel
 | 
				
			||||||
 | 
								.query()
 | 
				
			||||||
 | 
								.select("access_list.*", accessListModel.raw("COUNT(proxy_host.id) as proxy_host_count"))
 | 
				
			||||||
 | 
								.leftJoin("proxy_host", function () {
 | 
				
			||||||
 | 
									this.on("proxy_host.access_list_id", "=", "access_list.id").andOn(
 | 
				
			||||||
 | 
										"proxy_host.is_deleted",
 | 
				
			||||||
 | 
										"=",
 | 
				
			||||||
 | 
										0,
 | 
				
			||||||
 | 
									);
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.where("access_list.is_deleted", 0)
 | 
				
			||||||
 | 
								.andWhere("access_list.id", thisData.id)
 | 
				
			||||||
 | 
								.groupBy("access_list.id")
 | 
				
			||||||
 | 
								.allowGraph("[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]")
 | 
				
			||||||
 | 
								.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (accessData.permission_visibility !== "all") {
 | 
				
			||||||
 | 
								query.andWhere("access_list.owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('access_lists:get', data.id)
 | 
							if (typeof thisData.expand !== "undefined" && thisData.expand !== null) {
 | 
				
			||||||
			.then((access_data) => {
 | 
								query.withGraphFetched(`[${thisData.expand.join(", ")}]`);
 | 
				
			||||||
				let query = accessListModel
 | 
							}
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
 | 
					 | 
				
			||||||
					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
 | 
					 | 
				
			||||||
					.where('access_list.is_deleted', 0)
 | 
					 | 
				
			||||||
					.andWhere('access_list.id', data.id)
 | 
					 | 
				
			||||||
					.allowGraph('[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]')
 | 
					 | 
				
			||||||
					.first();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
							let row = await query.then(utils.omitRow(omissions()));
 | 
				
			||||||
					query.andWhere('access_list.owner_user_id', access.token.getUserId(1));
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
							if (!row || !row.id) {
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
								throw new errs.ItemNotFoundError(thisData.id);
 | 
				
			||||||
				}
 | 
							}
 | 
				
			||||||
 | 
							if (!skipMasking && typeof row.items !== "undefined" && row.items) {
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
								row = internalAccessList.maskItems(row);
 | 
				
			||||||
			})
 | 
							}
 | 
				
			||||||
			.then((row) => {
 | 
							// Custom omissions
 | 
				
			||||||
				if (!row) {
 | 
							if (typeof data.omit !== "undefined" && data.omit !== null) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
								row = _.omit(row, data.omit);
 | 
				
			||||||
				}
 | 
							}
 | 
				
			||||||
				if (!skip_masking && typeof row.items !== 'undefined' && row.items) {
 | 
							return row;
 | 
				
			||||||
					row = internalAccessList.maskItems(row);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
				// Custom omissions
 | 
					 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
					 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
				return row;
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -290,73 +261,64 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @param   {String}  [data.reason]
 | 
						 * @param   {String}  [data.reason]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: async (access, data) => {
 | 
				
			||||||
		return access.can('access_lists:delete', data.id)
 | 
							await access.can("access_lists:delete", data.id);
 | 
				
			||||||
			.then(() => {
 | 
							const row = await internalAccessList.get(access, {
 | 
				
			||||||
				return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items', 'clients']});
 | 
								id: data.id,
 | 
				
			||||||
			})
 | 
								expand: ["proxy_hosts", "items", "clients"],
 | 
				
			||||||
			.then((row) => {
 | 
							});
 | 
				
			||||||
				if (!row) {
 | 
					 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// 1. update row to be deleted
 | 
							if (!row || !row.id) {
 | 
				
			||||||
				// 2. update any proxy hosts that were using it (ignoring permissions)
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				// 3. reconfigure those hosts
 | 
							}
 | 
				
			||||||
				// 4. audit log
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// 1. update row to be deleted
 | 
							// 1. update row to be deleted
 | 
				
			||||||
				return accessListModel
 | 
							// 2. update any proxy hosts that were using it (ignoring permissions)
 | 
				
			||||||
					.query()
 | 
							// 3. reconfigure those hosts
 | 
				
			||||||
					.where('id', row.id)
 | 
							// 4. audit log
 | 
				
			||||||
					.patch({
 | 
					 | 
				
			||||||
						is_deleted: 1
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// 2. update any proxy hosts that were using it (ignoring permissions)
 | 
					 | 
				
			||||||
						if (row.proxy_hosts) {
 | 
					 | 
				
			||||||
							return proxyHostModel
 | 
					 | 
				
			||||||
								.query()
 | 
					 | 
				
			||||||
								.where('access_list_id', '=', row.id)
 | 
					 | 
				
			||||||
								.patch({access_list_id: 0})
 | 
					 | 
				
			||||||
								.then(() => {
 | 
					 | 
				
			||||||
									// 3. reconfigure those hosts, then reload nginx
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
									// set the access_list_id to zero for these items
 | 
							// 1. update row to be deleted
 | 
				
			||||||
									row.proxy_hosts.map(function (val, idx) {
 | 
							await accessListModel
 | 
				
			||||||
										row.proxy_hosts[idx].access_list_id = 0;
 | 
								.query()
 | 
				
			||||||
									});
 | 
								.where("id", row.id)
 | 
				
			||||||
 | 
								.patch({
 | 
				
			||||||
 | 
									is_deleted: 1,
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
									return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
 | 
							// 2. update any proxy hosts that were using it (ignoring permissions)
 | 
				
			||||||
								})
 | 
							if (row.proxy_hosts) {
 | 
				
			||||||
								.then(() => {
 | 
								await proxyHostModel
 | 
				
			||||||
									return internalNginx.reload();
 | 
									.query()
 | 
				
			||||||
								});
 | 
									.where("access_list_id", "=", row.id)
 | 
				
			||||||
						}
 | 
									.patch({ access_list_id: 0 });
 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// delete the htpasswd file
 | 
					 | 
				
			||||||
						let htpasswd_file = internalAccessList.getFilename(row);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
						try {
 | 
								// 3. reconfigure those hosts, then reload nginx
 | 
				
			||||||
							fs.unlinkSync(htpasswd_file);
 | 
								// set the access_list_id to zero for these items
 | 
				
			||||||
						} catch (err) {
 | 
								row.proxy_hosts.map((_val, idx) => {
 | 
				
			||||||
							// do nothing
 | 
									row.proxy_hosts[idx].access_list_id = 0;
 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// 4. audit log
 | 
					 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
							action:      'deleted',
 | 
					 | 
				
			||||||
							object_type: 'access-list',
 | 
					 | 
				
			||||||
							object_id:   row.id,
 | 
					 | 
				
			||||||
							meta:        _.omit(internalAccessList.maskItems(row), ['is_deleted', 'proxy_hosts'])
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return true;
 | 
									return true;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								await internalNginx.bulkGenerateConfigs("proxy_host", row.proxy_hosts);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							await internalNginx.reload();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// delete the htpasswd file
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								fs.unlinkSync(internalAccessList.getFilename(row));
 | 
				
			||||||
 | 
							} catch (_err) {
 | 
				
			||||||
 | 
								// do nothing
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// 4. audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "deleted",
 | 
				
			||||||
 | 
								object_type: "access-list",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: _.omit(internalAccessList.maskItems(row), ["is_deleted", "proxy_hosts"]),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
							return true;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -364,72 +326,73 @@ const internalAccessList = {
 | 
				
			|||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Array}   [expand]
 | 
						 * @param   {Array}   [expand]
 | 
				
			||||||
	 * @param   {String}  [search_query]
 | 
						 * @param   {String}  [searchQuery]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: async (access, expand, searchQuery) => {
 | 
				
			||||||
		return access.can('access_lists:list')
 | 
							const accessData = await access.can("access_lists:list");
 | 
				
			||||||
			.then((access_data) => {
 | 
					 | 
				
			||||||
				let query = accessListModel
 | 
					 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
 | 
					 | 
				
			||||||
					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
 | 
					 | 
				
			||||||
					.where('access_list.is_deleted', 0)
 | 
					 | 
				
			||||||
					.groupBy('access_list.id')
 | 
					 | 
				
			||||||
					.allowGraph('[owner,items,clients]')
 | 
					 | 
				
			||||||
					.orderBy('access_list.name', 'ASC');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
							const query = accessListModel
 | 
				
			||||||
					query.andWhere('access_list.owner_user_id', access.token.getUserId(1));
 | 
								.query()
 | 
				
			||||||
				}
 | 
								.select("access_list.*", accessListModel.raw("COUNT(proxy_host.id) as proxy_host_count"))
 | 
				
			||||||
 | 
								.leftJoin("proxy_host", function () {
 | 
				
			||||||
				// Query is used for searching
 | 
									this.on("proxy_host.access_list_id", "=", "access_list.id").andOn(
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
										"proxy_host.is_deleted",
 | 
				
			||||||
					query.where(function () {
 | 
										"=",
 | 
				
			||||||
						this.where('name', 'like', '%' + search_query + '%');
 | 
										0,
 | 
				
			||||||
					});
 | 
									);
 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
					 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((rows) => {
 | 
								.where("access_list.is_deleted", 0)
 | 
				
			||||||
				if (rows) {
 | 
								.groupBy("access_list.id")
 | 
				
			||||||
					rows.map(function (row, idx) {
 | 
								.allowGraph("[owner,items,clients]")
 | 
				
			||||||
						if (typeof row.items !== 'undefined' && row.items) {
 | 
								.orderBy("access_list.name", "ASC");
 | 
				
			||||||
							rows[idx] = internalAccessList.maskItems(row);
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return rows;
 | 
							if (accessData.permission_visibility !== "all") {
 | 
				
			||||||
 | 
								query.andWhere("access_list.owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Query is used for searching
 | 
				
			||||||
 | 
							if (typeof searchQuery === "string") {
 | 
				
			||||||
 | 
								query.where(function () {
 | 
				
			||||||
 | 
									this.where("name", "like", `%${searchQuery}%`);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const rows = await query.then(utils.omitRows(omissions()));
 | 
				
			||||||
 | 
							if (rows) {
 | 
				
			||||||
 | 
								rows.map((row, idx) => {
 | 
				
			||||||
 | 
									if (typeof row.items !== "undefined" && row.items) {
 | 
				
			||||||
 | 
										rows[idx] = internalAccessList.maskItems(row);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return rows;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Report use
 | 
						 * Count is used in reports
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Integer} user_id
 | 
						 * @param   {Integer} userId
 | 
				
			||||||
	 * @param   {String}  visibility
 | 
						 * @param   {String}  visibility
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (user_id, visibility) => {
 | 
						getCount: async (userId, visibility) => {
 | 
				
			||||||
		let query = accessListModel
 | 
							const query = accessListModel
 | 
				
			||||||
			.query()
 | 
								.query()
 | 
				
			||||||
			.count('id as count')
 | 
								.count("id as count")
 | 
				
			||||||
			.where('is_deleted', 0);
 | 
								.where("is_deleted", 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (visibility !== 'all') {
 | 
							if (visibility !== "all") {
 | 
				
			||||||
			query.andWhere('owner_user_id', user_id);
 | 
								query.andWhere("owner_user_id", userId);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query.first()
 | 
							const row = await query.first();
 | 
				
			||||||
			.then((row) => {
 | 
							return Number.parseInt(row.count, 10);
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -437,21 +400,21 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @returns {Object}
 | 
						 * @returns {Object}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	maskItems: (list) => {
 | 
						maskItems: (list) => {
 | 
				
			||||||
		if (list && typeof list.items !== 'undefined') {
 | 
							if (list && typeof list.items !== "undefined") {
 | 
				
			||||||
			list.items.map(function (val, idx) {
 | 
								list.items.map((val, idx) => {
 | 
				
			||||||
				let repeat_for = 8;
 | 
									let repeatFor = 8;
 | 
				
			||||||
				let first_char = '*';
 | 
									let firstChar = "*";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof val.password !== 'undefined' && val.password) {
 | 
									if (typeof val.password !== "undefined" && val.password) {
 | 
				
			||||||
					repeat_for = val.password.length - 1;
 | 
										repeatFor = val.password.length - 1;
 | 
				
			||||||
					first_char = val.password.charAt(0);
 | 
										firstChar = val.password.charAt(0);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				list.items[idx].hint     = first_char + ('*').repeat(repeat_for);
 | 
									list.items[idx].hint = firstChar + "*".repeat(repeatFor);
 | 
				
			||||||
				list.items[idx].password = '';
 | 
									list.items[idx].password = "";
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					 | 
				
			||||||
		return list;
 | 
							return list;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -461,7 +424,7 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @returns {String}
 | 
						 * @returns {String}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getFilename: (list) => {
 | 
						getFilename: (list) => {
 | 
				
			||||||
		return '/data/access/' + list.id;
 | 
							return `/data/access/${list.id}`;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -471,58 +434,55 @@ const internalAccessList = {
 | 
				
			|||||||
	 * @param   {Array}   list.items
 | 
						 * @param   {Array}   list.items
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	build: (list) => {
 | 
						build: async (list) => {
 | 
				
			||||||
		logger.info('Building Access file #' + list.id + ' for: ' + list.name);
 | 
							logger.info(`Building Access file #${list.id} for: ${list.name}`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							const htpasswdFile = internalAccessList.getFilename(list);
 | 
				
			||||||
			let htpasswd_file = internalAccessList.getFilename(list);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// 1. remove any existing access file
 | 
							// 1. remove any existing access file
 | 
				
			||||||
			try {
 | 
							try {
 | 
				
			||||||
				fs.unlinkSync(htpasswd_file);
 | 
								fs.unlinkSync(htpasswdFile);
 | 
				
			||||||
			} catch (err) {
 | 
							} catch (_err) {
 | 
				
			||||||
				// do nothing
 | 
								// do nothing
 | 
				
			||||||
			}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// 2. create empty access file
 | 
							// 2. create empty access file
 | 
				
			||||||
			try {
 | 
							fs.writeFileSync(htpasswdFile, '', {encoding: 'utf8'});
 | 
				
			||||||
				fs.writeFileSync(htpasswd_file, '', {encoding: 'utf8'});
 | 
					 | 
				
			||||||
				resolve(htpasswd_file);
 | 
					 | 
				
			||||||
			} catch (err) {
 | 
					 | 
				
			||||||
				reject(err);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((htpasswd_file) => {
 | 
					 | 
				
			||||||
				// 3. generate password for each user
 | 
					 | 
				
			||||||
				if (list.items.length) {
 | 
					 | 
				
			||||||
					return new Promise((resolve, reject) => {
 | 
					 | 
				
			||||||
						batchflow(list.items).sequential()
 | 
					 | 
				
			||||||
							.each((i, item, next) => {
 | 
					 | 
				
			||||||
								if (typeof item.password !== 'undefined' && item.password.length) {
 | 
					 | 
				
			||||||
									logger.info('Adding: ' + item.username);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
									utils.execFile('/usr/bin/htpasswd', ['-b', htpasswd_file, item.username, item.password])
 | 
							// 3. generate password for each user
 | 
				
			||||||
										.then((/*result*/) => {
 | 
							if (list.items.length) {
 | 
				
			||||||
											next();
 | 
								await new Promise((resolve, reject) => {
 | 
				
			||||||
										})
 | 
									batchflow(list.items).sequential()
 | 
				
			||||||
										.catch((err) => {
 | 
										.each((_i, item, next) => {
 | 
				
			||||||
											logger.error(err);
 | 
											if (item.password?.length) {
 | 
				
			||||||
											next(err);
 | 
												logger.info(`Adding: ${item.username}`);
 | 
				
			||||||
										});
 | 
					
 | 
				
			||||||
								}
 | 
												utils.execFile('openssl', ['passwd', '-apr1', item.password])
 | 
				
			||||||
							})
 | 
													.then((res) => {
 | 
				
			||||||
							.error((err) => {
 | 
														try {
 | 
				
			||||||
								logger.error(err);
 | 
															fs.appendFileSync(htpasswdFile, `${item.username}:${res}\n`, {encoding: 'utf8'});
 | 
				
			||||||
								reject(err);
 | 
														} catch (err) {
 | 
				
			||||||
							})
 | 
															reject(err);
 | 
				
			||||||
							.end((results) => {
 | 
														}
 | 
				
			||||||
								logger.success('Built Access file #' + list.id + ' for: ' + list.name);
 | 
														next();
 | 
				
			||||||
								resolve(results);
 | 
													})
 | 
				
			||||||
							});
 | 
													.catch((err) => {
 | 
				
			||||||
 | 
														logger.error(err);
 | 
				
			||||||
 | 
														next(err);
 | 
				
			||||||
 | 
													});
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
 | 
										.error((err) => {
 | 
				
			||||||
 | 
											logger.error(err);
 | 
				
			||||||
 | 
											reject(err);
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
 | 
										.end((results) => {
 | 
				
			||||||
 | 
											logger.success(`Built Access file #${list.id} for: ${list.name}`);
 | 
				
			||||||
 | 
											resolve(results);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
};
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalAccessList;
 | 
					export default internalAccessList;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const error         = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const auditLogModel = require('../models/audit-log');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
 | 
					import auditLogModel from "../models/audit-log.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalAuditLog = {
 | 
					const internalAuditLog = {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -8,32 +9,60 @@ const internalAuditLog = {
 | 
				
			|||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Array}   [expand]
 | 
						 * @param   {Array}   [expand]
 | 
				
			||||||
	 * @param   {String}  [search_query]
 | 
						 * @param   {String}  [searchQuery]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: async (access, expand, searchQuery) => {
 | 
				
			||||||
		return access.can('auditlog:list')
 | 
							await access.can("auditlog:list");
 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				let query = auditLogModel
 | 
					 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.orderBy('created_on', 'DESC')
 | 
					 | 
				
			||||||
					.orderBy('id', 'DESC')
 | 
					 | 
				
			||||||
					.limit(100)
 | 
					 | 
				
			||||||
					.allowGraph('[user]');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
							const query = auditLogModel
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
								.query()
 | 
				
			||||||
					query.where(function () {
 | 
								.orderBy("created_on", "DESC")
 | 
				
			||||||
						this.where('meta', 'like', '%' + search_query + '%');
 | 
								.orderBy("id", "DESC")
 | 
				
			||||||
					});
 | 
								.limit(100)
 | 
				
			||||||
				}
 | 
								.allowGraph("[user]");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
							// Query is used for searching
 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
							if (typeof searchQuery === "string" && searchQuery.length > 0) {
 | 
				
			||||||
				}
 | 
								query.where(function () {
 | 
				
			||||||
 | 
									this.where(castJsonIfNeed("meta"), "like", `%${searchQuery}`);
 | 
				
			||||||
				return query;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return await query;
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * @param  {Access}   access
 | 
				
			||||||
 | 
						 * @param  {Object}   [data]
 | 
				
			||||||
 | 
						 * @param  {Integer}  [data.id]          Defaults to the token user
 | 
				
			||||||
 | 
						 * @param  {Array}    [data.expand]
 | 
				
			||||||
 | 
						 * @return {Promise}
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						get: async (access, data) => {
 | 
				
			||||||
 | 
							await access.can("auditlog:list");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const query = auditLogModel
 | 
				
			||||||
 | 
								.query()
 | 
				
			||||||
 | 
								.andWhere("id", data.id)
 | 
				
			||||||
 | 
								.allowGraph("[user]")
 | 
				
			||||||
 | 
								.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof data.expand !== "undefined" && data.expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${data.expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const row = await query;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!row?.id) {
 | 
				
			||||||
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return row;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -50,29 +79,24 @@ const internalAuditLog = {
 | 
				
			|||||||
	 * @param   {Object}   [data.meta]
 | 
						 * @param   {Object}   [data.meta]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	add: (access, data) => {
 | 
						add: async (access, data) => {
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							if (typeof data.user_id === "undefined" || !data.user_id) {
 | 
				
			||||||
			// Default the user id
 | 
								data.user_id = access.token.getUserId(1);
 | 
				
			||||||
			if (typeof data.user_id === 'undefined' || !data.user_id) {
 | 
							}
 | 
				
			||||||
				data.user_id = access.token.getUserId(1);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (typeof data.action === 'undefined' || !data.action) {
 | 
							if (typeof data.action === "undefined" || !data.action) {
 | 
				
			||||||
				reject(new error.InternalValidationError('Audit log entry must contain an Action'));
 | 
								throw new errs.InternalValidationError("Audit log entry must contain an Action");
 | 
				
			||||||
			} else {
 | 
							}
 | 
				
			||||||
				// Make sure at least 1 of the IDs are set and action
 | 
					
 | 
				
			||||||
				resolve(auditLogModel
 | 
							// Make sure at least 1 of the IDs are set and action
 | 
				
			||||||
					.query()
 | 
							return await auditLogModel.query().insert({
 | 
				
			||||||
					.insert({
 | 
								user_id: data.user_id,
 | 
				
			||||||
						user_id:     data.user_id,
 | 
								action: data.action,
 | 
				
			||||||
						action:      data.action,
 | 
								object_type: data.object_type || "",
 | 
				
			||||||
						object_type: data.object_type || '',
 | 
								object_id: data.object_id || 0,
 | 
				
			||||||
						object_id:   data.object_id || 0,
 | 
								meta: data.meta || {},
 | 
				
			||||||
						meta:        data.meta || {}
 | 
					 | 
				
			||||||
					}));
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalAuditLog;
 | 
					export default internalAuditLog;
 | 
				
			||||||
 
 | 
				
			|||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -1,103 +1,96 @@
 | 
				
			|||||||
const _                   = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const error               = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const utils               = require('../lib/utils');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
const deadHostModel       = require('../models/dead_host');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const internalHost        = require('./host');
 | 
					import deadHostModel from "../models/dead_host.js";
 | 
				
			||||||
const internalNginx       = require('./nginx');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
const internalAuditLog    = require('./audit-log');
 | 
					import internalCertificate from "./certificate.js";
 | 
				
			||||||
const internalCertificate = require('./certificate');
 | 
					import internalHost from "./host.js";
 | 
				
			||||||
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalDeadHost = {
 | 
					const internalDeadHost = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: async (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							const createCertificate = data.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (create_certificate) {
 | 
							if (createCertificate) {
 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete data.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('dead_hosts:create', data)
 | 
							await access.can("dead_hosts:create", data);
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
					 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
					 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data.domain_names.map(function (domain_name) {
 | 
							// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
					domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name));
 | 
							const domainNameCheckPromises = [];
 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return Promise.all(domain_name_check_promises)
 | 
							data.domain_names.map((domain_name) => {
 | 
				
			||||||
					.then((check_results) => {
 | 
								domainNameCheckPromises.push(internalHost.isHostnameTaken(domain_name));
 | 
				
			||||||
						check_results.map(function (result) {
 | 
								return true;
 | 
				
			||||||
							if (result.is_taken) {
 | 
							});
 | 
				
			||||||
								throw new error.ValidationError(result.hostname + ' is already in use');
 | 
					 | 
				
			||||||
							}
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				// At this point the domains should have been checked
 | 
					 | 
				
			||||||
				data.owner_user_id = access.token.getUserId(1);
 | 
					 | 
				
			||||||
				data               = internalHost.cleanSslHstsData(data);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return deadHostModel
 | 
							await Promise.all(domainNameCheckPromises).then((check_results) => {
 | 
				
			||||||
					.query()
 | 
								check_results.map((result) => {
 | 
				
			||||||
					.insertAndFetch(data)
 | 
									if (result.is_taken) {
 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
										throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				if (create_certificate) {
 | 
					 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, data)
 | 
					 | 
				
			||||||
						.then((cert) => {
 | 
					 | 
				
			||||||
							// update host with cert id
 | 
					 | 
				
			||||||
							return internalDeadHost.update(access, {
 | 
					 | 
				
			||||||
								id:             row.id,
 | 
					 | 
				
			||||||
								certificate_id: cert.id
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
						})
 | 
					 | 
				
			||||||
						.then(() => {
 | 
					 | 
				
			||||||
							return row;
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			})
 | 
									return true;
 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				// re-fetch with cert
 | 
					 | 
				
			||||||
				return internalDeadHost.get(access, {
 | 
					 | 
				
			||||||
					id:     row.id,
 | 
					 | 
				
			||||||
					expand: ['certificate', 'owner']
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				// Configure nginx
 | 
					 | 
				
			||||||
				return internalNginx.configure(deadHostModel, 'dead_host', row)
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						return row;
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				data.meta = _.assign({}, data.meta || {}, row.meta);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				// Add to audit log
 | 
					 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
					action:      'created',
 | 
					 | 
				
			||||||
					object_type: 'dead-host',
 | 
					 | 
				
			||||||
					object_id:   row.id,
 | 
					 | 
				
			||||||
					meta:        data
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						return row;
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// At this point the domains should have been checked
 | 
				
			||||||
 | 
							data.owner_user_id = access.token.getUserId(1);
 | 
				
			||||||
 | 
							const thisData = internalHost.cleanSslHstsData(data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Fix for db field not having a default value
 | 
				
			||||||
 | 
							// for this optional field.
 | 
				
			||||||
 | 
							if (typeof data.advanced_config === "undefined") {
 | 
				
			||||||
 | 
								thisData.advanced_config = "";
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const row = await deadHostModel.query()
 | 
				
			||||||
 | 
								.insertAndFetch(thisData)
 | 
				
			||||||
 | 
								.then(utils.omitRow(omissions()));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "created",
 | 
				
			||||||
 | 
								object_type: "dead-host",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: thisData,
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (createCertificate) {
 | 
				
			||||||
 | 
								const cert = await internalCertificate.createQuickCertificate(access, data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// update host with cert id
 | 
				
			||||||
 | 
								await internalDeadHost.update(access, {
 | 
				
			||||||
 | 
									id: row.id,
 | 
				
			||||||
 | 
									certificate_id: cert.id,
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// re-fetch with cert
 | 
				
			||||||
 | 
							const freshRow = await internalDeadHost.get(access, {
 | 
				
			||||||
 | 
								id: row.id,
 | 
				
			||||||
 | 
								expand: ["certificate", "owner"],
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Sanity check
 | 
				
			||||||
 | 
							if (createCertificate && !freshRow.certificate_id) {
 | 
				
			||||||
 | 
								throw new errs.InternalValidationError("The host was created but the Certificate creation failed.");
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Configure nginx
 | 
				
			||||||
 | 
							await internalNginx.configure(deadHostModel, "dead_host", freshRow);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return freshRow;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -106,98 +99,85 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param  {Number}  data.id
 | 
						 * @param  {Number}  data.id
 | 
				
			||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: async (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							const createCertificate = data.certificate_id === "new";
 | 
				
			||||||
 | 
							if (createCertificate) {
 | 
				
			||||||
		if (create_certificate) {
 | 
					 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete data.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('dead_hosts:update', data.id)
 | 
							await access.can("dead_hosts:update", data.id);
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
					 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
					 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.domain_names !== 'undefined') {
 | 
							// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
					data.domain_names.map(function (domain_name) {
 | 
							const domainNameCheckPromises = [];
 | 
				
			||||||
						domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name, 'dead', data.id));
 | 
							if (typeof data.domain_names !== "undefined") {
 | 
				
			||||||
					});
 | 
								data.domain_names.map((domainName) => {
 | 
				
			||||||
 | 
									domainNameCheckPromises.push(internalHost.isHostnameTaken(domainName, "dead", data.id));
 | 
				
			||||||
					return Promise.all(domain_name_check_promises)
 | 
									return true;
 | 
				
			||||||
						.then((check_results) => {
 | 
					 | 
				
			||||||
							check_results.map(function (result) {
 | 
					 | 
				
			||||||
								if (result.is_taken) {
 | 
					 | 
				
			||||||
									throw new error.ValidationError(result.hostname + ' is already in use');
 | 
					 | 
				
			||||||
								}
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return internalDeadHost.get(access, {id: data.id});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				if (row.id !== data.id) {
 | 
					 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
					 | 
				
			||||||
					throw new error.InternalValidationError('404 Host could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if (create_certificate) {
 | 
					 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, {
 | 
					 | 
				
			||||||
						domain_names: data.domain_names || row.domain_names,
 | 
					 | 
				
			||||||
						meta:         _.assign({}, row.meta, data.meta)
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
						.then((cert) => {
 | 
					 | 
				
			||||||
							// update host with cert id
 | 
					 | 
				
			||||||
							data.certificate_id = cert.id;
 | 
					 | 
				
			||||||
						})
 | 
					 | 
				
			||||||
						.then(() => {
 | 
					 | 
				
			||||||
							return row;
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
					 | 
				
			||||||
				data = _.assign({}, {
 | 
					 | 
				
			||||||
					domain_names: row.domain_names
 | 
					 | 
				
			||||||
				}, data);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				data = internalHost.cleanSslHstsData(data, row);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return deadHostModel
 | 
					 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.where({id: data.id})
 | 
					 | 
				
			||||||
					.patch(data)
 | 
					 | 
				
			||||||
					.then((saved_row) => {
 | 
					 | 
				
			||||||
						// Add to audit log
 | 
					 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
							action:      'updated',
 | 
					 | 
				
			||||||
							object_type: 'dead-host',
 | 
					 | 
				
			||||||
							object_id:   row.id,
 | 
					 | 
				
			||||||
							meta:        data
 | 
					 | 
				
			||||||
						})
 | 
					 | 
				
			||||||
							.then(() => {
 | 
					 | 
				
			||||||
								return _.omit(saved_row, omissions());
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return internalDeadHost.get(access, {
 | 
					 | 
				
			||||||
					id:     data.id,
 | 
					 | 
				
			||||||
					expand: ['owner', 'certificate']
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
					.then((row) => {
 | 
					 | 
				
			||||||
						// Configure nginx
 | 
					 | 
				
			||||||
						return internalNginx.configure(deadHostModel, 'dead_host', row)
 | 
					 | 
				
			||||||
							.then((new_meta) => {
 | 
					 | 
				
			||||||
								row.meta = new_meta;
 | 
					 | 
				
			||||||
								row      = internalHost.cleanRowCertificateMeta(row);
 | 
					 | 
				
			||||||
								return _.omit(row, omissions());
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								const checkResults = await Promise.all(domainNameCheckPromises);
 | 
				
			||||||
 | 
								checkResults.map((result) => {
 | 
				
			||||||
 | 
									if (result.is_taken) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							const row = await internalDeadHost.get(access, { id: data.id });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (row.id !== data.id) {
 | 
				
			||||||
 | 
								// Sanity check that something crazy hasn't happened
 | 
				
			||||||
 | 
								throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
									`404 Host could not be updated, IDs do not match: ${row.id} !== ${data.id}`,
 | 
				
			||||||
 | 
								);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (createCertificate) {
 | 
				
			||||||
 | 
								const cert = await internalCertificate.createQuickCertificate(access, {
 | 
				
			||||||
 | 
									domain_names: data.domain_names || row.domain_names,
 | 
				
			||||||
 | 
									meta: _.assign({}, row.meta, data.meta),
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// update host with cert id
 | 
				
			||||||
 | 
								data.certificate_id = cert.id;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
				
			||||||
 | 
							let thisData = _.assign(
 | 
				
			||||||
 | 
								{},
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
									domain_names: row.domain_names,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								data,
 | 
				
			||||||
 | 
							);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							thisData = internalHost.cleanSslHstsData(thisData, row);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// do the row update
 | 
				
			||||||
 | 
							await deadHostModel
 | 
				
			||||||
 | 
								.query()
 | 
				
			||||||
 | 
								.where({id: data.id})
 | 
				
			||||||
 | 
								.patch(data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "updated",
 | 
				
			||||||
 | 
								object_type: "dead-host",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: thisData,
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const thisRow = await internalDeadHost
 | 
				
			||||||
 | 
								.get(access, {
 | 
				
			||||||
 | 
									id: thisData.id,
 | 
				
			||||||
 | 
									expand: ["owner", "certificate"],
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Configure nginx
 | 
				
			||||||
 | 
							const newMeta = await internalNginx.configure(deadHostModel, "dead_host", row);
 | 
				
			||||||
 | 
							row.meta = newMeta;
 | 
				
			||||||
 | 
							return _.omit(internalHost.cleanRowCertificateMeta(thisRow), omissions());
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -208,40 +188,32 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param  {Array}    [data.omit]
 | 
						 * @param  {Array}    [data.omit]
 | 
				
			||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: async (access, data) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const accessData = await access.can("dead_hosts:get", data.id);
 | 
				
			||||||
			data = {};
 | 
							const query = deadHostModel
 | 
				
			||||||
 | 
								.query()
 | 
				
			||||||
 | 
								.where("is_deleted", 0)
 | 
				
			||||||
 | 
								.andWhere("id", data.id)
 | 
				
			||||||
 | 
								.allowGraph("[owner,certificate]")
 | 
				
			||||||
 | 
								.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (accessData.permission_visibility !== "all") {
 | 
				
			||||||
 | 
								query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('dead_hosts:get', data.id)
 | 
							if (typeof data.expand !== "undefined" && data.expand !== null) {
 | 
				
			||||||
			.then((access_data) => {
 | 
								query.withGraphFetched(`[${data.expand.join(", ")}]`);
 | 
				
			||||||
				let query = deadHostModel
 | 
							}
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.where('is_deleted', 0)
 | 
					 | 
				
			||||||
					.andWhere('id', data.id)
 | 
					 | 
				
			||||||
					.allowGraph('[owner,certificate]')
 | 
					 | 
				
			||||||
					.first();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
							const row = await query.then(utils.omitRow(omissions()));
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
							if (!row || !row.id) {
 | 
				
			||||||
				}
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
							// Custom omissions
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
							if (typeof data.omit !== "undefined" && data.omit !== null) {
 | 
				
			||||||
				}
 | 
								return _.omit(row, data.omit);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
							return row;
 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				if (!row) {
 | 
					 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
				// Custom omissions
 | 
					 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
					 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
				return row;
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -251,42 +223,32 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param {String}  [data.reason]
 | 
						 * @param {String}  [data.reason]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: async (access, data) => {
 | 
				
			||||||
		return access.can('dead_hosts:delete', data.id)
 | 
							await access.can("dead_hosts:delete", data.id)
 | 
				
			||||||
			.then(() => {
 | 
							const row = await internalDeadHost.get(access, { id: data.id });
 | 
				
			||||||
				return internalDeadHost.get(access, {id: data.id});
 | 
							if (!row || !row.id) {
 | 
				
			||||||
			})
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
			.then((row) => {
 | 
							}
 | 
				
			||||||
				if (!row) {
 | 
					 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return deadHostModel
 | 
							await deadHostModel
 | 
				
			||||||
					.query()
 | 
								.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
								.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
								.patch({
 | 
				
			||||||
						is_deleted: 1
 | 
									is_deleted: 1,
 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Delete Nginx Config
 | 
					 | 
				
			||||||
						return internalNginx.deleteConfig('dead_host', row)
 | 
					 | 
				
			||||||
							.then(() => {
 | 
					 | 
				
			||||||
								return internalNginx.reload();
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Add to audit log
 | 
					 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
							action:      'deleted',
 | 
					 | 
				
			||||||
							object_type: 'dead-host',
 | 
					 | 
				
			||||||
							object_id:   row.id,
 | 
					 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return true;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Delete Nginx Config
 | 
				
			||||||
 | 
							await internalNginx.deleteConfig("dead_host", row);
 | 
				
			||||||
 | 
							await internalNginx.reload();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "deleted",
 | 
				
			||||||
 | 
								object_type: "dead-host",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: _.omit(row, omissions()),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
							return true;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -296,46 +258,39 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param {String}  [data.reason]
 | 
						 * @param {String}  [data.reason]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	enable: (access, data) => {
 | 
						enable: async (access, data) => {
 | 
				
			||||||
		return access.can('dead_hosts:update', data.id)
 | 
							await access.can("dead_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
							const row = await internalDeadHost.get(access, {
 | 
				
			||||||
				return internalDeadHost.get(access, {
 | 
								id: data.id,
 | 
				
			||||||
					id:     data.id,
 | 
								expand: ["certificate", "owner"],
 | 
				
			||||||
					expand: ['certificate', 'owner']
 | 
							});
 | 
				
			||||||
				});
 | 
							if (!row || !row.id) {
 | 
				
			||||||
			})
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
			.then((row) => {
 | 
							}
 | 
				
			||||||
				if (!row) {
 | 
							if (row.enabled) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
								throw new errs.ValidationError("Host is already enabled");
 | 
				
			||||||
				} else if (row.enabled) {
 | 
							}
 | 
				
			||||||
					throw new error.ValidationError('Host is already enabled');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 1;
 | 
							row.enabled = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return deadHostModel
 | 
							await deadHostModel
 | 
				
			||||||
					.query()
 | 
								.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
								.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
								.patch({
 | 
				
			||||||
						enabled: 1
 | 
									enabled: 1,
 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Configure nginx
 | 
					 | 
				
			||||||
						return internalNginx.configure(deadHostModel, 'dead_host', row);
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Add to audit log
 | 
					 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
							action:      'enabled',
 | 
					 | 
				
			||||||
							object_type: 'dead-host',
 | 
					 | 
				
			||||||
							object_id:   row.id,
 | 
					 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return true;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Configure nginx
 | 
				
			||||||
 | 
							await internalNginx.configure(deadHostModel, "dead_host", row);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "enabled",
 | 
				
			||||||
 | 
								object_type: "dead-host",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: _.omit(row, omissions()),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
							return true;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -345,46 +300,37 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param {String}  [data.reason]
 | 
						 * @param {String}  [data.reason]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	disable: (access, data) => {
 | 
						disable: async (access, data) => {
 | 
				
			||||||
		return access.can('dead_hosts:update', data.id)
 | 
							await access.can("dead_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
							const row = await internalDeadHost.get(access, { id: data.id });
 | 
				
			||||||
				return internalDeadHost.get(access, {id: data.id});
 | 
							if (!row || !row.id) {
 | 
				
			||||||
			})
 | 
								throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
			.then((row) => {
 | 
							}
 | 
				
			||||||
				if (!row) {
 | 
							if (!row.enabled) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
								throw new errs.ValidationError("Host is already disabled");
 | 
				
			||||||
				} else if (!row.enabled) {
 | 
							}
 | 
				
			||||||
					throw new error.ValidationError('Host is already disabled');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 0;
 | 
							row.enabled = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return deadHostModel
 | 
							await deadHostModel
 | 
				
			||||||
					.query()
 | 
								.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
								.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
								.patch({
 | 
				
			||||||
						enabled: 0
 | 
									enabled: 0,
 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Delete Nginx Config
 | 
					 | 
				
			||||||
						return internalNginx.deleteConfig('dead_host', row)
 | 
					 | 
				
			||||||
							.then(() => {
 | 
					 | 
				
			||||||
								return internalNginx.reload();
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Add to audit log
 | 
					 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
							action:      'disabled',
 | 
					 | 
				
			||||||
							object_type: 'dead-host',
 | 
					 | 
				
			||||||
							object_id:   row.id,
 | 
					 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then(() => {
 | 
					 | 
				
			||||||
				return true;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Delete Nginx Config
 | 
				
			||||||
 | 
							await internalNginx.deleteConfig("dead_host", row);
 | 
				
			||||||
 | 
							await internalNginx.reload();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Add to audit log
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "disabled",
 | 
				
			||||||
 | 
								object_type: "dead-host",
 | 
				
			||||||
 | 
								object_id: row.id,
 | 
				
			||||||
 | 
								meta: _.omit(row, omissions()),
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
							return true;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -392,43 +338,38 @@ const internalDeadHost = {
 | 
				
			|||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Array}   [expand]
 | 
						 * @param   {Array}   [expand]
 | 
				
			||||||
	 * @param   {String}  [search_query]
 | 
						 * @param   {String}  [searchQuery]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: async (access, expand, searchQuery) => {
 | 
				
			||||||
		return access.can('dead_hosts:list')
 | 
							const accessData = await access.can("dead_hosts:list")
 | 
				
			||||||
			.then((access_data) => {
 | 
							const query = deadHostModel
 | 
				
			||||||
				let query = deadHostModel
 | 
								.query()
 | 
				
			||||||
					.query()
 | 
								.where("is_deleted", 0)
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
								.groupBy("id")
 | 
				
			||||||
					.groupBy('id')
 | 
								.allowGraph("[owner,certificate]")
 | 
				
			||||||
					.allowGraph('[owner,certificate]')
 | 
								.orderBy(castJsonIfNeed("domain_names"), "ASC");
 | 
				
			||||||
					.orderBy('domain_names', 'ASC');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
							if (accessData.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
								query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
							// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
							if (typeof searchQuery === "string" && searchQuery.length > 0) {
 | 
				
			||||||
					query.where(function () {
 | 
								query.where(function () {
 | 
				
			||||||
						this.where('domain_names', 'like', '%' + search_query + '%');
 | 
									this.where(castJsonIfNeed("domain_names"), "like", `%${searchQuery}%`);
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
					 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
 | 
					 | 
				
			||||||
					return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return rows;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const rows = await query.then(utils.omitRows(omissions()));
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null && expand.indexOf("certificate") !== -1) {
 | 
				
			||||||
 | 
								internalHost.cleanAllRowsCertificateMeta(rows);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return rows;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -438,21 +379,16 @@ const internalDeadHost = {
 | 
				
			|||||||
	 * @param   {String}  visibility
 | 
						 * @param   {String}  visibility
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (user_id, visibility) => {
 | 
						getCount: async (user_id, visibility) => {
 | 
				
			||||||
		let query = deadHostModel
 | 
							const query = deadHostModel.query().count("id as count").where("is_deleted", 0);
 | 
				
			||||||
			.query()
 | 
					 | 
				
			||||||
			.count('id as count')
 | 
					 | 
				
			||||||
			.where('is_deleted', 0);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (visibility !== 'all') {
 | 
							if (visibility !== "all") {
 | 
				
			||||||
			query.andWhere('owner_user_id', user_id);
 | 
								query.andWhere("owner_user_id", user_id);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query.first()
 | 
							const row = await query.first();
 | 
				
			||||||
			.then((row) => {
 | 
							return Number.parseInt(row.count, 10);
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
						},
 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalDeadHost;
 | 
					export default internalDeadHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,10 +1,10 @@
 | 
				
			|||||||
const _                    = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const proxyHostModel       = require('../models/proxy_host');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
const redirectionHostModel = require('../models/redirection_host');
 | 
					import deadHostModel from "../models/dead_host.js";
 | 
				
			||||||
const deadHostModel        = require('../models/dead_host');
 | 
					import proxyHostModel from "../models/proxy_host.js";
 | 
				
			||||||
 | 
					import redirectionHostModel from "../models/redirection_host.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalHost = {
 | 
					const internalHost = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Makes sure that the ssl_* and hsts_* fields play nicely together.
 | 
						 * Makes sure that the ssl_* and hsts_* fields play nicely together.
 | 
				
			||||||
	 * ie: if there is no cert, then force_ssl is off.
 | 
						 * ie: if there is no cert, then force_ssl is off.
 | 
				
			||||||
@@ -14,25 +14,23 @@ const internalHost = {
 | 
				
			|||||||
	 * @param   {object} [existing_data]
 | 
						 * @param   {object} [existing_data]
 | 
				
			||||||
	 * @returns {object}
 | 
						 * @returns {object}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	cleanSslHstsData: function (data, existing_data) {
 | 
						cleanSslHstsData: (data, existingData) => {
 | 
				
			||||||
		existing_data = existing_data === undefined ? {} : existing_data;
 | 
							const combinedData = _.assign({}, existingData || {}, data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		let combined_data = _.assign({}, existing_data, data);
 | 
							if (!combinedData.certificate_id) {
 | 
				
			||||||
 | 
								combinedData.ssl_forced = false;
 | 
				
			||||||
		if (!combined_data.certificate_id) {
 | 
								combinedData.http2_support = false;
 | 
				
			||||||
			combined_data.ssl_forced    = false;
 | 
					 | 
				
			||||||
			combined_data.http2_support = false;
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!combined_data.ssl_forced) {
 | 
							if (!combinedData.ssl_forced) {
 | 
				
			||||||
			combined_data.hsts_enabled = false;
 | 
								combinedData.hsts_enabled = false;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!combined_data.hsts_enabled) {
 | 
							if (!combinedData.hsts_enabled) {
 | 
				
			||||||
			combined_data.hsts_subdomains = false;
 | 
								combinedData.hsts_subdomains = false;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return combined_data;
 | 
							return combinedData;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -41,11 +39,12 @@ const internalHost = {
 | 
				
			|||||||
	 * @param   {Array}  rows
 | 
						 * @param   {Array}  rows
 | 
				
			||||||
	 * @returns {Array}
 | 
						 * @returns {Array}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	cleanAllRowsCertificateMeta: function (rows) {
 | 
						cleanAllRowsCertificateMeta: (rows) => {
 | 
				
			||||||
		rows.map(function (row, idx) {
 | 
							rows.map((_, idx) => {
 | 
				
			||||||
			if (typeof rows[idx].certificate !== 'undefined' && rows[idx].certificate) {
 | 
								if (typeof rows[idx].certificate !== "undefined" && rows[idx].certificate) {
 | 
				
			||||||
				rows[idx].certificate.meta = {};
 | 
									rows[idx].certificate.meta = {};
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
								return true;
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return rows;
 | 
							return rows;
 | 
				
			||||||
@@ -57,8 +56,8 @@ const internalHost = {
 | 
				
			|||||||
	 * @param   {Object}  row
 | 
						 * @param   {Object}  row
 | 
				
			||||||
	 * @returns {Object}
 | 
						 * @returns {Object}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	cleanRowCertificateMeta: function (row) {
 | 
						cleanRowCertificateMeta: (row) => {
 | 
				
			||||||
		if (typeof row.certificate !== 'undefined' && row.certificate) {
 | 
							if (typeof row.certificate !== "undefined" && row.certificate) {
 | 
				
			||||||
			row.certificate.meta = {};
 | 
								row.certificate.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -66,54 +65,33 @@ const internalHost = {
 | 
				
			|||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * This returns all the host types with any domain listed in the provided domain_names array.
 | 
						 * This returns all the host types with any domain listed in the provided domainNames array.
 | 
				
			||||||
	 * This is used by the certificates to temporarily disable any host that is using the domain
 | 
						 * This is used by the certificates to temporarily disable any host that is using the domain
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Array}  domain_names
 | 
						 * @param   {Array}  domainNames
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getHostsWithDomains: function (domain_names) {
 | 
						getHostsWithDomains: async (domainNames) => {
 | 
				
			||||||
		let promises = [
 | 
							const responseObject = {
 | 
				
			||||||
			proxyHostModel
 | 
								total_count: 0,
 | 
				
			||||||
				.query()
 | 
								dead_hosts: [],
 | 
				
			||||||
				.where('is_deleted', 0),
 | 
								proxy_hosts: [],
 | 
				
			||||||
			redirectionHostModel
 | 
								redirection_hosts: [],
 | 
				
			||||||
				.query()
 | 
							};
 | 
				
			||||||
				.where('is_deleted', 0),
 | 
					 | 
				
			||||||
			deadHostModel
 | 
					 | 
				
			||||||
				.query()
 | 
					 | 
				
			||||||
				.where('is_deleted', 0)
 | 
					 | 
				
			||||||
		];
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return Promise.all(promises)
 | 
							const proxyRes = await proxyHostModel.query().where("is_deleted", 0);
 | 
				
			||||||
			.then((promises_results) => {
 | 
							responseObject.proxy_hosts = internalHost._getHostsWithDomains(proxyRes, domainNames);
 | 
				
			||||||
				let response_object = {
 | 
							responseObject.total_count += responseObject.proxy_hosts.length;
 | 
				
			||||||
					total_count:       0,
 | 
					 | 
				
			||||||
					dead_hosts:        [],
 | 
					 | 
				
			||||||
					proxy_hosts:       [],
 | 
					 | 
				
			||||||
					redirection_hosts: []
 | 
					 | 
				
			||||||
				};
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[0]) {
 | 
							const redirRes = await redirectionHostModel.query().where("is_deleted", 0);
 | 
				
			||||||
					// Proxy Hosts
 | 
							responseObject.redirection_hosts = internalHost._getHostsWithDomains(redirRes, domainNames);
 | 
				
			||||||
					response_object.proxy_hosts  = internalHost._getHostsWithDomains(promises_results[0], domain_names);
 | 
							responseObject.total_count += responseObject.redirection_hosts.length;
 | 
				
			||||||
					response_object.total_count += response_object.proxy_hosts.length;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[1]) {
 | 
							const deadRes = await deadHostModel.query().where("is_deleted", 0);
 | 
				
			||||||
					// Redirection Hosts
 | 
							responseObject.dead_hosts = internalHost._getHostsWithDomains(deadRes, domainNames);
 | 
				
			||||||
					response_object.redirection_hosts = internalHost._getHostsWithDomains(promises_results[1], domain_names);
 | 
							responseObject.total_count += responseObject.dead_hosts.length;
 | 
				
			||||||
					response_object.total_count      += response_object.redirection_hosts.length;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[2]) {
 | 
							return responseObject;
 | 
				
			||||||
					// Dead Hosts
 | 
					 | 
				
			||||||
					response_object.dead_hosts   = internalHost._getHostsWithDomains(promises_results[2], domain_names);
 | 
					 | 
				
			||||||
					response_object.total_count += response_object.dead_hosts.length;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return response_object;
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -124,112 +102,133 @@ const internalHost = {
 | 
				
			|||||||
	 * @param   {Integer}  [ignore_id]     Must be supplied if type was also supplied
 | 
						 * @param   {Integer}  [ignore_id]     Must be supplied if type was also supplied
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	isHostnameTaken: function (hostname, ignore_type, ignore_id) {
 | 
						isHostnameTaken: (hostname, ignore_type, ignore_id) => {
 | 
				
			||||||
		let promises = [
 | 
							const promises = [
 | 
				
			||||||
			proxyHostModel
 | 
								proxyHostModel
 | 
				
			||||||
				.query()
 | 
									.query()
 | 
				
			||||||
				.where('is_deleted', 0)
 | 
									.where("is_deleted", 0)
 | 
				
			||||||
				.andWhere('domain_names', 'like', '%' + hostname + '%'),
 | 
									.andWhere(castJsonIfNeed("domain_names"), "like", `%${hostname}%`),
 | 
				
			||||||
			redirectionHostModel
 | 
								redirectionHostModel
 | 
				
			||||||
				.query()
 | 
									.query()
 | 
				
			||||||
				.where('is_deleted', 0)
 | 
									.where("is_deleted", 0)
 | 
				
			||||||
				.andWhere('domain_names', 'like', '%' + hostname + '%'),
 | 
									.andWhere(castJsonIfNeed("domain_names"), "like", `%${hostname}%`),
 | 
				
			||||||
			deadHostModel
 | 
								deadHostModel
 | 
				
			||||||
				.query()
 | 
									.query()
 | 
				
			||||||
				.where('is_deleted', 0)
 | 
									.where("is_deleted", 0)
 | 
				
			||||||
				.andWhere('domain_names', 'like', '%' + hostname + '%')
 | 
									.andWhere(castJsonIfNeed("domain_names"), "like", `%${hostname}%`),
 | 
				
			||||||
		];
 | 
							];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return Promise.all(promises)
 | 
							return Promise.all(promises).then((promises_results) => {
 | 
				
			||||||
			.then((promises_results) => {
 | 
								let is_taken = false;
 | 
				
			||||||
				let is_taken = false;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[0]) {
 | 
								if (promises_results[0]) {
 | 
				
			||||||
					// Proxy Hosts
 | 
									// Proxy Hosts
 | 
				
			||||||
					if (internalHost._checkHostnameRecordsTaken(hostname, promises_results[0], ignore_type === 'proxy' && ignore_id ? ignore_id : 0)) {
 | 
									if (
 | 
				
			||||||
						is_taken = true;
 | 
										internalHost._checkHostnameRecordsTaken(
 | 
				
			||||||
					}
 | 
											hostname,
 | 
				
			||||||
 | 
											promises_results[0],
 | 
				
			||||||
 | 
											ignore_type === "proxy" && ignore_id ? ignore_id : 0,
 | 
				
			||||||
 | 
										)
 | 
				
			||||||
 | 
									) {
 | 
				
			||||||
 | 
										is_taken = true;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[1]) {
 | 
								if (promises_results[1]) {
 | 
				
			||||||
					// Redirection Hosts
 | 
									// Redirection Hosts
 | 
				
			||||||
					if (internalHost._checkHostnameRecordsTaken(hostname, promises_results[1], ignore_type === 'redirection' && ignore_id ? ignore_id : 0)) {
 | 
									if (
 | 
				
			||||||
						is_taken = true;
 | 
										internalHost._checkHostnameRecordsTaken(
 | 
				
			||||||
					}
 | 
											hostname,
 | 
				
			||||||
 | 
											promises_results[1],
 | 
				
			||||||
 | 
											ignore_type === "redirection" && ignore_id ? ignore_id : 0,
 | 
				
			||||||
 | 
										)
 | 
				
			||||||
 | 
									) {
 | 
				
			||||||
 | 
										is_taken = true;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (promises_results[2]) {
 | 
								if (promises_results[2]) {
 | 
				
			||||||
					// Dead Hosts
 | 
									// Dead Hosts
 | 
				
			||||||
					if (internalHost._checkHostnameRecordsTaken(hostname, promises_results[2], ignore_type === 'dead' && ignore_id ? ignore_id : 0)) {
 | 
									if (
 | 
				
			||||||
						is_taken = true;
 | 
										internalHost._checkHostnameRecordsTaken(
 | 
				
			||||||
					}
 | 
											hostname,
 | 
				
			||||||
 | 
											promises_results[2],
 | 
				
			||||||
 | 
											ignore_type === "dead" && ignore_id ? ignore_id : 0,
 | 
				
			||||||
 | 
										)
 | 
				
			||||||
 | 
									) {
 | 
				
			||||||
 | 
										is_taken = true;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return {
 | 
								return {
 | 
				
			||||||
					hostname: hostname,
 | 
									hostname: hostname,
 | 
				
			||||||
					is_taken: is_taken
 | 
									is_taken: is_taken,
 | 
				
			||||||
				};
 | 
								};
 | 
				
			||||||
			});
 | 
							});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Private call only
 | 
						 * Private call only
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {String}  hostname
 | 
						 * @param   {String}  hostname
 | 
				
			||||||
	 * @param   {Array}   existing_rows
 | 
						 * @param   {Array}   existingRows
 | 
				
			||||||
	 * @param   {Integer} [ignore_id]
 | 
						 * @param   {Integer} [ignoreId]
 | 
				
			||||||
	 * @returns {Boolean}
 | 
						 * @returns {Boolean}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	_checkHostnameRecordsTaken: function (hostname, existing_rows, ignore_id) {
 | 
						_checkHostnameRecordsTaken: (hostname, existingRows, ignoreId) => {
 | 
				
			||||||
		let is_taken = false;
 | 
							let isTaken = false;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (existing_rows && existing_rows.length) {
 | 
							if (existingRows?.length) {
 | 
				
			||||||
			existing_rows.map(function (existing_row) {
 | 
								existingRows.map((existingRow) => {
 | 
				
			||||||
				existing_row.domain_names.map(function (existing_hostname) {
 | 
									existingRow.domain_names.map((existingHostname) => {
 | 
				
			||||||
					// Does this domain match?
 | 
										// Does this domain match?
 | 
				
			||||||
					if (existing_hostname.toLowerCase() === hostname.toLowerCase()) {
 | 
										if (existingHostname.toLowerCase() === hostname.toLowerCase()) {
 | 
				
			||||||
						if (!ignore_id || ignore_id !== existing_row.id) {
 | 
											if (!ignoreId || ignoreId !== existingRow.id) {
 | 
				
			||||||
							is_taken = true;
 | 
												isTaken = true;
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
										return true;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return is_taken;
 | 
							return isTaken;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Private call only
 | 
						 * Private call only
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {Array}   hosts
 | 
						 * @param   {Array}   hosts
 | 
				
			||||||
	 * @param   {Array}   domain_names
 | 
						 * @param   {Array}   domainNames
 | 
				
			||||||
	 * @returns {Array}
 | 
						 * @returns {Array}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	_getHostsWithDomains: function (hosts, domain_names) {
 | 
						_getHostsWithDomains: (hosts, domainNames) => {
 | 
				
			||||||
		let response = [];
 | 
							const response = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (hosts && hosts.length) {
 | 
							if (hosts?.length) {
 | 
				
			||||||
			hosts.map(function (host) {
 | 
								hosts.map((host) => {
 | 
				
			||||||
				let host_matches = false;
 | 
									let hostMatches = false;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				domain_names.map(function (domain_name) {
 | 
									domainNames.map((domainName) => {
 | 
				
			||||||
					host.domain_names.map(function (host_domain_name) {
 | 
										host.domain_names.map((hostDomainName) => {
 | 
				
			||||||
						if (domain_name.toLowerCase() === host_domain_name.toLowerCase()) {
 | 
											if (domainName.toLowerCase() === hostDomainName.toLowerCase()) {
 | 
				
			||||||
							host_matches = true;
 | 
												hostMatches = true;
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
 | 
											return true;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
										return true;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (host_matches) {
 | 
									if (hostMatches) {
 | 
				
			||||||
					response.push(host);
 | 
										response.push(host);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									return true;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return response;
 | 
							return response;
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalHost;
 | 
					export default internalHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,45 +1,51 @@
 | 
				
			|||||||
const https         = require('https');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const fs            = require('fs');
 | 
					import https from "node:https";
 | 
				
			||||||
const logger        = require('../logger').ip_ranges;
 | 
					import { dirname } from "node:path";
 | 
				
			||||||
const error         = require('../lib/error');
 | 
					import { fileURLToPath } from "node:url";
 | 
				
			||||||
const utils         = require('../lib/utils');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const internalNginx = require('./nginx');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
 | 
					import { ipRanges as logger } from "../logger.js";
 | 
				
			||||||
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json';
 | 
					const __filename = fileURLToPath(import.meta.url);
 | 
				
			||||||
const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4';
 | 
					const __dirname = dirname(__filename);
 | 
				
			||||||
const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6';
 | 
					
 | 
				
			||||||
 | 
					const CLOUDFRONT_URL = "https://ip-ranges.amazonaws.com/ip-ranges.json";
 | 
				
			||||||
 | 
					const CLOUDFARE_V4_URL = "https://www.cloudflare.com/ips-v4";
 | 
				
			||||||
 | 
					const CLOUDFARE_V6_URL = "https://www.cloudflare.com/ips-v6";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const regIpV4 = /^(\d+\.?){4}\/\d+/;
 | 
					const regIpV4 = /^(\d+\.?){4}\/\d+/;
 | 
				
			||||||
const regIpV6 = /^(([\da-fA-F]+)?:)+\/\d+/;
 | 
					const regIpV6 = /^(([\da-fA-F]+)?:)+\/\d+/;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalIpRanges = {
 | 
					const internalIpRanges = {
 | 
				
			||||||
 | 
						interval_timeout: 1000 * 60 * 60 * 6, // 6 hours
 | 
				
			||||||
	interval_timeout:    1000 * 60 * 60 * 6, // 6 hours
 | 
						interval: null,
 | 
				
			||||||
	interval:            null,
 | 
					 | 
				
			||||||
	interval_processing: false,
 | 
						interval_processing: false,
 | 
				
			||||||
	iteration_count:     0,
 | 
						iteration_count: 0,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	initTimer: () => {
 | 
						initTimer: () => {
 | 
				
			||||||
		logger.info('IP Ranges Renewal Timer initialized');
 | 
							logger.info("IP Ranges Renewal Timer initialized");
 | 
				
			||||||
		internalIpRanges.interval = setInterval(internalIpRanges.fetch, internalIpRanges.interval_timeout);
 | 
							internalIpRanges.interval = setInterval(internalIpRanges.fetch, internalIpRanges.interval_timeout);
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fetchUrl: (url) => {
 | 
						fetchUrl: (url) => {
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							return new Promise((resolve, reject) => {
 | 
				
			||||||
			logger.info('Fetching ' + url);
 | 
								logger.info(`Fetching ${url}`);
 | 
				
			||||||
			return https.get(url, (res) => {
 | 
								return https
 | 
				
			||||||
				res.setEncoding('utf8');
 | 
									.get(url, (res) => {
 | 
				
			||||||
				let raw_data = '';
 | 
										res.setEncoding("utf8");
 | 
				
			||||||
				res.on('data', (chunk) => {
 | 
										let raw_data = "";
 | 
				
			||||||
					raw_data += chunk;
 | 
										res.on("data", (chunk) => {
 | 
				
			||||||
				});
 | 
											raw_data += chunk;
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				res.on('end', () => {
 | 
										res.on("end", () => {
 | 
				
			||||||
					resolve(raw_data);
 | 
											resolve(raw_data);
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
 | 
									})
 | 
				
			||||||
 | 
									.on("error", (err) => {
 | 
				
			||||||
 | 
										reject(err);
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			}).on('error', (err) => {
 | 
					 | 
				
			||||||
				reject(err);
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -49,27 +55,30 @@ const internalIpRanges = {
 | 
				
			|||||||
	fetch: () => {
 | 
						fetch: () => {
 | 
				
			||||||
		if (!internalIpRanges.interval_processing) {
 | 
							if (!internalIpRanges.interval_processing) {
 | 
				
			||||||
			internalIpRanges.interval_processing = true;
 | 
								internalIpRanges.interval_processing = true;
 | 
				
			||||||
			logger.info('Fetching IP Ranges from online services...');
 | 
								logger.info("Fetching IP Ranges from online services...");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			let ip_ranges = [];
 | 
								let ip_ranges = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return internalIpRanges.fetchUrl(CLOUDFRONT_URL)
 | 
								return internalIpRanges
 | 
				
			||||||
 | 
									.fetchUrl(CLOUDFRONT_URL)
 | 
				
			||||||
				.then((cloudfront_data) => {
 | 
									.then((cloudfront_data) => {
 | 
				
			||||||
					let data = JSON.parse(cloudfront_data);
 | 
										const data = JSON.parse(cloudfront_data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					if (data && typeof data.prefixes !== 'undefined') {
 | 
										if (data && typeof data.prefixes !== "undefined") {
 | 
				
			||||||
						data.prefixes.map((item) => {
 | 
											data.prefixes.map((item) => {
 | 
				
			||||||
							if (item.service === 'CLOUDFRONT') {
 | 
												if (item.service === "CLOUDFRONT") {
 | 
				
			||||||
								ip_ranges.push(item.ip_prefix);
 | 
													ip_ranges.push(item.ip_prefix);
 | 
				
			||||||
							}
 | 
												}
 | 
				
			||||||
 | 
												return true;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					if (data && typeof data.ipv6_prefixes !== 'undefined') {
 | 
										if (data && typeof data.ipv6_prefixes !== "undefined") {
 | 
				
			||||||
						data.ipv6_prefixes.map((item) => {
 | 
											data.ipv6_prefixes.map((item) => {
 | 
				
			||||||
							if (item.service === 'CLOUDFRONT') {
 | 
												if (item.service === "CLOUDFRONT") {
 | 
				
			||||||
								ip_ranges.push(item.ipv6_prefix);
 | 
													ip_ranges.push(item.ipv6_prefix);
 | 
				
			||||||
							}
 | 
												}
 | 
				
			||||||
 | 
												return true;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
@@ -77,38 +86,38 @@ const internalIpRanges = {
 | 
				
			|||||||
					return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL);
 | 
										return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL);
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.then((cloudfare_data) => {
 | 
									.then((cloudfare_data) => {
 | 
				
			||||||
					let items = cloudfare_data.split('\n').filter((line) => regIpV4.test(line));
 | 
										const items = cloudfare_data.split("\n").filter((line) => regIpV4.test(line));
 | 
				
			||||||
					ip_ranges = [... ip_ranges, ... items];
 | 
										ip_ranges = [...ip_ranges, ...items];
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.then(() => {
 | 
									.then(() => {
 | 
				
			||||||
					return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL);
 | 
										return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL);
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.then((cloudfare_data) => {
 | 
									.then((cloudfare_data) => {
 | 
				
			||||||
					let items = cloudfare_data.split('\n').filter((line) => regIpV6.test(line));
 | 
										const items = cloudfare_data.split("\n").filter((line) => regIpV6.test(line));
 | 
				
			||||||
					ip_ranges = [... ip_ranges, ... items];
 | 
										ip_ranges = [...ip_ranges, ...items];
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.then(() => {
 | 
									.then(() => {
 | 
				
			||||||
					let clean_ip_ranges = [];
 | 
										const clean_ip_ranges = [];
 | 
				
			||||||
					ip_ranges.map((range) => {
 | 
										ip_ranges.map((range) => {
 | 
				
			||||||
						if (range) {
 | 
											if (range) {
 | 
				
			||||||
							clean_ip_ranges.push(range);
 | 
												clean_ip_ranges.push(range);
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
 | 
											return true;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					return internalIpRanges.generateConfig(clean_ip_ranges)
 | 
										return internalIpRanges.generateConfig(clean_ip_ranges).then(() => {
 | 
				
			||||||
						.then(() => {
 | 
											if (internalIpRanges.iteration_count) {
 | 
				
			||||||
							if (internalIpRanges.iteration_count) {
 | 
												// Reload nginx
 | 
				
			||||||
								// Reload nginx
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											}
 | 
				
			||||||
							}
 | 
										});
 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.then(() => {
 | 
									.then(() => {
 | 
				
			||||||
					internalIpRanges.interval_processing = false;
 | 
										internalIpRanges.interval_processing = false;
 | 
				
			||||||
					internalIpRanges.iteration_count++;
 | 
										internalIpRanges.iteration_count++;
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.catch((err) => {
 | 
									.catch((err) => {
 | 
				
			||||||
					logger.error(err.message);
 | 
										logger.fatal(err.message);
 | 
				
			||||||
					internalIpRanges.interval_processing = false;
 | 
										internalIpRanges.interval_processing = false;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -122,26 +131,26 @@ const internalIpRanges = {
 | 
				
			|||||||
		const renderEngine = utils.getRenderEngine();
 | 
							const renderEngine = utils.getRenderEngine();
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							return new Promise((resolve, reject) => {
 | 
				
			||||||
			let template = null;
 | 
								let template = null;
 | 
				
			||||||
			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf';
 | 
								const filename = "/etc/nginx/conf.d/include/ip_ranges.conf";
 | 
				
			||||||
			try {
 | 
								try {
 | 
				
			||||||
				template = fs.readFileSync(__dirname + '/../templates/ip_ranges.conf', {encoding: 'utf8'});
 | 
									template = fs.readFileSync(`${__dirname}/../templates/ip_ranges.conf`, { encoding: "utf8" });
 | 
				
			||||||
			} catch (err) {
 | 
								} catch (err) {
 | 
				
			||||||
				reject(new error.ConfigurationError(err.message));
 | 
									reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
				return;
 | 
									return;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			renderEngine
 | 
								renderEngine
 | 
				
			||||||
				.parseAndRender(template, {ip_ranges: ip_ranges})
 | 
									.parseAndRender(template, { ip_ranges: ip_ranges })
 | 
				
			||||||
				.then((config_text) => {
 | 
									.then((config_text) => {
 | 
				
			||||||
					fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
 | 
										fs.writeFileSync(filename, config_text, { encoding: "utf8" });
 | 
				
			||||||
					resolve(true);
 | 
										resolve(true);
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.catch((err) => {
 | 
									.catch((err) => {
 | 
				
			||||||
					logger.warn('Could not write ' + filename + ':', err.message);
 | 
										logger.warn(`Could not write ${filename}: ${err.message}`);
 | 
				
			||||||
					reject(new error.ConfigurationError(err.message));
 | 
										reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalIpRanges;
 | 
					export default internalIpRanges;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,12 +1,15 @@
 | 
				
			|||||||
const _      = require('lodash');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const fs     = require('fs');
 | 
					import { dirname } from "node:path";
 | 
				
			||||||
const logger = require('../logger').nginx;
 | 
					import { fileURLToPath } from "node:url";
 | 
				
			||||||
const config = require('../lib/config');
 | 
					import _ from "lodash";
 | 
				
			||||||
const utils  = require('../lib/utils');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const error  = require('../lib/error');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
 | 
					import { nginx as logger } from "../logger.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const __filename = fileURLToPath(import.meta.url);
 | 
				
			||||||
 | 
					const __dirname = dirname(__filename);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalNginx = {
 | 
					const internalNginx = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * This will:
 | 
						 * This will:
 | 
				
			||||||
	 * - test the nginx config first to make sure it's OK
 | 
						 * - test the nginx config first to make sure it's OK
 | 
				
			||||||
@@ -24,7 +27,8 @@ const internalNginx = {
 | 
				
			|||||||
	configure: (model, host_type, host) => {
 | 
						configure: (model, host_type, host) => {
 | 
				
			||||||
		let combined_meta = {};
 | 
							let combined_meta = {};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return internalNginx.test()
 | 
							return internalNginx
 | 
				
			||||||
 | 
								.test()
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				// Nginx is OK
 | 
									// Nginx is OK
 | 
				
			||||||
				// We're deleting this config regardless.
 | 
									// We're deleting this config regardless.
 | 
				
			||||||
@@ -37,49 +41,46 @@ const internalNginx = {
 | 
				
			|||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				// Test nginx again and update meta with result
 | 
									// Test nginx again and update meta with result
 | 
				
			||||||
				return internalNginx.test()
 | 
									return internalNginx
 | 
				
			||||||
 | 
										.test()
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// nginx is ok
 | 
											// nginx is ok
 | 
				
			||||||
						combined_meta = _.assign({}, host.meta, {
 | 
											combined_meta = _.assign({}, host.meta, {
 | 
				
			||||||
							nginx_online: true,
 | 
												nginx_online: true,
 | 
				
			||||||
							nginx_err:    null
 | 
												nginx_err: null,
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						return model
 | 
											return model.query().where("id", host.id).patch({
 | 
				
			||||||
							.query()
 | 
												meta: combined_meta,
 | 
				
			||||||
							.where('id', host.id)
 | 
											});
 | 
				
			||||||
							.patch({
 | 
					 | 
				
			||||||
								meta: combined_meta
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.catch((err) => {
 | 
										.catch((err) => {
 | 
				
			||||||
						// Remove the error_log line because it's a docker-ism false positive that doesn't need to be reported.
 | 
											// Remove the error_log line because it's a docker-ism false positive that doesn't need to be reported.
 | 
				
			||||||
						// It will always look like this:
 | 
											// It will always look like this:
 | 
				
			||||||
						//   nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (6: No such device or address)
 | 
											//   nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (6: No such device or address)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						let valid_lines = [];
 | 
											const valid_lines = [];
 | 
				
			||||||
						let err_lines   = err.message.split('\n');
 | 
											const err_lines = err.message.split("\n");
 | 
				
			||||||
						err_lines.map(function (line) {
 | 
											err_lines.map((line) => {
 | 
				
			||||||
							if (line.indexOf('/var/log/nginx/error.log') === -1) {
 | 
												if (line.indexOf("/var/log/nginx/error.log") === -1) {
 | 
				
			||||||
								valid_lines.push(line);
 | 
													valid_lines.push(line);
 | 
				
			||||||
							}
 | 
												}
 | 
				
			||||||
 | 
												return true;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						if (config.debug()) {
 | 
											logger.debug("Nginx test failed:", valid_lines.join("\n"));
 | 
				
			||||||
							logger.error('Nginx test failed:', valid_lines.join('\n'));
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
						// config is bad, update meta and delete config
 | 
											// config is bad, update meta and delete config
 | 
				
			||||||
						combined_meta = _.assign({}, host.meta, {
 | 
											combined_meta = _.assign({}, host.meta, {
 | 
				
			||||||
							nginx_online: false,
 | 
												nginx_online: false,
 | 
				
			||||||
							nginx_err:    valid_lines.join('\n')
 | 
												nginx_err: valid_lines.join("\n"),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						return model
 | 
											return model
 | 
				
			||||||
							.query()
 | 
												.query()
 | 
				
			||||||
							.where('id', host.id)
 | 
												.where("id", host.id)
 | 
				
			||||||
							.patch({
 | 
												.patch({
 | 
				
			||||||
								meta: combined_meta
 | 
													meta: combined_meta,
 | 
				
			||||||
							})
 | 
												})
 | 
				
			||||||
							.then(() => {
 | 
												.then(() => {
 | 
				
			||||||
								internalNginx.renameConfigAsError(host_type, host);
 | 
													internalNginx.renameConfigAsError(host_type, host);
 | 
				
			||||||
@@ -101,22 +102,18 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	test: () => {
 | 
						test: () => {
 | 
				
			||||||
		if (config.debug()) {
 | 
							logger.debug("Testing Nginx configuration");
 | 
				
			||||||
			logger.info('Testing Nginx configuration');
 | 
							return utils.execFile("/usr/sbin/nginx", ["-t", "-g", "error_log off;"]);
 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		return utils.exec('/usr/sbin/nginx -t -g "error_log off;"');
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	reload: () => {
 | 
						reload: () => {
 | 
				
			||||||
		return internalNginx.test()
 | 
							return internalNginx.test().then(() => {
 | 
				
			||||||
			.then(() => {
 | 
								logger.info("Reloading Nginx");
 | 
				
			||||||
				logger.info('Reloading Nginx');
 | 
								return utils.execFile("/usr/sbin/nginx", ["-s", "reload"]);
 | 
				
			||||||
				return utils.exec('/usr/sbin/nginx -s reload');
 | 
							});
 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -125,10 +122,10 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {String}
 | 
						 * @returns {String}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getConfigName: (host_type, host_id) => {
 | 
						getConfigName: (host_type, host_id) => {
 | 
				
			||||||
		if (host_type === 'default') {
 | 
							if (host_type === "default") {
 | 
				
			||||||
			return '/data/nginx/default_host/site.conf';
 | 
								return "/data/nginx/default_host/site.conf";
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return '/data/nginx/' + internalNginx.getFileFriendlyHostType(host_type) + '/' + host_id + '.conf';
 | 
							return `/data/nginx/${internalNginx.getFileFriendlyHostType(host_type)}/${host_id}.conf`;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -141,38 +138,45 @@ const internalNginx = {
 | 
				
			|||||||
			let template;
 | 
								let template;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			try {
 | 
								try {
 | 
				
			||||||
				template = fs.readFileSync(__dirname + '/../templates/_location.conf', {encoding: 'utf8'});
 | 
									template = fs.readFileSync(`${__dirname}/../templates/_location.conf`, { encoding: "utf8" });
 | 
				
			||||||
			} catch (err) {
 | 
								} catch (err) {
 | 
				
			||||||
				reject(new error.ConfigurationError(err.message));
 | 
									reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
				return;
 | 
									return;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			const renderEngine    = utils.getRenderEngine();
 | 
								const renderEngine = utils.getRenderEngine();
 | 
				
			||||||
			let renderedLocations = '';
 | 
								let renderedLocations = "";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			const locationRendering = async () => {
 | 
								const locationRendering = async () => {
 | 
				
			||||||
				for (let i = 0; i < host.locations.length; i++) {
 | 
									for (let i = 0; i < host.locations.length; i++) {
 | 
				
			||||||
					let locationCopy = Object.assign({}, {access_list_id: host.access_list_id}, {certificate_id: host.certificate_id},
 | 
										const locationCopy = Object.assign(
 | 
				
			||||||
						{ssl_forced: host.ssl_forced}, {caching_enabled: host.caching_enabled}, {block_exploits: host.block_exploits},
 | 
											{},
 | 
				
			||||||
						{allow_websocket_upgrade: host.allow_websocket_upgrade}, {http2_support: host.http2_support},
 | 
											{ access_list_id: host.access_list_id },
 | 
				
			||||||
						{hsts_enabled: host.hsts_enabled}, {hsts_subdomains: host.hsts_subdomains}, {access_list: host.access_list},
 | 
											{ certificate_id: host.certificate_id },
 | 
				
			||||||
						{certificate: host.certificate}, host.locations[i]);
 | 
											{ ssl_forced: host.ssl_forced },
 | 
				
			||||||
 | 
											{ caching_enabled: host.caching_enabled },
 | 
				
			||||||
 | 
											{ block_exploits: host.block_exploits },
 | 
				
			||||||
 | 
											{ allow_websocket_upgrade: host.allow_websocket_upgrade },
 | 
				
			||||||
 | 
											{ http2_support: host.http2_support },
 | 
				
			||||||
 | 
											{ hsts_enabled: host.hsts_enabled },
 | 
				
			||||||
 | 
											{ hsts_subdomains: host.hsts_subdomains },
 | 
				
			||||||
 | 
											{ access_list: host.access_list },
 | 
				
			||||||
 | 
											{ certificate: host.certificate },
 | 
				
			||||||
 | 
											host.locations[i],
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					if (locationCopy.forward_host.indexOf('/') > -1) {
 | 
										if (locationCopy.forward_host.indexOf("/") > -1) {
 | 
				
			||||||
						const splitted = locationCopy.forward_host.split('/');
 | 
											const splitted = locationCopy.forward_host.split("/");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						locationCopy.forward_host = splitted.shift();
 | 
											locationCopy.forward_host = splitted.shift();
 | 
				
			||||||
						locationCopy.forward_path = `/${splitted.join('/')}`;
 | 
											locationCopy.forward_path = `/${splitted.join("/")}`;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					// eslint-disable-next-line
 | 
					 | 
				
			||||||
					renderedLocations += await renderEngine.parseAndRender(template, locationCopy);
 | 
										renderedLocations += await renderEngine.parseAndRender(template, locationCopy);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					 | 
				
			||||||
			};
 | 
								};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			locationRendering().then(() => resolve(renderedLocations));
 | 
								locationRendering().then(() => resolve(renderedLocations));
 | 
				
			||||||
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -181,23 +185,23 @@ const internalNginx = {
 | 
				
			|||||||
	 * @param   {Object}  host
 | 
						 * @param   {Object}  host
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	generateConfig: (host_type, host) => {
 | 
						generateConfig: (host_type, host_row) => {
 | 
				
			||||||
 | 
							// Prevent modifying the original object:
 | 
				
			||||||
 | 
							const host = JSON.parse(JSON.stringify(host_row));
 | 
				
			||||||
		const nice_host_type = internalNginx.getFileFriendlyHostType(host_type);
 | 
							const nice_host_type = internalNginx.getFileFriendlyHostType(host_type);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (config.debug()) {
 | 
							logger.debug(`Generating ${nice_host_type} Config:`, JSON.stringify(host, null, 2));
 | 
				
			||||||
			logger.info('Generating ' + nice_host_type + ' Config:', JSON.stringify(host, null, 2));
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		const renderEngine = utils.getRenderEngine();
 | 
							const renderEngine = utils.getRenderEngine();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							return new Promise((resolve, reject) => {
 | 
				
			||||||
			let template = null;
 | 
								let template = null;
 | 
				
			||||||
			let filename = internalNginx.getConfigName(nice_host_type, host.id);
 | 
								const filename = internalNginx.getConfigName(nice_host_type, host.id);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			try {
 | 
								try {
 | 
				
			||||||
				template = fs.readFileSync(__dirname + '/../templates/' + nice_host_type + '.conf', {encoding: 'utf8'});
 | 
									template = fs.readFileSync(`${__dirname}/../templates/${nice_host_type}.conf`, { encoding: "utf8" });
 | 
				
			||||||
			} catch (err) {
 | 
								} catch (err) {
 | 
				
			||||||
				reject(new error.ConfigurationError(err.message));
 | 
									reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
				return;
 | 
									return;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -205,27 +209,26 @@ const internalNginx = {
 | 
				
			|||||||
			let origLocations;
 | 
								let origLocations;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Manipulate the data a bit before sending it to the template
 | 
								// Manipulate the data a bit before sending it to the template
 | 
				
			||||||
			if (nice_host_type !== 'default') {
 | 
								if (nice_host_type !== "default") {
 | 
				
			||||||
				host.use_default_location = true;
 | 
									host.use_default_location = true;
 | 
				
			||||||
				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) {
 | 
									if (typeof host.advanced_config !== "undefined" && host.advanced_config) {
 | 
				
			||||||
					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config);
 | 
										host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (host.locations) {
 | 
								if (host.locations) {
 | 
				
			||||||
				//logger.info ('host.locations = ' + JSON.stringify(host.locations, null, 2));
 | 
									//logger.info ('host.locations = ' + JSON.stringify(host.locations, null, 2));
 | 
				
			||||||
				origLocations    = [].concat(host.locations);
 | 
									origLocations = [].concat(host.locations);
 | 
				
			||||||
				locationsPromise = internalNginx.renderLocations(host).then((renderedLocations) => {
 | 
									locationsPromise = internalNginx.renderLocations(host).then((renderedLocations) => {
 | 
				
			||||||
					host.locations = renderedLocations;
 | 
										host.locations = renderedLocations;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Allow someone who is using / custom location path to use it, and skip the default / location
 | 
									// Allow someone who is using / custom location path to use it, and skip the default / location
 | 
				
			||||||
				_.map(host.locations, (location) => {
 | 
									_.map(host.locations, (location) => {
 | 
				
			||||||
					if (location.path === '/') {
 | 
										if (location.path === "/") {
 | 
				
			||||||
						host.use_default_location = false;
 | 
											host.use_default_location = false;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
					 | 
				
			||||||
			} else {
 | 
								} else {
 | 
				
			||||||
				locationsPromise = Promise.resolve();
 | 
									locationsPromise = Promise.resolve();
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -237,11 +240,8 @@ const internalNginx = {
 | 
				
			|||||||
				renderEngine
 | 
									renderEngine
 | 
				
			||||||
					.parseAndRender(template, host)
 | 
										.parseAndRender(template, host)
 | 
				
			||||||
					.then((config_text) => {
 | 
										.then((config_text) => {
 | 
				
			||||||
						fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
 | 
											fs.writeFileSync(filename, config_text, { encoding: "utf8" });
 | 
				
			||||||
 | 
											logger.debug("Wrote config:", filename, config_text);
 | 
				
			||||||
						if (config.debug()) {
 | 
					 | 
				
			||||||
							logger.success('Wrote config:', filename, config_text);
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
						// Restore locations array
 | 
											// Restore locations array
 | 
				
			||||||
						host.locations = origLocations;
 | 
											host.locations = origLocations;
 | 
				
			||||||
@@ -249,11 +249,8 @@ const internalNginx = {
 | 
				
			|||||||
						resolve(true);
 | 
											resolve(true);
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.catch((err) => {
 | 
										.catch((err) => {
 | 
				
			||||||
						if (config.debug()) {
 | 
											logger.debug(`Could not write ${filename}:`, err.message);
 | 
				
			||||||
							logger.warn('Could not write ' + filename + ':', err.message);
 | 
											reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
						reject(new error.ConfigurationError(err.message));
 | 
					 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
@@ -268,20 +265,17 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	generateLetsEncryptRequestConfig: (certificate) => {
 | 
						generateLetsEncryptRequestConfig: (certificate) => {
 | 
				
			||||||
		if (config.debug()) {
 | 
							logger.debug("Generating LetsEncrypt Request Config:", certificate);
 | 
				
			||||||
			logger.info('Generating LetsEncrypt Request Config:', certificate);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		const renderEngine = utils.getRenderEngine();
 | 
							const renderEngine = utils.getRenderEngine();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							return new Promise((resolve, reject) => {
 | 
				
			||||||
			let template = null;
 | 
								let template = null;
 | 
				
			||||||
			let filename = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf';
 | 
								const filename = `/data/nginx/temp/letsencrypt_${certificate.id}.conf`;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			try {
 | 
								try {
 | 
				
			||||||
				template = fs.readFileSync(__dirname + '/../templates/letsencrypt-request.conf', {encoding: 'utf8'});
 | 
									template = fs.readFileSync(`${__dirname}/../templates/letsencrypt-request.conf`, { encoding: "utf8" });
 | 
				
			||||||
			} catch (err) {
 | 
								} catch (err) {
 | 
				
			||||||
				reject(new error.ConfigurationError(err.message));
 | 
									reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
				return;
 | 
									return;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -290,20 +284,13 @@ const internalNginx = {
 | 
				
			|||||||
			renderEngine
 | 
								renderEngine
 | 
				
			||||||
				.parseAndRender(template, certificate)
 | 
									.parseAndRender(template, certificate)
 | 
				
			||||||
				.then((config_text) => {
 | 
									.then((config_text) => {
 | 
				
			||||||
					fs.writeFileSync(filename, config_text, {encoding: 'utf8'});
 | 
										fs.writeFileSync(filename, config_text, { encoding: "utf8" });
 | 
				
			||||||
 | 
										logger.debug("Wrote config:", filename, config_text);
 | 
				
			||||||
					if (config.debug()) {
 | 
					 | 
				
			||||||
						logger.success('Wrote config:', filename, config_text);
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					resolve(true);
 | 
										resolve(true);
 | 
				
			||||||
				})
 | 
									})
 | 
				
			||||||
				.catch((err) => {
 | 
									.catch((err) => {
 | 
				
			||||||
					if (config.debug()) {
 | 
										logger.debug(`Could not write ${filename}:`, err.message);
 | 
				
			||||||
						logger.warn('Could not write ' + filename + ':', err.message);
 | 
										reject(new errs.ConfigurationError(err.message));
 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
					reject(new error.ConfigurationError(err.message));
 | 
					 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
@@ -314,11 +301,14 @@ const internalNginx = {
 | 
				
			|||||||
	 * @param   {String}  filename
 | 
						 * @param   {String}  filename
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	deleteFile: (filename) => {
 | 
						deleteFile: (filename) => {
 | 
				
			||||||
		logger.debug('Deleting file: ' + filename);
 | 
							if (!fs.existsSync(filename)) {
 | 
				
			||||||
 | 
								return;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
		try {
 | 
							try {
 | 
				
			||||||
 | 
								logger.debug(`Deleting file: ${filename}`);
 | 
				
			||||||
			fs.unlinkSync(filename);
 | 
								fs.unlinkSync(filename);
 | 
				
			||||||
		} catch (err) {
 | 
							} catch (err) {
 | 
				
			||||||
			logger.debug('Could not delete file:', JSON.stringify(err, null, 2));
 | 
								logger.debug("Could not delete file:", JSON.stringify(err, null, 2));
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -328,7 +318,7 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns String
 | 
						 * @returns String
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getFileFriendlyHostType: (host_type) => {
 | 
						getFileFriendlyHostType: (host_type) => {
 | 
				
			||||||
		return host_type.replace(new RegExp('-', 'g'), '_');
 | 
							return host_type.replace(/-/g, "_");
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -338,8 +328,8 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	deleteLetsEncryptRequestConfig: (certificate) => {
 | 
						deleteLetsEncryptRequestConfig: (certificate) => {
 | 
				
			||||||
		const config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf';
 | 
							const config_file = `/data/nginx/temp/letsencrypt_${certificate.id}.conf`;
 | 
				
			||||||
		return new Promise((resolve/*, reject*/) => {
 | 
							return new Promise((resolve /*, reject*/) => {
 | 
				
			||||||
			internalNginx.deleteFile(config_file);
 | 
								internalNginx.deleteFile(config_file);
 | 
				
			||||||
			resolve();
 | 
								resolve();
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
@@ -352,10 +342,13 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	deleteConfig: (host_type, host, delete_err_file) => {
 | 
						deleteConfig: (host_type, host, delete_err_file) => {
 | 
				
			||||||
		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id);
 | 
							const config_file = internalNginx.getConfigName(
 | 
				
			||||||
		const config_file_err = config_file + '.err';
 | 
								internalNginx.getFileFriendlyHostType(host_type),
 | 
				
			||||||
 | 
								typeof host === "undefined" ? 0 : host.id,
 | 
				
			||||||
 | 
							);
 | 
				
			||||||
 | 
							const config_file_err = `${config_file}.err`;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve/*, reject*/) => {
 | 
							return new Promise((resolve /*, reject*/) => {
 | 
				
			||||||
			internalNginx.deleteFile(config_file);
 | 
								internalNginx.deleteFile(config_file);
 | 
				
			||||||
			if (delete_err_file) {
 | 
								if (delete_err_file) {
 | 
				
			||||||
				internalNginx.deleteFile(config_file_err);
 | 
									internalNginx.deleteFile(config_file_err);
 | 
				
			||||||
@@ -370,10 +363,13 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	renameConfigAsError: (host_type, host) => {
 | 
						renameConfigAsError: (host_type, host) => {
 | 
				
			||||||
		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id);
 | 
							const config_file = internalNginx.getConfigName(
 | 
				
			||||||
		const config_file_err = config_file + '.err';
 | 
								internalNginx.getFileFriendlyHostType(host_type),
 | 
				
			||||||
 | 
								typeof host === "undefined" ? 0 : host.id,
 | 
				
			||||||
 | 
							);
 | 
				
			||||||
 | 
							const config_file_err = `${config_file}.err`;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve/*, reject*/) => {
 | 
							return new Promise((resolve /*, reject*/) => {
 | 
				
			||||||
			fs.unlink(config_file, () => {
 | 
								fs.unlink(config_file, () => {
 | 
				
			||||||
				// ignore result, continue
 | 
									// ignore result, continue
 | 
				
			||||||
				fs.rename(config_file, config_file_err, () => {
 | 
									fs.rename(config_file, config_file_err, () => {
 | 
				
			||||||
@@ -385,14 +381,15 @@ const internalNginx = {
 | 
				
			|||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {String}  host_type
 | 
						 * @param   {String}  hostType
 | 
				
			||||||
	 * @param   {Array}   hosts
 | 
						 * @param   {Array}   hosts
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	bulkGenerateConfigs: (host_type, hosts) => {
 | 
						bulkGenerateConfigs: (hostType, hosts) => {
 | 
				
			||||||
		let promises = [];
 | 
							const promises = [];
 | 
				
			||||||
		hosts.map(function (host) {
 | 
							hosts.map((host) => {
 | 
				
			||||||
			promises.push(internalNginx.generateConfig(host_type, host));
 | 
								promises.push(internalNginx.generateConfig(hostType, host));
 | 
				
			||||||
 | 
								return true;
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return Promise.all(promises);
 | 
							return Promise.all(promises);
 | 
				
			||||||
@@ -404,9 +401,10 @@ const internalNginx = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	bulkDeleteConfigs: (host_type, hosts) => {
 | 
						bulkDeleteConfigs: (host_type, hosts) => {
 | 
				
			||||||
		let promises = [];
 | 
							const promises = [];
 | 
				
			||||||
		hosts.map(function (host) {
 | 
							hosts.map((host) => {
 | 
				
			||||||
			promises.push(internalNginx.deleteConfig(host_type, host, true));
 | 
								promises.push(internalNginx.deleteConfig(host_type, host, true));
 | 
				
			||||||
 | 
								return true;
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return Promise.all(promises);
 | 
							return Promise.all(promises);
 | 
				
			||||||
@@ -416,21 +414,19 @@ const internalNginx = {
 | 
				
			|||||||
	 * @param   {string}  config
 | 
						 * @param   {string}  config
 | 
				
			||||||
	 * @returns {boolean}
 | 
						 * @returns {boolean}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	advancedConfigHasDefaultLocation: function (cfg) {
 | 
						advancedConfigHasDefaultLocation: (cfg) => !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im),
 | 
				
			||||||
		return !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im);
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @returns {boolean}
 | 
						 * @returns {boolean}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	ipv6Enabled: function () {
 | 
						ipv6Enabled: () => {
 | 
				
			||||||
		if (typeof process.env.DISABLE_IPV6 !== 'undefined') {
 | 
							if (typeof process.env.DISABLE_IPV6 !== "undefined") {
 | 
				
			||||||
			const disabled = process.env.DISABLE_IPV6.toLowerCase();
 | 
								const disabled = process.env.DISABLE_IPV6.toLowerCase();
 | 
				
			||||||
			return !(disabled === 'on' || disabled === 'true' || disabled === '1' || disabled === 'yes');
 | 
								return !(disabled === "on" || disabled === "true" || disabled === "1" || disabled === "yes");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return true;
 | 
							return true;
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalNginx;
 | 
					export default internalNginx;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,100 +1,106 @@
 | 
				
			|||||||
const _                   = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const error               = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const utils               = require('../lib/utils');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
const proxyHostModel      = require('../models/proxy_host');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const internalHost        = require('./host');
 | 
					import proxyHostModel from "../models/proxy_host.js";
 | 
				
			||||||
const internalNginx       = require('./nginx');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
const internalAuditLog    = require('./audit-log');
 | 
					import internalCertificate from "./certificate.js";
 | 
				
			||||||
const internalCertificate = require('./certificate');
 | 
					import internalHost from "./host.js";
 | 
				
			||||||
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted", "owner.is_deleted"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalProxyHost = {
 | 
					const internalProxyHost = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							let thisData = data;
 | 
				
			||||||
 | 
							const createCertificate = thisData.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (create_certificate) {
 | 
							if (createCertificate) {
 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete thisData.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('proxy_hosts:create', data)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:create", thisData)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
									// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
									const domain_name_check_promises = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data.domain_names.map(function (domain_name) {
 | 
									thisData.domain_names.map((domain_name) => {
 | 
				
			||||||
					domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name));
 | 
										domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name));
 | 
				
			||||||
 | 
										return true;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return Promise.all(domain_name_check_promises)
 | 
									return Promise.all(domain_name_check_promises).then((check_results) => {
 | 
				
			||||||
					.then((check_results) => {
 | 
										check_results.map((result) => {
 | 
				
			||||||
						check_results.map(function (result) {
 | 
											if (result.is_taken) {
 | 
				
			||||||
							if (result.is_taken) {
 | 
												throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
								throw new error.ValidationError(result.hostname + ' is already in use');
 | 
											}
 | 
				
			||||||
							}
 | 
											return true;
 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				// At this point the domains should have been checked
 | 
									// At this point the domains should have been checked
 | 
				
			||||||
				data.owner_user_id = access.token.getUserId(1);
 | 
									thisData.owner_user_id = access.token.getUserId(1);
 | 
				
			||||||
				data               = internalHost.cleanSslHstsData(data);
 | 
									thisData = internalHost.cleanSslHstsData(thisData);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return proxyHostModel
 | 
									// Fix for db field not having a default value
 | 
				
			||||||
					.query()
 | 
									// for this optional field.
 | 
				
			||||||
					.insertAndFetch(data)
 | 
									if (typeof thisData.advanced_config === "undefined") {
 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
										thisData.advanced_config = "";
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									return proxyHostModel.query().insertAndFetch(thisData).then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (create_certificate) {
 | 
									if (createCertificate) {
 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, data)
 | 
										return internalCertificate
 | 
				
			||||||
 | 
											.createQuickCertificate(access, thisData)
 | 
				
			||||||
						.then((cert) => {
 | 
											.then((cert) => {
 | 
				
			||||||
							// update host with cert id
 | 
												// update host with cert id
 | 
				
			||||||
							return internalProxyHost.update(access, {
 | 
												return internalProxyHost.update(access, {
 | 
				
			||||||
								id:             row.id,
 | 
													id: row.id,
 | 
				
			||||||
								certificate_id: cert.id
 | 
													certificate_id: cert.id,
 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return row;
 | 
												return row;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// re-fetch with cert
 | 
									// re-fetch with cert
 | 
				
			||||||
				return internalProxyHost.get(access, {
 | 
									return internalProxyHost.get(access, {
 | 
				
			||||||
					id:     row.id,
 | 
										id: row.id,
 | 
				
			||||||
					expand: ['certificate', 'owner', 'access_list.[clients,items]']
 | 
										expand: ["certificate", "owner", "access_list.[clients,items]"],
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Configure nginx
 | 
									// Configure nginx
 | 
				
			||||||
				return internalNginx.configure(proxyHostModel, 'proxy_host', row)
 | 
									return internalNginx.configure(proxyHostModel, "proxy_host", row).then(() => {
 | 
				
			||||||
					.then(() => {
 | 
										return row;
 | 
				
			||||||
						return row;
 | 
									});
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Audit log
 | 
									// Audit log
 | 
				
			||||||
				data.meta = _.assign({}, data.meta || {}, row.meta);
 | 
									thisData.meta = _.assign({}, thisData.meta || {}, row.meta);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Add to audit log
 | 
									// Add to audit log
 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
									return internalAuditLog
 | 
				
			||||||
					action:      'created',
 | 
										.add(access, {
 | 
				
			||||||
					object_type: 'proxy-host',
 | 
											action: "created",
 | 
				
			||||||
					object_id:   row.id,
 | 
											object_type: "proxy-host",
 | 
				
			||||||
					meta:        data
 | 
											object_id: row.id,
 | 
				
			||||||
				})
 | 
											meta: thisData,
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						return row;
 | 
											return row;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
@@ -108,100 +114,110 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							let thisData = data;
 | 
				
			||||||
 | 
							const create_certificate = thisData.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (create_certificate) {
 | 
							if (create_certificate) {
 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete thisData.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('proxy_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:update", thisData.id)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
									// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
									const domain_name_check_promises = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.domain_names !== 'undefined') {
 | 
									if (typeof thisData.domain_names !== "undefined") {
 | 
				
			||||||
					data.domain_names.map(function (domain_name) {
 | 
										thisData.domain_names.map((domain_name) => {
 | 
				
			||||||
						domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name, 'proxy', data.id));
 | 
											return domain_name_check_promises.push(
 | 
				
			||||||
 | 
												internalHost.isHostnameTaken(domain_name, "proxy", thisData.id),
 | 
				
			||||||
 | 
											);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					return Promise.all(domain_name_check_promises)
 | 
										return Promise.all(domain_name_check_promises).then((check_results) => {
 | 
				
			||||||
						.then((check_results) => {
 | 
											check_results.map((result) => {
 | 
				
			||||||
							check_results.map(function (result) {
 | 
												if (result.is_taken) {
 | 
				
			||||||
								if (result.is_taken) {
 | 
													throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
									throw new error.ValidationError(result.hostname + ' is already in use');
 | 
												}
 | 
				
			||||||
								}
 | 
												return true;
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalProxyHost.get(access, {id: data.id});
 | 
									return internalProxyHost.get(access, { id: thisData.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row.id !== data.id) {
 | 
									if (row.id !== thisData.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('Proxy Host could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`Proxy Host could not be updated, IDs do not match: ${row.id} !== ${thisData.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (create_certificate) {
 | 
									if (create_certificate) {
 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, {
 | 
										return internalCertificate
 | 
				
			||||||
						domain_names: data.domain_names || row.domain_names,
 | 
											.createQuickCertificate(access, {
 | 
				
			||||||
						meta:         _.assign({}, row.meta, data.meta)
 | 
												domain_names: thisData.domain_names || row.domain_names,
 | 
				
			||||||
					})
 | 
												meta: _.assign({}, row.meta, thisData.meta),
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
						.then((cert) => {
 | 
											.then((cert) => {
 | 
				
			||||||
							// update host with cert id
 | 
												// update host with cert id
 | 
				
			||||||
							data.certificate_id = cert.id;
 | 
												thisData.certificate_id = cert.id;
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return row;
 | 
												return row;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
									// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
				
			||||||
				data = _.assign({}, {
 | 
									thisData = _.assign(
 | 
				
			||||||
					domain_names: row.domain_names
 | 
										{},
 | 
				
			||||||
				}, data);
 | 
										{
 | 
				
			||||||
 | 
											domain_names: row.domain_names,
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
										data,
 | 
				
			||||||
 | 
									);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data = internalHost.cleanSslHstsData(data, row);
 | 
									thisData = internalHost.cleanSslHstsData(thisData, row);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return proxyHostModel
 | 
									return proxyHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where({id: data.id})
 | 
										.where({ id: thisData.id })
 | 
				
			||||||
					.patch(data)
 | 
										.patch(thisData)
 | 
				
			||||||
					.then(utils.omitRow(omissions()))
 | 
										.then(utils.omitRow(omissions()))
 | 
				
			||||||
					.then((saved_row) => {
 | 
										.then((saved_row) => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog
 | 
				
			||||||
							action:      'updated',
 | 
												.add(access, {
 | 
				
			||||||
							object_type: 'proxy-host',
 | 
													action: "updated",
 | 
				
			||||||
							object_id:   row.id,
 | 
													object_type: "proxy-host",
 | 
				
			||||||
							meta:        data
 | 
													object_id: row.id,
 | 
				
			||||||
						})
 | 
													meta: thisData,
 | 
				
			||||||
 | 
												})
 | 
				
			||||||
							.then(() => {
 | 
												.then(() => {
 | 
				
			||||||
								return saved_row;
 | 
													return saved_row;
 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalProxyHost.get(access, {
 | 
									return internalProxyHost
 | 
				
			||||||
					id:     data.id,
 | 
										.get(access, {
 | 
				
			||||||
					expand: ['owner', 'certificate', 'access_list.[clients,items]']
 | 
											id: thisData.id,
 | 
				
			||||||
				})
 | 
											expand: ["owner", "certificate", "access_list.[clients,items]"],
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then((row) => {
 | 
										.then((row) => {
 | 
				
			||||||
						if (!row.enabled) {
 | 
											if (!row.enabled) {
 | 
				
			||||||
							// No need to add nginx config if host is disabled
 | 
												// No need to add nginx config if host is disabled
 | 
				
			||||||
							return row;
 | 
												return row;
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
						// Configure nginx
 | 
											// Configure nginx
 | 
				
			||||||
						return internalNginx.configure(proxyHostModel, 'proxy_host', row)
 | 
											return internalNginx.configure(proxyHostModel, "proxy_host", row).then((new_meta) => {
 | 
				
			||||||
							.then((new_meta) => {
 | 
												row.meta = new_meta;
 | 
				
			||||||
								row.meta = new_meta;
 | 
												return _.omit(internalHost.cleanRowCertificateMeta(row), omissions());
 | 
				
			||||||
								row      = internalHost.cleanRowCertificateMeta(row);
 | 
											});
 | 
				
			||||||
								return _.omit(row, omissions());
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
@@ -215,39 +231,38 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: (access, data) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const thisData = data || {};
 | 
				
			||||||
			data = {};
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('proxy_hosts:get', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:get", thisData.id)
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let query = proxyHostModel
 | 
									const query = proxyHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.andWhere('id', data.id)
 | 
										.andWhere("id", thisData.id)
 | 
				
			||||||
					.allowGraph('[owner,access_list.[clients,items],certificate]')
 | 
										.allowGraph("[owner,access_list.[clients,items],certificate]")
 | 
				
			||||||
					.first();
 | 
										.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
									if (access_data.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
										query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
									if (typeof thisData.expand !== "undefined" && thisData.expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${thisData.expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
									return query.then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(thisData.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				row = internalHost.cleanRowCertificateMeta(row);
 | 
									const thisRow = internalHost.cleanRowCertificateMeta(row);
 | 
				
			||||||
				// Custom omissions
 | 
									// Custom omissions
 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
									if (typeof thisData.omit !== "undefined" && thisData.omit !== null) {
 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
										return _.omit(row, thisData.omit);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				return row;
 | 
									return thisRow;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -259,35 +274,35 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: (access, data) => {
 | 
				
			||||||
		return access.can('proxy_hosts:delete', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:delete", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalProxyHost.get(access, {id: data.id});
 | 
									return internalProxyHost.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return proxyHostModel
 | 
									return proxyHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						is_deleted: 1
 | 
											is_deleted: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('proxy_host', row)
 | 
											return internalNginx.deleteConfig("proxy_host", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'deleted',
 | 
												action: "deleted",
 | 
				
			||||||
							object_type: 'proxy-host',
 | 
												object_type: "proxy-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -304,39 +319,41 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	enable: (access, data) => {
 | 
						enable: (access, data) => {
 | 
				
			||||||
		return access.can('proxy_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalProxyHost.get(access, {
 | 
									return internalProxyHost.get(access, {
 | 
				
			||||||
					id:     data.id,
 | 
										id: data.id,
 | 
				
			||||||
					expand: ['certificate', 'owner', 'access_list']
 | 
										expand: ["certificate", "owner", "access_list"],
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already enabled');
 | 
									if (row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Host is already enabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 1;
 | 
									row.enabled = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return proxyHostModel
 | 
									return proxyHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 1
 | 
											enabled: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Configure nginx
 | 
											// Configure nginx
 | 
				
			||||||
						return internalNginx.configure(proxyHostModel, 'proxy_host', row);
 | 
											return internalNginx.configure(proxyHostModel, "proxy_host", row);
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'enabled',
 | 
												action: "enabled",
 | 
				
			||||||
							object_type: 'proxy-host',
 | 
												object_type: "proxy-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -353,39 +370,40 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	disable: (access, data) => {
 | 
						disable: (access, data) => {
 | 
				
			||||||
		return access.can('proxy_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("proxy_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalProxyHost.get(access, {id: data.id});
 | 
									return internalProxyHost.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (!row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already disabled');
 | 
									if (!row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Host is already disabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 0;
 | 
									row.enabled = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return proxyHostModel
 | 
									return proxyHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 0
 | 
											enabled: 0,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('proxy_host', row)
 | 
											return internalNginx.deleteConfig("proxy_host", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'disabled',
 | 
												action: "disabled",
 | 
				
			||||||
							object_type: 'proxy-host',
 | 
												object_type: "proxy-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -402,40 +420,35 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @param   {String}  [search_query]
 | 
						 * @param   {String}  [search_query]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: async (access, expand, searchQuery) => {
 | 
				
			||||||
		return access.can('proxy_hosts:list')
 | 
							const accessData = await access.can("proxy_hosts:list");
 | 
				
			||||||
			.then((access_data) => {
 | 
							const query = proxyHostModel
 | 
				
			||||||
				let query = proxyHostModel
 | 
								.query()
 | 
				
			||||||
					.query()
 | 
								.where("is_deleted", 0)
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
								.groupBy("id")
 | 
				
			||||||
					.groupBy('id')
 | 
								.allowGraph("[owner,access_list,certificate]")
 | 
				
			||||||
					.allowGraph('[owner,access_list,certificate]')
 | 
								.orderBy(castJsonIfNeed("domain_names"), "ASC");
 | 
				
			||||||
					.orderBy('domain_names', 'ASC');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
							if (accessData.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
								query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
							// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
							if (typeof searchQuery === "string" && searchQuery.length > 0) {
 | 
				
			||||||
					query.where(function () {
 | 
								query.where(function () {
 | 
				
			||||||
						this.where('domain_names', 'like', '%' + search_query + '%');
 | 
									this.where(castJsonIfNeed("domain_names"), "like", `%${searchQuery}%`);
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
					 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
 | 
					 | 
				
			||||||
					return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return rows;
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const rows = await query.then(utils.omitRows(omissions()));
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null && expand.indexOf("certificate") !== -1) {
 | 
				
			||||||
 | 
								return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return rows;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -446,20 +459,16 @@ const internalProxyHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (user_id, visibility) => {
 | 
						getCount: (user_id, visibility) => {
 | 
				
			||||||
		let query = proxyHostModel
 | 
							const query = proxyHostModel.query().count("id as count").where("is_deleted", 0);
 | 
				
			||||||
			.query()
 | 
					 | 
				
			||||||
			.count('id as count')
 | 
					 | 
				
			||||||
			.where('is_deleted', 0);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (visibility !== 'all') {
 | 
							if (visibility !== "all") {
 | 
				
			||||||
			query.andWhere('owner_user_id', user_id);
 | 
								query.andWhere("owner_user_id", user_id);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query.first()
 | 
							return query.first().then((row) => {
 | 
				
			||||||
			.then((row) => {
 | 
								return Number.parseInt(row.count, 10);
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
							});
 | 
				
			||||||
			});
 | 
						},
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalProxyHost;
 | 
					export default internalProxyHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,66 +1,73 @@
 | 
				
			|||||||
const _                    = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const error                = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const utils                = require('../lib/utils');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
const redirectionHostModel = require('../models/redirection_host');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const internalHost         = require('./host');
 | 
					import redirectionHostModel from "../models/redirection_host.js";
 | 
				
			||||||
const internalNginx        = require('./nginx');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
const internalAuditLog     = require('./audit-log');
 | 
					import internalCertificate from "./certificate.js";
 | 
				
			||||||
const internalCertificate  = require('./certificate');
 | 
					import internalHost from "./host.js";
 | 
				
			||||||
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalRedirectionHost = {
 | 
					const internalRedirectionHost = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							let thisData = data || {};
 | 
				
			||||||
 | 
							const createCertificate = thisData.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (create_certificate) {
 | 
							if (createCertificate) {
 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete thisData.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('redirection_hosts:create', data)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:create", thisData)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
									// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
									const domain_name_check_promises = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data.domain_names.map(function (domain_name) {
 | 
									thisData.domain_names.map((domain_name) => {
 | 
				
			||||||
					domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name));
 | 
										domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name));
 | 
				
			||||||
 | 
										return true;
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return Promise.all(domain_name_check_promises)
 | 
									return Promise.all(domain_name_check_promises).then((check_results) => {
 | 
				
			||||||
					.then((check_results) => {
 | 
										check_results.map((result) => {
 | 
				
			||||||
						check_results.map(function (result) {
 | 
											if (result.is_taken) {
 | 
				
			||||||
							if (result.is_taken) {
 | 
												throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
								throw new error.ValidationError(result.hostname + ' is already in use');
 | 
											}
 | 
				
			||||||
							}
 | 
											return true;
 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				// At this point the domains should have been checked
 | 
									// At this point the domains should have been checked
 | 
				
			||||||
				data.owner_user_id = access.token.getUserId(1);
 | 
									thisData.owner_user_id = access.token.getUserId(1);
 | 
				
			||||||
				data               = internalHost.cleanSslHstsData(data);
 | 
									thisData = internalHost.cleanSslHstsData(thisData);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return redirectionHostModel
 | 
									// Fix for db field not having a default value
 | 
				
			||||||
					.query()
 | 
									// for this optional field.
 | 
				
			||||||
					.insertAndFetch(data)
 | 
									if (typeof data.advanced_config === "undefined") {
 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
										data.advanced_config = "";
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									return redirectionHostModel.query().insertAndFetch(thisData).then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (create_certificate) {
 | 
									if (createCertificate) {
 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, data)
 | 
										return internalCertificate
 | 
				
			||||||
 | 
											.createQuickCertificate(access, thisData)
 | 
				
			||||||
						.then((cert) => {
 | 
											.then((cert) => {
 | 
				
			||||||
							// update host with cert id
 | 
												// update host with cert id
 | 
				
			||||||
							return internalRedirectionHost.update(access, {
 | 
												return internalRedirectionHost.update(access, {
 | 
				
			||||||
								id:             row.id,
 | 
													id: row.id,
 | 
				
			||||||
								certificate_id: cert.id
 | 
													certificate_id: cert.id,
 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
@@ -72,27 +79,27 @@ const internalRedirectionHost = {
 | 
				
			|||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// re-fetch with cert
 | 
									// re-fetch with cert
 | 
				
			||||||
				return internalRedirectionHost.get(access, {
 | 
									return internalRedirectionHost.get(access, {
 | 
				
			||||||
					id:     row.id,
 | 
										id: row.id,
 | 
				
			||||||
					expand: ['certificate', 'owner']
 | 
										expand: ["certificate", "owner"],
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Configure nginx
 | 
									// Configure nginx
 | 
				
			||||||
				return internalNginx.configure(redirectionHostModel, 'redirection_host', row)
 | 
									return internalNginx.configure(redirectionHostModel, "redirection_host", row).then(() => {
 | 
				
			||||||
					.then(() => {
 | 
										return row;
 | 
				
			||||||
						return row;
 | 
									});
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				data.meta = _.assign({}, data.meta || {}, row.meta);
 | 
									thisData.meta = _.assign({}, thisData.meta || {}, row.meta);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Add to audit log
 | 
									// Add to audit log
 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
									return internalAuditLog
 | 
				
			||||||
					action:      'created',
 | 
										.add(access, {
 | 
				
			||||||
					object_type: 'redirection-host',
 | 
											action: "created",
 | 
				
			||||||
					object_id:   row.id,
 | 
											object_type: "redirection-host",
 | 
				
			||||||
					meta:        data
 | 
											object_id: row.id,
 | 
				
			||||||
				})
 | 
											meta: thisData,
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						return row;
 | 
											return row;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
@@ -106,94 +113,107 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: (access, data) => {
 | 
				
			||||||
		let create_certificate = data.certificate_id === 'new';
 | 
							let thisData = data || {};
 | 
				
			||||||
 | 
							const createCertificate = thisData.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (create_certificate) {
 | 
							if (createCertificate) {
 | 
				
			||||||
			delete data.certificate_id;
 | 
								delete thisData.certificate_id;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('redirection_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:update", thisData.id)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				// Get a list of the domain names and check each of them against existing records
 | 
									// Get a list of the domain names and check each of them against existing records
 | 
				
			||||||
				let domain_name_check_promises = [];
 | 
									const domain_name_check_promises = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.domain_names !== 'undefined') {
 | 
									if (typeof thisData.domain_names !== "undefined") {
 | 
				
			||||||
					data.domain_names.map(function (domain_name) {
 | 
										thisData.domain_names.map((domain_name) => {
 | 
				
			||||||
						domain_name_check_promises.push(internalHost.isHostnameTaken(domain_name, 'redirection', data.id));
 | 
											domain_name_check_promises.push(
 | 
				
			||||||
 | 
												internalHost.isHostnameTaken(domain_name, "redirection", thisData.id),
 | 
				
			||||||
 | 
											);
 | 
				
			||||||
 | 
											return true;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					return Promise.all(domain_name_check_promises)
 | 
										return Promise.all(domain_name_check_promises).then((check_results) => {
 | 
				
			||||||
						.then((check_results) => {
 | 
											check_results.map((result) => {
 | 
				
			||||||
							check_results.map(function (result) {
 | 
												if (result.is_taken) {
 | 
				
			||||||
								if (result.is_taken) {
 | 
													throw new errs.ValidationError(`${result.hostname} is already in use`);
 | 
				
			||||||
									throw new error.ValidationError(result.hostname + ' is already in use');
 | 
												}
 | 
				
			||||||
								}
 | 
												return true;
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalRedirectionHost.get(access, {id: data.id});
 | 
									return internalRedirectionHost.get(access, { id: thisData.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row.id !== data.id) {
 | 
									if (row.id !== thisData.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('Redirection Host could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`Redirection Host could not be updated, IDs do not match: ${row.id} !== ${thisData.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (create_certificate) {
 | 
									if (createCertificate) {
 | 
				
			||||||
					return internalCertificate.createQuickCertificate(access, {
 | 
										return internalCertificate
 | 
				
			||||||
						domain_names: data.domain_names || row.domain_names,
 | 
											.createQuickCertificate(access, {
 | 
				
			||||||
						meta:         _.assign({}, row.meta, data.meta)
 | 
												domain_names: thisData.domain_names || row.domain_names,
 | 
				
			||||||
					})
 | 
												meta: _.assign({}, row.meta, thisData.meta),
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
						.then((cert) => {
 | 
											.then((cert) => {
 | 
				
			||||||
							// update host with cert id
 | 
												// update host with cert id
 | 
				
			||||||
							data.certificate_id = cert.id;
 | 
												thisData.certificate_id = cert.id;
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return row;
 | 
												return row;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
									// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
				
			||||||
				data = _.assign({}, {
 | 
									thisData = _.assign(
 | 
				
			||||||
					domain_names: row.domain_names
 | 
										{},
 | 
				
			||||||
				}, data);
 | 
										{
 | 
				
			||||||
 | 
											domain_names: row.domain_names,
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
										thisData,
 | 
				
			||||||
 | 
									);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data = internalHost.cleanSslHstsData(data, row);
 | 
									thisData = internalHost.cleanSslHstsData(thisData, row);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return redirectionHostModel
 | 
									return redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where({id: data.id})
 | 
										.where({ id: thisData.id })
 | 
				
			||||||
					.patch(data)
 | 
										.patch(thisData)
 | 
				
			||||||
					.then((saved_row) => {
 | 
										.then((saved_row) => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog
 | 
				
			||||||
							action:      'updated',
 | 
												.add(access, {
 | 
				
			||||||
							object_type: 'redirection-host',
 | 
													action: "updated",
 | 
				
			||||||
							object_id:   row.id,
 | 
													object_type: "redirection-host",
 | 
				
			||||||
							meta:        data
 | 
													object_id: row.id,
 | 
				
			||||||
						})
 | 
													meta: thisData,
 | 
				
			||||||
 | 
												})
 | 
				
			||||||
							.then(() => {
 | 
												.then(() => {
 | 
				
			||||||
								return _.omit(saved_row, omissions());
 | 
													return _.omit(saved_row, omissions());
 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalRedirectionHost.get(access, {
 | 
									return internalRedirectionHost
 | 
				
			||||||
					id:     data.id,
 | 
										.get(access, {
 | 
				
			||||||
					expand: ['owner', 'certificate']
 | 
											id: thisData.id,
 | 
				
			||||||
				})
 | 
											expand: ["owner", "certificate"],
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then((row) => {
 | 
										.then((row) => {
 | 
				
			||||||
						// Configure nginx
 | 
											// Configure nginx
 | 
				
			||||||
						return internalNginx.configure(redirectionHostModel, 'redirection_host', row)
 | 
											return internalNginx
 | 
				
			||||||
 | 
												.configure(redirectionHostModel, "redirection_host", row)
 | 
				
			||||||
							.then((new_meta) => {
 | 
												.then((new_meta) => {
 | 
				
			||||||
								row.meta = new_meta;
 | 
													row.meta = new_meta;
 | 
				
			||||||
								row      = internalHost.cleanRowCertificateMeta(row);
 | 
													return _.omit(internalHost.cleanRowCertificateMeta(row), omissions());
 | 
				
			||||||
								return _.omit(row, omissions());
 | 
					 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
@@ -208,39 +228,39 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: (access, data) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const thisData = data || {};
 | 
				
			||||||
			data = {};
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('redirection_hosts:get', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:get", thisData.id)
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let query = redirectionHostModel
 | 
									const query = redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.andWhere('id', data.id)
 | 
										.andWhere("id", thisData.id)
 | 
				
			||||||
					.allowGraph('[owner,certificate]')
 | 
										.allowGraph("[owner,certificate]")
 | 
				
			||||||
					.first();
 | 
										.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
									if (access_data.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
										query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
									if (typeof thisData.expand !== "undefined" && thisData.expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${thisData.expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
									return query.then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									let thisRow = row;
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
									if (!thisRow || !thisRow.id) {
 | 
				
			||||||
 | 
										throw new errs.ItemNotFoundError(thisData.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				row = internalHost.cleanRowCertificateMeta(row);
 | 
									thisRow = internalHost.cleanRowCertificateMeta(thisRow);
 | 
				
			||||||
				// Custom omissions
 | 
									// Custom omissions
 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
									if (typeof thisData.omit !== "undefined" && thisData.omit !== null) {
 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
										return _.omit(thisRow, thisData.omit);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				return row;
 | 
									return thisRow;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -252,35 +272,35 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: (access, data) => {
 | 
				
			||||||
		return access.can('redirection_hosts:delete', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:delete", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalRedirectionHost.get(access, {id: data.id});
 | 
									return internalRedirectionHost.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return redirectionHostModel
 | 
									return redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						is_deleted: 1
 | 
											is_deleted: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('redirection_host', row)
 | 
											return internalNginx.deleteConfig("redirection_host", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'deleted',
 | 
												action: "deleted",
 | 
				
			||||||
							object_type: 'redirection-host',
 | 
												object_type: "redirection-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -297,39 +317,41 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	enable: (access, data) => {
 | 
						enable: (access, data) => {
 | 
				
			||||||
		return access.can('redirection_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalRedirectionHost.get(access, {
 | 
									return internalRedirectionHost.get(access, {
 | 
				
			||||||
					id:     data.id,
 | 
										id: data.id,
 | 
				
			||||||
					expand: ['certificate', 'owner']
 | 
										expand: ["certificate", "owner"],
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already enabled');
 | 
									if (row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Host is already enabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 1;
 | 
									row.enabled = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return redirectionHostModel
 | 
									return redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 1
 | 
											enabled: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Configure nginx
 | 
											// Configure nginx
 | 
				
			||||||
						return internalNginx.configure(redirectionHostModel, 'redirection_host', row);
 | 
											return internalNginx.configure(redirectionHostModel, "redirection_host", row);
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'enabled',
 | 
												action: "enabled",
 | 
				
			||||||
							object_type: 'redirection-host',
 | 
												object_type: "redirection-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -346,39 +368,40 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	disable: (access, data) => {
 | 
						disable: (access, data) => {
 | 
				
			||||||
		return access.can('redirection_hosts:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalRedirectionHost.get(access, {id: data.id});
 | 
									return internalRedirectionHost.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (!row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already disabled');
 | 
									if (!row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Host is already disabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 0;
 | 
									row.enabled = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return redirectionHostModel
 | 
									return redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 0
 | 
											enabled: 0,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('redirection_host', row)
 | 
											return internalNginx.deleteConfig("redirection_host", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'disabled',
 | 
												action: "disabled",
 | 
				
			||||||
							object_type: 'redirection-host',
 | 
												object_type: "redirection-host",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -396,34 +419,35 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: (access, expand, search_query) => {
 | 
				
			||||||
		return access.can('redirection_hosts:list')
 | 
							return access
 | 
				
			||||||
 | 
								.can("redirection_hosts:list")
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let query = redirectionHostModel
 | 
									const query = redirectionHostModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.groupBy('id')
 | 
										.groupBy("id")
 | 
				
			||||||
					.allowGraph('[owner,certificate]')
 | 
										.allowGraph("[owner,certificate]")
 | 
				
			||||||
					.orderBy('domain_names', 'ASC');
 | 
										.orderBy(castJsonIfNeed("domain_names"), "ASC");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
									if (access_data.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
										query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
									// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
									if (typeof search_query === "string" && search_query.length > 0) {
 | 
				
			||||||
					query.where(function () {
 | 
										query.where(function () {
 | 
				
			||||||
						this.where('domain_names', 'like', '%' + search_query + '%');
 | 
											this.where(castJsonIfNeed("domain_names"), "like", `%${search_query}%`);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
									if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
									return query.then(utils.omitRows(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((rows) => {
 | 
								.then((rows) => {
 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) {
 | 
									if (typeof expand !== "undefined" && expand !== null && expand.indexOf("certificate") !== -1) {
 | 
				
			||||||
					return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
										return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -439,20 +463,16 @@ const internalRedirectionHost = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (user_id, visibility) => {
 | 
						getCount: (user_id, visibility) => {
 | 
				
			||||||
		let query = redirectionHostModel
 | 
							const query = redirectionHostModel.query().count("id as count").where("is_deleted", 0);
 | 
				
			||||||
			.query()
 | 
					 | 
				
			||||||
			.count('id as count')
 | 
					 | 
				
			||||||
			.where('is_deleted', 0);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (visibility !== 'all') {
 | 
							if (visibility !== "all") {
 | 
				
			||||||
			query.andWhere('owner_user_id', user_id);
 | 
								query.andWhere("owner_user_id", user_id);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query.first()
 | 
							return query.first().then((row) => {
 | 
				
			||||||
			.then((row) => {
 | 
								return Number.parseInt(row.count, 10);
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
							});
 | 
				
			||||||
			});
 | 
						},
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalRedirectionHost;
 | 
					export default internalRedirectionHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,38 +1,37 @@
 | 
				
			|||||||
const internalProxyHost       = require('./proxy-host');
 | 
					import internalDeadHost from "./dead-host.js";
 | 
				
			||||||
const internalRedirectionHost = require('./redirection-host');
 | 
					import internalProxyHost from "./proxy-host.js";
 | 
				
			||||||
const internalDeadHost        = require('./dead-host');
 | 
					import internalRedirectionHost from "./redirection-host.js";
 | 
				
			||||||
const internalStream          = require('./stream');
 | 
					import internalStream from "./stream.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalReport = {
 | 
					const internalReport = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param  {Access}   access
 | 
						 * @param  {Access}   access
 | 
				
			||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getHostsReport: (access) => {
 | 
						getHostsReport: (access) => {
 | 
				
			||||||
		return access.can('reports:hosts', 1)
 | 
							return access
 | 
				
			||||||
 | 
								.can("reports:hosts", 1)
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let user_id = access.token.getUserId(1);
 | 
									const userId = access.token.getUserId(1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				let promises = [
 | 
									const promises = [
 | 
				
			||||||
					internalProxyHost.getCount(user_id, access_data.visibility),
 | 
										internalProxyHost.getCount(userId, access_data.visibility),
 | 
				
			||||||
					internalRedirectionHost.getCount(user_id, access_data.visibility),
 | 
										internalRedirectionHost.getCount(userId, access_data.visibility),
 | 
				
			||||||
					internalStream.getCount(user_id, access_data.visibility),
 | 
										internalStream.getCount(userId, access_data.visibility),
 | 
				
			||||||
					internalDeadHost.getCount(user_id, access_data.visibility)
 | 
										internalDeadHost.getCount(userId, access_data.visibility),
 | 
				
			||||||
				];
 | 
									];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return Promise.all(promises);
 | 
									return Promise.all(promises);
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((counts) => {
 | 
								.then((counts) => {
 | 
				
			||||||
				return {
 | 
									return {
 | 
				
			||||||
					proxy:       counts.shift(),
 | 
										proxy: counts.shift(),
 | 
				
			||||||
					redirection: counts.shift(),
 | 
										redirection: counts.shift(),
 | 
				
			||||||
					stream:      counts.shift(),
 | 
										stream: counts.shift(),
 | 
				
			||||||
					dead:        counts.shift()
 | 
										dead: counts.shift(),
 | 
				
			||||||
				};
 | 
									};
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalReport;
 | 
					export default internalReport;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,10 +1,9 @@
 | 
				
			|||||||
const fs            = require('fs');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const error         = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const settingModel  = require('../models/setting');
 | 
					import settingModel from "../models/setting.js";
 | 
				
			||||||
const internalNginx = require('./nginx');
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalSetting = {
 | 
					const internalSetting = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param  {Access}  access
 | 
						 * @param  {Access}  access
 | 
				
			||||||
	 * @param  {Object}  data
 | 
						 * @param  {Object}  data
 | 
				
			||||||
@@ -12,37 +11,38 @@ const internalSetting = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: (access, data) => {
 | 
				
			||||||
		return access.can('settings:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("settings:update", data.id)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				return internalSetting.get(access, {id: data.id});
 | 
									return internalSetting.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row.id !== data.id) {
 | 
									if (row.id !== data.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('Setting could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`Setting could not be updated, IDs do not match: ${row.id} !== ${data.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return settingModel
 | 
									return settingModel.query().where({ id: data.id }).patch(data);
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.where({id: data.id})
 | 
					 | 
				
			||||||
					.patch(data);
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalSetting.get(access, {
 | 
									return internalSetting.get(access, {
 | 
				
			||||||
					id: data.id
 | 
										id: data.id,
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row.id === 'default-site') {
 | 
									if (row.id === "default-site") {
 | 
				
			||||||
					// write the html if we need to
 | 
										// write the html if we need to
 | 
				
			||||||
					if (row.value === 'html') {
 | 
										if (row.value === "html") {
 | 
				
			||||||
						fs.writeFileSync('/data/nginx/default_www/index.html', row.meta.html, {encoding: 'utf8'});
 | 
											fs.writeFileSync("/data/nginx/default_www/index.html", row.meta.html, { encoding: "utf8" });
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					// Configure nginx
 | 
										// Configure nginx
 | 
				
			||||||
					return internalNginx.deleteConfig('default')
 | 
										return internalNginx
 | 
				
			||||||
 | 
											.deleteConfig("default")
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return internalNginx.generateConfig('default', row);
 | 
												return internalNginx.generateConfig("default", row);
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return internalNginx.test();
 | 
												return internalNginx.test();
 | 
				
			||||||
@@ -54,7 +54,8 @@ const internalSetting = {
 | 
				
			|||||||
							return row;
 | 
												return row;
 | 
				
			||||||
						})
 | 
											})
 | 
				
			||||||
						.catch((/*err*/) => {
 | 
											.catch((/*err*/) => {
 | 
				
			||||||
							internalNginx.deleteConfig('default')
 | 
												internalNginx
 | 
				
			||||||
 | 
													.deleteConfig("default")
 | 
				
			||||||
								.then(() => {
 | 
													.then(() => {
 | 
				
			||||||
									return internalNginx.test();
 | 
														return internalNginx.test();
 | 
				
			||||||
								})
 | 
													})
 | 
				
			||||||
@@ -63,12 +64,11 @@ const internalSetting = {
 | 
				
			|||||||
								})
 | 
													})
 | 
				
			||||||
								.then(() => {
 | 
													.then(() => {
 | 
				
			||||||
									// I'm being slack here I know..
 | 
														// I'm being slack here I know..
 | 
				
			||||||
									throw new error.ValidationError('Could not reconfigure Nginx. Please check logs.');
 | 
														throw new errs.ValidationError("Could not reconfigure Nginx. Please check logs.");
 | 
				
			||||||
								});
 | 
													});
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return row;
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -79,19 +79,16 @@ const internalSetting = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: (access, data) => {
 | 
				
			||||||
		return access.can('settings:get', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("settings:get", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return settingModel
 | 
									return settingModel.query().where("id", data.id).first();
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.where('id', data.id)
 | 
					 | 
				
			||||||
					.first();
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row) {
 | 
									if (row) {
 | 
				
			||||||
					return row;
 | 
										return row;
 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -102,15 +99,13 @@ const internalSetting = {
 | 
				
			|||||||
	 * @returns {*}
 | 
						 * @returns {*}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (access) => {
 | 
						getCount: (access) => {
 | 
				
			||||||
		return access.can('settings:list')
 | 
							return access
 | 
				
			||||||
 | 
								.can("settings:list")
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return settingModel
 | 
									return settingModel.query().count("id as count").first();
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.count('id as count')
 | 
					 | 
				
			||||||
					.first();
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
									return Number.parseInt(row.count, 10);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -121,13 +116,10 @@ const internalSetting = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access) => {
 | 
						getAll: (access) => {
 | 
				
			||||||
		return access.can('settings:list')
 | 
							return access.can("settings:list").then(() => {
 | 
				
			||||||
			.then(() => {
 | 
								return settingModel.query().orderBy("description", "ASC");
 | 
				
			||||||
				return settingModel
 | 
							});
 | 
				
			||||||
					.query()
 | 
						},
 | 
				
			||||||
					.orderBy('description', 'ASC');
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalSetting;
 | 
					export default internalSetting;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,51 +1,85 @@
 | 
				
			|||||||
const _                = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const error            = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const utils            = require('../lib/utils');
 | 
					import { castJsonIfNeed } from "../lib/helpers.js";
 | 
				
			||||||
const streamModel      = require('../models/stream');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const internalNginx    = require('./nginx');
 | 
					import streamModel from "../models/stream.js";
 | 
				
			||||||
const internalAuditLog = require('./audit-log');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
 | 
					import internalCertificate from "./certificate.js";
 | 
				
			||||||
 | 
					import internalHost from "./host.js";
 | 
				
			||||||
 | 
					import internalNginx from "./nginx.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted", "owner.is_deleted", "certificate.is_deleted"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalStream = {
 | 
					const internalStream = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: (access, data) => {
 | 
				
			||||||
		return access.can('streams:create', data)
 | 
							const create_certificate = data.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (create_certificate) {
 | 
				
			||||||
 | 
								delete data.certificate_id;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:create", data)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				// TODO: At this point the existing ports should have been checked
 | 
									// TODO: At this point the existing ports should have been checked
 | 
				
			||||||
				data.owner_user_id = access.token.getUserId(1);
 | 
									data.owner_user_id = access.token.getUserId(1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.meta === 'undefined') {
 | 
									if (typeof data.meta === "undefined") {
 | 
				
			||||||
					data.meta = {};
 | 
										data.meta = {};
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return streamModel
 | 
									// streams aren't routed by domain name so don't store domain names in the DB
 | 
				
			||||||
					.query()
 | 
									const data_no_domains = structuredClone(data);
 | 
				
			||||||
					.insertAndFetch(data)
 | 
									delete data_no_domains.domain_names;
 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
					
 | 
				
			||||||
 | 
									return streamModel.query().insertAndFetch(data_no_domains).then(utils.omitRow(omissions()));
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.then((row) => {
 | 
				
			||||||
 | 
									if (create_certificate) {
 | 
				
			||||||
 | 
										return internalCertificate
 | 
				
			||||||
 | 
											.createQuickCertificate(access, data)
 | 
				
			||||||
 | 
											.then((cert) => {
 | 
				
			||||||
 | 
												// update host with cert id
 | 
				
			||||||
 | 
												return internalStream.update(access, {
 | 
				
			||||||
 | 
													id: row.id,
 | 
				
			||||||
 | 
													certificate_id: cert.id,
 | 
				
			||||||
 | 
												});
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
 | 
											.then(() => {
 | 
				
			||||||
 | 
												return row;
 | 
				
			||||||
 | 
											});
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.then((row) => {
 | 
				
			||||||
 | 
									// re-fetch with cert
 | 
				
			||||||
 | 
									return internalStream.get(access, {
 | 
				
			||||||
 | 
										id: row.id,
 | 
				
			||||||
 | 
										expand: ["certificate", "owner"],
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Configure nginx
 | 
									// Configure nginx
 | 
				
			||||||
				return internalNginx.configure(streamModel, 'stream', row)
 | 
									return internalNginx.configure(streamModel, "stream", row).then(() => {
 | 
				
			||||||
					.then(() => {
 | 
										return row;
 | 
				
			||||||
						return internalStream.get(access, {id: row.id, expand: ['owner']});
 | 
									});
 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				// Add to audit log
 | 
									// Add to audit log
 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
									return internalAuditLog
 | 
				
			||||||
					action:      'created',
 | 
										.add(access, {
 | 
				
			||||||
					object_type: 'stream',
 | 
											action: "created",
 | 
				
			||||||
					object_id:   row.id,
 | 
											object_type: "stream",
 | 
				
			||||||
					meta:        data
 | 
											object_id: row.id,
 | 
				
			||||||
				})
 | 
											meta: data,
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						return row;
 | 
											return row;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
@@ -59,39 +93,78 @@ const internalStream = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: (access, data) => {
 | 
				
			||||||
		return access.can('streams:update', data.id)
 | 
							let thisData = data;
 | 
				
			||||||
 | 
							const create_certificate = thisData.certificate_id === "new";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (create_certificate) {
 | 
				
			||||||
 | 
								delete thisData.certificate_id;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:update", thisData.id)
 | 
				
			||||||
			.then((/*access_data*/) => {
 | 
								.then((/*access_data*/) => {
 | 
				
			||||||
				// TODO: at this point the existing streams should have been checked
 | 
									// TODO: at this point the existing streams should have been checked
 | 
				
			||||||
				return internalStream.get(access, {id: data.id});
 | 
									return internalStream.get(access, { id: thisData.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (row.id !== data.id) {
 | 
									if (row.id !== thisData.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('Stream could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`Stream could not be updated, IDs do not match: ${row.id} !== ${thisData.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									if (create_certificate) {
 | 
				
			||||||
 | 
										return internalCertificate
 | 
				
			||||||
 | 
											.createQuickCertificate(access, {
 | 
				
			||||||
 | 
												domain_names: thisData.domain_names || row.domain_names,
 | 
				
			||||||
 | 
												meta: _.assign({}, row.meta, thisData.meta),
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
 | 
											.then((cert) => {
 | 
				
			||||||
 | 
												// update host with cert id
 | 
				
			||||||
 | 
												thisData.certificate_id = cert.id;
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
 | 
											.then(() => {
 | 
				
			||||||
 | 
												return row;
 | 
				
			||||||
 | 
											});
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									return row;
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.then((row) => {
 | 
				
			||||||
 | 
									// Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
 | 
				
			||||||
 | 
									thisData = _.assign(
 | 
				
			||||||
 | 
										{},
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
											domain_names: row.domain_names,
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
										thisData,
 | 
				
			||||||
 | 
									);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return streamModel
 | 
									return streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.patchAndFetchById(row.id, data)
 | 
										.patchAndFetchById(row.id, thisData)
 | 
				
			||||||
					.then(utils.omitRow(omissions()))
 | 
										.then(utils.omitRow(omissions()))
 | 
				
			||||||
					.then((saved_row) => {
 | 
					 | 
				
			||||||
						return internalNginx.configure(streamModel, 'stream', saved_row)
 | 
					 | 
				
			||||||
							.then(() => {
 | 
					 | 
				
			||||||
								return internalStream.get(access, {id: row.id, expand: ['owner']});
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then((saved_row) => {
 | 
										.then((saved_row) => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog
 | 
				
			||||||
							action:      'updated',
 | 
												.add(access, {
 | 
				
			||||||
							object_type: 'stream',
 | 
													action: "updated",
 | 
				
			||||||
							object_id:   row.id,
 | 
													object_type: "stream",
 | 
				
			||||||
							meta:        data
 | 
													object_id: row.id,
 | 
				
			||||||
						})
 | 
													meta: thisData,
 | 
				
			||||||
 | 
												})
 | 
				
			||||||
							.then(() => {
 | 
												.then(() => {
 | 
				
			||||||
								return saved_row;
 | 
													return saved_row;
 | 
				
			||||||
							});
 | 
												});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.then(() => {
 | 
				
			||||||
 | 
									return internalStream.get(access, { id: thisData.id, expand: ["owner", "certificate"] }).then((row) => {
 | 
				
			||||||
 | 
										return internalNginx.configure(streamModel, "stream", row).then((new_meta) => {
 | 
				
			||||||
 | 
											row.meta = new_meta;
 | 
				
			||||||
 | 
											return _.omit(internalHost.cleanRowCertificateMeta(row), omissions());
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -104,38 +177,39 @@ const internalStream = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: (access, data) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const thisData = data || {};
 | 
				
			||||||
			data = {};
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('streams:get', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:get", thisData.id)
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let query = streamModel
 | 
									const query = streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.andWhere('id', data.id)
 | 
										.andWhere("id", thisData.id)
 | 
				
			||||||
					.allowGraph('[owner]')
 | 
										.allowGraph("[owner,certificate]")
 | 
				
			||||||
					.first();
 | 
										.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
									if (access_data.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
										query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
									if (typeof thisData.expand !== "undefined" && thisData.expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${thisData.expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
									return query.then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									let thisRow = row;
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
									if (!thisRow || !thisRow.id) {
 | 
				
			||||||
 | 
										throw new errs.ItemNotFoundError(thisData.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
									thisRow = internalHost.cleanRowCertificateMeta(thisRow);
 | 
				
			||||||
				// Custom omissions
 | 
									// Custom omissions
 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
									if (typeof thisData.omit !== "undefined" && thisData.omit !== null) {
 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
										return _.omit(thisRow, thisData.omit);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				return row;
 | 
									return thisRow;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -147,35 +221,35 @@ const internalStream = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: (access, data) => {
 | 
				
			||||||
		return access.can('streams:delete', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:delete", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalStream.get(access, {id: data.id});
 | 
									return internalStream.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return streamModel
 | 
									return streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						is_deleted: 1
 | 
											is_deleted: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('stream', row)
 | 
											return internalNginx.deleteConfig("stream", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'deleted',
 | 
												action: "deleted",
 | 
				
			||||||
							object_type: 'stream',
 | 
												object_type: "stream",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -192,39 +266,41 @@ const internalStream = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	enable: (access, data) => {
 | 
						enable: (access, data) => {
 | 
				
			||||||
		return access.can('streams:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalStream.get(access, {
 | 
									return internalStream.get(access, {
 | 
				
			||||||
					id:     data.id,
 | 
										id: data.id,
 | 
				
			||||||
					expand: ['owner']
 | 
										expand: ["certificate", "owner"],
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already enabled');
 | 
									if (row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Stream is already enabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 1;
 | 
									row.enabled = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return streamModel
 | 
									return streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 1
 | 
											enabled: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Configure nginx
 | 
											// Configure nginx
 | 
				
			||||||
						return internalNginx.configure(streamModel, 'stream', row);
 | 
											return internalNginx.configure(streamModel, "stream", row);
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'enabled',
 | 
												action: "enabled",
 | 
				
			||||||
							object_type: 'stream',
 | 
												object_type: "stream",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -241,39 +317,40 @@ const internalStream = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	disable: (access, data) => {
 | 
						disable: (access, data) => {
 | 
				
			||||||
		return access.can('streams:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalStream.get(access, {id: data.id});
 | 
									return internalStream.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				} else if (!row.enabled) {
 | 
									}
 | 
				
			||||||
					throw new error.ValidationError('Host is already disabled');
 | 
									if (!row.enabled) {
 | 
				
			||||||
 | 
										throw new errs.ValidationError("Stream is already disabled");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				row.enabled = 0;
 | 
									row.enabled = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return streamModel
 | 
									return streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', row.id)
 | 
										.where("id", row.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						enabled: 0
 | 
											enabled: 0,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Delete Nginx Config
 | 
											// Delete Nginx Config
 | 
				
			||||||
						return internalNginx.deleteConfig('stream', row)
 | 
											return internalNginx.deleteConfig("stream", row).then(() => {
 | 
				
			||||||
							.then(() => {
 | 
												return internalNginx.reload();
 | 
				
			||||||
								return internalNginx.reload();
 | 
											});
 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'disabled',
 | 
												action: "disabled",
 | 
				
			||||||
							object_type: 'stream-host',
 | 
												object_type: "stream",
 | 
				
			||||||
							object_id:   row.id,
 | 
												object_id: row.id,
 | 
				
			||||||
							meta:        _.omit(row, omissions())
 | 
												meta: _.omit(row, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -291,31 +368,39 @@ const internalStream = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: (access, expand, search_query) => {
 | 
				
			||||||
		return access.can('streams:list')
 | 
							return access
 | 
				
			||||||
 | 
								.can("streams:list")
 | 
				
			||||||
			.then((access_data) => {
 | 
								.then((access_data) => {
 | 
				
			||||||
				let query = streamModel
 | 
									const query = streamModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.groupBy('id')
 | 
										.groupBy("id")
 | 
				
			||||||
					.allowGraph('[owner]')
 | 
										.allowGraph("[owner,certificate]")
 | 
				
			||||||
					.orderBy('incoming_port', 'ASC');
 | 
										.orderBy("incoming_port", "ASC");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (access_data.permission_visibility !== 'all') {
 | 
									if (access_data.permission_visibility !== "all") {
 | 
				
			||||||
					query.andWhere('owner_user_id', access.token.getUserId(1));
 | 
										query.andWhere("owner_user_id", access.token.getUserId(1));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
									// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
									if (typeof search_query === "string" && search_query.length > 0) {
 | 
				
			||||||
					query.where(function () {
 | 
										query.where(function () {
 | 
				
			||||||
						this.where('incoming_port', 'like', '%' + search_query + '%');
 | 
											this.where(castJsonIfNeed("incoming_port"), "like", `%${search_query}%`);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
									if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
									return query.then(utils.omitRows(omissions()));
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.then((rows) => {
 | 
				
			||||||
 | 
									if (typeof expand !== "undefined" && expand !== null && expand.indexOf("certificate") !== -1) {
 | 
				
			||||||
 | 
										return internalHost.cleanAllRowsCertificateMeta(rows);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									return rows;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -327,20 +412,16 @@ const internalStream = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (user_id, visibility) => {
 | 
						getCount: (user_id, visibility) => {
 | 
				
			||||||
		let query = streamModel
 | 
							const query = streamModel.query().count("id AS count").where("is_deleted", 0);
 | 
				
			||||||
			.query()
 | 
					 | 
				
			||||||
			.count('id as count')
 | 
					 | 
				
			||||||
			.where('is_deleted', 0);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (visibility !== 'all') {
 | 
							if (visibility !== "all") {
 | 
				
			||||||
			query.andWhere('owner_user_id', user_id);
 | 
								query.andWhere("owner_user_id", user_id);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query.first()
 | 
							return query.first().then((row) => {
 | 
				
			||||||
			.then((row) => {
 | 
								return Number.parseInt(row.count, 10);
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
							});
 | 
				
			||||||
			});
 | 
						},
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalStream;
 | 
					export default internalStream;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,12 +1,14 @@
 | 
				
			|||||||
const _          = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const error      = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const userModel  = require('../models/user');
 | 
					import { parseDatePeriod } from "../lib/helpers.js";
 | 
				
			||||||
const authModel  = require('../models/auth');
 | 
					import authModel from "../models/auth.js";
 | 
				
			||||||
const helpers    = require('../lib/helpers');
 | 
					import TokenModel from "../models/token.js";
 | 
				
			||||||
const TokenModel = require('../models/token');
 | 
					import userModel from "../models/user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					const ERROR_MESSAGE_INVALID_AUTH = "Invalid email or password";
 | 
				
			||||||
 | 
					const ERROR_MESSAGE_INVALID_AUTH_I18N = "error.invalid-auth";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default {
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Object} data
 | 
						 * @param   {Object} data
 | 
				
			||||||
	 * @param   {String} data.identity
 | 
						 * @param   {String} data.identity
 | 
				
			||||||
@@ -16,70 +18,66 @@ module.exports = {
 | 
				
			|||||||
	 * @param   {String} [issuer]
 | 
						 * @param   {String} [issuer]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getTokenFromEmail: (data, issuer) => {
 | 
						getTokenFromEmail: async (data, issuer) => {
 | 
				
			||||||
		let Token = new TokenModel();
 | 
							const Token = TokenModel();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		data.scope  = data.scope || 'user';
 | 
							data.scope = data.scope || "user";
 | 
				
			||||||
		data.expiry = data.expiry || '1d';
 | 
							data.expiry = data.expiry || "1d";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return userModel
 | 
							const user = await userModel
 | 
				
			||||||
			.query()
 | 
								.query()
 | 
				
			||||||
			.where('email', data.identity.toLowerCase().trim())
 | 
								.where("email", data.identity.toLowerCase().trim())
 | 
				
			||||||
			.andWhere('is_deleted', 0)
 | 
								.andWhere("is_deleted", 0)
 | 
				
			||||||
			.andWhere('is_disabled', 0)
 | 
								.andWhere("is_disabled", 0)
 | 
				
			||||||
			.first()
 | 
								.first();
 | 
				
			||||||
			.then((user) => {
 | 
					 | 
				
			||||||
				if (user) {
 | 
					 | 
				
			||||||
					// Get auth
 | 
					 | 
				
			||||||
					return authModel
 | 
					 | 
				
			||||||
						.query()
 | 
					 | 
				
			||||||
						.where('user_id', '=', user.id)
 | 
					 | 
				
			||||||
						.where('type', '=', 'password')
 | 
					 | 
				
			||||||
						.first()
 | 
					 | 
				
			||||||
						.then((auth) => {
 | 
					 | 
				
			||||||
							if (auth) {
 | 
					 | 
				
			||||||
								return auth.verifyPassword(data.secret)
 | 
					 | 
				
			||||||
									.then((valid) => {
 | 
					 | 
				
			||||||
										if (valid) {
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
											if (data.scope !== 'user' && _.indexOf(user.roles, data.scope) === -1) {
 | 
							if (!user) {
 | 
				
			||||||
												// The scope requested doesn't exist as a role against the user,
 | 
								throw new errs.AuthError(ERROR_MESSAGE_INVALID_AUTH);
 | 
				
			||||||
												// you shall not pass.
 | 
							}
 | 
				
			||||||
												throw new error.AuthError('Invalid scope: ' + data.scope);
 | 
					 | 
				
			||||||
											}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
											// Create a moment of the expiry expression
 | 
							const auth = await authModel
 | 
				
			||||||
											let expiry = helpers.parseDatePeriod(data.expiry);
 | 
								.query()
 | 
				
			||||||
											if (expiry === null) {
 | 
								.where("user_id", "=", user.id)
 | 
				
			||||||
												throw new error.AuthError('Invalid expiry time: ' + data.expiry);
 | 
								.where("type", "=", "password")
 | 
				
			||||||
											}
 | 
								.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
											return Token.create({
 | 
							if (!auth) {
 | 
				
			||||||
												iss:   issuer || 'api',
 | 
								throw new errs.AuthError(ERROR_MESSAGE_INVALID_AUTH);
 | 
				
			||||||
												attrs: {
 | 
							}
 | 
				
			||||||
													id: user.id
 | 
					
 | 
				
			||||||
												},
 | 
							const valid = await auth.verifyPassword(data.secret);
 | 
				
			||||||
												scope:     [data.scope],
 | 
							if (!valid) {
 | 
				
			||||||
												expiresIn: data.expiry
 | 
								throw new errs.AuthError(
 | 
				
			||||||
											})
 | 
									ERROR_MESSAGE_INVALID_AUTH,
 | 
				
			||||||
												.then((signed) => {
 | 
									ERROR_MESSAGE_INVALID_AUTH_I18N,
 | 
				
			||||||
													return {
 | 
								);
 | 
				
			||||||
														token:   signed.token,
 | 
							}
 | 
				
			||||||
														expires: expiry.toISOString()
 | 
					
 | 
				
			||||||
													};
 | 
							if (data.scope !== "user" && _.indexOf(user.roles, data.scope) === -1) {
 | 
				
			||||||
												});
 | 
								// The scope requested doesn't exist as a role against the user,
 | 
				
			||||||
										} else {
 | 
								// you shall not pass.
 | 
				
			||||||
											throw new error.AuthError('Invalid password');
 | 
								throw new errs.AuthError(`Invalid scope: ${data.scope}`);
 | 
				
			||||||
										}
 | 
							}
 | 
				
			||||||
									});
 | 
					
 | 
				
			||||||
							} else {
 | 
							// Create a moment of the expiry expression
 | 
				
			||||||
								throw new error.AuthError('No password auth for user');
 | 
							const expiry = parseDatePeriod(data.expiry);
 | 
				
			||||||
							}
 | 
							if (expiry === null) {
 | 
				
			||||||
						});
 | 
								throw new errs.AuthError(`Invalid expiry time: ${data.expiry}`);
 | 
				
			||||||
				} else {
 | 
							}
 | 
				
			||||||
					throw new error.AuthError('No relevant user found');
 | 
					
 | 
				
			||||||
				}
 | 
							const signed = await Token.create({
 | 
				
			||||||
			});
 | 
								iss: issuer || "api",
 | 
				
			||||||
 | 
								attrs: {
 | 
				
			||||||
 | 
									id: user.id,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								scope: [data.scope],
 | 
				
			||||||
 | 
								expiresIn: data.expiry,
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return {
 | 
				
			||||||
 | 
								token: signed.token,
 | 
				
			||||||
 | 
								expires: expiry.toISOString(),
 | 
				
			||||||
 | 
							};
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -89,74 +87,70 @@ module.exports = {
 | 
				
			|||||||
	 * @param {String} [data.scope]   Only considered if existing token scope is admin
 | 
						 * @param {String} [data.scope]   Only considered if existing token scope is admin
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getFreshToken: (access, data) => {
 | 
						getFreshToken: async (access, data) => {
 | 
				
			||||||
		let Token = new TokenModel();
 | 
							const Token = TokenModel();
 | 
				
			||||||
 | 
							const thisData = data || {};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		data        = data || {};
 | 
							thisData.expiry = thisData.expiry || "1d";
 | 
				
			||||||
		data.expiry = data.expiry || '1d';
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (access && access.token.getUserId(0)) {
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (access?.token.getUserId(0)) {
 | 
				
			||||||
			// Create a moment of the expiry expression
 | 
								// Create a moment of the expiry expression
 | 
				
			||||||
			let expiry = helpers.parseDatePeriod(data.expiry);
 | 
								const expiry = parseDatePeriod(thisData.expiry);
 | 
				
			||||||
			if (expiry === null) {
 | 
								if (expiry === null) {
 | 
				
			||||||
				throw new error.AuthError('Invalid expiry time: ' + data.expiry);
 | 
									throw new errs.AuthError(`Invalid expiry time: ${thisData.expiry}`);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			let token_attrs = {
 | 
								const token_attrs = {
 | 
				
			||||||
				id: access.token.getUserId(0)
 | 
									id: access.token.getUserId(0),
 | 
				
			||||||
			};
 | 
								};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Only admins can request otherwise scoped tokens
 | 
								// Only admins can request otherwise scoped tokens
 | 
				
			||||||
			let scope = access.token.get('scope');
 | 
								let scope = access.token.get("scope");
 | 
				
			||||||
			if (data.scope && access.token.hasScope('admin')) {
 | 
								if (thisData.scope && access.token.hasScope("admin")) {
 | 
				
			||||||
				scope = [data.scope];
 | 
									scope = [thisData.scope];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (data.scope === 'job-board' || data.scope === 'worker') {
 | 
									if (thisData.scope === "job-board" || thisData.scope === "worker") {
 | 
				
			||||||
					token_attrs.id = 0;
 | 
										token_attrs.id = 0;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return Token.create({
 | 
								const signed = await Token.create({
 | 
				
			||||||
				iss:       'api',
 | 
									iss: "api",
 | 
				
			||||||
				scope:     scope,
 | 
									scope: scope,
 | 
				
			||||||
				attrs:     token_attrs,
 | 
									attrs: token_attrs,
 | 
				
			||||||
				expiresIn: data.expiry
 | 
									expiresIn: thisData.expiry,
 | 
				
			||||||
			})
 | 
								});
 | 
				
			||||||
				.then((signed) => {
 | 
					
 | 
				
			||||||
					return {
 | 
								return {
 | 
				
			||||||
						token:   signed.token,
 | 
									token: signed.token,
 | 
				
			||||||
						expires: expiry.toISOString()
 | 
									expires: expiry.toISOString(),
 | 
				
			||||||
					};
 | 
								};
 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			throw new error.AssertionFailedError('Existing token contained invalid user data');
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
							throw new error.AssertionFailedError("Existing token contained invalid user data");
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * @param   {Object} user
 | 
						 * @param   {Object} user
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getTokenFromUser: (user) => {
 | 
						getTokenFromUser: async (user) => {
 | 
				
			||||||
		const expire = '1d';
 | 
							const expire = "1d";
 | 
				
			||||||
		const Token  = new TokenModel();
 | 
							const Token = TokenModel();
 | 
				
			||||||
		const expiry = helpers.parseDatePeriod(expire);
 | 
							const expiry = parseDatePeriod(expire);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return Token.create({
 | 
							const signed = await Token.create({
 | 
				
			||||||
			iss:   'api',
 | 
								iss: "api",
 | 
				
			||||||
			attrs: {
 | 
								attrs: {
 | 
				
			||||||
				id: user.id
 | 
									id: user.id,
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			scope:     ['user'],
 | 
								scope: ["user"],
 | 
				
			||||||
			expiresIn: expire
 | 
								expiresIn: expire,
 | 
				
			||||||
		})
 | 
							});
 | 
				
			||||||
			.then((signed) => {
 | 
					
 | 
				
			||||||
				return {
 | 
							return {
 | 
				
			||||||
					token:   signed.token,
 | 
								token: signed.token,
 | 
				
			||||||
					expires: expiry.toISOString(),
 | 
								expires: expiry.toISOString(),
 | 
				
			||||||
					user:    user
 | 
								user: user,
 | 
				
			||||||
				};
 | 
							};
 | 
				
			||||||
			});
 | 
						},
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,93 +1,76 @@
 | 
				
			|||||||
const _                   = require('lodash');
 | 
					import gravatar from "gravatar";
 | 
				
			||||||
const error               = require('../lib/error');
 | 
					import _ from "lodash";
 | 
				
			||||||
const utils               = require('../lib/utils');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const userModel           = require('../models/user');
 | 
					import utils from "../lib/utils.js";
 | 
				
			||||||
const userPermissionModel = require('../models/user_permission');
 | 
					import authModel from "../models/auth.js";
 | 
				
			||||||
const authModel           = require('../models/auth');
 | 
					import userModel from "../models/user.js";
 | 
				
			||||||
const gravatar            = require('gravatar');
 | 
					import userPermissionModel from "../models/user_permission.js";
 | 
				
			||||||
const internalToken       = require('./token');
 | 
					import internalAuditLog from "./audit-log.js";
 | 
				
			||||||
const internalAuditLog    = require('./audit-log');
 | 
					import internalToken from "./token.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function omissions () {
 | 
					const omissions = () => {
 | 
				
			||||||
	return ['is_deleted'];
 | 
						return ["is_deleted", "permissions.id", "permissions.user_id", "permissions.created_on", "permissions.modified_on"];
 | 
				
			||||||
}
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const DEFAULT_AVATAR = gravatar.url("admin@example.com", { default: "mm" });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const internalUser = {
 | 
					const internalUser = {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
 | 
						 * Create a user can happen unauthenticated only once and only when no active users exist.
 | 
				
			||||||
 | 
						 * Otherwise, a valid auth method is required.
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
	 * @param   {Access}  access
 | 
						 * @param   {Access}  access
 | 
				
			||||||
	 * @param   {Object}  data
 | 
						 * @param   {Object}  data
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	create: (access, data) => {
 | 
						create: async (access, data) => {
 | 
				
			||||||
		let auth = data.auth || null;
 | 
							const auth = data.auth || null;
 | 
				
			||||||
		delete data.auth;
 | 
							delete data.auth;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		data.avatar = data.avatar || '';
 | 
							data.avatar = data.avatar || "";
 | 
				
			||||||
		data.roles  = data.roles || [];
 | 
							data.roles = data.roles || [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (typeof data.is_disabled !== 'undefined') {
 | 
							if (typeof data.is_disabled !== "undefined") {
 | 
				
			||||||
			data.is_disabled = data.is_disabled ? 1 : 0;
 | 
								data.is_disabled = data.is_disabled ? 1 : 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('users:create', data)
 | 
							await access.can("users:create", data);
 | 
				
			||||||
			.then(() => {
 | 
							data.avatar = gravatar.url(data.email, { default: "mm" });
 | 
				
			||||||
				data.avatar = gravatar.url(data.email, {default: 'mm'});
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return userModel
 | 
							let user = await userModel.query().insertAndFetch(data).then(utils.omitRow(omissions()));
 | 
				
			||||||
					.query()
 | 
							if (auth) {
 | 
				
			||||||
					.insertAndFetch(data)
 | 
								user = await authModel.query().insert({
 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
									user_id: user.id,
 | 
				
			||||||
			})
 | 
									type: auth.type,
 | 
				
			||||||
			.then((user) => {
 | 
									secret: auth.secret,
 | 
				
			||||||
				if (auth) {
 | 
									meta: {},
 | 
				
			||||||
					return authModel
 | 
					 | 
				
			||||||
						.query()
 | 
					 | 
				
			||||||
						.insert({
 | 
					 | 
				
			||||||
							user_id: user.id,
 | 
					 | 
				
			||||||
							type:    auth.type,
 | 
					 | 
				
			||||||
							secret:  auth.secret,
 | 
					 | 
				
			||||||
							meta:    {}
 | 
					 | 
				
			||||||
						})
 | 
					 | 
				
			||||||
						.then(() => {
 | 
					 | 
				
			||||||
							return user;
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					return user;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((user) => {
 | 
					 | 
				
			||||||
				// Create permissions row as well
 | 
					 | 
				
			||||||
				let is_admin = data.roles.indexOf('admin') !== -1;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return userPermissionModel
 | 
					 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.insert({
 | 
					 | 
				
			||||||
						user_id:           user.id,
 | 
					 | 
				
			||||||
						visibility:        is_admin ? 'all' : 'user',
 | 
					 | 
				
			||||||
						proxy_hosts:       'manage',
 | 
					 | 
				
			||||||
						redirection_hosts: 'manage',
 | 
					 | 
				
			||||||
						dead_hosts:        'manage',
 | 
					 | 
				
			||||||
						streams:           'manage',
 | 
					 | 
				
			||||||
						access_lists:      'manage',
 | 
					 | 
				
			||||||
						certificates:      'manage'
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						return internalUser.get(access, {id: user.id, expand: ['permissions']});
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((user) => {
 | 
					 | 
				
			||||||
				// Add to audit log
 | 
					 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
					 | 
				
			||||||
					action:      'created',
 | 
					 | 
				
			||||||
					object_type: 'user',
 | 
					 | 
				
			||||||
					object_id:   user.id,
 | 
					 | 
				
			||||||
					meta:        user
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						return user;
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create permissions row as well
 | 
				
			||||||
 | 
							const isAdmin = data.roles.indexOf("admin") !== -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							await userPermissionModel.query().insert({
 | 
				
			||||||
 | 
								user_id: user.id,
 | 
				
			||||||
 | 
								visibility: isAdmin ? "all" : "user",
 | 
				
			||||||
 | 
								proxy_hosts: "manage",
 | 
				
			||||||
 | 
								redirection_hosts: "manage",
 | 
				
			||||||
 | 
								dead_hosts: "manage",
 | 
				
			||||||
 | 
								streams: "manage",
 | 
				
			||||||
 | 
								access_lists: "manage",
 | 
				
			||||||
 | 
								certificates: "manage",
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							user = await internalUser.get(access, { id: user.id, expand: ["permissions"] });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							await internalAuditLog.add(access, {
 | 
				
			||||||
 | 
								action: "created",
 | 
				
			||||||
 | 
								object_type: "user",
 | 
				
			||||||
 | 
								object_id: user.id,
 | 
				
			||||||
 | 
								meta: user,
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							return user;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -99,62 +82,57 @@ const internalUser = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	update: (access, data) => {
 | 
						update: (access, data) => {
 | 
				
			||||||
		if (typeof data.is_disabled !== 'undefined') {
 | 
							if (typeof data.is_disabled !== "undefined") {
 | 
				
			||||||
			data.is_disabled = data.is_disabled ? 1 : 0;
 | 
								data.is_disabled = data.is_disabled ? 1 : 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return access.can('users:update', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:update", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
 | 
					 | 
				
			||||||
				// Make sure that the user being updated doesn't change their email to another user that is already using it
 | 
									// Make sure that the user being updated doesn't change their email to another user that is already using it
 | 
				
			||||||
				// 1. get user we want to update
 | 
									// 1. get user we want to update
 | 
				
			||||||
				return internalUser.get(access, {id: data.id})
 | 
									return internalUser.get(access, { id: data.id }).then((user) => {
 | 
				
			||||||
					.then((user) => {
 | 
										// 2. if email is to be changed, find other users with that email
 | 
				
			||||||
 | 
										if (typeof data.email !== "undefined") {
 | 
				
			||||||
 | 
											data.email = data.email.toLowerCase().trim();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						// 2. if email is to be changed, find other users with that email
 | 
											if (user.email !== data.email) {
 | 
				
			||||||
						if (typeof data.email !== 'undefined') {
 | 
												return internalUser.isEmailAvailable(data.email, data.id).then((available) => {
 | 
				
			||||||
							data.email = data.email.toLowerCase().trim();
 | 
													if (!available) {
 | 
				
			||||||
 | 
														throw new errs.ValidationError(`Email address already in use - ${data.email}`);
 | 
				
			||||||
							if (user.email !== data.email) {
 | 
													}
 | 
				
			||||||
								return internalUser.isEmailAvailable(data.email, data.id)
 | 
													return user;
 | 
				
			||||||
									.then((available) => {
 | 
												});
 | 
				
			||||||
										if (!available) {
 | 
					 | 
				
			||||||
											throw new error.ValidationError('Email address already in use - ' + data.email);
 | 
					 | 
				
			||||||
										}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
										return user;
 | 
					 | 
				
			||||||
									});
 | 
					 | 
				
			||||||
							}
 | 
					 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						// No change to email:
 | 
										// No change to email:
 | 
				
			||||||
						return user;
 | 
										return user;
 | 
				
			||||||
					});
 | 
									});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				if (user.id !== data.id) {
 | 
									if (user.id !== data.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('User could not be updated, IDs do not match: ' + user.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`User could not be updated, IDs do not match: ${user.id} !== ${data.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				data.avatar = gravatar.url(data.email || user.email, {default: 'mm'});
 | 
									data.avatar = gravatar.url(data.email || user.email, { default: "mm" });
 | 
				
			||||||
 | 
									return userModel.query().patchAndFetchById(user.id, data).then(utils.omitRow(omissions()));
 | 
				
			||||||
				return userModel
 | 
					 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.patchAndFetchById(user.id, data)
 | 
					 | 
				
			||||||
					.then(utils.omitRow(omissions()));
 | 
					 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalUser.get(access, {id: data.id});
 | 
									return internalUser.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				// Add to audit log
 | 
									// Add to audit log
 | 
				
			||||||
				return internalAuditLog.add(access, {
 | 
									return internalAuditLog
 | 
				
			||||||
					action:      'updated',
 | 
										.add(access, {
 | 
				
			||||||
					object_type: 'user',
 | 
											action: "updated",
 | 
				
			||||||
					object_id:   user.id,
 | 
											object_type: "user",
 | 
				
			||||||
					meta:        data
 | 
											object_id: user.id,
 | 
				
			||||||
				})
 | 
											meta: { ...data, id: user.id, name: user.name },
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						return user;
 | 
											return user;
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
@@ -170,37 +148,41 @@ const internalUser = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	get: (access, data) => {
 | 
						get: (access, data) => {
 | 
				
			||||||
		if (typeof data === 'undefined') {
 | 
							const thisData = data || {};
 | 
				
			||||||
			data = {};
 | 
					
 | 
				
			||||||
 | 
							if (typeof thisData.id === "undefined" || !thisData.id) {
 | 
				
			||||||
 | 
								thisData.id = access.token.getUserId(0);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (typeof data.id === 'undefined' || !data.id) {
 | 
							return access
 | 
				
			||||||
			data.id = access.token.getUserId(0);
 | 
								.can("users:get", thisData.id)
 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		return access.can('users:get', data.id)
 | 
					 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				let query = userModel
 | 
									const query = userModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
										.where("is_deleted", 0)
 | 
				
			||||||
					.andWhere('id', data.id)
 | 
										.andWhere("id", thisData.id)
 | 
				
			||||||
					.allowGraph('[permissions]')
 | 
										.allowGraph("[permissions]")
 | 
				
			||||||
					.first();
 | 
										.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (typeof data.expand !== 'undefined' && data.expand !== null) {
 | 
									if (typeof thisData.expand !== "undefined" && thisData.expand !== null) {
 | 
				
			||||||
					query.withGraphFetched('[' + data.expand.join(', ') + ']');
 | 
										query.withGraphFetched(`[${thisData.expand.join(", ")}]`);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query.then(utils.omitRow(omissions()));
 | 
									return query.then(utils.omitRow(omissions()));
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				if (!row) {
 | 
									if (!row || !row.id) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(thisData.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				// Custom omissions
 | 
									// Custom omissions
 | 
				
			||||||
				if (typeof data.omit !== 'undefined' && data.omit !== null) {
 | 
									if (typeof thisData.omit !== "undefined" && thisData.omit !== null) {
 | 
				
			||||||
					row = _.omit(row, data.omit);
 | 
										return _.omit(row, thisData.omit);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									if (row.avatar === "") {
 | 
				
			||||||
 | 
										row.avatar = DEFAULT_AVATAR;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return row;
 | 
									return row;
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
@@ -213,20 +195,15 @@ const internalUser = {
 | 
				
			|||||||
	 * @param user_id
 | 
						 * @param user_id
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	isEmailAvailable: (email, user_id) => {
 | 
						isEmailAvailable: (email, user_id) => {
 | 
				
			||||||
		let query = userModel
 | 
							const query = userModel.query().where("email", "=", email.toLowerCase().trim()).where("is_deleted", 0).first();
 | 
				
			||||||
			.query()
 | 
					 | 
				
			||||||
			.where('email', '=', email.toLowerCase().trim())
 | 
					 | 
				
			||||||
			.where('is_deleted', 0)
 | 
					 | 
				
			||||||
			.first();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (typeof user_id !== 'undefined') {
 | 
							if (typeof user_id !== "undefined") {
 | 
				
			||||||
			query.where('id', '!=', user_id);
 | 
								query.where("id", "!=", user_id);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return query
 | 
							return query.then((user) => {
 | 
				
			||||||
			.then((user) => {
 | 
								return !user;
 | 
				
			||||||
				return !user;
 | 
							});
 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -237,33 +214,34 @@ const internalUser = {
 | 
				
			|||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	delete: (access, data) => {
 | 
						delete: (access, data) => {
 | 
				
			||||||
		return access.can('users:delete', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:delete", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalUser.get(access, {id: data.id});
 | 
									return internalUser.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				if (!user) {
 | 
									if (!user) {
 | 
				
			||||||
					throw new error.ItemNotFoundError(data.id);
 | 
										throw new errs.ItemNotFoundError(data.id);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Make sure user can't delete themselves
 | 
									// Make sure user can't delete themselves
 | 
				
			||||||
				if (user.id === access.token.getUserId(0)) {
 | 
									if (user.id === access.token.getUserId(0)) {
 | 
				
			||||||
					throw new error.PermissionError('You cannot delete yourself.');
 | 
										throw new errs.PermissionError("You cannot delete yourself.");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return userModel
 | 
									return userModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('id', user.id)
 | 
										.where("id", user.id)
 | 
				
			||||||
					.patch({
 | 
										.patch({
 | 
				
			||||||
						is_deleted: 1
 | 
											is_deleted: 1,
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to audit log
 | 
											// Add to audit log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'deleted',
 | 
												action: "deleted",
 | 
				
			||||||
							object_type: 'user',
 | 
												object_type: "user",
 | 
				
			||||||
							object_id:   user.id,
 | 
												object_id: user.id,
 | 
				
			||||||
							meta:        _.omit(user, omissions())
 | 
												meta: _.omit(user, omissions()),
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -272,6 +250,14 @@ const internalUser = {
 | 
				
			|||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						deleteAll: async () => {
 | 
				
			||||||
 | 
							await userModel
 | 
				
			||||||
 | 
								.query()
 | 
				
			||||||
 | 
								.patch({
 | 
				
			||||||
 | 
									is_deleted: 1,
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * This will only count the users
 | 
						 * This will only count the users
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
@@ -280,26 +266,26 @@ const internalUser = {
 | 
				
			|||||||
	 * @returns {*}
 | 
						 * @returns {*}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getCount: (access, search_query) => {
 | 
						getCount: (access, search_query) => {
 | 
				
			||||||
		return access.can('users:list')
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:list")
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				let query = userModel
 | 
									const query = userModel.query().count("id as count").where("is_deleted", 0).first();
 | 
				
			||||||
					.query()
 | 
					 | 
				
			||||||
					.count('id as count')
 | 
					 | 
				
			||||||
					.where('is_deleted', 0)
 | 
					 | 
				
			||||||
					.first();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
									// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
									if (typeof search_query === "string") {
 | 
				
			||||||
					query.where(function () {
 | 
										query.where(function () {
 | 
				
			||||||
						this.where('user.name', 'like', '%' + search_query + '%')
 | 
											this.where("user.name", "like", `%${search_query}%`).orWhere(
 | 
				
			||||||
							.orWhere('user.email', 'like', '%' + search_query + '%');
 | 
												"user.email",
 | 
				
			||||||
 | 
												"like",
 | 
				
			||||||
 | 
												`%${search_query}%`,
 | 
				
			||||||
 | 
											);
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return query;
 | 
									return query;
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((row) => {
 | 
								.then((row) => {
 | 
				
			||||||
				return parseInt(row.count, 10);
 | 
									return Number.parseInt(row.count, 10);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -311,30 +297,28 @@ const internalUser = {
 | 
				
			|||||||
	 * @param   {String}  [search_query]
 | 
						 * @param   {String}  [search_query]
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getAll: (access, expand, search_query) => {
 | 
						getAll: async (access, expand, search_query) => {
 | 
				
			||||||
		return access.can('users:list')
 | 
							await access.can("users:list");
 | 
				
			||||||
			.then(() => {
 | 
							const query = userModel
 | 
				
			||||||
				let query = userModel
 | 
								.query()
 | 
				
			||||||
					.query()
 | 
								.where("is_deleted", 0)
 | 
				
			||||||
					.where('is_deleted', 0)
 | 
								.groupBy("id")
 | 
				
			||||||
					.groupBy('id')
 | 
								.allowGraph("[permissions]")
 | 
				
			||||||
					.allowGraph('[permissions]')
 | 
								.orderBy("name", "ASC");
 | 
				
			||||||
					.orderBy('name', 'ASC');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// Query is used for searching
 | 
							// Query is used for searching
 | 
				
			||||||
				if (typeof search_query === 'string') {
 | 
							if (typeof search_query === "string") {
 | 
				
			||||||
					query.where(function () {
 | 
								query.where(function () {
 | 
				
			||||||
						this.where('name', 'like', '%' + search_query + '%')
 | 
									this.where("name", "like", `%${search_query}%`).orWhere("email", "like", `%${search_query}%`);
 | 
				
			||||||
							.orWhere('email', 'like', '%' + search_query + '%');
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if (typeof expand !== 'undefined' && expand !== null) {
 | 
					 | 
				
			||||||
					query.withGraphFetched('[' + expand.join(', ') + ']');
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				return query.then(utils.omitRows(omissions()));
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (typeof expand !== "undefined" && expand !== null) {
 | 
				
			||||||
 | 
								query.withGraphFetched(`[${expand.join(", ")}]`);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							const res = await query;
 | 
				
			||||||
 | 
							return utils.omitRows(omissions())(res);
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -342,11 +326,11 @@ const internalUser = {
 | 
				
			|||||||
	 * @param   {Integer} [id_requested]
 | 
						 * @param   {Integer} [id_requested]
 | 
				
			||||||
	 * @returns {[String]}
 | 
						 * @returns {[String]}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	getUserOmisionsByAccess: (access, id_requested) => {
 | 
						getUserOmisionsByAccess: (access, idRequested) => {
 | 
				
			||||||
		let response = []; // Admin response
 | 
							let response = []; // Admin response
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!access.token.hasScope('admin') && access.token.getUserId(0) !== id_requested) {
 | 
							if (!access.token.hasScope("admin") && access.token.getUserId(0) !== idRequested) {
 | 
				
			||||||
			response = ['roles', 'is_deleted']; // Restricted response
 | 
								response = ["is_deleted"]; // Restricted response
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return response;
 | 
							return response;
 | 
				
			||||||
@@ -361,26 +345,30 @@ const internalUser = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	setPassword: (access, data) => {
 | 
						setPassword: (access, data) => {
 | 
				
			||||||
		return access.can('users:password', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:password", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalUser.get(access, {id: data.id});
 | 
									return internalUser.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				if (user.id !== data.id) {
 | 
									if (user.id !== data.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('User could not be updated, IDs do not match: ' + user.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`User could not be updated, IDs do not match: ${user.id} !== ${data.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (user.id === access.token.getUserId(0)) {
 | 
									if (user.id === access.token.getUserId(0)) {
 | 
				
			||||||
					// they're setting their own password. Make sure their current password is correct
 | 
										// they're setting their own password. Make sure their current password is correct
 | 
				
			||||||
					if (typeof data.current === 'undefined' || !data.current) {
 | 
										if (typeof data.current === "undefined" || !data.current) {
 | 
				
			||||||
						throw new error.ValidationError('Current password was not supplied');
 | 
											throw new errs.ValidationError("Current password was not supplied");
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
					return internalToken.getTokenFromEmail({
 | 
										return internalToken
 | 
				
			||||||
						identity: user.email,
 | 
											.getTokenFromEmail({
 | 
				
			||||||
						secret:   data.current
 | 
												identity: user.email,
 | 
				
			||||||
					})
 | 
												secret: data.current,
 | 
				
			||||||
 | 
											})
 | 
				
			||||||
						.then(() => {
 | 
											.then(() => {
 | 
				
			||||||
							return user;
 | 
												return user;
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
@@ -392,43 +380,36 @@ const internalUser = {
 | 
				
			|||||||
				// Get auth, patch if it exists
 | 
									// Get auth, patch if it exists
 | 
				
			||||||
				return authModel
 | 
									return authModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('user_id', user.id)
 | 
										.where("user_id", user.id)
 | 
				
			||||||
					.andWhere('type', data.type)
 | 
										.andWhere("type", data.type)
 | 
				
			||||||
					.first()
 | 
										.first()
 | 
				
			||||||
					.then((existing_auth) => {
 | 
										.then((existing_auth) => {
 | 
				
			||||||
						if (existing_auth) {
 | 
											if (existing_auth) {
 | 
				
			||||||
							// patch
 | 
												// patch
 | 
				
			||||||
							return authModel
 | 
												return authModel.query().where("user_id", user.id).andWhere("type", data.type).patch({
 | 
				
			||||||
								.query()
 | 
													type: data.type, // This is required for the model to encrypt on save
 | 
				
			||||||
								.where('user_id', user.id)
 | 
													secret: data.secret,
 | 
				
			||||||
								.andWhere('type', data.type)
 | 
												});
 | 
				
			||||||
								.patch({
 | 
					 | 
				
			||||||
									type:   data.type, // This is required for the model to encrypt on save
 | 
					 | 
				
			||||||
									secret: data.secret
 | 
					 | 
				
			||||||
								});
 | 
					 | 
				
			||||||
						} else {
 | 
					 | 
				
			||||||
							// insert
 | 
					 | 
				
			||||||
							return authModel
 | 
					 | 
				
			||||||
								.query()
 | 
					 | 
				
			||||||
								.insert({
 | 
					 | 
				
			||||||
									user_id: user.id,
 | 
					 | 
				
			||||||
									type:    data.type,
 | 
					 | 
				
			||||||
									secret:  data.secret,
 | 
					 | 
				
			||||||
									meta:    {}
 | 
					 | 
				
			||||||
								});
 | 
					 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
 | 
											// insert
 | 
				
			||||||
 | 
											return authModel.query().insert({
 | 
				
			||||||
 | 
												user_id: user.id,
 | 
				
			||||||
 | 
												type: data.type,
 | 
				
			||||||
 | 
												secret: data.secret,
 | 
				
			||||||
 | 
												meta: {},
 | 
				
			||||||
 | 
											});
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then(() => {
 | 
										.then(() => {
 | 
				
			||||||
						// Add to Audit Log
 | 
											// Add to Audit Log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'updated',
 | 
												action: "updated",
 | 
				
			||||||
							object_type: 'user',
 | 
												object_type: "user",
 | 
				
			||||||
							object_id:   user.id,
 | 
												object_id: user.id,
 | 
				
			||||||
							meta:        {
 | 
												meta: {
 | 
				
			||||||
								name:             user.name,
 | 
													name: user.name,
 | 
				
			||||||
								password_changed: true,
 | 
													password_changed: true,
 | 
				
			||||||
								auth_type:        data.type
 | 
													auth_type: data.type,
 | 
				
			||||||
							}
 | 
												},
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
@@ -443,14 +424,17 @@ const internalUser = {
 | 
				
			|||||||
	 * @return {Promise}
 | 
						 * @return {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	setPermissions: (access, data) => {
 | 
						setPermissions: (access, data) => {
 | 
				
			||||||
		return access.can('users:permissions', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:permissions", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalUser.get(access, {id: data.id});
 | 
									return internalUser.get(access, { id: data.id });
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				if (user.id !== data.id) {
 | 
									if (user.id !== data.id) {
 | 
				
			||||||
					// Sanity check that something crazy hasn't happened
 | 
										// Sanity check that something crazy hasn't happened
 | 
				
			||||||
					throw new error.InternalValidationError('User could not be updated, IDs do not match: ' + user.id + ' !== ' + data.id);
 | 
										throw new errs.InternalValidationError(
 | 
				
			||||||
 | 
											`User could not be updated, IDs do not match: ${user.id} !== ${data.id}`,
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return user;
 | 
									return user;
 | 
				
			||||||
@@ -459,34 +443,30 @@ const internalUser = {
 | 
				
			|||||||
				// Get perms row, patch if it exists
 | 
									// Get perms row, patch if it exists
 | 
				
			||||||
				return userPermissionModel
 | 
									return userPermissionModel
 | 
				
			||||||
					.query()
 | 
										.query()
 | 
				
			||||||
					.where('user_id', user.id)
 | 
										.where("user_id", user.id)
 | 
				
			||||||
					.first()
 | 
										.first()
 | 
				
			||||||
					.then((existing_auth) => {
 | 
										.then((existing_auth) => {
 | 
				
			||||||
						if (existing_auth) {
 | 
											if (existing_auth) {
 | 
				
			||||||
							// patch
 | 
												// patch
 | 
				
			||||||
							return userPermissionModel
 | 
												return userPermissionModel
 | 
				
			||||||
								.query()
 | 
													.query()
 | 
				
			||||||
								.where('user_id', user.id)
 | 
													.where("user_id", user.id)
 | 
				
			||||||
								.patchAndFetchById(existing_auth.id, _.assign({user_id: user.id}, data));
 | 
													.patchAndFetchById(existing_auth.id, _.assign({ user_id: user.id }, data));
 | 
				
			||||||
						} else {
 | 
					 | 
				
			||||||
							// insert
 | 
					 | 
				
			||||||
							return userPermissionModel
 | 
					 | 
				
			||||||
								.query()
 | 
					 | 
				
			||||||
								.insertAndFetch(_.assign({user_id: user.id}, data));
 | 
					 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
 | 
											// insert
 | 
				
			||||||
 | 
											return userPermissionModel.query().insertAndFetch(_.assign({ user_id: user.id }, data));
 | 
				
			||||||
					})
 | 
										})
 | 
				
			||||||
					.then((permissions) => {
 | 
										.then((permissions) => {
 | 
				
			||||||
						// Add to Audit Log
 | 
											// Add to Audit Log
 | 
				
			||||||
						return internalAuditLog.add(access, {
 | 
											return internalAuditLog.add(access, {
 | 
				
			||||||
							action:      'updated',
 | 
												action: "updated",
 | 
				
			||||||
							object_type: 'user',
 | 
												object_type: "user",
 | 
				
			||||||
							object_id:   user.id,
 | 
												object_id: user.id,
 | 
				
			||||||
							meta:        {
 | 
												meta: {
 | 
				
			||||||
								name:        user.name,
 | 
													name: user.name,
 | 
				
			||||||
								permissions: permissions
 | 
													permissions: permissions,
 | 
				
			||||||
							}
 | 
												},
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
 | 
					 | 
				
			||||||
					});
 | 
										});
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
@@ -500,14 +480,15 @@ const internalUser = {
 | 
				
			|||||||
	 * @param {Integer}  data.id
 | 
						 * @param {Integer}  data.id
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	loginAs: (access, data) => {
 | 
						loginAs: (access, data) => {
 | 
				
			||||||
		return access.can('users:loginas', data.id)
 | 
							return access
 | 
				
			||||||
 | 
								.can("users:loginas", data.id)
 | 
				
			||||||
			.then(() => {
 | 
								.then(() => {
 | 
				
			||||||
				return internalUser.get(access, data);
 | 
									return internalUser.get(access, data);
 | 
				
			||||||
			})
 | 
								})
 | 
				
			||||||
			.then((user) => {
 | 
								.then((user) => {
 | 
				
			||||||
				return internalToken.getTokenFromUser(user);
 | 
									return internalToken.getTokenFromUser(user);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
	}
 | 
						},
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = internalUser;
 | 
					export default internalUser;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,6 +1,6 @@
 | 
				
			|||||||
module.exports = {
 | 
					module.exports = {
 | 
				
			||||||
	development: {
 | 
						development: {
 | 
				
			||||||
		client:     'mysql',
 | 
							client:     'mysql2',
 | 
				
			||||||
		migrations: {
 | 
							migrations: {
 | 
				
			||||||
			tableName: 'migrations',
 | 
								tableName: 'migrations',
 | 
				
			||||||
			stub:      'lib/migrate_template.js',
 | 
								stub:      'lib/migrate_template.js',
 | 
				
			||||||
@@ -9,7 +9,7 @@ module.exports = {
 | 
				
			|||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	production: {
 | 
						production: {
 | 
				
			||||||
		client:     'mysql',
 | 
							client:     'mysql2',
 | 
				
			||||||
		migrations: {
 | 
							migrations: {
 | 
				
			||||||
			tableName: 'migrations',
 | 
								tableName: 'migrations',
 | 
				
			||||||
			stub:      'lib/migrate_template.js',
 | 
								stub:      'lib/migrate_template.js',
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -4,91 +4,90 @@
 | 
				
			|||||||
 * "scope" in this file means "where did this token come from and what is using it", so 99% of the time
 | 
					 * "scope" in this file means "where did this token come from and what is using it", so 99% of the time
 | 
				
			||||||
 * the "scope" is going to be "user" because it would be a user token. This is not to be confused with
 | 
					 * the "scope" is going to be "user" because it would be a user token. This is not to be confused with
 | 
				
			||||||
 * the "role" which could be "user" or "admin". The scope in fact, could be "worker" or anything else.
 | 
					 * the "role" which could be "user" or "admin". The scope in fact, could be "worker" or anything else.
 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const _              = require('lodash');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const logger         = require('../logger').access;
 | 
					import { dirname } from "node:path";
 | 
				
			||||||
const validator      = require('ajv');
 | 
					import { fileURLToPath } from "node:url";
 | 
				
			||||||
const error          = require('./error');
 | 
					import Ajv from "ajv/dist/2020.js";
 | 
				
			||||||
const userModel      = require('../models/user');
 | 
					import _ from "lodash";
 | 
				
			||||||
const proxyHostModel = require('../models/proxy_host');
 | 
					import { access as logger } from "../logger.js";
 | 
				
			||||||
const TokenModel     = require('../models/token');
 | 
					import proxyHostModel from "../models/proxy_host.js";
 | 
				
			||||||
const roleSchema     = require('./access/roles.json');
 | 
					import TokenModel from "../models/token.js";
 | 
				
			||||||
const permsSchema    = require('./access/permissions.json');
 | 
					import userModel from "../models/user.js";
 | 
				
			||||||
 | 
					import permsSchema from "./access/permissions.json" with { type: "json" };
 | 
				
			||||||
 | 
					import roleSchema from "./access/roles.json" with { type: "json" };
 | 
				
			||||||
 | 
					import errs from "./error.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = function (token_string) {
 | 
					const __filename = fileURLToPath(import.meta.url);
 | 
				
			||||||
	let Token                 = new TokenModel();
 | 
					const __dirname = dirname(__filename);
 | 
				
			||||||
	let token_data            = null;
 | 
					
 | 
				
			||||||
	let initialised           = false;
 | 
					export default function (tokenString) {
 | 
				
			||||||
	let object_cache          = {};
 | 
						const Token = TokenModel();
 | 
				
			||||||
	let allow_internal_access = false;
 | 
						let tokenData = null;
 | 
				
			||||||
	let user_roles            = [];
 | 
						let initialised = false;
 | 
				
			||||||
	let permissions           = {};
 | 
						const objectCache = {};
 | 
				
			||||||
 | 
						let allowInternalAccess = false;
 | 
				
			||||||
 | 
						let userRoles = [];
 | 
				
			||||||
 | 
						let permissions = {};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Loads the Token object from the token string
 | 
						 * Loads the Token object from the token string
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	this.init = () => {
 | 
						this.init = async () => {
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							if (initialised) {
 | 
				
			||||||
			if (initialised) {
 | 
								return;
 | 
				
			||||||
				resolve();
 | 
							}
 | 
				
			||||||
			} else if (!token_string) {
 | 
					
 | 
				
			||||||
				reject(new error.PermissionError('Permission Denied'));
 | 
							if (!tokenString) {
 | 
				
			||||||
 | 
								throw new errs.PermissionError("Permission Denied");
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							tokenData = await Token.load(tokenString);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// At this point we need to load the user from the DB and make sure they:
 | 
				
			||||||
 | 
							// - exist (and not soft deleted)
 | 
				
			||||||
 | 
							// - still have the appropriate scopes for this token
 | 
				
			||||||
 | 
							// This is only required when the User ID is supplied or if the token scope has `user`
 | 
				
			||||||
 | 
							if (
 | 
				
			||||||
 | 
								tokenData.attrs.id ||
 | 
				
			||||||
 | 
								(typeof tokenData.scope !== "undefined" && _.indexOf(tokenData.scope, "user") !== -1)
 | 
				
			||||||
 | 
							) {
 | 
				
			||||||
 | 
								// Has token user id or token user scope
 | 
				
			||||||
 | 
								const user = await userModel
 | 
				
			||||||
 | 
									.query()
 | 
				
			||||||
 | 
									.where("id", tokenData.attrs.id)
 | 
				
			||||||
 | 
									.andWhere("is_deleted", 0)
 | 
				
			||||||
 | 
									.andWhere("is_disabled", 0)
 | 
				
			||||||
 | 
									.allowGraph("[permissions]")
 | 
				
			||||||
 | 
									.withGraphFetched("[permissions]")
 | 
				
			||||||
 | 
									.first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if (user) {
 | 
				
			||||||
 | 
									// make sure user has all scopes of the token
 | 
				
			||||||
 | 
									// The `user` role is not added against the user row, so we have to just add it here to get past this check.
 | 
				
			||||||
 | 
									user.roles.push("user");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									let ok = true;
 | 
				
			||||||
 | 
									_.forEach(tokenData.scope, (scope_item) => {
 | 
				
			||||||
 | 
										if (_.indexOf(user.roles, scope_item) === -1) {
 | 
				
			||||||
 | 
											ok = false;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									if (!ok) {
 | 
				
			||||||
 | 
										throw new errs.AuthError("Invalid token scope for User");
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
									initialised = true;
 | 
				
			||||||
 | 
									userRoles = user.roles;
 | 
				
			||||||
 | 
									permissions = user.permissions;
 | 
				
			||||||
			} else {
 | 
								} else {
 | 
				
			||||||
				resolve(Token.load(token_string)
 | 
									throw new errs.AuthError("User cannot be loaded for Token");
 | 
				
			||||||
					.then((data) => {
 | 
					 | 
				
			||||||
						token_data = data;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
						// At this point we need to load the user from the DB and make sure they:
 | 
					 | 
				
			||||||
						// - exist (and not soft deleted)
 | 
					 | 
				
			||||||
						// - still have the appropriate scopes for this token
 | 
					 | 
				
			||||||
						// This is only required when the User ID is supplied or if the token scope has `user`
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
						if (token_data.attrs.id || (typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'user') !== -1)) {
 | 
					 | 
				
			||||||
							// Has token user id or token user scope
 | 
					 | 
				
			||||||
							return userModel
 | 
					 | 
				
			||||||
								.query()
 | 
					 | 
				
			||||||
								.where('id', token_data.attrs.id)
 | 
					 | 
				
			||||||
								.andWhere('is_deleted', 0)
 | 
					 | 
				
			||||||
								.andWhere('is_disabled', 0)
 | 
					 | 
				
			||||||
								.allowGraph('[permissions]')
 | 
					 | 
				
			||||||
								.withGraphFetched('[permissions]')
 | 
					 | 
				
			||||||
								.first()
 | 
					 | 
				
			||||||
								.then((user) => {
 | 
					 | 
				
			||||||
									if (user) {
 | 
					 | 
				
			||||||
										// make sure user has all scopes of the token
 | 
					 | 
				
			||||||
										// The `user` role is not added against the user row, so we have to just add it here to get past this check.
 | 
					 | 
				
			||||||
										user.roles.push('user');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
										let is_ok = true;
 | 
					 | 
				
			||||||
										_.forEach(token_data.scope, (scope_item) => {
 | 
					 | 
				
			||||||
											if (_.indexOf(user.roles, scope_item) === -1) {
 | 
					 | 
				
			||||||
												is_ok = false;
 | 
					 | 
				
			||||||
											}
 | 
					 | 
				
			||||||
										});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
										if (!is_ok) {
 | 
					 | 
				
			||||||
											throw new error.AuthError('Invalid token scope for User');
 | 
					 | 
				
			||||||
										} else {
 | 
					 | 
				
			||||||
											initialised = true;
 | 
					 | 
				
			||||||
											user_roles  = user.roles;
 | 
					 | 
				
			||||||
											permissions = user.permissions;
 | 
					 | 
				
			||||||
										}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
									} else {
 | 
					 | 
				
			||||||
										throw new error.AuthError('User cannot be loaded for Token');
 | 
					 | 
				
			||||||
									}
 | 
					 | 
				
			||||||
								});
 | 
					 | 
				
			||||||
						} else {
 | 
					 | 
				
			||||||
							initialised = true;
 | 
					 | 
				
			||||||
						}
 | 
					 | 
				
			||||||
					}));
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		});
 | 
							}
 | 
				
			||||||
 | 
							initialised = true;
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
@@ -96,141 +95,121 @@ module.exports = function (token_string) {
 | 
				
			|||||||
	 * This only applies to USER token scopes, as all other tokens are not really bound
 | 
						 * This only applies to USER token scopes, as all other tokens are not really bound
 | 
				
			||||||
	 * by object scopes
 | 
						 * by object scopes
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {String} object_type
 | 
						 * @param   {String} objectType
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	this.loadObjects = (object_type) => {
 | 
						this.loadObjects = async (objectType) => {
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
							let objects = null;
 | 
				
			||||||
			if (Token.hasScope('user')) {
 | 
					 | 
				
			||||||
				if (typeof token_data.attrs.id === 'undefined' || !token_data.attrs.id) {
 | 
					 | 
				
			||||||
					reject(new error.AuthError('User Token supplied without a User ID'));
 | 
					 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					let token_user_id = token_data.attrs.id ? token_data.attrs.id : 0;
 | 
					 | 
				
			||||||
					let query;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
					if (typeof object_cache[object_type] === 'undefined') {
 | 
							if (Token.hasScope("user")) {
 | 
				
			||||||
						switch (object_type) {
 | 
								if (typeof tokenData.attrs.id === "undefined" || !tokenData.attrs.id) {
 | 
				
			||||||
 | 
									throw new errs.AuthError("User Token supplied without a User ID");
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						// USERS - should only return yourself
 | 
								const tokenUserId = tokenData.attrs.id ? tokenData.attrs.id : 0;
 | 
				
			||||||
						case 'users':
 | 
					 | 
				
			||||||
							resolve(token_user_id ? [token_user_id] : []);
 | 
					 | 
				
			||||||
							break;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
							// Proxy Hosts
 | 
								if (typeof objectCache[objectType] !== "undefined") {
 | 
				
			||||||
						case 'proxy_hosts':
 | 
									objects = objectCache[objectType];
 | 
				
			||||||
							query = proxyHostModel
 | 
								} else {
 | 
				
			||||||
								.query()
 | 
									switch (objectType) {
 | 
				
			||||||
								.select('id')
 | 
										// USERS - should only return yourself
 | 
				
			||||||
								.andWhere('is_deleted', 0);
 | 
										case "users":
 | 
				
			||||||
 | 
											objects = tokenUserId ? [tokenUserId] : [];
 | 
				
			||||||
 | 
											break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							if (permissions.visibility === 'user') {
 | 
										// Proxy Hosts
 | 
				
			||||||
								query.andWhere('owner_user_id', token_user_id);
 | 
										case "proxy_hosts": {
 | 
				
			||||||
							}
 | 
											const query = proxyHostModel
 | 
				
			||||||
 | 
												.query()
 | 
				
			||||||
 | 
												.select("id")
 | 
				
			||||||
 | 
												.andWhere("is_deleted", 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							resolve(query
 | 
											if (permissions.visibility === "user") {
 | 
				
			||||||
								.then((rows) => {
 | 
												query.andWhere("owner_user_id", tokenUserId);
 | 
				
			||||||
									let result = [];
 | 
					 | 
				
			||||||
									_.forEach(rows, (rule_row) => {
 | 
					 | 
				
			||||||
										result.push(rule_row.id);
 | 
					 | 
				
			||||||
									});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
									// enum should not have less than 1 item
 | 
					 | 
				
			||||||
									if (!result.length) {
 | 
					 | 
				
			||||||
										result.push(0);
 | 
					 | 
				
			||||||
									}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
									return result;
 | 
					 | 
				
			||||||
								})
 | 
					 | 
				
			||||||
							);
 | 
					 | 
				
			||||||
							break;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
							// DEFAULT: null
 | 
					 | 
				
			||||||
						default:
 | 
					 | 
				
			||||||
							resolve(null);
 | 
					 | 
				
			||||||
							break;
 | 
					 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
					} else {
 | 
					
 | 
				
			||||||
						resolve(object_cache[object_type]);
 | 
											const rows = await query;
 | 
				
			||||||
 | 
											objects = [];
 | 
				
			||||||
 | 
											_.forEach(rows, (ruleRow) => {
 | 
				
			||||||
 | 
												objects.push(ruleRow.id);
 | 
				
			||||||
 | 
											});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
											// enum should not have less than 1 item
 | 
				
			||||||
 | 
											if (!objects.length) {
 | 
				
			||||||
 | 
												objects.push(0);
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
											break;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			} else {
 | 
									objectCache[objectType] = objects;
 | 
				
			||||||
				resolve(null);
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		})
 | 
							}
 | 
				
			||||||
			.then((objects) => {
 | 
							return objects;
 | 
				
			||||||
				object_cache[object_type] = objects;
 | 
					 | 
				
			||||||
				return objects;
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Creates a schema object on the fly with the IDs and other values required to be checked against the permissionSchema
 | 
						 * Creates a schema object on the fly with the IDs and other values required to be checked against the permissionSchema
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param   {String} permission_label
 | 
						 * @param   {String} permissionLabel
 | 
				
			||||||
	 * @returns {Object}
 | 
						 * @returns {Object}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	this.getObjectSchema = (permission_label) => {
 | 
						this.getObjectSchema = async (permissionLabel) => {
 | 
				
			||||||
		let base_object_type = permission_label.split(':').shift();
 | 
							const baseObjectType = permissionLabel.split(":").shift();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		let schema = {
 | 
							const schema = {
 | 
				
			||||||
			$id:                  'objects',
 | 
								$id: "objects",
 | 
				
			||||||
			$schema:              'http://json-schema.org/draft-07/schema#',
 | 
								description: "Actor Properties",
 | 
				
			||||||
			description:          'Actor Properties',
 | 
								type: "object",
 | 
				
			||||||
			type:                 'object',
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
								additionalProperties: false,
 | 
				
			||||||
			properties:           {
 | 
								properties: {
 | 
				
			||||||
				user_id: {
 | 
									user_id: {
 | 
				
			||||||
					anyOf: [
 | 
										anyOf: [
 | 
				
			||||||
						{
 | 
											{
 | 
				
			||||||
							type: 'number',
 | 
												type: "number",
 | 
				
			||||||
							enum: [Token.get('attrs').id]
 | 
												enum: [Token.get("attrs").id],
 | 
				
			||||||
						}
 | 
											},
 | 
				
			||||||
					]
 | 
										],
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				scope: {
 | 
									scope: {
 | 
				
			||||||
					type:    'string',
 | 
										type: "string",
 | 
				
			||||||
					pattern: '^' + Token.get('scope') + '$'
 | 
										pattern: `^${Token.get("scope")}$`,
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return this.loadObjects(base_object_type)
 | 
							const result = await this.loadObjects(baseObjectType);
 | 
				
			||||||
			.then((object_result) => {
 | 
							if (typeof result === "object" && result !== null) {
 | 
				
			||||||
				if (typeof object_result === 'object' && object_result !== null) {
 | 
								schema.properties[baseObjectType] = {
 | 
				
			||||||
					schema.properties[base_object_type] = {
 | 
									type: "number",
 | 
				
			||||||
						type:    'number',
 | 
									enum: result,
 | 
				
			||||||
						enum:    object_result,
 | 
									minimum: 1,
 | 
				
			||||||
						minimum: 1
 | 
								};
 | 
				
			||||||
					};
 | 
							} else {
 | 
				
			||||||
				} else {
 | 
								schema.properties[baseObjectType] = {
 | 
				
			||||||
					schema.properties[base_object_type] = {
 | 
									type: "number",
 | 
				
			||||||
						type:    'number',
 | 
									minimum: 1,
 | 
				
			||||||
						minimum: 1
 | 
								};
 | 
				
			||||||
					};
 | 
							}
 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				return schema;
 | 
							return schema;
 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return {
 | 
						// here:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return {
 | 
				
			||||||
		token: Token,
 | 
							token: Token,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/**
 | 
							/**
 | 
				
			||||||
		 *
 | 
							 *
 | 
				
			||||||
		 * @param   {Boolean}  [allow_internal]
 | 
							 * @param   {Boolean}  [allowInternal]
 | 
				
			||||||
		 * @returns {Promise}
 | 
							 * @returns {Promise}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		load: (allow_internal) => {
 | 
							load: async (allowInternal) => {
 | 
				
			||||||
			return new Promise(function (resolve/*, reject*/) {
 | 
								if (tokenString) {
 | 
				
			||||||
				if (token_string) {
 | 
									return await Token.load(tokenString);
 | 
				
			||||||
					resolve(Token.load(token_string));
 | 
								}
 | 
				
			||||||
				} else {
 | 
								allowInternalAccess = allowInternal;
 | 
				
			||||||
					allow_internal_access = allow_internal;
 | 
								return allowInternal || null;
 | 
				
			||||||
					resolve(allow_internal_access || null);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		reloadObjects: this.loadObjects,
 | 
							reloadObjects: this.loadObjects,
 | 
				
			||||||
@@ -241,74 +220,59 @@ module.exports = function (token_string) {
 | 
				
			|||||||
		 * @param {*}       [data]
 | 
							 * @param {*}       [data]
 | 
				
			||||||
		 * @returns {Promise}
 | 
							 * @returns {Promise}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		can: (permission, data) => {
 | 
							can: async (permission, data) => {
 | 
				
			||||||
			if (allow_internal_access === true) {
 | 
								if (allowInternalAccess === true) {
 | 
				
			||||||
				return Promise.resolve(true);
 | 
									return true;
 | 
				
			||||||
				//return true;
 | 
					 | 
				
			||||||
			} else {
 | 
					 | 
				
			||||||
				return this.init()
 | 
					 | 
				
			||||||
					.then(() => {
 | 
					 | 
				
			||||||
						// Initialised, token decoded ok
 | 
					 | 
				
			||||||
						return this.getObjectSchema(permission)
 | 
					 | 
				
			||||||
							.then((objectSchema) => {
 | 
					 | 
				
			||||||
								let data_schema = {
 | 
					 | 
				
			||||||
									[permission]: {
 | 
					 | 
				
			||||||
										data:                         data,
 | 
					 | 
				
			||||||
										scope:                        Token.get('scope'),
 | 
					 | 
				
			||||||
										roles:                        user_roles,
 | 
					 | 
				
			||||||
										permission_visibility:        permissions.visibility,
 | 
					 | 
				
			||||||
										permission_proxy_hosts:       permissions.proxy_hosts,
 | 
					 | 
				
			||||||
										permission_redirection_hosts: permissions.redirection_hosts,
 | 
					 | 
				
			||||||
										permission_dead_hosts:        permissions.dead_hosts,
 | 
					 | 
				
			||||||
										permission_streams:           permissions.streams,
 | 
					 | 
				
			||||||
										permission_access_lists:      permissions.access_lists,
 | 
					 | 
				
			||||||
										permission_certificates:      permissions.certificates
 | 
					 | 
				
			||||||
									}
 | 
					 | 
				
			||||||
								};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								let permissionSchema = {
 | 
					 | 
				
			||||||
									$schema:              'http://json-schema.org/draft-07/schema#',
 | 
					 | 
				
			||||||
									$async:               true,
 | 
					 | 
				
			||||||
									$id:                  'permissions',
 | 
					 | 
				
			||||||
									additionalProperties: false,
 | 
					 | 
				
			||||||
									properties:           {}
 | 
					 | 
				
			||||||
								};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								// logger.info('objectSchema', JSON.stringify(objectSchema, null, 2));
 | 
					 | 
				
			||||||
								// logger.info('permissionSchema', JSON.stringify(permissionSchema, null, 2));
 | 
					 | 
				
			||||||
								// logger.info('data_schema', JSON.stringify(data_schema, null, 2));
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								let ajv = validator({
 | 
					 | 
				
			||||||
									verbose:      true,
 | 
					 | 
				
			||||||
									allErrors:    true,
 | 
					 | 
				
			||||||
									format:       'full',
 | 
					 | 
				
			||||||
									missingRefs:  'fail',
 | 
					 | 
				
			||||||
									breakOnError: true,
 | 
					 | 
				
			||||||
									coerceTypes:  true,
 | 
					 | 
				
			||||||
									schemas:      [
 | 
					 | 
				
			||||||
										roleSchema,
 | 
					 | 
				
			||||||
										permsSchema,
 | 
					 | 
				
			||||||
										objectSchema,
 | 
					 | 
				
			||||||
										permissionSchema
 | 
					 | 
				
			||||||
									]
 | 
					 | 
				
			||||||
								});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								return ajv.validate('permissions', data_schema)
 | 
					 | 
				
			||||||
									.then(() => {
 | 
					 | 
				
			||||||
										return data_schema[permission];
 | 
					 | 
				
			||||||
									});
 | 
					 | 
				
			||||||
							});
 | 
					 | 
				
			||||||
					})
 | 
					 | 
				
			||||||
					.catch((err) => {
 | 
					 | 
				
			||||||
						err.permission      = permission;
 | 
					 | 
				
			||||||
						err.permission_data = data;
 | 
					 | 
				
			||||||
						logger.error(permission, data, err.message);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
						throw new error.PermissionError('Permission Denied', err);
 | 
					 | 
				
			||||||
					});
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
					
 | 
				
			||||||
 | 
								try {
 | 
				
			||||||
 | 
									await this.init();
 | 
				
			||||||
 | 
									const objectSchema = await this.getObjectSchema(permission);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									const dataSchema = {
 | 
				
			||||||
 | 
										[permission]: {
 | 
				
			||||||
 | 
											data: data,
 | 
				
			||||||
 | 
											scope: Token.get("scope"),
 | 
				
			||||||
 | 
											roles: userRoles,
 | 
				
			||||||
 | 
											permission_visibility: permissions.visibility,
 | 
				
			||||||
 | 
											permission_proxy_hosts: permissions.proxy_hosts,
 | 
				
			||||||
 | 
											permission_redirection_hosts: permissions.redirection_hosts,
 | 
				
			||||||
 | 
											permission_dead_hosts: permissions.dead_hosts,
 | 
				
			||||||
 | 
											permission_streams: permissions.streams,
 | 
				
			||||||
 | 
											permission_access_lists: permissions.access_lists,
 | 
				
			||||||
 | 
											permission_certificates: permissions.certificates,
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									const permissionSchema = {
 | 
				
			||||||
 | 
										$async: true,
 | 
				
			||||||
 | 
										$id: "permissions",
 | 
				
			||||||
 | 
										type: "object",
 | 
				
			||||||
 | 
										additionalProperties: false,
 | 
				
			||||||
 | 
										properties: {},
 | 
				
			||||||
 | 
									};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									const rawData = fs.readFileSync(`${__dirname}/access/${permission.replace(/:/gim, "-")}.json`, {
 | 
				
			||||||
 | 
										encoding: "utf8",
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
 | 
									permissionSchema.properties[permission] = JSON.parse(rawData);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									const ajv = new Ajv({
 | 
				
			||||||
 | 
										verbose: true,
 | 
				
			||||||
 | 
										allErrors: true,
 | 
				
			||||||
 | 
										breakOnError: true,
 | 
				
			||||||
 | 
										coerceTypes: true,
 | 
				
			||||||
 | 
										schemas: [roleSchema, permsSchema, objectSchema, permissionSchema],
 | 
				
			||||||
 | 
									});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									const valid = await ajv.validate("permissions", dataSchema);
 | 
				
			||||||
 | 
									return valid && dataSchema[permission];
 | 
				
			||||||
 | 
								} catch (err) {
 | 
				
			||||||
 | 
									err.permission = permission;
 | 
				
			||||||
 | 
									err.permission_data = data;
 | 
				
			||||||
 | 
									logger.error(permission, data, err.message);
 | 
				
			||||||
 | 
									throw errs.PermissionError("Permission Denied", err);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
};
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,4 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
	"$schema": "http://json-schema.org/draft-07/schema#",
 | 
					 | 
				
			||||||
	"$id": "perms",
 | 
						"$id": "perms",
 | 
				
			||||||
	"definitions": {
 | 
						"definitions": {
 | 
				
			||||||
		"view": {
 | 
							"view": {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,4 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
	"$schema": "http://json-schema.org/draft-07/schema#",
 | 
					 | 
				
			||||||
	"$id": "roles",
 | 
						"$id": "roles",
 | 
				
			||||||
	"definitions": {
 | 
						"definitions": {
 | 
				
			||||||
		"admin": {
 | 
							"admin": {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,78 +1,86 @@
 | 
				
			|||||||
const dnsPlugins = require('../global/certbot-dns-plugins.json');
 | 
					import batchflow from "batchflow";
 | 
				
			||||||
const utils      = require('./utils');
 | 
					import dnsPlugins from "../certbot/dns-plugins.json" with { type: "json" };
 | 
				
			||||||
const error      = require('./error');
 | 
					import { certbot as logger } from "../logger.js";
 | 
				
			||||||
const logger     = require('../logger').certbot;
 | 
					import errs from "./error.js";
 | 
				
			||||||
const batchflow  = require('batchflow');
 | 
					import utils from "./utils.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const CERTBOT_VERSION_REPLACEMENT = '$(certbot --version | grep -Eo \'[0-9](\\.[0-9]+)+\')';
 | 
					const CERTBOT_VERSION_REPLACEMENT = "$(certbot --version | grep -Eo '[0-9](\\.[0-9]+)+')";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const certbot = {
 | 
					/**
 | 
				
			||||||
 | 
					 * Installs a cerbot plugin given the key for the object from
 | 
				
			||||||
 | 
					 * ../certbot/dns-plugins.json
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param   {string}  pluginKey
 | 
				
			||||||
 | 
					 * @returns {Object}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const installPlugin = async (pluginKey) => {
 | 
				
			||||||
 | 
						if (typeof dnsPlugins[pluginKey] === "undefined") {
 | 
				
			||||||
 | 
							// throw Error(`Certbot plugin ${pluginKey} not found`);
 | 
				
			||||||
 | 
							throw new errs.ItemNotFoundError(pluginKey);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						const plugin = dnsPlugins[pluginKey];
 | 
				
			||||||
	 * @param {array} pluginKeys
 | 
						logger.start(`Installing ${pluginKey}...`);
 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	installPlugins: async function (pluginKeys) {
 | 
					 | 
				
			||||||
		let hasErrors = false;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
						plugin.version = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
 | 
				
			||||||
			if (pluginKeys.length === 0) {
 | 
						plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
 | 
				
			||||||
				resolve();
 | 
					 | 
				
			||||||
				return;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
			batchflow(pluginKeys).sequential()
 | 
						// SETUPTOOLS_USE_DISTUTILS is required for certbot plugins to install correctly
 | 
				
			||||||
				.each((i, pluginKey, next) => {
 | 
						// in new versions of Python
 | 
				
			||||||
					certbot.installPlugin(pluginKey)
 | 
						let env = Object.assign({}, process.env, { SETUPTOOLS_USE_DISTUTILS: "stdlib" });
 | 
				
			||||||
						.then(() => {
 | 
						if (typeof plugin.env === "object") {
 | 
				
			||||||
							next();
 | 
							env = Object.assign(env, plugin.env);
 | 
				
			||||||
						})
 | 
						}
 | 
				
			||||||
						.catch((err) => {
 | 
					
 | 
				
			||||||
							hasErrors = true;
 | 
						const cmd = `. /opt/certbot/bin/activate && pip install --no-cache-dir ${plugin.dependencies} ${plugin.package_name}${plugin.version}  && deactivate`;
 | 
				
			||||||
							next(err);
 | 
						return utils
 | 
				
			||||||
						});
 | 
							.exec(cmd, { env })
 | 
				
			||||||
				})
 | 
							.then((result) => {
 | 
				
			||||||
				.error((err) => {
 | 
								logger.complete(`Installed ${pluginKey}`);
 | 
				
			||||||
					logger.error(err.message);
 | 
								return result;
 | 
				
			||||||
				})
 | 
							})
 | 
				
			||||||
				.end(() => {
 | 
							.catch((err) => {
 | 
				
			||||||
					if (hasErrors) {
 | 
								throw err;
 | 
				
			||||||
						reject(new error.CommandError('Some plugins failed to install. Please check the logs above', 1));
 | 
					 | 
				
			||||||
					} else {
 | 
					 | 
				
			||||||
						resolve();
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Installs a cerbot plugin given the key for the object from
 | 
					 | 
				
			||||||
	 * ../global/certbot-dns-plugins.json
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @param   {string}  pluginKey
 | 
					 | 
				
			||||||
	 * @returns {Object}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	installPlugin: async function (pluginKey) {
 | 
					 | 
				
			||||||
		if (typeof dnsPlugins[pluginKey] === 'undefined') {
 | 
					 | 
				
			||||||
			// throw Error(`Certbot plugin ${pluginKey} not found`);
 | 
					 | 
				
			||||||
			throw new error.ItemNotFoundError(pluginKey);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		const plugin = dnsPlugins[pluginKey];
 | 
					 | 
				
			||||||
		logger.start(`Installing ${pluginKey}...`);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		plugin.version      = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
 | 
					 | 
				
			||||||
		plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		const cmd = '. /opt/certbot/bin/activate && pip install --no-cache-dir ' + plugin.dependencies + ' ' + plugin.package_name + plugin.version + ' ' + ' && deactivate';
 | 
					 | 
				
			||||||
		return utils.exec(cmd)
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				logger.complete(`Installed ${pluginKey}`);
 | 
					 | 
				
			||||||
				return result;
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch((err) => {
 | 
					 | 
				
			||||||
				throw err;
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = certbot;
 | 
					/**
 | 
				
			||||||
 | 
					 * @param {array} pluginKeys
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const installPlugins = async (pluginKeys) => {
 | 
				
			||||||
 | 
						let hasErrors = false;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return new Promise((resolve, reject) => {
 | 
				
			||||||
 | 
							if (pluginKeys.length === 0) {
 | 
				
			||||||
 | 
								resolve();
 | 
				
			||||||
 | 
								return;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							batchflow(pluginKeys)
 | 
				
			||||||
 | 
								.sequential()
 | 
				
			||||||
 | 
								.each((_i, pluginKey, next) => {
 | 
				
			||||||
 | 
									installPlugin(pluginKey)
 | 
				
			||||||
 | 
										.then(() => {
 | 
				
			||||||
 | 
											next();
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
 | 
										.catch((err) => {
 | 
				
			||||||
 | 
											hasErrors = true;
 | 
				
			||||||
 | 
											next(err);
 | 
				
			||||||
 | 
										});
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.error((err) => {
 | 
				
			||||||
 | 
									logger.error(err.message);
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								.end(() => {
 | 
				
			||||||
 | 
									if (hasErrors) {
 | 
				
			||||||
 | 
										reject(
 | 
				
			||||||
 | 
											new errs.CommandError("Some plugins failed to install. Please check the logs above", 1),
 | 
				
			||||||
 | 
										);
 | 
				
			||||||
 | 
									} else {
 | 
				
			||||||
 | 
										resolve();
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { installPlugins, installPlugin };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,26 +1,31 @@
 | 
				
			|||||||
const fs      = require('fs');
 | 
					import fs from "node:fs";
 | 
				
			||||||
const NodeRSA = require('node-rsa');
 | 
					import NodeRSA from "node-rsa";
 | 
				
			||||||
const logger  = require('../logger').global;
 | 
					import { global as logger } from "../logger.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const keysFile = '/data/keys.json';
 | 
					const keysFile         = '/data/keys.json';
 | 
				
			||||||
 | 
					const mysqlEngine      = 'mysql2';
 | 
				
			||||||
 | 
					const postgresEngine   = 'pg';
 | 
				
			||||||
 | 
					const sqliteClientName = 'sqlite3';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
let instance = null;
 | 
					let instance = null;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// 1. Load from config file first (not recommended anymore)
 | 
					// 1. Load from config file first (not recommended anymore)
 | 
				
			||||||
// 2. Use config env variables next
 | 
					// 2. Use config env variables next
 | 
				
			||||||
const configure = () => {
 | 
					const configure = () => {
 | 
				
			||||||
	const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json';
 | 
						const filename = `${process.env.NODE_CONFIG_DIR || "./config"}/${process.env.NODE_ENV || "default"}.json`;
 | 
				
			||||||
	if (fs.existsSync(filename)) {
 | 
						if (fs.existsSync(filename)) {
 | 
				
			||||||
		let configData;
 | 
							let configData;
 | 
				
			||||||
		try {
 | 
							try {
 | 
				
			||||||
			configData = require(filename);
 | 
								// Load this json  synchronously
 | 
				
			||||||
		} catch (err) {
 | 
								const rawData = fs.readFileSync(filename);
 | 
				
			||||||
 | 
								configData = JSON.parse(rawData);
 | 
				
			||||||
 | 
							} catch (_) {
 | 
				
			||||||
			// do nothing
 | 
								// do nothing
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (configData && configData.database) {
 | 
							if (configData?.database) {
 | 
				
			||||||
			logger.info(`Using configuration from file: ${filename}`);
 | 
								logger.info(`Using configuration from file: ${filename}`);
 | 
				
			||||||
			instance      = configData;
 | 
								instance = configData;
 | 
				
			||||||
			instance.keys = getKeys();
 | 
								instance.keys = getKeys();
 | 
				
			||||||
			return;
 | 
								return;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -31,33 +36,53 @@ const configure = () => {
 | 
				
			|||||||
	const envMysqlName = process.env.DB_MYSQL_NAME || null;
 | 
						const envMysqlName = process.env.DB_MYSQL_NAME || null;
 | 
				
			||||||
	if (envMysqlHost && envMysqlUser && envMysqlName) {
 | 
						if (envMysqlHost && envMysqlUser && envMysqlName) {
 | 
				
			||||||
		// we have enough mysql creds to go with mysql
 | 
							// we have enough mysql creds to go with mysql
 | 
				
			||||||
		logger.info('Using MySQL configuration');
 | 
							logger.info("Using MySQL configuration");
 | 
				
			||||||
		instance = {
 | 
							instance = {
 | 
				
			||||||
			database: {
 | 
								database: {
 | 
				
			||||||
				engine:   'mysql',
 | 
									engine: mysqlEngine,
 | 
				
			||||||
				host:     envMysqlHost,
 | 
									host: envMysqlHost,
 | 
				
			||||||
				port:     process.env.DB_MYSQL_PORT || 3306,
 | 
									port: process.env.DB_MYSQL_PORT || 3306,
 | 
				
			||||||
				user:     envMysqlUser,
 | 
									user: envMysqlUser,
 | 
				
			||||||
				password: process.env.DB_MYSQL_PASSWORD,
 | 
									password: process.env.DB_MYSQL_PASSWORD,
 | 
				
			||||||
				name:     envMysqlName,
 | 
									name: envMysqlName,
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			keys: getKeys(),
 | 
								keys: getKeys(),
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
		return;
 | 
							return;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	const envSqliteFile = process.env.DB_SQLITE_FILE || '/data/database.sqlite';
 | 
						const envPostgresHost = process.env.DB_POSTGRES_HOST || null;
 | 
				
			||||||
 | 
						const envPostgresUser = process.env.DB_POSTGRES_USER || null;
 | 
				
			||||||
 | 
						const envPostgresName = process.env.DB_POSTGRES_NAME || null;
 | 
				
			||||||
 | 
						if (envPostgresHost && envPostgresUser && envPostgresName) {
 | 
				
			||||||
 | 
							// we have enough postgres creds to go with postgres
 | 
				
			||||||
 | 
							logger.info("Using Postgres configuration");
 | 
				
			||||||
 | 
							instance = {
 | 
				
			||||||
 | 
								database: {
 | 
				
			||||||
 | 
									engine: postgresEngine,
 | 
				
			||||||
 | 
									host: envPostgresHost,
 | 
				
			||||||
 | 
									port: process.env.DB_POSTGRES_PORT || 5432,
 | 
				
			||||||
 | 
									user: envPostgresUser,
 | 
				
			||||||
 | 
									password: process.env.DB_POSTGRES_PASSWORD,
 | 
				
			||||||
 | 
									name: envPostgresName,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								keys: getKeys(),
 | 
				
			||||||
 | 
							};
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						const envSqliteFile = process.env.DB_SQLITE_FILE || "/data/database.sqlite";
 | 
				
			||||||
	logger.info(`Using Sqlite: ${envSqliteFile}`);
 | 
						logger.info(`Using Sqlite: ${envSqliteFile}`);
 | 
				
			||||||
	instance = {
 | 
						instance = {
 | 
				
			||||||
		database: {
 | 
							database: {
 | 
				
			||||||
			engine: 'knex-native',
 | 
								engine: "knex-native",
 | 
				
			||||||
			knex:   {
 | 
								knex: {
 | 
				
			||||||
				client:     'sqlite3',
 | 
									client: sqliteClientName,
 | 
				
			||||||
				connection: {
 | 
									connection: {
 | 
				
			||||||
					filename: envSqliteFile
 | 
										filename: envSqliteFile,
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				useNullAsDefault: true
 | 
									useNullAsDefault: true,
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
		keys: getKeys(),
 | 
							keys: getKeys(),
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
@@ -65,120 +90,155 @@ const configure = () => {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
const getKeys = () => {
 | 
					const getKeys = () => {
 | 
				
			||||||
	// Get keys from file
 | 
						// Get keys from file
 | 
				
			||||||
 | 
						logger.debug("Cheecking for keys file:", keysFile);
 | 
				
			||||||
	if (!fs.existsSync(keysFile)) {
 | 
						if (!fs.existsSync(keysFile)) {
 | 
				
			||||||
		generateKeys();
 | 
							generateKeys();
 | 
				
			||||||
	} else if (process.env.DEBUG) {
 | 
						} else if (process.env.DEBUG) {
 | 
				
			||||||
		logger.info('Keys file exists OK');
 | 
							logger.info("Keys file exists OK");
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	try {
 | 
						try {
 | 
				
			||||||
		return require(keysFile);
 | 
							// Load this json keysFile synchronously and return the json object
 | 
				
			||||||
 | 
							const rawData = fs.readFileSync(keysFile);
 | 
				
			||||||
 | 
							return JSON.parse(rawData);
 | 
				
			||||||
	} catch (err) {
 | 
						} catch (err) {
 | 
				
			||||||
		logger.error('Could not read JWT key pair from config file: ' + keysFile, err);
 | 
							logger.error(`Could not read JWT key pair from config file: ${keysFile}`, err);
 | 
				
			||||||
		process.exit(1);
 | 
							process.exit(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const generateKeys = () => {
 | 
					const generateKeys = () => {
 | 
				
			||||||
	logger.info('Creating a new JWT key pair...');
 | 
						logger.info("Creating a new JWT key pair...");
 | 
				
			||||||
	// Now create the keys and save them in the config.
 | 
						// Now create the keys and save them in the config.
 | 
				
			||||||
	const key = new NodeRSA({ b: 2048 });
 | 
						const key = new NodeRSA({ b: 2048 });
 | 
				
			||||||
	key.generateKeyPair();
 | 
						key.generateKeyPair();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	const keys = {
 | 
						const keys = {
 | 
				
			||||||
		key: key.exportKey('private').toString(),
 | 
							key: key.exportKey("private").toString(),
 | 
				
			||||||
		pub: key.exportKey('public').toString(),
 | 
							pub: key.exportKey("public").toString(),
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Write keys config
 | 
						// Write keys config
 | 
				
			||||||
	try {
 | 
						try {
 | 
				
			||||||
		fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2));
 | 
							fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2));
 | 
				
			||||||
	} catch (err) {
 | 
						} catch (err) {
 | 
				
			||||||
		logger.error('Could not write JWT key pair to config file: ' + keysFile + ': ' + err.message);
 | 
							logger.error(`Could not write JWT key pair to config file: ${keysFile}: ${err.message}`);
 | 
				
			||||||
		process.exit(1);
 | 
							process.exit(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	logger.info('Wrote JWT key pair to config file: ' + keysFile);
 | 
						logger.info(`Wrote JWT key pair to config file: ${keysFile}`);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					/**
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
	/**
 | 
					 * @param   {string}  key   ie: 'database' or 'database.engine'
 | 
				
			||||||
	 *
 | 
					 * @returns {boolean}
 | 
				
			||||||
	 * @param   {string}  key   ie: 'database' or 'database.engine'
 | 
					 */
 | 
				
			||||||
	 * @returns {boolean}
 | 
					const configHas = (key) => {
 | 
				
			||||||
	 */
 | 
						instance === null && configure();
 | 
				
			||||||
	has: function(key) {
 | 
						const keys = key.split(".");
 | 
				
			||||||
		instance === null && configure();
 | 
						let level = instance;
 | 
				
			||||||
		const keys = key.split('.');
 | 
						let has = true;
 | 
				
			||||||
		let level  = instance;
 | 
						keys.forEach((keyItem) => {
 | 
				
			||||||
		let has    = true;
 | 
							if (typeof level[keyItem] === "undefined") {
 | 
				
			||||||
		keys.forEach((keyItem) =>{
 | 
								has = false;
 | 
				
			||||||
			if (typeof level[keyItem] === 'undefined') {
 | 
							} else {
 | 
				
			||||||
				has = false;
 | 
								level = level[keyItem];
 | 
				
			||||||
			} else {
 | 
					 | 
				
			||||||
				level = level[keyItem];
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		return has;
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Gets a specific key from the top level
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @param {string} key
 | 
					 | 
				
			||||||
	 * @returns {*}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	get: function (key) {
 | 
					 | 
				
			||||||
		instance === null && configure();
 | 
					 | 
				
			||||||
		if (key && typeof instance[key] !== 'undefined') {
 | 
					 | 
				
			||||||
			return instance[key];
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return instance;
 | 
						});
 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						return has;
 | 
				
			||||||
	 * Is this a sqlite configuration?
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @returns {boolean}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	isSqlite: function () {
 | 
					 | 
				
			||||||
		instance === null && configure();
 | 
					 | 
				
			||||||
		return instance.database.knex && instance.database.knex.client === 'sqlite3';
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Are we running in debug mdoe?
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @returns {boolean}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	debug: function () {
 | 
					 | 
				
			||||||
		return !!process.env.DEBUG;
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Returns a public key
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @returns {string}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	getPublicKey: function () {
 | 
					 | 
				
			||||||
		instance === null && configure();
 | 
					 | 
				
			||||||
		return instance.keys.pub;
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Returns a private key
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @returns {string}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	getPrivateKey: function () {
 | 
					 | 
				
			||||||
		instance === null && configure();
 | 
					 | 
				
			||||||
		return instance.keys.key;
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * @returns {boolean}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	useLetsencryptStaging: function () {
 | 
					 | 
				
			||||||
		return !!process.env.LE_STAGING;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Gets a specific key from the top level
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param {string} key
 | 
				
			||||||
 | 
					 * @returns {*}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const configGet = (key) => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						if (key && typeof instance[key] !== "undefined") {
 | 
				
			||||||
 | 
							return instance[key];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return instance;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Is this a sqlite configuration?
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const isSqlite = () => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						return instance.database.knex && instance.database.knex.client === sqliteClientName;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Is this a mysql configuration?
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const isMysql = () => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						return instance.database.engine === mysqlEngine;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Is this a postgres configuration?
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const isPostgres = () => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						return instance.database.engine === postgresEngine;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Are we running in debug mdoe?
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const isDebugMode = () => !!process.env.DEBUG;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Are we running in CI?
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const isCI = () => process.env.CI === 'true' && process.env.DEBUG === 'true';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Returns a public key
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {string}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const getPublicKey = () => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						return instance.keys.pub;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Returns a private key
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @returns {string}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const getPrivateKey = () => {
 | 
				
			||||||
 | 
						instance === null && configure();
 | 
				
			||||||
 | 
						return instance.keys.key;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * @returns {boolean}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const useLetsencryptStaging = () => !!process.env.LE_STAGING;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * @returns {string|null}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const useLetsencryptServer = () => {
 | 
				
			||||||
 | 
						if (process.env.LE_SERVER) {
 | 
				
			||||||
 | 
							return process.env.LE_SERVER;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return null;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { isCI, configHas, configGet, isSqlite, isMysql, isPostgres, isDebugMode, getPrivateKey, getPublicKey, useLetsencryptStaging, useLetsencryptServer };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,99 +1,103 @@
 | 
				
			|||||||
const _    = require('lodash');
 | 
					import _ from "lodash";
 | 
				
			||||||
const util = require('util');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					const errs = {
 | 
				
			||||||
 | 
						PermissionError: function (_, previous) {
 | 
				
			||||||
	PermissionError: function (message, previous) {
 | 
					 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = 'Permission Denied';
 | 
							this.message = "Permission Denied";
 | 
				
			||||||
		this.public   = true;
 | 
							this.public = true;
 | 
				
			||||||
		this.status   = 403;
 | 
							this.status = 403;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ItemNotFoundError: function (id, previous) {
 | 
						ItemNotFoundError: function (id, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = 'Item Not Found - ' + id;
 | 
							this.message = "Not Found";
 | 
				
			||||||
		this.public   = true;
 | 
							if (id) {
 | 
				
			||||||
		this.status   = 404;
 | 
								this.message = `Not Found - ${id}`;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							this.public = true;
 | 
				
			||||||
 | 
							this.status = 404;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	AuthError: function (message, previous) {
 | 
						AuthError: function (message, messageI18n, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.public   = true;
 | 
							this.message_i18n = messageI18n;
 | 
				
			||||||
		this.status   = 401;
 | 
							this.public = true;
 | 
				
			||||||
 | 
							this.status = 400;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	InternalError: function (message, previous) {
 | 
						InternalError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.status   = 500;
 | 
							this.status = 500;
 | 
				
			||||||
		this.public   = false;
 | 
							this.public = false;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	InternalValidationError: function (message, previous) {
 | 
						InternalValidationError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.status   = 400;
 | 
							this.status = 400;
 | 
				
			||||||
		this.public   = false;
 | 
							this.public = false;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ConfigurationError: function (message, previous) {
 | 
						ConfigurationError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.status   = 400;
 | 
							this.status = 400;
 | 
				
			||||||
		this.public   = true;
 | 
							this.public = true;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	CacheError: function (message, previous) {
 | 
						CacheError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.status   = 500;
 | 
							this.status = 500;
 | 
				
			||||||
		this.public   = false;
 | 
							this.public = false;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ValidationError: function (message, previous) {
 | 
						ValidationError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.public   = true;
 | 
							this.public = true;
 | 
				
			||||||
		this.status   = 400;
 | 
							this.status = 400;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	AssertionFailedError: function (message, previous) {
 | 
						AssertionFailedError: function (message, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = message;
 | 
							this.message = message;
 | 
				
			||||||
		this.public   = false;
 | 
							this.public = false;
 | 
				
			||||||
		this.status   = 400;
 | 
							this.status = 400;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	CommandError: function (stdErr, code, previous) {
 | 
						CommandError: function (stdErr, code, previous) {
 | 
				
			||||||
		Error.captureStackTrace(this, this.constructor);
 | 
							Error.captureStackTrace(this, this.constructor);
 | 
				
			||||||
		this.name     = this.constructor.name;
 | 
							this.name = this.constructor.name;
 | 
				
			||||||
		this.previous = previous;
 | 
							this.previous = previous;
 | 
				
			||||||
		this.message  = stdErr;
 | 
							this.message = stdErr;
 | 
				
			||||||
		this.code     = code;
 | 
							this.code = code;
 | 
				
			||||||
		this.public   = false;
 | 
							this.public = false;
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
_.forEach(module.exports, function (error) {
 | 
					_.forEach(errs, (err) => {
 | 
				
			||||||
	util.inherits(error, Error);
 | 
						err.prototype = Object.create(Error.prototype);
 | 
				
			||||||
});
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default errs;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,40 +1,17 @@
 | 
				
			|||||||
const validator = require('../validator');
 | 
					export default (req, res, next) => {
 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = function (req, res, next) {
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (req.headers.origin) {
 | 
						if (req.headers.origin) {
 | 
				
			||||||
 | 
							res.set({
 | 
				
			||||||
		const originSchema = {
 | 
								"Access-Control-Allow-Origin": req.headers.origin,
 | 
				
			||||||
			oneOf: [
 | 
								"Access-Control-Allow-Credentials": true,
 | 
				
			||||||
				{
 | 
								"Access-Control-Allow-Methods": "OPTIONS, GET, POST",
 | 
				
			||||||
					type:    'string',
 | 
								"Access-Control-Allow-Headers":
 | 
				
			||||||
					pattern: '^[a-z\\-]+:\\/\\/(?:[\\w\\-\\.]+(:[0-9]+)?/?)?$'
 | 
									"Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit",
 | 
				
			||||||
				},
 | 
								"Access-Control-Max-Age": 5 * 60,
 | 
				
			||||||
				{
 | 
								"Access-Control-Expose-Headers": "X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit",
 | 
				
			||||||
					type:    'string',
 | 
							});
 | 
				
			||||||
					pattern: '^[a-z\\-]+:\\/\\/(?:\\[([a-z0-9]{0,4}\\:?)+\\])?/?(:[0-9]+)?$'
 | 
							next();
 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			]
 | 
					 | 
				
			||||||
		};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// very relaxed validation....
 | 
					 | 
				
			||||||
		validator(originSchema, req.headers.origin)
 | 
					 | 
				
			||||||
			.then(function () {
 | 
					 | 
				
			||||||
				res.set({
 | 
					 | 
				
			||||||
					'Access-Control-Allow-Origin':      req.headers.origin,
 | 
					 | 
				
			||||||
					'Access-Control-Allow-Credentials': true,
 | 
					 | 
				
			||||||
					'Access-Control-Allow-Methods':     'OPTIONS, GET, POST',
 | 
					 | 
				
			||||||
					'Access-Control-Allow-Headers':     'Content-Type, Cache-Control, Pragma, Expires, Authorization, X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit',
 | 
					 | 
				
			||||||
					'Access-Control-Max-Age':           5 * 60,
 | 
					 | 
				
			||||||
					'Access-Control-Expose-Headers':    'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit'
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
				next();
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		// No origin
 | 
							// No origin
 | 
				
			||||||
		next();
 | 
							next();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,15 +1,15 @@
 | 
				
			|||||||
const Access = require('../access');
 | 
					import Access from "../access.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = () => {
 | 
					export default () => {
 | 
				
			||||||
	return function (req, res, next) {
 | 
						return async (_, res, next) => {
 | 
				
			||||||
		res.locals.access = null;
 | 
							try {
 | 
				
			||||||
		let access        = new Access(res.locals.token || null);
 | 
								res.locals.access = null;
 | 
				
			||||||
		access.load()
 | 
								const access = new Access(res.locals.token || null);
 | 
				
			||||||
			.then(() => {
 | 
								await access.load();
 | 
				
			||||||
				res.locals.access = access;
 | 
								res.locals.access = access;
 | 
				
			||||||
				next();
 | 
								next();
 | 
				
			||||||
			})
 | 
							} catch (err) {
 | 
				
			||||||
			.catch(next);
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,13 +1,13 @@
 | 
				
			|||||||
module.exports = function () {
 | 
					export default function () {
 | 
				
			||||||
	return function (req, res, next) {
 | 
						return (req, res, next) => {
 | 
				
			||||||
		if (req.headers.authorization) {
 | 
							if (req.headers.authorization) {
 | 
				
			||||||
			let parts = req.headers.authorization.split(' ');
 | 
								const parts = req.headers.authorization.split(" ");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (parts && parts[0] === 'Bearer' && parts[1]) {
 | 
								if (parts && parts[0] === "Bearer" && parts[1]) {
 | 
				
			||||||
				res.locals.token = parts[1];
 | 
									res.locals.token = parts[1];
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		next();
 | 
							next();
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
};
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,7 +1,6 @@
 | 
				
			|||||||
let _ = require('lodash');
 | 
					import _  from "lodash";
 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = function (default_sort, default_offset, default_limit, max_limit) {
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default (default_sort, default_offset, default_limit, max_limit) => {
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * This will setup the req query params with filtered data and defaults
 | 
						 * This will setup the req query params with filtered data and defaults
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
@@ -11,34 +10,35 @@ module.exports = function (default_sort, default_offset, default_limit, max_limi
 | 
				
			|||||||
	 *
 | 
						 *
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return function (req, res, next) {
 | 
						return (req, _res, next) => {
 | 
				
			||||||
 | 
							req.query.offset =
 | 
				
			||||||
		req.query.offset = typeof req.query.limit === 'undefined' ? default_offset || 0 : parseInt(req.query.offset, 10);
 | 
								typeof req.query.limit === "undefined" ? default_offset || 0 : Number.parseInt(req.query.offset, 10);
 | 
				
			||||||
		req.query.limit  = typeof req.query.limit === 'undefined' ? default_limit || 50 : parseInt(req.query.limit, 10);
 | 
							req.query.limit =
 | 
				
			||||||
 | 
								typeof req.query.limit === "undefined" ? default_limit || 50 : Number.parseInt(req.query.limit, 10);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (max_limit && req.query.limit > max_limit) {
 | 
							if (max_limit && req.query.limit > max_limit) {
 | 
				
			||||||
			req.query.limit = max_limit;
 | 
								req.query.limit = max_limit;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Sorting
 | 
							// Sorting
 | 
				
			||||||
		let sort       = typeof req.query.sort === 'undefined' ? default_sort : req.query.sort;
 | 
							let sort = typeof req.query.sort === "undefined" ? default_sort : req.query.sort;
 | 
				
			||||||
		let myRegexp   = /.*\.(asc|desc)$/ig;
 | 
							const myRegexp = /.*\.(asc|desc)$/gi;
 | 
				
			||||||
		let sort_array = [];
 | 
							const sort_array = [];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		sort = sort.split(',');
 | 
							sort = sort.split(",");
 | 
				
			||||||
		_.map(sort, function (val) {
 | 
							_.map(sort, (val) => {
 | 
				
			||||||
			let matches = myRegexp.exec(val);
 | 
								const matches = myRegexp.exec(val);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (matches !== null) {
 | 
								if (matches !== null) {
 | 
				
			||||||
				let dir = matches[1];
 | 
									const dir = matches[1];
 | 
				
			||||||
				sort_array.push({
 | 
									sort_array.push({
 | 
				
			||||||
					field: val.substr(0, val.length - (dir.length + 1)),
 | 
										field: val.substr(0, val.length - (dir.length + 1)),
 | 
				
			||||||
					dir:   dir.toLowerCase()
 | 
										dir: dir.toLowerCase(),
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			} else {
 | 
								} else {
 | 
				
			||||||
				sort_array.push({
 | 
									sort_array.push({
 | 
				
			||||||
					field: val,
 | 
										field: val,
 | 
				
			||||||
					dir:   'asc'
 | 
										dir: "asc",
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,9 +1,8 @@
 | 
				
			|||||||
module.exports = (req, res, next) => {
 | 
					export default (req, res, next) => {
 | 
				
			||||||
	if (req.params.user_id === 'me' && res.locals.access) {
 | 
						if (req.params.user_id === 'me' && res.locals.access) {
 | 
				
			||||||
		req.params.user_id = res.locals.access.token.get('attrs').id;
 | 
							req.params.user_id = res.locals.access.token.get('attrs').id;
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		req.params.user_id = parseInt(req.params.user_id, 10);
 | 
							req.params.user_id = Number.parseInt(req.params.user_id, 10);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
	next();
 | 
						next();
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,32 +1,58 @@
 | 
				
			|||||||
const moment = require('moment');
 | 
					import moment from "moment";
 | 
				
			||||||
 | 
					import { ref } from "objection";
 | 
				
			||||||
 | 
					import { isPostgres } from "./config.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					/**
 | 
				
			||||||
 | 
					 * Takes an expression such as 30d and returns a moment object of that date in future
 | 
				
			||||||
	/**
 | 
					 *
 | 
				
			||||||
	 * Takes an expression such as 30d and returns a moment object of that date in future
 | 
					 * Key      Shorthand
 | 
				
			||||||
	 *
 | 
					 * ==================
 | 
				
			||||||
	 * Key      Shorthand
 | 
					 * years         y
 | 
				
			||||||
	 * ==================
 | 
					 * quarters      Q
 | 
				
			||||||
	 * years         y
 | 
					 * months        M
 | 
				
			||||||
	 * quarters      Q
 | 
					 * weeks         w
 | 
				
			||||||
	 * months        M
 | 
					 * days          d
 | 
				
			||||||
	 * weeks         w
 | 
					 * hours         h
 | 
				
			||||||
	 * days          d
 | 
					 * minutes       m
 | 
				
			||||||
	 * hours         h
 | 
					 * seconds       s
 | 
				
			||||||
	 * minutes       m
 | 
					 * milliseconds  ms
 | 
				
			||||||
	 * seconds       s
 | 
					 *
 | 
				
			||||||
	 * milliseconds  ms
 | 
					 * @param {String}  expression
 | 
				
			||||||
	 *
 | 
					 * @returns {Object}
 | 
				
			||||||
	 * @param {String}  expression
 | 
					 */
 | 
				
			||||||
	 * @returns {Object}
 | 
					const parseDatePeriod = (expression) => {
 | 
				
			||||||
	 */
 | 
						const matches = expression.match(/^([0-9]+)(y|Q|M|w|d|h|m|s|ms)$/m);
 | 
				
			||||||
	parseDatePeriod: function (expression) {
 | 
						if (matches) {
 | 
				
			||||||
		let matches = expression.match(/^([0-9]+)(y|Q|M|w|d|h|m|s|ms)$/m);
 | 
							return moment().add(matches[1], matches[2]);
 | 
				
			||||||
		if (matches) {
 | 
					 | 
				
			||||||
			return moment().add(matches[1], matches[2]);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		return null;
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return null;
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const convertIntFieldsToBool = (obj, fields) => {
 | 
				
			||||||
 | 
						fields.forEach((field) => {
 | 
				
			||||||
 | 
							if (typeof obj[field] !== "undefined") {
 | 
				
			||||||
 | 
								obj[field] = obj[field] === 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
						return obj;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const convertBoolFieldsToInt = (obj, fields) => {
 | 
				
			||||||
 | 
						fields.forEach((field) => {
 | 
				
			||||||
 | 
							if (typeof obj[field] !== "undefined") {
 | 
				
			||||||
 | 
								obj[field] = obj[field] ? 1 : 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
						return obj;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Casts a column to json if using postgres
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param {string} colName
 | 
				
			||||||
 | 
					 * @returns {string|Objection.ReferenceBuilder}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const castJsonIfNeed = (colName) => (isPostgres() ? ref(colName).castText() : colName);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { parseDatePeriod, convertIntFieldsToBool, convertBoolFieldsToInt, castJsonIfNeed };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,33 +1,34 @@
 | 
				
			|||||||
const migrate_name = 'identifier_for_migrate';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "identifier_for_migrate";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex, Promise) {
 | 
					const up = (_knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create Table example:
 | 
						// Create Table example:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/*return knex.schema.createTable('notification', (table) => {
 | 
						/*
 | 
				
			||||||
 | 
						return knex.schema.createTable('notification', (table) => {
 | 
				
			||||||
		 table.increments().primary();
 | 
							 table.increments().primary();
 | 
				
			||||||
		 table.string('name').notNull();
 | 
							 table.string('name').notNull();
 | 
				
			||||||
		 table.string('type').notNull();
 | 
							 table.string('type').notNull();
 | 
				
			||||||
		 table.integer('created_on').notNull();
 | 
							 table.integer('created_on').notNull();
 | 
				
			||||||
		 table.integer('modified_on').notNull();
 | 
							 table.integer('modified_on').notNull();
 | 
				
			||||||
	 })
 | 
						 })
 | 
				
			||||||
	 .then(function () {
 | 
							.then(function () {
 | 
				
			||||||
		logger.info('[' + migrate_name + '] Notification Table created');
 | 
								logger.info('[' + migrateName + '] Notification Table created');
 | 
				
			||||||
	 });*/
 | 
							});
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up Complete');
 | 
						logger.info(`[${migrateName}] Migrating Up Complete`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
@@ -35,21 +36,24 @@ exports.up = function (knex, Promise) {
 | 
				
			|||||||
/**
 | 
					/**
 | 
				
			||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Drop table example:
 | 
						// Drop table example:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/*return knex.schema.dropTable('notification')
 | 
						/*
 | 
				
			||||||
	 .then(() => {
 | 
						return knex.schema.dropTable('notification')
 | 
				
			||||||
		logger.info('[' + migrate_name + '] Notification Table dropped');
 | 
							.then(() => {
 | 
				
			||||||
	 });*/
 | 
								logger.info(`[${migrateName}] Notification Table dropped`);
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
						*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down Complete');
 | 
						logger.info(`[${migrateName}] Migrating Down Complete`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,106 +1,110 @@
 | 
				
			|||||||
const _          = require('lodash');
 | 
					import { exec as nodeExec, execFile as nodeExecFile } from "node:child_process";
 | 
				
			||||||
const exec       = require('child_process').exec;
 | 
					import { dirname } from "node:path";
 | 
				
			||||||
const execFile   = require('child_process').execFile;
 | 
					import { fileURLToPath } from "node:url";
 | 
				
			||||||
const { Liquid } = require('liquidjs');
 | 
					import { Liquid } from "liquidjs";
 | 
				
			||||||
const logger     = require('../logger').global;
 | 
					import _ from "lodash";
 | 
				
			||||||
const error      = require('./error');
 | 
					import { global as logger } from "../logger.js";
 | 
				
			||||||
 | 
					import errs from "./error.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					const __filename = fileURLToPath(import.meta.url);
 | 
				
			||||||
 | 
					const __dirname = dirname(__filename);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	exec: async function(cmd, options = {}) {
 | 
					const exec = async (cmd, options = {}) => {
 | 
				
			||||||
		logger.debug('CMD:', cmd);
 | 
						logger.debug("CMD:", cmd);
 | 
				
			||||||
 | 
						const { stdout, stderr } = await new Promise((resolve, reject) => {
 | 
				
			||||||
		const { stdout, stderr } = await new Promise((resolve, reject) => {
 | 
							const child = nodeExec(cmd, options, (isError, stdout, stderr) => {
 | 
				
			||||||
			const child = exec(cmd, options, (isError, stdout, stderr) => {
 | 
								if (isError) {
 | 
				
			||||||
				if (isError) {
 | 
									reject(new errs.CommandError(stderr, isError));
 | 
				
			||||||
					reject(new error.CommandError(stderr, isError));
 | 
								} else {
 | 
				
			||||||
				} else {
 | 
									resolve({ stdout, stderr });
 | 
				
			||||||
					resolve({ stdout, stderr });
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			child.on('error', (e) => {
 | 
					 | 
				
			||||||
				reject(new error.CommandError(stderr, 1, e));
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
		return stdout;
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * @param   {String} cmd
 | 
					 | 
				
			||||||
	 * @param   {Array}  args
 | 
					 | 
				
			||||||
	 * @returns {Promise}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	execFile: function (cmd, args) {
 | 
					 | 
				
			||||||
		// logger.debug('CMD: ' + cmd + ' ' + (args ? args.join(' ') : ''));
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		return new Promise((resolve, reject) => {
 | 
					 | 
				
			||||||
			execFile(cmd, args, function (err, stdout, /*stderr*/) {
 | 
					 | 
				
			||||||
				if (err && typeof err === 'object') {
 | 
					 | 
				
			||||||
					reject(err);
 | 
					 | 
				
			||||||
				} else {
 | 
					 | 
				
			||||||
					resolve(stdout.trim());
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Used in objection query builder
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @param   {Array}  omissions
 | 
					 | 
				
			||||||
	 * @returns {Function}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	omitRow: function (omissions) {
 | 
					 | 
				
			||||||
		/**
 | 
					 | 
				
			||||||
		 * @param   {Object} row
 | 
					 | 
				
			||||||
		 * @returns {Object}
 | 
					 | 
				
			||||||
		 */
 | 
					 | 
				
			||||||
		return (row) => {
 | 
					 | 
				
			||||||
			return _.omit(row, omissions);
 | 
					 | 
				
			||||||
		};
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * Used in objection query builder
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * @param   {Array}  omissions
 | 
					 | 
				
			||||||
	 * @returns {Function}
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	omitRows: function (omissions) {
 | 
					 | 
				
			||||||
		/**
 | 
					 | 
				
			||||||
		 * @param   {Array} rows
 | 
					 | 
				
			||||||
		 * @returns {Object}
 | 
					 | 
				
			||||||
		 */
 | 
					 | 
				
			||||||
		return (rows) => {
 | 
					 | 
				
			||||||
			rows.forEach((row, idx) => {
 | 
					 | 
				
			||||||
				rows[idx] = _.omit(row, omissions);
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
			return rows;
 | 
					 | 
				
			||||||
		};
 | 
					 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * @returns {Object} Liquid render engine
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	getRenderEngine: function () {
 | 
					 | 
				
			||||||
		const renderEngine = new Liquid({
 | 
					 | 
				
			||||||
			root: __dirname + '/../templates/'
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		/**
 | 
					 | 
				
			||||||
		 * nginxAccessRule expects the object given to have 2 properties:
 | 
					 | 
				
			||||||
		 *
 | 
					 | 
				
			||||||
		 * directive  string
 | 
					 | 
				
			||||||
		 * address    string
 | 
					 | 
				
			||||||
		 */
 | 
					 | 
				
			||||||
		renderEngine.registerFilter('nginxAccessRule', (v) => {
 | 
					 | 
				
			||||||
			if (typeof v.directive !== 'undefined' && typeof v.address !== 'undefined' && v.directive && v.address) {
 | 
					 | 
				
			||||||
				return `${v.directive} ${v.address};`;
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return '';
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return renderEngine;
 | 
							child.on("error", (e) => {
 | 
				
			||||||
	}
 | 
								reject(new errs.CommandError(stderr, 1, e));
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
						return stdout;
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * @param   {String} cmd
 | 
				
			||||||
 | 
					 * @param   {Array}  args
 | 
				
			||||||
 | 
					 * @param   {Object|undefined}  options
 | 
				
			||||||
 | 
					 * @returns {Promise}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const execFile = (cmd, args, options) => {
 | 
				
			||||||
 | 
						logger.debug(`CMD: ${cmd} ${args ? args.join(" ") : ""}`);
 | 
				
			||||||
 | 
						const opts = options || {};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return new Promise((resolve, reject) => {
 | 
				
			||||||
 | 
							nodeExecFile(cmd, args, opts, (err, stdout, stderr) => {
 | 
				
			||||||
 | 
								if (err && typeof err === "object") {
 | 
				
			||||||
 | 
									reject(new errs.CommandError(stderr, 1, err));
 | 
				
			||||||
 | 
								} else {
 | 
				
			||||||
 | 
									resolve(stdout.trim());
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Used in objection query builder
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param   {Array}  omissions
 | 
				
			||||||
 | 
					 * @returns {Function}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const omitRow = (omissions) => {
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * @param   {Object} row
 | 
				
			||||||
 | 
						 * @returns {Object}
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						return (row) => {
 | 
				
			||||||
 | 
							return _.omit(row, omissions);
 | 
				
			||||||
 | 
						};
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Used in objection query builder
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param   {Array}  omissions
 | 
				
			||||||
 | 
					 * @returns {Function}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const omitRows = (omissions) => {
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * @param   {Array} rows
 | 
				
			||||||
 | 
						 * @returns {Object}
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						return (rows) => {
 | 
				
			||||||
 | 
							rows.forEach((row, idx) => {
 | 
				
			||||||
 | 
								rows[idx] = _.omit(row, omissions);
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
							return rows;
 | 
				
			||||||
 | 
						};
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * @returns {Object} Liquid render engine
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const getRenderEngine = () => {
 | 
				
			||||||
 | 
						const renderEngine = new Liquid({
 | 
				
			||||||
 | 
							root: `${__dirname}/../templates/`,
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * nginxAccessRule expects the object given to have 2 properties:
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * directive  string
 | 
				
			||||||
 | 
						 * address    string
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						renderEngine.registerFilter("nginxAccessRule", (v) => {
 | 
				
			||||||
 | 
							if (typeof v.directive !== "undefined" && typeof v.address !== "undefined" && v.directive && v.address) {
 | 
				
			||||||
 | 
								return `${v.directive} ${v.address};`;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return "";
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return renderEngine;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default { exec, execFile, omitRow, omitRows, getRenderEngine };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,13 +1,12 @@
 | 
				
			|||||||
const error  = require('../error');
 | 
					import Ajv from "ajv/dist/2020.js";
 | 
				
			||||||
const path   = require('path');
 | 
					import errs from "../error.js";
 | 
				
			||||||
const parser = require('json-schema-ref-parser');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
const ajv = require('ajv')({
 | 
					const ajv = new Ajv({
 | 
				
			||||||
	verbose:        true,
 | 
						verbose: true,
 | 
				
			||||||
	validateSchema: true,
 | 
						allErrors: true,
 | 
				
			||||||
	allErrors:      false,
 | 
						allowUnionTypes: true,
 | 
				
			||||||
	format:         'full',
 | 
						strict: false,
 | 
				
			||||||
	coerceTypes:    true
 | 
						coerceTypes: true,
 | 
				
			||||||
});
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
@@ -15,31 +14,32 @@ const ajv = require('ajv')({
 | 
				
			|||||||
 * @param {Object} payload
 | 
					 * @param {Object} payload
 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
function apiValidator (schema, payload/*, description*/) {
 | 
					const apiValidator = async (schema, payload /*, description*/) => {
 | 
				
			||||||
	return new Promise(function Promise_apiValidator (resolve, reject) {
 | 
						if (!schema) {
 | 
				
			||||||
		if (typeof payload === 'undefined') {
 | 
							throw new errs.ValidationError("Schema is undefined");
 | 
				
			||||||
			reject(new error.ValidationError('Payload is undefined'));
 | 
						}
 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		let validate = ajv.compile(schema);
 | 
						// Can't use falsy check here as valid payload could be `0` or `false`
 | 
				
			||||||
		let valid    = validate(payload);
 | 
						if (typeof payload === "undefined") {
 | 
				
			||||||
 | 
							throw new errs.ValidationError("Payload is undefined");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (valid && !validate.errors) {
 | 
					 | 
				
			||||||
			resolve(payload);
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			let message = ajv.errorsText(validate.errors);
 | 
					 | 
				
			||||||
			let err     = new error.ValidationError(message);
 | 
					 | 
				
			||||||
			err.debug   = [validate.errors, payload];
 | 
					 | 
				
			||||||
			reject(err);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
apiValidator.loadSchemas = parser
 | 
						const validate = ajv.compile(schema);
 | 
				
			||||||
	.dereference(path.resolve('schema/index.json'))
 | 
					 | 
				
			||||||
	.then((schema) => {
 | 
					 | 
				
			||||||
		ajv.addSchema(schema);
 | 
					 | 
				
			||||||
		return schema;
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = apiValidator;
 | 
						const valid = validate(payload);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (valid && !validate.errors) {
 | 
				
			||||||
 | 
							return payload;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						const message = ajv.errorsText(validate.errors);
 | 
				
			||||||
 | 
						const err = new errs.ValidationError(message);
 | 
				
			||||||
 | 
						err.debug = {validationErrors: validate.errors, payload};
 | 
				
			||||||
 | 
						throw err;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default apiValidator;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,17 +1,17 @@
 | 
				
			|||||||
const _           = require('lodash');
 | 
					import Ajv from 'ajv/dist/2020.js';
 | 
				
			||||||
const error       = require('../error');
 | 
					import _ from "lodash";
 | 
				
			||||||
const definitions = require('../../schema/definitions.json');
 | 
					import commonDefinitions from "../../schema/common.json" with { type: "json" };
 | 
				
			||||||
 | 
					import errs from "../error.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RegExp.prototype.toJSON = RegExp.prototype.toString;
 | 
					RegExp.prototype.toJSON = RegExp.prototype.toString;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const ajv = require('ajv')({
 | 
					const ajv = new Ajv({
 | 
				
			||||||
	verbose:     true,
 | 
						verbose: true,
 | 
				
			||||||
	allErrors:   true,
 | 
						allErrors: true,
 | 
				
			||||||
	format:      'full',  // strict regexes for format checks
 | 
						allowUnionTypes: true,
 | 
				
			||||||
	coerceTypes: true,
 | 
						coerceTypes: true,
 | 
				
			||||||
	schemas:     [
 | 
						strict: false,
 | 
				
			||||||
		definitions
 | 
						schemas: [commonDefinitions],
 | 
				
			||||||
	]
 | 
					 | 
				
			||||||
});
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
@@ -20,30 +20,26 @@ const ajv = require('ajv')({
 | 
				
			|||||||
 * @param   {Object} payload
 | 
					 * @param   {Object} payload
 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
function validator (schema, payload) {
 | 
					const validator = (schema, payload) => {
 | 
				
			||||||
	return new Promise(function (resolve, reject) {
 | 
						return new Promise((resolve, reject) => {
 | 
				
			||||||
		if (!payload) {
 | 
							if (!payload) {
 | 
				
			||||||
			reject(new error.InternalValidationError('Payload is falsy'));
 | 
								reject(new errs.InternalValidationError("Payload is falsy"));
 | 
				
			||||||
		} else {
 | 
							} else {
 | 
				
			||||||
			try {
 | 
								try {
 | 
				
			||||||
				let validate = ajv.compile(schema);
 | 
									const validate = ajv.compile(schema);
 | 
				
			||||||
 | 
									const valid = validate(payload);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				let valid = validate(payload);
 | 
					 | 
				
			||||||
				if (valid && !validate.errors) {
 | 
									if (valid && !validate.errors) {
 | 
				
			||||||
					resolve(_.cloneDeep(payload));
 | 
										resolve(_.cloneDeep(payload));
 | 
				
			||||||
				} else {
 | 
									} else {
 | 
				
			||||||
					let message = ajv.errorsText(validate.errors);
 | 
										const message = ajv.errorsText(validate.errors);
 | 
				
			||||||
					reject(new error.InternalValidationError(message));
 | 
										reject(new errs.InternalValidationError(message));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					 | 
				
			||||||
			} catch (err) {
 | 
								} catch (err) {
 | 
				
			||||||
				reject(err);
 | 
									reject(err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					 | 
				
			||||||
	});
 | 
						});
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
}
 | 
					export default validator;
 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = validator;
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,14 +1,18 @@
 | 
				
			|||||||
const {Signale} = require('signale');
 | 
					import signale from "signale";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					const opts = {
 | 
				
			||||||
	global:    new Signale({scope: 'Global   '}),
 | 
						logLevel: "info",
 | 
				
			||||||
	migrate:   new Signale({scope: 'Migrate  '}),
 | 
					 | 
				
			||||||
	express:   new Signale({scope: 'Express  '}),
 | 
					 | 
				
			||||||
	access:    new Signale({scope: 'Access   '}),
 | 
					 | 
				
			||||||
	nginx:     new Signale({scope: 'Nginx    '}),
 | 
					 | 
				
			||||||
	ssl:       new Signale({scope: 'SSL      '}),
 | 
					 | 
				
			||||||
	certbot:   new Signale({scope: 'Certbot  '}),
 | 
					 | 
				
			||||||
	import:    new Signale({scope: 'Importer '}),
 | 
					 | 
				
			||||||
	setup:     new Signale({scope: 'Setup    '}),
 | 
					 | 
				
			||||||
	ip_ranges: new Signale({scope: 'IP Ranges'})
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const global = new signale.Signale({ scope: "Global   ", ...opts });
 | 
				
			||||||
 | 
					const migrate = new signale.Signale({ scope: "Migrate  ", ...opts });
 | 
				
			||||||
 | 
					const express = new signale.Signale({ scope: "Express  ", ...opts });
 | 
				
			||||||
 | 
					const access = new signale.Signale({ scope: "Access   ", ...opts });
 | 
				
			||||||
 | 
					const nginx = new signale.Signale({ scope: "Nginx    ", ...opts });
 | 
				
			||||||
 | 
					const ssl = new signale.Signale({ scope: "SSL      ", ...opts });
 | 
				
			||||||
 | 
					const certbot = new signale.Signale({ scope: "Certbot  ", ...opts });
 | 
				
			||||||
 | 
					const importer = new signale.Signale({ scope: "Importer ", ...opts });
 | 
				
			||||||
 | 
					const setup = new signale.Signale({ scope: "Setup    ", ...opts });
 | 
				
			||||||
 | 
					const ipRanges = new signale.Signale({ scope: "IP Ranges", ...opts });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { global, migrate, express, access, nginx, ssl, certbot, importer, setup, ipRanges };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,15 +1,13 @@
 | 
				
			|||||||
const db     = require('./db');
 | 
					import db from "./db.js";
 | 
				
			||||||
const logger = require('./logger').migrate;
 | 
					import { migrate as logger } from "./logger.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = {
 | 
					const migrateUp = async () => {
 | 
				
			||||||
	latest: function () {
 | 
						const version = await db.migrate.currentVersion();
 | 
				
			||||||
		return db.migrate.currentVersion()
 | 
						logger.info("Current database version:", version);
 | 
				
			||||||
			.then((version) => {
 | 
						return await db.migrate.latest({
 | 
				
			||||||
				logger.info('Current database version:', version);
 | 
							tableName: "migrations",
 | 
				
			||||||
				return db.migrate.latest({
 | 
							directory: "migrations",
 | 
				
			||||||
					tableName: 'migrations',
 | 
						});
 | 
				
			||||||
					directory: 'migrations'
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			});
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { migrateUp };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'initial-schema';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "initial-schema";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,199 +8,199 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.createTable('auth', (table) => {
 | 
						return knex.schema
 | 
				
			||||||
		table.increments().primary();
 | 
							.createTable("auth", (table) => {
 | 
				
			||||||
		table.dateTime('created_on').notNull();
 | 
								table.increments().primary();
 | 
				
			||||||
		table.dateTime('modified_on').notNull();
 | 
								table.dateTime("created_on").notNull();
 | 
				
			||||||
		table.integer('user_id').notNull().unsigned();
 | 
								table.dateTime("modified_on").notNull();
 | 
				
			||||||
		table.string('type', 30).notNull();
 | 
								table.integer("user_id").notNull().unsigned();
 | 
				
			||||||
		table.string('secret').notNull();
 | 
								table.string("type", 30).notNull();
 | 
				
			||||||
		table.json('meta').notNull();
 | 
								table.string("secret").notNull();
 | 
				
			||||||
		table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
								table.json("meta").notNull();
 | 
				
			||||||
	})
 | 
								table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] auth Table created');
 | 
								logger.info(`[${migrateName}] auth Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('user', (table) => {
 | 
								return knex.schema.createTable("user", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('is_disabled').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_disabled").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.string('email').notNull();
 | 
									table.string("email").notNull();
 | 
				
			||||||
				table.string('name').notNull();
 | 
									table.string("name").notNull();
 | 
				
			||||||
				table.string('nickname').notNull();
 | 
									table.string("nickname").notNull();
 | 
				
			||||||
				table.string('avatar').notNull();
 | 
									table.string("avatar").notNull();
 | 
				
			||||||
				table.json('roles').notNull();
 | 
									table.json("roles").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] user Table created');
 | 
								logger.info(`[${migrateName}] user Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('user_permission', (table) => {
 | 
								return knex.schema.createTable("user_permission", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('user_id').notNull().unsigned();
 | 
									table.integer("user_id").notNull().unsigned();
 | 
				
			||||||
				table.string('visibility').notNull();
 | 
									table.string("visibility").notNull();
 | 
				
			||||||
				table.string('proxy_hosts').notNull();
 | 
									table.string("proxy_hosts").notNull();
 | 
				
			||||||
				table.string('redirection_hosts').notNull();
 | 
									table.string("redirection_hosts").notNull();
 | 
				
			||||||
				table.string('dead_hosts').notNull();
 | 
									table.string("dead_hosts").notNull();
 | 
				
			||||||
				table.string('streams').notNull();
 | 
									table.string("streams").notNull();
 | 
				
			||||||
				table.string('access_lists').notNull();
 | 
									table.string("access_lists").notNull();
 | 
				
			||||||
				table.string('certificates').notNull();
 | 
									table.string("certificates").notNull();
 | 
				
			||||||
				table.unique('user_id');
 | 
									table.unique("user_id");
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] user_permission Table created');
 | 
								logger.info(`[${migrateName}] user_permission Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('proxy_host', (table) => {
 | 
								return knex.schema.createTable("proxy_host", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.json('domain_names').notNull();
 | 
									table.json("domain_names").notNull();
 | 
				
			||||||
				table.string('forward_ip').notNull();
 | 
									table.string("forward_ip").notNull();
 | 
				
			||||||
				table.integer('forward_port').notNull().unsigned();
 | 
									table.integer("forward_port").notNull().unsigned();
 | 
				
			||||||
				table.integer('access_list_id').notNull().unsigned().defaultTo(0);
 | 
									table.integer("access_list_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('certificate_id').notNull().unsigned().defaultTo(0);
 | 
									table.integer("certificate_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('ssl_forced').notNull().unsigned().defaultTo(0);
 | 
									table.integer("ssl_forced").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('caching_enabled').notNull().unsigned().defaultTo(0);
 | 
									table.integer("caching_enabled").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('block_exploits').notNull().unsigned().defaultTo(0);
 | 
									table.integer("block_exploits").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.text('advanced_config').notNull().defaultTo('');
 | 
									table.text("advanced_config").notNull().defaultTo("");
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table created');
 | 
								logger.info(`[${migrateName}] proxy_host Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('redirection_host', (table) => {
 | 
								return knex.schema.createTable("redirection_host", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.json('domain_names').notNull();
 | 
									table.json("domain_names").notNull();
 | 
				
			||||||
				table.string('forward_domain_name').notNull();
 | 
									table.string("forward_domain_name").notNull();
 | 
				
			||||||
				table.integer('preserve_path').notNull().unsigned().defaultTo(0);
 | 
									table.integer("preserve_path").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('certificate_id').notNull().unsigned().defaultTo(0);
 | 
									table.integer("certificate_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('ssl_forced').notNull().unsigned().defaultTo(0);
 | 
									table.integer("ssl_forced").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('block_exploits').notNull().unsigned().defaultTo(0);
 | 
									table.integer("block_exploits").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.text('advanced_config').notNull().defaultTo('');
 | 
									table.text("advanced_config").notNull().defaultTo("");
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table created');
 | 
								logger.info(`[${migrateName}] redirection_host Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('dead_host', (table) => {
 | 
								return knex.schema.createTable("dead_host", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.json('domain_names').notNull();
 | 
									table.json("domain_names").notNull();
 | 
				
			||||||
				table.integer('certificate_id').notNull().unsigned().defaultTo(0);
 | 
									table.integer("certificate_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('ssl_forced').notNull().unsigned().defaultTo(0);
 | 
									table.integer("ssl_forced").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.text('advanced_config').notNull().defaultTo('');
 | 
									table.text("advanced_config").notNull().defaultTo("");
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] dead_host Table created');
 | 
								logger.info(`[${migrateName}] dead_host Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('stream', (table) => {
 | 
								return knex.schema.createTable("stream", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('incoming_port').notNull().unsigned();
 | 
									table.integer("incoming_port").notNull().unsigned();
 | 
				
			||||||
				table.string('forward_ip').notNull();
 | 
									table.string("forward_ip").notNull();
 | 
				
			||||||
				table.integer('forwarding_port').notNull().unsigned();
 | 
									table.integer("forwarding_port").notNull().unsigned();
 | 
				
			||||||
				table.integer('tcp_forwarding').notNull().unsigned().defaultTo(0);
 | 
									table.integer("tcp_forwarding").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.integer('udp_forwarding').notNull().unsigned().defaultTo(0);
 | 
									table.integer("udp_forwarding").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] stream Table created');
 | 
								logger.info(`[${migrateName}] stream Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('access_list', (table) => {
 | 
								return knex.schema.createTable("access_list", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.string('name').notNull();
 | 
									table.string("name").notNull();
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list Table created');
 | 
								logger.info(`[${migrateName}] access_list Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('certificate', (table) => {
 | 
								return knex.schema.createTable("certificate", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('owner_user_id').notNull().unsigned();
 | 
									table.integer("owner_user_id").notNull().unsigned();
 | 
				
			||||||
				table.integer('is_deleted').notNull().unsigned().defaultTo(0);
 | 
									table.integer("is_deleted").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.string('provider').notNull();
 | 
									table.string("provider").notNull();
 | 
				
			||||||
				table.string('nice_name').notNull().defaultTo('');
 | 
									table.string("nice_name").notNull().defaultTo("");
 | 
				
			||||||
				table.json('domain_names').notNull();
 | 
									table.json("domain_names").notNull();
 | 
				
			||||||
				table.dateTime('expires_on').notNull();
 | 
									table.dateTime("expires_on").notNull();
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] certificate Table created');
 | 
								logger.info(`[${migrateName}] certificate Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('access_list_auth', (table) => {
 | 
								return knex.schema.createTable("access_list_auth", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('access_list_id').notNull().unsigned();
 | 
									table.integer("access_list_id").notNull().unsigned();
 | 
				
			||||||
				table.string('username').notNull();
 | 
									table.string("username").notNull();
 | 
				
			||||||
				table.string('password').notNull();
 | 
									table.string("password").notNull();
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list_auth Table created');
 | 
								logger.info(`[${migrateName}] access_list_auth Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.createTable('audit_log', (table) => {
 | 
								return knex.schema.createTable("audit_log", (table) => {
 | 
				
			||||||
				table.increments().primary();
 | 
									table.increments().primary();
 | 
				
			||||||
				table.dateTime('created_on').notNull();
 | 
									table.dateTime("created_on").notNull();
 | 
				
			||||||
				table.dateTime('modified_on').notNull();
 | 
									table.dateTime("modified_on").notNull();
 | 
				
			||||||
				table.integer('user_id').notNull().unsigned();
 | 
									table.integer("user_id").notNull().unsigned();
 | 
				
			||||||
				table.string('object_type').notNull().defaultTo('');
 | 
									table.string("object_type").notNull().defaultTo("");
 | 
				
			||||||
				table.integer('object_id').notNull().unsigned().defaultTo(0);
 | 
									table.integer("object_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				table.string('action').notNull();
 | 
									table.string("action").notNull();
 | 
				
			||||||
				table.json('meta').notNull();
 | 
									table.json("meta").notNull();
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] audit_log Table created');
 | 
								logger.info(`[${migrateName}] audit_log Table created`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down the initial data.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down the initial data.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'websockets';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "websockets";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,29 +8,29 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.integer('allow_websocket_upgrade').notNull().unsigned().defaultTo(0);
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.integer("allow_websocket_upgrade").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'forward_host';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "forward_host";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,17 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.renameColumn('forward_ip', 'forward_host');
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.renameColumn("forward_ip", "forward_host");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -25,10 +26,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'http2_support';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "http2_support";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,31 +8,31 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.integer('http2_support').notNull().unsigned().defaultTo(0);
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.integer("http2_support").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('redirection_host', function (redirection_host) {
 | 
								return knex.schema.table("redirection_host", (redirection_host) => {
 | 
				
			||||||
				redirection_host.integer('http2_support').notNull().unsigned().defaultTo(0);
 | 
									redirection_host.integer("http2_support").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('dead_host', function (dead_host) {
 | 
								return knex.schema.table("dead_host", (dead_host) => {
 | 
				
			||||||
				dead_host.integer('http2_support').notNull().unsigned().defaultTo(0);
 | 
									dead_host.integer("http2_support").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] dead_host Table altered');
 | 
								logger.info(`[${migrateName}] dead_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -39,11 +40,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'forward_scheme';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "forward_scheme";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,17 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.string('forward_scheme').notNull().defaultTo('http');
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.string("forward_scheme").notNull().defaultTo("http");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -25,10 +26,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'disabled';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "disabled";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,38 +8,38 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.integer('enabled').notNull().unsigned().defaultTo(1);
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.integer("enabled").notNull().unsigned().defaultTo(1);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('redirection_host', function (redirection_host) {
 | 
								return knex.schema.table("redirection_host", (redirection_host) => {
 | 
				
			||||||
				redirection_host.integer('enabled').notNull().unsigned().defaultTo(1);
 | 
									redirection_host.integer("enabled").notNull().unsigned().defaultTo(1);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('dead_host', function (dead_host) {
 | 
								return knex.schema.table("dead_host", (dead_host) => {
 | 
				
			||||||
				dead_host.integer('enabled').notNull().unsigned().defaultTo(1);
 | 
									dead_host.integer("enabled").notNull().unsigned().defaultTo(1);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] dead_host Table altered');
 | 
								logger.info(`[${migrateName}] dead_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('stream', function (stream) {
 | 
								return knex.schema.table("stream", (stream) => {
 | 
				
			||||||
				stream.integer('enabled').notNull().unsigned().defaultTo(1);
 | 
									stream.integer("enabled").notNull().unsigned().defaultTo(1);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] stream Table altered');
 | 
								logger.info(`[${migrateName}] stream Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -46,10 +47,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'custom_locations';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "custom_locations";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -8,17 +9,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.json('locations');
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
	})
 | 
								proxy_host.json("locations");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -26,10 +27,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'hsts';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "hsts";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,34 +8,34 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
						return knex.schema
 | 
				
			||||||
		proxy_host.integer('hsts_enabled').notNull().unsigned().defaultTo(0);
 | 
							.table("proxy_host", (proxy_host) => {
 | 
				
			||||||
		proxy_host.integer('hsts_subdomains').notNull().unsigned().defaultTo(0);
 | 
								proxy_host.integer("hsts_enabled").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
	})
 | 
								proxy_host.integer("hsts_subdomains").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
								logger.info(`[${migrateName}] proxy_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('redirection_host', function (redirection_host) {
 | 
								return knex.schema.table("redirection_host", (redirection_host) => {
 | 
				
			||||||
				redirection_host.integer('hsts_enabled').notNull().unsigned().defaultTo(0);
 | 
									redirection_host.integer("hsts_enabled").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				redirection_host.integer('hsts_subdomains').notNull().unsigned().defaultTo(0);
 | 
									redirection_host.integer("hsts_subdomains").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return knex.schema.table('dead_host', function (dead_host) {
 | 
								return knex.schema.table("dead_host", (dead_host) => {
 | 
				
			||||||
				dead_host.integer('hsts_enabled').notNull().unsigned().defaultTo(0);
 | 
									dead_host.integer("hsts_enabled").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
				dead_host.integer('hsts_subdomains').notNull().unsigned().defaultTo(0);
 | 
									dead_host.integer("hsts_subdomains").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] dead_host Table altered');
 | 
								logger.info(`[${migrateName}] dead_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -42,10 +43,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'settings';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "settings";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,11 +8,10 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.createTable('setting', (table) => {
 | 
						return knex.schema.createTable('setting', (table) => {
 | 
				
			||||||
		table.string('id').notNull().primary();
 | 
							table.string('id').notNull().primary();
 | 
				
			||||||
@@ -21,7 +21,7 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
		table.json('meta').notNull();
 | 
							table.json('meta').notNull();
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] setting Table created');
 | 
								logger.info(`[${migrateName}] setting Table created`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -29,10 +29,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down the initial data.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down the initial data.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'access_list_client';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "access_list_client";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,32 +8,30 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.createTable("access_list_client", (table) => {
 | 
				
			||||||
 | 
								table.increments().primary();
 | 
				
			||||||
 | 
								table.dateTime("created_on").notNull();
 | 
				
			||||||
 | 
								table.dateTime("modified_on").notNull();
 | 
				
			||||||
 | 
								table.integer("access_list_id").notNull().unsigned();
 | 
				
			||||||
 | 
								table.string("address").notNull();
 | 
				
			||||||
 | 
								table.string("directive").notNull();
 | 
				
			||||||
 | 
								table.json("meta").notNull();
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] access_list_client Table created`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.createTable('access_list_client', (table) => {
 | 
								return knex.schema.table("access_list", (access_list) => {
 | 
				
			||||||
		table.increments().primary();
 | 
									access_list.integer("satify_any").notNull().defaultTo(0);
 | 
				
			||||||
		table.dateTime('created_on').notNull();
 | 
					 | 
				
			||||||
		table.dateTime('modified_on').notNull();
 | 
					 | 
				
			||||||
		table.integer('access_list_id').notNull().unsigned();
 | 
					 | 
				
			||||||
		table.string('address').notNull();
 | 
					 | 
				
			||||||
		table.string('directive').notNull();
 | 
					 | 
				
			||||||
		table.json('meta').notNull();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(function () {
 | 
					 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list_client Table created');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			return knex.schema.table('access_list', function (access_list) {
 | 
					 | 
				
			||||||
				access_list.integer('satify_any').notNull().defaultTo(0);
 | 
					 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list Table altered');
 | 
								logger.info(`[${migrateName}] access_list Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -40,14 +39,14 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param {Object} knex
 | 
					 * @param {Object} knex
 | 
				
			||||||
 * @param {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					const down = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.dropTable('access_list_client')
 | 
						return knex.schema.dropTable("access_list_client").then(() => {
 | 
				
			||||||
		.then(() => {
 | 
							logger.info(`[${migrateName}] access_list_client Table dropped`);
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list_client Table dropped');
 | 
						});
 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'access_list_client_fix';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "access_list_client_fix";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,17 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('access_list', function (access_list) {
 | 
						return knex.schema
 | 
				
			||||||
		access_list.renameColumn('satify_any', 'satisfy_any');
 | 
							.table("access_list", (access_list) => {
 | 
				
			||||||
	})
 | 
								access_list.renameColumn("satify_any", "satisfy_any");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list Table altered');
 | 
								logger.info(`[${migrateName}] access_list Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -25,10 +26,11 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex, Promise) {
 | 
					const down = (_knex) => {
 | 
				
			||||||
	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.');
 | 
						logger.warn(`[${migrateName}] You can't migrate down this one.`);
 | 
				
			||||||
	return Promise.resolve(true);
 | 
						return Promise.resolve(true);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,48 +0,0 @@
 | 
				
			|||||||
const migrate_name = 'openid_connect';
 | 
					 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Migrate
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @see http://knexjs.org/#Schema
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
					 | 
				
			||||||
		proxy_host.integer('openidc_enabled').notNull().unsigned().defaultTo(0);
 | 
					 | 
				
			||||||
		proxy_host.text('openidc_redirect_uri').notNull().defaultTo('');
 | 
					 | 
				
			||||||
		proxy_host.text('openidc_discovery').notNull().defaultTo('');
 | 
					 | 
				
			||||||
		proxy_host.text('openidc_auth_method').notNull().defaultTo('');
 | 
					 | 
				
			||||||
		proxy_host.text('openidc_client_id').notNull().defaultTo('');
 | 
					 | 
				
			||||||
		proxy_host.text('openidc_client_secret').notNull().defaultTo('');
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(() => {
 | 
					 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Undo Migrate
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_enabled');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_redirect_uri');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_discovery');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_auth_method');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_client_id');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_client_secret');
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(() => {
 | 
					 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
@@ -1,40 +0,0 @@
 | 
				
			|||||||
const migrate_name = 'openid_allowed_users';
 | 
					 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Migrate
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @see http://knexjs.org/#Schema
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
					 | 
				
			||||||
		proxy_host.integer('openidc_restrict_users_enabled').notNull().unsigned().defaultTo(0);
 | 
					 | 
				
			||||||
		proxy_host.json('openidc_allowed_users').notNull().defaultTo([]);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(() => {
 | 
					 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Undo Migrate
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					 | 
				
			||||||
	return knex.schema.table('proxy_host', function (proxy_host) {
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_restrict_users_enabled');
 | 
					 | 
				
			||||||
		proxy_host.dropColumn('openidc_allowed_users');
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(() => {
 | 
					 | 
				
			||||||
			logger.info('[' + migrate_name + '] proxy_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'pass_auth';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "pass_auth";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,18 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object}  knex
 | 
					 * @param   {Object}  knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.table("access_list", (access_list) => {
 | 
				
			||||||
	return knex.schema.table('access_list', function (access_list) {
 | 
								access_list.integer("pass_auth").notNull().defaultTo(1);
 | 
				
			||||||
		access_list.integer('pass_auth').notNull().defaultTo(1);
 | 
							})
 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list Table altered');
 | 
								logger.info(`[${migrateName}] access_list Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -26,16 +26,18 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param {Object} knex
 | 
					 * @param {Object} knex
 | 
				
			||||||
 * @param {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					const down = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('access_list', function (access_list) {
 | 
						return knex.schema
 | 
				
			||||||
		access_list.dropColumn('pass_auth');
 | 
							.table("access_list", (access_list) => {
 | 
				
			||||||
	})
 | 
								access_list.dropColumn("pass_auth");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			logger.info('[' + migrate_name + '] access_list pass_auth Column dropped');
 | 
								logger.info(`[${migrateName}] access_list pass_auth Column dropped`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'redirection_scheme';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "redirection_scheme";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,18 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.table("redirection_host", (table) => {
 | 
				
			||||||
	return knex.schema.table('redirection_host', (table) => {
 | 
								table.string("forward_scheme").notNull().defaultTo("$scheme");
 | 
				
			||||||
		table.string('forward_scheme').notNull().defaultTo('$scheme');
 | 
							})
 | 
				
			||||||
	})
 | 
							.then(() => {
 | 
				
			||||||
		.then(function () {
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -26,16 +26,18 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					const down = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('redirection_host', (table) => {
 | 
						return knex.schema
 | 
				
			||||||
		table.dropColumn('forward_scheme');
 | 
							.table("redirection_host", (table) => {
 | 
				
			||||||
	})
 | 
								table.dropColumn("forward_scheme");
 | 
				
			||||||
		.then(function () {
 | 
							})
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,6 @@
 | 
				
			|||||||
const migrate_name = 'redirection_status_code';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "redirection_status_code";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * Migrate
 | 
					 * Migrate
 | 
				
			||||||
@@ -7,18 +8,17 @@ const logger       = require('../logger').migrate;
 | 
				
			|||||||
 * @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
					const up = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.table("redirection_host", (table) => {
 | 
				
			||||||
	return knex.schema.table('redirection_host', (table) => {
 | 
								table.integer("forward_http_code").notNull().unsigned().defaultTo(302);
 | 
				
			||||||
		table.integer('forward_http_code').notNull().unsigned().defaultTo(302);
 | 
							})
 | 
				
			||||||
	})
 | 
							.then(() => {
 | 
				
			||||||
		.then(function () {
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
					 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -26,16 +26,18 @@ exports.up = function (knex/*, Promise*/) {
 | 
				
			|||||||
 * Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 * @param   {Promise} Promise
 | 
					 | 
				
			||||||
 * @returns {Promise}
 | 
					 * @returns {Promise}
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
					const down = (knex) => {
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('redirection_host', (table) => {
 | 
						return knex.schema
 | 
				
			||||||
		table.dropColumn('forward_http_code');
 | 
							.table("redirection_host", (table) => {
 | 
				
			||||||
	})
 | 
								table.dropColumn("forward_http_code");
 | 
				
			||||||
		.then(function () {
 | 
							})
 | 
				
			||||||
			logger.info('[' + migrate_name + '] redirection_host Table altered');
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] redirection_host Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,40 +1,43 @@
 | 
				
			|||||||
const migrate_name = 'stream_domain';
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const logger       = require('../logger').migrate;
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "stream_domain";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
	* Migrate
 | 
					 * Migrate
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
	* @param   {Promise} Promise
 | 
					 * @returns {Promise}
 | 
				
			||||||
	* @returns {Promise}
 | 
					 */
 | 
				
			||||||
	*/
 | 
					const up = (knex) => {
 | 
				
			||||||
exports.up = function (knex/*, Promise*/) {
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('stream', (table) => {
 | 
						return knex.schema
 | 
				
			||||||
		table.renameColumn('forward_ip', 'forwarding_host');
 | 
							.table("stream", (table) => {
 | 
				
			||||||
	})
 | 
								table.renameColumn("forward_ip", "forwarding_host");
 | 
				
			||||||
		.then(function () {
 | 
							})
 | 
				
			||||||
			logger.info('[' + migrate_name + '] stream Table altered');
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] stream Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
	* Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
	* @param   {Promise} Promise
 | 
					 * @returns {Promise}
 | 
				
			||||||
	* @returns {Promise}
 | 
					 */
 | 
				
			||||||
	*/
 | 
					const down = (knex) => {
 | 
				
			||||||
exports.down = function (knex/*, Promise*/) {
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return knex.schema.table('stream', (table) => {
 | 
						return knex.schema
 | 
				
			||||||
		table.renameColumn('forwarding_host', 'forward_ip');
 | 
							.table("stream", (table) => {
 | 
				
			||||||
	})
 | 
								table.renameColumn("forwarding_host", "forward_ip");
 | 
				
			||||||
		.then(function () {
 | 
							})
 | 
				
			||||||
			logger.info('[' + migrate_name + '] stream Table altered');
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] stream Table altered`);
 | 
				
			||||||
		});
 | 
							});
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,17 +1,19 @@
 | 
				
			|||||||
const migrate_name  = 'stream_domain';
 | 
					import internalNginx from "../internal/nginx.js";
 | 
				
			||||||
const logger        = require('../logger').migrate;
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
const internalNginx = require('../internal/nginx');
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "stream_domain";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
async function regenerateDefaultHost(knex) {
 | 
					async function regenerateDefaultHost(knex) {
 | 
				
			||||||
	const row = await knex('setting').select('*').where('id', 'default-site').first();
 | 
						const row = await knex("setting").select("*").where("id", "default-site").first();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!row) {
 | 
						if (!row) {
 | 
				
			||||||
		return Promise.resolve();
 | 
							return Promise.resolve();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return internalNginx.deleteConfig('default')
 | 
						return internalNginx
 | 
				
			||||||
 | 
							.deleteConfig("default")
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			return internalNginx.generateConfig('default', row);
 | 
								return internalNginx.generateConfig("default", row);
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		.then(() => {
 | 
							.then(() => {
 | 
				
			||||||
			return internalNginx.test();
 | 
								return internalNginx.test();
 | 
				
			||||||
@@ -22,29 +24,29 @@ async function regenerateDefaultHost(knex) {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
	* Migrate
 | 
					 * Migrate
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @see http://knexjs.org/#Schema
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
	* @param   {Promise} Promise
 | 
					 * @returns {Promise}
 | 
				
			||||||
	* @returns {Promise}
 | 
					 */
 | 
				
			||||||
	*/
 | 
					const up = (knex) => {
 | 
				
			||||||
exports.up = function (knex) {
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Up...');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return regenerateDefaultHost(knex);
 | 
						return regenerateDefaultHost(knex);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
	* Undo Migrate
 | 
					 * Undo Migrate
 | 
				
			||||||
	*
 | 
					 *
 | 
				
			||||||
	* @param   {Object} knex
 | 
					 * @param   {Object} knex
 | 
				
			||||||
	* @param   {Promise} Promise
 | 
					 * @returns {Promise}
 | 
				
			||||||
	* @returns {Promise}
 | 
					 */
 | 
				
			||||||
	*/
 | 
					const down = (knex) => {
 | 
				
			||||||
exports.down = function (knex) {
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
	logger.info('[' + migrate_name + '] Migrating Down...');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return regenerateDefaultHost(knex);
 | 
						return regenerateDefaultHost(knex);
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										43
									
								
								backend/migrations/20240427161436_stream_ssl.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										43
									
								
								backend/migrations/20240427161436_stream_ssl.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,43 @@
 | 
				
			|||||||
 | 
					import { migrate as logger } from "../logger.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const migrateName = "stream_ssl";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Migrate
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @see http://knexjs.org/#Schema
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 | 
					 * @returns {Promise}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const up = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Up...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.table("stream", (table) => {
 | 
				
			||||||
 | 
								table.integer("certificate_id").notNull().unsigned().defaultTo(0);
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] stream Table altered`);
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Undo Migrate
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * @param   {Object} knex
 | 
				
			||||||
 | 
					 * @returns {Promise}
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					const down = (knex) => {
 | 
				
			||||||
 | 
						logger.info(`[${migrateName}] Migrating Down...`);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return knex.schema
 | 
				
			||||||
 | 
							.table("stream", (table) => {
 | 
				
			||||||
 | 
								table.dropColumn("certificate_id");
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
							.then(() => {
 | 
				
			||||||
 | 
								logger.info(`[${migrateName}] stream Table altered`);
 | 
				
			||||||
 | 
							});
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export { up, down };
 | 
				
			||||||
@@ -1,86 +1,98 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db               = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model            = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User             = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const AccessListAuth   = require('./access_list_auth');
 | 
					import AccessListAuth from "./access_list_auth.js";
 | 
				
			||||||
const AccessListClient = require('./access_list_client');
 | 
					import AccessListClient from "./access_list_client.js";
 | 
				
			||||||
const now              = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import ProxyHostModel from "./proxy_host.js";
 | 
				
			||||||
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = ["is_deleted", "satisfy_any", "pass_auth"];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class AccessList extends Model {
 | 
					class AccessList extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'AccessList';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'access_list';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['meta'];
 | 
							return "AccessList";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
		const ProxyHost = require('./proxy_host');
 | 
							return "access_list";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["meta"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list.owner_user_id',
 | 
										from: "access_list.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
					 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			items: {
 | 
								items: {
 | 
				
			||||||
				relation:   Model.HasManyRelation,
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
				modelClass: AccessListAuth,
 | 
									modelClass: AccessListAuth,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list.id',
 | 
										from: "access_list.id",
 | 
				
			||||||
					to:   'access_list_auth.access_list_id'
 | 
										to: "access_list_auth.access_list_id",
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			clients: {
 | 
								clients: {
 | 
				
			||||||
				relation:   Model.HasManyRelation,
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
				modelClass: AccessListClient,
 | 
									modelClass: AccessListClient,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list.id',
 | 
										from: "access_list.id",
 | 
				
			||||||
					to:   'access_list_client.access_list_id'
 | 
										to: "access_list_client.access_list_id",
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			proxy_hosts: {
 | 
								proxy_hosts: {
 | 
				
			||||||
				relation:   Model.HasManyRelation,
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
				modelClass: ProxyHost,
 | 
									modelClass: ProxyHostModel,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list.id',
 | 
										from: "access_list.id",
 | 
				
			||||||
					to:   'proxy_host.access_list_id'
 | 
										to: "proxy_host.access_list_id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('proxy_host.is_deleted', 0);
 | 
										qb.where("proxy_host.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = AccessList;
 | 
					export default AccessList;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,54 +1,55 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					import accessListModel from "./access_list.js";
 | 
				
			||||||
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class AccessListAuth extends Model {
 | 
					class AccessListAuth extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						static get name() {
 | 
				
			||||||
		return 'AccessListAuth';
 | 
							return "AccessListAuth";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						static get tableName() {
 | 
				
			||||||
		return 'access_list_auth';
 | 
							return "access_list_auth";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get jsonAttributes() {
 | 
				
			||||||
		return ['meta'];
 | 
							return ["meta"];
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			access_list: {
 | 
								access_list: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: require('./access_list'),
 | 
									modelClass: accessListModel,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list_auth.access_list_id',
 | 
										from: "access_list_auth.access_list_id",
 | 
				
			||||||
					to:   'access_list.id'
 | 
										to: "access_list.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('access_list.is_deleted', 0);
 | 
										qb.where("access_list.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = AccessListAuth;
 | 
					export default AccessListAuth;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,54 +1,55 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					import accessListModel from "./access_list.js";
 | 
				
			||||||
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class AccessListClient extends Model {
 | 
					class AccessListClient extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						static get name() {
 | 
				
			||||||
		return 'AccessListClient';
 | 
							return "AccessListClient";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						static get tableName() {
 | 
				
			||||||
		return 'access_list_client';
 | 
							return "access_list_client";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get jsonAttributes() {
 | 
				
			||||||
		return ['meta'];
 | 
							return ["meta"];
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			access_list: {
 | 
								access_list: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: require('./access_list'),
 | 
									modelClass: accessListModel,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'access_list_client.access_list_id',
 | 
										from: "access_list_client.access_list_id",
 | 
				
			||||||
					to:   'access_list.id'
 | 
										to: "access_list.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('access_list.is_deleted', 0);
 | 
										qb.where("access_list.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = AccessListClient;
 | 
					export default AccessListClient;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,52 +1,52 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User  = require('./user');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class AuditLog extends Model {
 | 
					class AuditLog extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						static get name() {
 | 
				
			||||||
		return 'AuditLog';
 | 
							return "AuditLog";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						static get tableName() {
 | 
				
			||||||
		return 'audit_log';
 | 
							return "audit_log";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get jsonAttributes() {
 | 
				
			||||||
		return ['meta'];
 | 
							return ["meta"];
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			user: {
 | 
								user: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'audit_log.user_id',
 | 
										from: "audit_log.user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = AuditLog;
 | 
					export default AuditLog;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,83 +1,92 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const bcrypt = require('bcrypt');
 | 
					import bcrypt from "bcrypt";
 | 
				
			||||||
const db     = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model  = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User   = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const now    = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
function encryptPassword () {
 | 
					const boolFields = ["is_deleted"];
 | 
				
			||||||
	/* jshint -W040 */
 | 
					 | 
				
			||||||
	let _this = this;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (_this.type === 'password' && _this.secret) {
 | 
					function encryptPassword() {
 | 
				
			||||||
		return bcrypt.hash(_this.secret, 13)
 | 
						if (this.type === "password" && this.secret) {
 | 
				
			||||||
			.then(function (hash) {
 | 
							return bcrypt.hash(this.secret, 13).then((hash) => {
 | 
				
			||||||
				_this.secret = hash;
 | 
								this.secret = hash;
 | 
				
			||||||
			});
 | 
							});
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return null;
 | 
						return null;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class Auth extends Model {
 | 
					class Auth extends Model {
 | 
				
			||||||
	$beforeInsert (queryContext) {
 | 
						$beforeInsert(queryContext) {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		return encryptPassword.apply(this, queryContext);
 | 
							return encryptPassword.apply(this, queryContext);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate (queryContext) {
 | 
						$beforeUpdate(queryContext) {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
		return encryptPassword.apply(this, queryContext);
 | 
							return encryptPassword.apply(this, queryContext);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/**
 | 
						/**
 | 
				
			||||||
	 * Verify a plain password against the encrypted password
 | 
						 * Verify a plain password against the encrypted password
 | 
				
			||||||
	 *
 | 
						 *
 | 
				
			||||||
	 * @param {String} password
 | 
						 * @param {String} password
 | 
				
			||||||
	 * @returns {Promise}
 | 
						 * @returns {Promise}
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	verifyPassword (password) {
 | 
						verifyPassword(password) {
 | 
				
			||||||
		return bcrypt.compare(password, this.secret);
 | 
							return bcrypt.compare(password, this.secret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						static get name() {
 | 
				
			||||||
		return 'Auth';
 | 
							return "Auth";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						static get tableName() {
 | 
				
			||||||
		return 'auth';
 | 
							return "auth";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get jsonAttributes() {
 | 
				
			||||||
		return ['meta'];
 | 
							return ["meta"];
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			user: {
 | 
								user: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'auth.user_id',
 | 
										from: "auth.user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				filter: {
 | 
									filter: {
 | 
				
			||||||
					is_deleted: 0
 | 
										is_deleted: 0,
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = Auth;
 | 
					export default Auth;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,72 +1,133 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User  = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					import deadHostModel from "./dead_host.js";
 | 
				
			||||||
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import proxyHostModel from "./proxy_host.js";
 | 
				
			||||||
 | 
					import redirectionHostModel from "./redirection_host.js";
 | 
				
			||||||
 | 
					import streamModel from "./stream.js";
 | 
				
			||||||
 | 
					import userModel from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = ["is_deleted"];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class Certificate extends Model {
 | 
					class Certificate extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for expires_on
 | 
							// Default for expires_on
 | 
				
			||||||
		if (typeof this.expires_on === 'undefined') {
 | 
							if (typeof this.expires_on === "undefined") {
 | 
				
			||||||
			this.expires_on = now();
 | 
								this.expires_on = now();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for domain_names
 | 
							// Default for domain_names
 | 
				
			||||||
		if (typeof this.domain_names === 'undefined') {
 | 
							if (typeof this.domain_names === "undefined") {
 | 
				
			||||||
			this.domain_names = [];
 | 
								this.domain_names = [];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		this.domain_names.sort();
 | 
							this.domain_names.sort();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Sort domain_names
 | 
							// Sort domain_names
 | 
				
			||||||
		if (typeof this.domain_names !== 'undefined') {
 | 
							if (typeof this.domain_names !== "undefined") {
 | 
				
			||||||
			this.domain_names.sort();
 | 
								this.domain_names.sort();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'Certificate';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'certificate';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['domain_names', 'meta'];
 | 
							return "Certificate";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "certificate";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["domain_names", "meta"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: userModel,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'certificate.owner_user_id',
 | 
										from: "certificate.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
 | 
								proxy_hosts: {
 | 
				
			||||||
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
 | 
									modelClass: proxyHostModel,
 | 
				
			||||||
 | 
									join: {
 | 
				
			||||||
 | 
										from: "certificate.id",
 | 
				
			||||||
 | 
										to: "proxy_host.certificate_id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("proxy_host.is_deleted", 0);
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								dead_hosts: {
 | 
				
			||||||
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
 | 
									modelClass: deadHostModel,
 | 
				
			||||||
 | 
									join: {
 | 
				
			||||||
 | 
										from: "certificate.id",
 | 
				
			||||||
 | 
										to: "dead_host.certificate_id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("dead_host.is_deleted", 0);
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								redirection_hosts: {
 | 
				
			||||||
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
 | 
									modelClass: redirectionHostModel,
 | 
				
			||||||
 | 
									join: {
 | 
				
			||||||
 | 
										from: "certificate.id",
 | 
				
			||||||
 | 
										to: "redirection_host.certificate_id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("redirection_host.is_deleted", 0);
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
								streams: {
 | 
				
			||||||
 | 
									relation: Model.HasManyRelation,
 | 
				
			||||||
 | 
									modelClass: streamModel,
 | 
				
			||||||
 | 
									join: {
 | 
				
			||||||
 | 
										from: "certificate.id",
 | 
				
			||||||
 | 
										to: "stream.certificate_id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("stream.is_deleted", 0);
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = Certificate;
 | 
					export default Certificate;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,79 +1,92 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db          = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model       = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User        = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const Certificate = require('./certificate');
 | 
					import Certificate from "./certificate.js";
 | 
				
			||||||
const now         = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = ["is_deleted", "ssl_forced", "http2_support", "enabled", "hsts_enabled", "hsts_subdomains"];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class DeadHost extends Model {
 | 
					class DeadHost extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for domain_names
 | 
							// Default for domain_names
 | 
				
			||||||
		if (typeof this.domain_names === 'undefined') {
 | 
							if (typeof this.domain_names === "undefined") {
 | 
				
			||||||
			this.domain_names = [];
 | 
								this.domain_names = [];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		this.domain_names.sort();
 | 
							this.domain_names.sort();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Sort domain_names
 | 
							// Sort domain_names
 | 
				
			||||||
		if (typeof this.domain_names !== 'undefined') {
 | 
							if (typeof this.domain_names !== "undefined") {
 | 
				
			||||||
			this.domain_names.sort();
 | 
								this.domain_names.sort();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'DeadHost';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'dead_host';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['domain_names', 'meta'];
 | 
							return "DeadHost";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "dead_host";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["domain_names", "meta"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'dead_host.owner_user_id',
 | 
										from: "dead_host.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
					 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			certificate: {
 | 
								certificate: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: Certificate,
 | 
									modelClass: Certificate,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'dead_host.certificate_id',
 | 
										from: "dead_host.certificate_id",
 | 
				
			||||||
					to:   'certificate.id'
 | 
										to: "certificate.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('certificate.is_deleted', 0);
 | 
										qb.where("certificate.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = DeadHost;
 | 
					export default DeadHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,13 +1,12 @@
 | 
				
			|||||||
const db     = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const config = require('../lib/config');
 | 
					import db from "../db.js";
 | 
				
			||||||
const Model  = require('objection').Model;
 | 
					import { isSqlite } from "../lib/config.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = function () {
 | 
					export default () => {
 | 
				
			||||||
	if (config.isSqlite()) {
 | 
						if (isSqlite()) {
 | 
				
			||||||
		// eslint-disable-next-line
 | 
					 | 
				
			||||||
		return Model.raw("datetime('now','localtime')");
 | 
							return Model.raw("datetime('now','localtime')");
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return Model.raw('NOW()');
 | 
						return Model.raw("NOW()");
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,107 +1,114 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db          = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model       = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User        = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const AccessList  = require('./access_list');
 | 
					import AccessList from "./access_list.js";
 | 
				
			||||||
const Certificate = require('./certificate');
 | 
					import Certificate from "./certificate.js";
 | 
				
			||||||
const now         = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = [
 | 
				
			||||||
 | 
						"is_deleted",
 | 
				
			||||||
 | 
						"ssl_forced",
 | 
				
			||||||
 | 
						"caching_enabled",
 | 
				
			||||||
 | 
						"block_exploits",
 | 
				
			||||||
 | 
						"allow_websocket_upgrade",
 | 
				
			||||||
 | 
						"http2_support",
 | 
				
			||||||
 | 
						"enabled",
 | 
				
			||||||
 | 
						"hsts_enabled",
 | 
				
			||||||
 | 
						"hsts_subdomains",
 | 
				
			||||||
 | 
					];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class ProxyHost extends Model {
 | 
					class ProxyHost extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for domain_names
 | 
							// Default for domain_names
 | 
				
			||||||
		if (typeof this.domain_names === 'undefined') {
 | 
							if (typeof this.domain_names === "undefined") {
 | 
				
			||||||
			this.domain_names = [];
 | 
								this.domain_names = [];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for openidc_allowed_users
 | 
					 | 
				
			||||||
		if (typeof this.openidc_allowed_users === 'undefined') {
 | 
					 | 
				
			||||||
			this.openidc_allowed_users = [];
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Openidc defaults
 | 
					 | 
				
			||||||
		if (typeof this.openidc_auth_method === 'undefined') {
 | 
					 | 
				
			||||||
			this.openidc_auth_method = 'client_secret_post';
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		this.domain_names.sort();
 | 
							this.domain_names.sort();
 | 
				
			||||||
		this.openidc_allowed_users.sort();
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Sort domain_names
 | 
							// Sort domain_names
 | 
				
			||||||
		if (typeof this.domain_names !== 'undefined') {
 | 
							if (typeof this.domain_names !== "undefined") {
 | 
				
			||||||
			this.domain_names.sort();
 | 
								this.domain_names.sort();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Sort openidc_allowed_users
 | 
					 | 
				
			||||||
		if (typeof this.openidc_allowed_users !== 'undefined') {
 | 
					 | 
				
			||||||
			this.openidc_allowed_users.sort();
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'ProxyHost';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'proxy_host';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['domain_names', 'meta', 'locations', 'openidc_allowed_users'];
 | 
							return "ProxyHost";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "proxy_host";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["domain_names", "meta", "locations"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'proxy_host.owner_user_id',
 | 
										from: "proxy_host.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
					 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			access_list: {
 | 
								access_list: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: AccessList,
 | 
									modelClass: AccessList,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'proxy_host.access_list_id',
 | 
										from: "proxy_host.access_list_id",
 | 
				
			||||||
					to:   'access_list.id'
 | 
										to: "access_list.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("access_list.is_deleted", 0);
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
					 | 
				
			||||||
					qb.where('access_list.is_deleted', 0);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			certificate: {
 | 
								certificate: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: Certificate,
 | 
									modelClass: Certificate,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'proxy_host.certificate_id',
 | 
										from: "proxy_host.certificate_id",
 | 
				
			||||||
					to:   'certificate.id'
 | 
										to: "certificate.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('certificate.is_deleted', 0);
 | 
										qb.where("certificate.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = ProxyHost;
 | 
					export default ProxyHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,80 +1,101 @@
 | 
				
			|||||||
 | 
					 | 
				
			||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db          = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model       = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const User        = require('./user');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const Certificate = require('./certificate');
 | 
					import Certificate from "./certificate.js";
 | 
				
			||||||
const now         = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import User from "./user.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = [
 | 
				
			||||||
 | 
						"is_deleted",
 | 
				
			||||||
 | 
						"enabled",
 | 
				
			||||||
 | 
						"preserve_path",
 | 
				
			||||||
 | 
						"ssl_forced",
 | 
				
			||||||
 | 
						"block_exploits",
 | 
				
			||||||
 | 
						"hsts_enabled",
 | 
				
			||||||
 | 
						"hsts_subdomains",
 | 
				
			||||||
 | 
						"http2_support",
 | 
				
			||||||
 | 
					];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class RedirectionHost extends Model {
 | 
					class RedirectionHost extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for domain_names
 | 
							// Default for domain_names
 | 
				
			||||||
		if (typeof this.domain_names === 'undefined') {
 | 
							if (typeof this.domain_names === "undefined") {
 | 
				
			||||||
			this.domain_names = [];
 | 
								this.domain_names = [];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		this.domain_names.sort();
 | 
							this.domain_names.sort();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Sort domain_names
 | 
							// Sort domain_names
 | 
				
			||||||
		if (typeof this.domain_names !== 'undefined') {
 | 
							if (typeof this.domain_names !== "undefined") {
 | 
				
			||||||
			this.domain_names.sort();
 | 
								this.domain_names.sort();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'RedirectionHost';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'redirection_host';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['domain_names', 'meta'];
 | 
							return "RedirectionHost";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "redirection_host";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["domain_names", "meta"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'redirection_host.owner_user_id',
 | 
										from: "redirection_host.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
					 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
			certificate: {
 | 
								certificate: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: Certificate,
 | 
									modelClass: Certificate,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'redirection_host.certificate_id',
 | 
										from: "redirection_host.certificate_id",
 | 
				
			||||||
					to:   'certificate.id'
 | 
										to: "certificate.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('certificate.is_deleted', 0);
 | 
										qb.where("certificate.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = RedirectionHost;
 | 
					export default RedirectionHost;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,8 +1,8 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -27,4 +27,4 @@ class Setting extends Model {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = Setting;
 | 
					export default Setting;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,55 +1,77 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					import { Model } from "objection";
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					import db from "../db.js";
 | 
				
			||||||
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const db    = require('../db');
 | 
					import Certificate from "./certificate.js";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
const User  = require('./user');
 | 
					import User from "./user.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = ["is_deleted", "enabled", "tcp_forwarding", "udp_forwarding"];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class Stream extends Model {
 | 
					class Stream extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for meta
 | 
							// Default for meta
 | 
				
			||||||
		if (typeof this.meta === 'undefined') {
 | 
							if (typeof this.meta === "undefined") {
 | 
				
			||||||
			this.meta = {};
 | 
								this.meta = {};
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'Stream';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'stream';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['meta'];
 | 
							return "Stream";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "stream";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["meta"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			owner: {
 | 
								owner: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: User,
 | 
									modelClass: User,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'stream.owner_user_id',
 | 
										from: "stream.owner_user_id",
 | 
				
			||||||
					to:   'user.id'
 | 
										to: "user.id",
 | 
				
			||||||
				},
 | 
									},
 | 
				
			||||||
				modify: function (qb) {
 | 
									modify: (qb) => {
 | 
				
			||||||
					qb.where('user.is_deleted', 0);
 | 
										qb.where("user.is_deleted", 0);
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
 | 
								certificate: {
 | 
				
			||||||
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
 | 
									modelClass: Certificate,
 | 
				
			||||||
 | 
									join: {
 | 
				
			||||||
 | 
										from: "stream.certificate_id",
 | 
				
			||||||
 | 
										to: "certificate.id",
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									modify: (qb) => {
 | 
				
			||||||
 | 
										qb.where("certificate.is_deleted", 0);
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = Stream;
 | 
					export default Stream;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,17 +3,17 @@
 | 
				
			|||||||
 and then has abilities after that.
 | 
					 and then has abilities after that.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const _      = require('lodash');
 | 
					import crypto from "node:crypto";
 | 
				
			||||||
const jwt    = require('jsonwebtoken');
 | 
					import jwt from "jsonwebtoken";
 | 
				
			||||||
const crypto = require('crypto');
 | 
					import _ from "lodash";
 | 
				
			||||||
const config = require('../lib/config');
 | 
					import { getPrivateKey, getPublicKey } from "../lib/config.js";
 | 
				
			||||||
const error  = require('../lib/error');
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
const logger = require('../logger').global;
 | 
					import { global as logger } from "../logger.js";
 | 
				
			||||||
const ALGO   = 'RS256';
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = function () {
 | 
					const ALGO = "RS256";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	let token_data = {};
 | 
					export default () => {
 | 
				
			||||||
 | 
						let tokenData = {};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	const self = {
 | 
						const self = {
 | 
				
			||||||
		/**
 | 
							/**
 | 
				
			||||||
@@ -21,28 +21,26 @@ module.exports = function () {
 | 
				
			|||||||
		 * @returns {Promise}
 | 
							 * @returns {Promise}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		create: (payload) => {
 | 
							create: (payload) => {
 | 
				
			||||||
			if (!config.getPrivateKey()) {
 | 
								if (!getPrivateKey()) {
 | 
				
			||||||
				logger.error('Private key is empty!');
 | 
									logger.error("Private key is empty!");
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			// sign with RSA SHA256
 | 
								// sign with RSA SHA256
 | 
				
			||||||
			const options = {
 | 
								const options = {
 | 
				
			||||||
				algorithm: ALGO,
 | 
									algorithm: ALGO,
 | 
				
			||||||
				expiresIn: payload.expiresIn || '1d'
 | 
									expiresIn: payload.expiresIn || "1d",
 | 
				
			||||||
			};
 | 
								};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			payload.jti = crypto.randomBytes(12)
 | 
								payload.jti = crypto.randomBytes(12).toString("base64").substring(-8);
 | 
				
			||||||
				.toString('base64')
 | 
					 | 
				
			||||||
				.substring(-8);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return new Promise((resolve, reject) => {
 | 
								return new Promise((resolve, reject) => {
 | 
				
			||||||
				jwt.sign(payload, config.getPrivateKey(), options, (err, token) => {
 | 
									jwt.sign(payload, getPrivateKey(), options, (err, token) => {
 | 
				
			||||||
					if (err) {
 | 
										if (err) {
 | 
				
			||||||
						reject(err);
 | 
											reject(err);
 | 
				
			||||||
					} else {
 | 
										} else {
 | 
				
			||||||
						token_data = payload;
 | 
											tokenData = payload;
 | 
				
			||||||
						resolve({
 | 
											resolve({
 | 
				
			||||||
							token:   token,
 | 
												token: token,
 | 
				
			||||||
							payload: payload
 | 
												payload: payload,
 | 
				
			||||||
						});
 | 
											});
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				});
 | 
									});
 | 
				
			||||||
@@ -53,42 +51,47 @@ module.exports = function () {
 | 
				
			|||||||
		 * @param {String} token
 | 
							 * @param {String} token
 | 
				
			||||||
		 * @returns {Promise}
 | 
							 * @returns {Promise}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		load: function (token) {
 | 
							load: (token) => {
 | 
				
			||||||
			if (!config.getPublicKey()) {
 | 
								if (!getPublicKey()) {
 | 
				
			||||||
				logger.error('Public key is empty!');
 | 
									logger.error("Public key is empty!");
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return new Promise((resolve, reject) => {
 | 
								return new Promise((resolve, reject) => {
 | 
				
			||||||
				try {
 | 
									try {
 | 
				
			||||||
					if (!token || token === null || token === 'null') {
 | 
										if (!token || token === null || token === "null") {
 | 
				
			||||||
						reject(new error.AuthError('Empty token'));
 | 
											reject(new errs.AuthError("Empty token"));
 | 
				
			||||||
					} else {
 | 
										} else {
 | 
				
			||||||
						jwt.verify(token, config.getPublicKey(), {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => {
 | 
											jwt.verify(
 | 
				
			||||||
							if (err) {
 | 
												token,
 | 
				
			||||||
 | 
												getPublicKey(),
 | 
				
			||||||
								if (err.name === 'TokenExpiredError') {
 | 
												{ ignoreExpiration: false, algorithms: [ALGO] },
 | 
				
			||||||
									reject(new error.AuthError('Token has expired', err));
 | 
												(err, result) => {
 | 
				
			||||||
 | 
													if (err) {
 | 
				
			||||||
 | 
														if (err.name === "TokenExpiredError") {
 | 
				
			||||||
 | 
															reject(new errs.AuthError("Token has expired", err));
 | 
				
			||||||
 | 
														} else {
 | 
				
			||||||
 | 
															reject(err);
 | 
				
			||||||
 | 
														}
 | 
				
			||||||
								} else {
 | 
													} else {
 | 
				
			||||||
									reject(err);
 | 
														tokenData = result;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
														// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'.
 | 
				
			||||||
 | 
														// For 30 days at least, we need to replace 'all' with user.
 | 
				
			||||||
 | 
														if (
 | 
				
			||||||
 | 
															typeof tokenData.scope !== "undefined" &&
 | 
				
			||||||
 | 
															_.indexOf(tokenData.scope, "all") !== -1
 | 
				
			||||||
 | 
														) {
 | 
				
			||||||
 | 
															tokenData.scope = ["user"];
 | 
				
			||||||
 | 
														}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
														resolve(tokenData);
 | 
				
			||||||
								}
 | 
													}
 | 
				
			||||||
 | 
												},
 | 
				
			||||||
							} else {
 | 
											);
 | 
				
			||||||
								token_data = result;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'.
 | 
					 | 
				
			||||||
								// For 30 days at least, we need to replace 'all' with user.
 | 
					 | 
				
			||||||
								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) {
 | 
					 | 
				
			||||||
									token_data.scope = ['user'];
 | 
					 | 
				
			||||||
								}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
								resolve(token_data);
 | 
					 | 
				
			||||||
							}
 | 
					 | 
				
			||||||
						});
 | 
					 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				} catch (err) {
 | 
									} catch (err) {
 | 
				
			||||||
					reject(err);
 | 
										reject(err);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			});
 | 
								});
 | 
				
			||||||
 | 
					 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/**
 | 
							/**
 | 
				
			||||||
@@ -97,17 +100,15 @@ module.exports = function () {
 | 
				
			|||||||
		 * @param   {String}  scope
 | 
							 * @param   {String}  scope
 | 
				
			||||||
		 * @returns {Boolean}
 | 
							 * @returns {Boolean}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		hasScope: function (scope) {
 | 
							hasScope: (scope) => typeof tokenData.scope !== "undefined" && _.indexOf(tokenData.scope, scope) !== -1,
 | 
				
			||||||
			return typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, scope) !== -1;
 | 
					 | 
				
			||||||
		},
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/**
 | 
							/**
 | 
				
			||||||
		 * @param  {String}  key
 | 
							 * @param  {String}  key
 | 
				
			||||||
		 * @return {*}
 | 
							 * @return {*}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		get: function (key) {
 | 
							get: (key) => {
 | 
				
			||||||
			if (typeof token_data[key] !== 'undefined') {
 | 
								if (typeof tokenData[key] !== "undefined") {
 | 
				
			||||||
				return token_data[key];
 | 
									return tokenData[key];
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return null;
 | 
								return null;
 | 
				
			||||||
@@ -117,22 +118,22 @@ module.exports = function () {
 | 
				
			|||||||
		 * @param  {String}  key
 | 
							 * @param  {String}  key
 | 
				
			||||||
		 * @param  {*}       value
 | 
							 * @param  {*}       value
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		set: function (key, value) {
 | 
							set: (key, value) => {
 | 
				
			||||||
			token_data[key] = value;
 | 
								tokenData[key] = value;
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/**
 | 
							/**
 | 
				
			||||||
		 * @param   [default_value]
 | 
							 * @param   [defaultValue]
 | 
				
			||||||
		 * @returns {Integer}
 | 
							 * @returns {Integer}
 | 
				
			||||||
		 */
 | 
							 */
 | 
				
			||||||
		getUserId: (default_value) => {
 | 
							getUserId: (defaultValue) => {
 | 
				
			||||||
			const attrs = self.get('attrs');
 | 
								const attrs = self.get("attrs");
 | 
				
			||||||
			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) {
 | 
								if (attrs?.id) {
 | 
				
			||||||
				return attrs.id;
 | 
									return attrs.id;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return default_value || 0;
 | 
								return defaultValue || 0;
 | 
				
			||||||
		}
 | 
							},
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return self;
 | 
						return self;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,53 +1,65 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db             = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model          = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const UserPermission = require('./user_permission');
 | 
					import { convertBoolFieldsToInt, convertIntFieldsToBool } from "../lib/helpers.js";
 | 
				
			||||||
const now            = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					import UserPermission from "./user_permission.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const boolFields = ["is_deleted", "is_disabled"];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
class User extends Model {
 | 
					class User extends Model {
 | 
				
			||||||
	$beforeInsert () {
 | 
						$beforeInsert() {
 | 
				
			||||||
		this.created_on  = now();
 | 
							this.created_on = now();
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Default for roles
 | 
							// Default for roles
 | 
				
			||||||
		if (typeof this.roles === 'undefined') {
 | 
							if (typeof this.roles === "undefined") {
 | 
				
			||||||
			this.roles = [];
 | 
								this.roles = [];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	$beforeUpdate () {
 | 
						$beforeUpdate() {
 | 
				
			||||||
		this.modified_on = now();
 | 
							this.modified_on = now();
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get name () {
 | 
						$parseDatabaseJson(json) {
 | 
				
			||||||
		return 'User';
 | 
							const thisJson = super.$parseDatabaseJson(json);
 | 
				
			||||||
 | 
							return convertIntFieldsToBool(thisJson, boolFields);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get tableName () {
 | 
						$formatDatabaseJson(json) {
 | 
				
			||||||
		return 'user';
 | 
							const thisJson = convertBoolFieldsToInt(json, boolFields);
 | 
				
			||||||
 | 
							return super.$formatDatabaseJson(thisJson);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get jsonAttributes () {
 | 
						static get name() {
 | 
				
			||||||
		return ['roles'];
 | 
							return "User";
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	static get relationMappings () {
 | 
						static get tableName() {
 | 
				
			||||||
 | 
							return "user";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get jsonAttributes() {
 | 
				
			||||||
 | 
							return ["roles"];
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						static get relationMappings() {
 | 
				
			||||||
		return {
 | 
							return {
 | 
				
			||||||
			permissions: {
 | 
								permissions: {
 | 
				
			||||||
				relation:   Model.HasOneRelation,
 | 
									relation: Model.HasOneRelation,
 | 
				
			||||||
				modelClass: UserPermission,
 | 
									modelClass: UserPermission,
 | 
				
			||||||
				join:       {
 | 
									join: {
 | 
				
			||||||
					from: 'user.id',
 | 
										from: "user.id",
 | 
				
			||||||
					to:   'user_permission.user_id'
 | 
										to: "user_permission.user_id",
 | 
				
			||||||
				}
 | 
									},
 | 
				
			||||||
			}
 | 
								},
 | 
				
			||||||
		};
 | 
							};
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = User;
 | 
					export default User;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,9 +1,9 @@
 | 
				
			|||||||
// Objection Docs:
 | 
					// Objection Docs:
 | 
				
			||||||
// http://vincit.github.io/objection.js/
 | 
					// http://vincit.github.io/objection.js/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const db    = require('../db');
 | 
					import { Model } from "objection";
 | 
				
			||||||
const Model = require('objection').Model;
 | 
					import db from "../db.js";
 | 
				
			||||||
const now   = require('./now_helper');
 | 
					import now from "./now_helper.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Model.knex(db);
 | 
					Model.knex(db);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -26,4 +26,4 @@ class UserPermission extends Model {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
module.exports = UserPermission;
 | 
					export default UserPermission;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,5 +3,5 @@
 | 
				
			|||||||
  "ignore": [
 | 
					  "ignore": [
 | 
				
			||||||
    "data"
 | 
					    "data"
 | 
				
			||||||
  ],
 | 
					  ],
 | 
				
			||||||
  "ext": "js json ejs"
 | 
					  "ext": "js json ejs cjs"
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,42 +1,49 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
	"name": "nginx-proxy-manager",
 | 
						"name": "nginx-proxy-manager",
 | 
				
			||||||
	"version": "0.0.0",
 | 
						"version": "2.0.0",
 | 
				
			||||||
	"description": "A beautiful interface for creating Nginx endpoints",
 | 
						"description": "A beautiful interface for creating Nginx endpoints",
 | 
				
			||||||
	"main": "js/index.js",
 | 
						"author": "Jamie Curnow <jc@jc21.com>",
 | 
				
			||||||
 | 
						"license": "MIT",
 | 
				
			||||||
 | 
						"main": "index.js",
 | 
				
			||||||
 | 
						"type": "module",
 | 
				
			||||||
 | 
						"scripts": {
 | 
				
			||||||
 | 
							"lint": "biome lint",
 | 
				
			||||||
 | 
							"prettier": "biome format --write .",
 | 
				
			||||||
 | 
							"validate-schema": "node validate-schema.js"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"dependencies": {
 | 
						"dependencies": {
 | 
				
			||||||
		"ajv": "^6.12.0",
 | 
							"@apidevtools/json-schema-ref-parser": "^11.7.0",
 | 
				
			||||||
 | 
							"ajv": "^8.17.1",
 | 
				
			||||||
		"archiver": "^5.3.0",
 | 
							"archiver": "^5.3.0",
 | 
				
			||||||
		"batchflow": "^0.4.0",
 | 
							"batchflow": "^0.4.0",
 | 
				
			||||||
		"bcrypt": "^5.0.0",
 | 
							"bcrypt": "^5.0.0",
 | 
				
			||||||
		"body-parser": "^1.19.0",
 | 
							"body-parser": "^1.20.3",
 | 
				
			||||||
		"compression": "^1.7.4",
 | 
							"compression": "^1.7.4",
 | 
				
			||||||
		"express": "^4.19.2",
 | 
							"express": "^4.20.0",
 | 
				
			||||||
		"express-fileupload": "^1.1.9",
 | 
							"express-fileupload": "^1.5.2",
 | 
				
			||||||
		"gravatar": "^1.8.0",
 | 
							"gravatar": "^1.8.2",
 | 
				
			||||||
		"json-schema-ref-parser": "^8.0.0",
 | 
							"jsonwebtoken": "^9.0.2",
 | 
				
			||||||
		"jsonwebtoken": "^9.0.0",
 | 
					 | 
				
			||||||
		"knex": "2.4.2",
 | 
							"knex": "2.4.2",
 | 
				
			||||||
		"liquidjs": "10.6.1",
 | 
							"liquidjs": "10.6.1",
 | 
				
			||||||
		"lodash": "^4.17.21",
 | 
							"lodash": "^4.17.21",
 | 
				
			||||||
		"moment": "^2.29.4",
 | 
							"moment": "^2.30.1",
 | 
				
			||||||
		"mysql": "^2.18.1",
 | 
							"mysql2": "^3.15.3",
 | 
				
			||||||
		"node-rsa": "^1.0.8",
 | 
							"node-rsa": "^1.1.1",
 | 
				
			||||||
		"objection": "3.0.1",
 | 
							"objection": "3.0.1",
 | 
				
			||||||
		"path": "^0.12.7",
 | 
							"path": "^0.12.7",
 | 
				
			||||||
 | 
							"pg": "^8.16.3",
 | 
				
			||||||
		"signale": "1.4.0",
 | 
							"signale": "1.4.0",
 | 
				
			||||||
		"sqlite3": "5.1.6",
 | 
							"sqlite3": "^5.1.7",
 | 
				
			||||||
		"temp-write": "^4.0.0"
 | 
							"temp-write": "^4.0.0"
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"devDependencies": {
 | 
				
			||||||
 | 
							"@apidevtools/swagger-parser": "^10.1.0",
 | 
				
			||||||
 | 
							"@biomejs/biome": "^2.3.2",
 | 
				
			||||||
 | 
							"chalk": "4.1.2",
 | 
				
			||||||
 | 
							"nodemon": "^2.0.2"
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"signale": {
 | 
						"signale": {
 | 
				
			||||||
		"displayDate": true,
 | 
							"displayDate": true,
 | 
				
			||||||
		"displayTimestamp": true
 | 
							"displayTimestamp": true
 | 
				
			||||||
	},
 | 
					 | 
				
			||||||
	"author": "Jamie Curnow <jc@jc21.com>",
 | 
					 | 
				
			||||||
	"license": "MIT",
 | 
					 | 
				
			||||||
	"devDependencies": {
 | 
					 | 
				
			||||||
		"eslint": "^8.36.0",
 | 
					 | 
				
			||||||
		"eslint-plugin-align-assignments": "^1.1.2",
 | 
					 | 
				
			||||||
		"nodemon": "^2.0.2",
 | 
					 | 
				
			||||||
		"prettier": "^2.0.4"
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,52 +0,0 @@
 | 
				
			|||||||
const express          = require('express');
 | 
					 | 
				
			||||||
const validator        = require('../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode        = require('../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalAuditLog = require('../../internal/audit-log');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/audit-log
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/audit-log
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all logs
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalAuditLog.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,51 +0,0 @@
 | 
				
			|||||||
const express = require('express');
 | 
					 | 
				
			||||||
const pjson   = require('../../package.json');
 | 
					 | 
				
			||||||
const error   = require('../../lib/error');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Health Check
 | 
					 | 
				
			||||||
 * GET /api
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router.get('/', (req, res/*, next*/) => {
 | 
					 | 
				
			||||||
	let version = pjson.version.split('-').shift().split('.');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	res.status(200).send({
 | 
					 | 
				
			||||||
		status:  'OK',
 | 
					 | 
				
			||||||
		version: {
 | 
					 | 
				
			||||||
			major:    parseInt(version.shift(), 10),
 | 
					 | 
				
			||||||
			minor:    parseInt(version.shift(), 10),
 | 
					 | 
				
			||||||
			revision: parseInt(version.shift(), 10)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
router.use('/schema', require('./schema'));
 | 
					 | 
				
			||||||
router.use('/tokens', require('./tokens'));
 | 
					 | 
				
			||||||
router.use('/users', require('./users'));
 | 
					 | 
				
			||||||
router.use('/audit-log', require('./audit-log'));
 | 
					 | 
				
			||||||
router.use('/reports', require('./reports'));
 | 
					 | 
				
			||||||
router.use('/settings', require('./settings'));
 | 
					 | 
				
			||||||
router.use('/nginx/proxy-hosts', require('./nginx/proxy_hosts'));
 | 
					 | 
				
			||||||
router.use('/nginx/redirection-hosts', require('./nginx/redirection_hosts'));
 | 
					 | 
				
			||||||
router.use('/nginx/dead-hosts', require('./nginx/dead_hosts'));
 | 
					 | 
				
			||||||
router.use('/nginx/streams', require('./nginx/streams'));
 | 
					 | 
				
			||||||
router.use('/nginx/access-lists', require('./nginx/access_lists'));
 | 
					 | 
				
			||||||
router.use('/nginx/certificates', require('./nginx/certificates'));
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * API 404 for all other routes
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * ALL /api/*
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router.all(/(.+)/, function (req, res, next) {
 | 
					 | 
				
			||||||
	req.params.page = req.params['0'];
 | 
					 | 
				
			||||||
	next(new error.ItemNotFoundError(req.params.page));
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,148 +0,0 @@
 | 
				
			|||||||
const express            = require('express');
 | 
					 | 
				
			||||||
const validator          = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode          = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalAccessList = require('../../../internal/access-list');
 | 
					 | 
				
			||||||
const apiValidator       = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/access-lists
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/access-lists
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all access-lists
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalAccessList.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/access-lists
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new access-list
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/access-lists#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalAccessList.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific access-list
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/access-lists/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:list_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/access-lists/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific access-list
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['list_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				list_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			list_id: req.params.list_id,
 | 
					 | 
				
			||||||
			expand:  (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalAccessList.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.list_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/access-lists/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing access-list
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/access-lists#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.list_id, 10);
 | 
					 | 
				
			||||||
				return internalAccessList.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/access-lists/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Delete and existing access-list
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalAccessList.delete(res.locals.access, {id: parseInt(req.params.list_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,299 +0,0 @@
 | 
				
			|||||||
const express             = require('express');
 | 
					 | 
				
			||||||
const validator           = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode           = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalCertificate = require('../../../internal/certificate');
 | 
					 | 
				
			||||||
const apiValidator        = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/certificates
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/certificates
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all certificates
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalCertificate.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/certificates
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/certificates#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				req.setTimeout(900000); // 15 minutes timeout
 | 
					 | 
				
			||||||
				return internalCertificate.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Test HTTP challenge for domains
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/test-http
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/test-http')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * GET /api/nginx/certificates/test-http
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * Test HTTP challenge for domains
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		internalCertificate.testHttpsChallenge(res.locals.access, JSON.parse(req.query.domains))
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific certificate
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:certificate_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/certificates/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['certificate_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				certificate_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			certificate_id: req.params.certificate_id,
 | 
					 | 
				
			||||||
			expand:         (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalCertificate.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.certificate_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/certificates/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/certificates#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.certificate_id, 10);
 | 
					 | 
				
			||||||
				return internalCertificate.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/certificates/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalCertificate.delete(res.locals.access, {id: parseInt(req.params.certificate_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Upload Certs
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/123/upload
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:certificate_id/upload')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/certificates/123/upload
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Upload certificates
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		if (!req.files) {
 | 
					 | 
				
			||||||
			res.status(400)
 | 
					 | 
				
			||||||
				.send({error: 'No files were uploaded'});
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			internalCertificate.upload(res.locals.access, {
 | 
					 | 
				
			||||||
				id:    parseInt(req.params.certificate_id, 10),
 | 
					 | 
				
			||||||
				files: req.files
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
				.then((result) => {
 | 
					 | 
				
			||||||
					res.status(200)
 | 
					 | 
				
			||||||
						.send(result);
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
				.catch(next);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Renew LE Certs
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/123/renew
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:certificate_id/renew')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/certificates/123/renew
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Renew certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		req.setTimeout(900000); // 15 minutes timeout
 | 
					 | 
				
			||||||
		internalCertificate.renew(res.locals.access, {
 | 
					 | 
				
			||||||
			id: parseInt(req.params.certificate_id, 10)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Download LE Certs
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/123/download
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:certificate_id/download')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/certificates/123/download
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Renew certificate
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		internalCertificate.download(res.locals.access, {
 | 
					 | 
				
			||||||
			id: parseInt(req.params.certificate_id, 10)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.download(result.fileName);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Validate Certs before saving
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/certificates/validate
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/validate')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/certificates/validate
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Validate certificates
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		if (!req.files) {
 | 
					 | 
				
			||||||
			res.status(400)
 | 
					 | 
				
			||||||
				.send({error: 'No files were uploaded'});
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			internalCertificate.validate({
 | 
					 | 
				
			||||||
				files: req.files
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
				.then((result) => {
 | 
					 | 
				
			||||||
					res.status(200)
 | 
					 | 
				
			||||||
						.send(result);
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
				.catch(next);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,196 +0,0 @@
 | 
				
			|||||||
const express          = require('express');
 | 
					 | 
				
			||||||
const validator        = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode        = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalDeadHost = require('../../../internal/dead-host');
 | 
					 | 
				
			||||||
const apiValidator     = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/dead-hosts
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/dead-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all dead-hosts
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalDeadHost.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/dead-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new dead-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/dead-hosts#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalDeadHost.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific dead-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/dead-hosts/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/dead-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific dead-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['host_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				host_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			host_id: req.params.host_id,
 | 
					 | 
				
			||||||
			expand:  (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalDeadHost.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.host_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/dead-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing dead-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/dead-hosts#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.host_id, 10);
 | 
					 | 
				
			||||||
				return internalDeadHost.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/dead-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing dead-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalDeadHost.delete(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Enable dead-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/dead-hosts/123/enable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/enable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/dead-hosts/123/enable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalDeadHost.enable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Disable dead-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/dead-hosts/123/disable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/disable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/dead-hosts/123/disable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalDeadHost.disable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,196 +0,0 @@
 | 
				
			|||||||
const express           = require('express');
 | 
					 | 
				
			||||||
const validator         = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode         = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalProxyHost = require('../../../internal/proxy-host');
 | 
					 | 
				
			||||||
const apiValidator      = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/proxy-hosts
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/proxy-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all proxy-hosts
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalProxyHost.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/proxy-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new proxy-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/proxy-hosts#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalProxyHost.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific proxy-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/proxy-hosts/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/proxy-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific proxy-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['host_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				host_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			host_id: req.params.host_id,
 | 
					 | 
				
			||||||
			expand:  (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalProxyHost.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.host_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/proxy-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing proxy-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/proxy-hosts#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.host_id, 10);
 | 
					 | 
				
			||||||
				return internalProxyHost.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/proxy-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing proxy-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalProxyHost.delete(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Enable proxy-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/proxy-hosts/123/enable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/enable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/proxy-hosts/123/enable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalProxyHost.enable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Disable proxy-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/proxy-hosts/123/disable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/disable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/proxy-hosts/123/disable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalProxyHost.disable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,196 +0,0 @@
 | 
				
			|||||||
const express                 = require('express');
 | 
					 | 
				
			||||||
const validator               = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode               = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalRedirectionHost = require('../../../internal/redirection-host');
 | 
					 | 
				
			||||||
const apiValidator            = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/redirection-hosts
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/redirection-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all redirection-hosts
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalRedirectionHost.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/redirection-hosts
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new redirection-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/redirection-hosts#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalRedirectionHost.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific redirection-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/redirection-hosts/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/redirection-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific redirection-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['host_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				host_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			host_id: req.params.host_id,
 | 
					 | 
				
			||||||
			expand:  (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalRedirectionHost.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.host_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/redirection-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing redirection-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/redirection-hosts#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.host_id, 10);
 | 
					 | 
				
			||||||
				return internalRedirectionHost.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/redirection-hosts/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing redirection-host
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalRedirectionHost.delete(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Enable redirection-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/redirection-hosts/123/enable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/enable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/redirection-hosts/123/enable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalRedirectionHost.enable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Disable redirection-host
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/redirection-hosts/123/disable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/disable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/redirection-hosts/123/disable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalRedirectionHost.disable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,196 +0,0 @@
 | 
				
			|||||||
const express        = require('express');
 | 
					 | 
				
			||||||
const validator      = require('../../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode      = require('../../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalStream = require('../../../internal/stream');
 | 
					 | 
				
			||||||
const apiValidator   = require('../../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/nginx/streams
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode()) // preferred so it doesn't apply to nonexistent routes
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/streams
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all streams
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalStream.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/streams
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new stream
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/streams#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalStream.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific stream
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/streams/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:stream_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode()) // preferred so it doesn't apply to nonexistent routes
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/nginx/streams/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific stream
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['stream_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				stream_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			stream_id: req.params.stream_id,
 | 
					 | 
				
			||||||
			expand:    (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalStream.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     parseInt(data.stream_id, 10),
 | 
					 | 
				
			||||||
					expand: data.expand
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/nginx/streams/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing stream
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/streams#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = parseInt(req.params.stream_id, 10);
 | 
					 | 
				
			||||||
				return internalStream.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/nginx/streams/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing stream
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalStream.delete(res.locals.access, {id: parseInt(req.params.stream_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Enable stream
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/streams/123/enable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/enable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/streams/123/enable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalStream.enable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Disable stream
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/nginx/streams/123/disable
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:host_id/disable')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/nginx/streams/123/disable
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalStream.disable(res.locals.access, {id: parseInt(req.params.host_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,29 +0,0 @@
 | 
				
			|||||||
const express        = require('express');
 | 
					 | 
				
			||||||
const jwtdecode      = require('../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalReport = require('../../internal/report');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/hosts')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /reports/hosts
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get(jwtdecode(), (req, res, next) => {
 | 
					 | 
				
			||||||
		internalReport.getHostsReport(res.locals.access)
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(data);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,36 +0,0 @@
 | 
				
			|||||||
const express     = require('express');
 | 
					 | 
				
			||||||
const swaggerJSON = require('../../doc/api.swagger.json');
 | 
					 | 
				
			||||||
const PACKAGE     = require('../../package.json');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /schema
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res/*, next*/) => {
 | 
					 | 
				
			||||||
		let proto = req.protocol;
 | 
					 | 
				
			||||||
		if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) {
 | 
					 | 
				
			||||||
			proto = req.headers['x-forwarded-proto'];
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		let origin = proto + '://' + req.hostname;
 | 
					 | 
				
			||||||
		if (typeof req.headers.origin !== 'undefined' && req.headers.origin) {
 | 
					 | 
				
			||||||
			origin = req.headers.origin;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		swaggerJSON.info.version   = PACKAGE.version;
 | 
					 | 
				
			||||||
		swaggerJSON.servers[0].url = origin + '/api';
 | 
					 | 
				
			||||||
		res.status(200).send(swaggerJSON);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,96 +0,0 @@
 | 
				
			|||||||
const express         = require('express');
 | 
					 | 
				
			||||||
const validator       = require('../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode       = require('../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalSetting = require('../../internal/setting');
 | 
					 | 
				
			||||||
const apiValidator    = require('../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/settings
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/settings
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all settings
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		internalSetting.getAll(res.locals.access)
 | 
					 | 
				
			||||||
			.then((rows) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(rows);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific setting
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/settings/something
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:setting_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /settings/something
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific setting
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['setting_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				setting_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/setting_id'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			setting_id: req.params.setting_id
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalSetting.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id: data.setting_id
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((row) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(row);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/settings/something
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing setting
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/settings#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = req.params.setting_id;
 | 
					 | 
				
			||||||
				return internalSetting.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,54 +0,0 @@
 | 
				
			|||||||
const express       = require('express');
 | 
					 | 
				
			||||||
const jwtdecode     = require('../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const internalToken = require('../../internal/token');
 | 
					 | 
				
			||||||
const apiValidator  = require('../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /tokens
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Get a new Token, given they already have a token they want to refresh
 | 
					 | 
				
			||||||
	 * We also piggy back on to this method, allowing admins to get tokens
 | 
					 | 
				
			||||||
	 * for services like Job board and Worker.
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get(jwtdecode(), (req, res, next) => {
 | 
					 | 
				
			||||||
		internalToken.getFreshToken(res.locals.access, {
 | 
					 | 
				
			||||||
			expiry: (typeof req.query.expiry !== 'undefined' ? req.query.expiry : null),
 | 
					 | 
				
			||||||
			scope:  (typeof req.query.scope !== 'undefined' ? req.query.scope : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(data);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /tokens
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new Token
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/tokens#/links/0/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalToken.getTokenFromEmail(payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(data);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
@@ -1,239 +0,0 @@
 | 
				
			|||||||
const express      = require('express');
 | 
					 | 
				
			||||||
const validator    = require('../../lib/validator');
 | 
					 | 
				
			||||||
const jwtdecode    = require('../../lib/express/jwt-decode');
 | 
					 | 
				
			||||||
const userIdFromMe = require('../../lib/express/user-id-from-me');
 | 
					 | 
				
			||||||
const internalUser = require('../../internal/user');
 | 
					 | 
				
			||||||
const apiValidator = require('../../lib/validator/api');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
let router = express.Router({
 | 
					 | 
				
			||||||
	caseSensitive: true,
 | 
					 | 
				
			||||||
	strict:        true,
 | 
					 | 
				
			||||||
	mergeParams:   true
 | 
					 | 
				
			||||||
});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * /api/users
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /api/users
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve all users
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				query: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/query'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			expand: (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null),
 | 
					 | 
				
			||||||
			query:  (typeof req.query.query === 'string' ? req.query.query : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalUser.getAll(res.locals.access, data.expand, data.query);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((users) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(users);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/users
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Create a new User
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/users#/links/1/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				return internalUser.create(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific user
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/users/123
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:user_id')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
	.all(userIdFromMe)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * GET /users/123 or /users/me
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Retrieve a specific user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.get((req, res, next) => {
 | 
					 | 
				
			||||||
		validator({
 | 
					 | 
				
			||||||
			required:             ['user_id'],
 | 
					 | 
				
			||||||
			additionalProperties: false,
 | 
					 | 
				
			||||||
			properties:           {
 | 
					 | 
				
			||||||
				user_id: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/id'
 | 
					 | 
				
			||||||
				},
 | 
					 | 
				
			||||||
				expand: {
 | 
					 | 
				
			||||||
					$ref: 'definitions#/definitions/expand'
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}, {
 | 
					 | 
				
			||||||
			user_id: req.params.user_id,
 | 
					 | 
				
			||||||
			expand:  (typeof req.query.expand === 'string' ? req.query.expand.split(',') : null)
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
			.then((data) => {
 | 
					 | 
				
			||||||
				return internalUser.get(res.locals.access, {
 | 
					 | 
				
			||||||
					id:     data.user_id,
 | 
					 | 
				
			||||||
					expand: data.expand,
 | 
					 | 
				
			||||||
					omit:   internalUser.getUserOmisionsByAccess(res.locals.access, data.user_id)
 | 
					 | 
				
			||||||
				});
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((user) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(user);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/users/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/users#/links/2/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = req.params.user_id;
 | 
					 | 
				
			||||||
				return internalUser.update(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * DELETE /api/users/123
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update and existing user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.delete((req, res, next) => {
 | 
					 | 
				
			||||||
		internalUser.delete(res.locals.access, {id: req.params.user_id})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(200)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific user auth
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/users/123/auth
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:user_id/auth')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
	.all(userIdFromMe)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/users/123/auth
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Update password for a user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/users#/links/4/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = req.params.user_id;
 | 
					 | 
				
			||||||
				return internalUser.setPassword(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific user permissions
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/users/123/permissions
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:user_id/permissions')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
	.all(userIdFromMe)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * PUT /api/users/123/permissions
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Set some or all permissions for a user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.put((req, res, next) => {
 | 
					 | 
				
			||||||
		apiValidator({$ref: 'endpoints/users#/links/5/schema'}, req.body)
 | 
					 | 
				
			||||||
			.then((payload) => {
 | 
					 | 
				
			||||||
				payload.id = req.params.user_id;
 | 
					 | 
				
			||||||
				return internalUser.setPermissions(res.locals.access, payload);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * Specific user login as
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * /api/users/123/login
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
router
 | 
					 | 
				
			||||||
	.route('/:user_id/login')
 | 
					 | 
				
			||||||
	.options((req, res) => {
 | 
					 | 
				
			||||||
		res.sendStatus(204);
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	.all(jwtdecode())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/**
 | 
					 | 
				
			||||||
	 * POST /api/users/123/login
 | 
					 | 
				
			||||||
	 *
 | 
					 | 
				
			||||||
	 * Log in as a user
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	.post((req, res, next) => {
 | 
					 | 
				
			||||||
		internalUser.loginAs(res.locals.access, {id: parseInt(req.params.user_id, 10)})
 | 
					 | 
				
			||||||
			.then((result) => {
 | 
					 | 
				
			||||||
				res.status(201)
 | 
					 | 
				
			||||||
					.send(result);
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			.catch(next);
 | 
					 | 
				
			||||||
	});
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
module.exports = router;
 | 
					 | 
				
			||||||
							
								
								
									
										107
									
								
								backend/routes/audit-log.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										107
									
								
								backend/routes/audit-log.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,107 @@
 | 
				
			|||||||
 | 
					import express from "express";
 | 
				
			||||||
 | 
					import internalAuditLog from "../internal/audit-log.js";
 | 
				
			||||||
 | 
					import jwtdecode from "../lib/express/jwt-decode.js";
 | 
				
			||||||
 | 
					import validator from "../lib/validator/index.js";
 | 
				
			||||||
 | 
					import { express as logger } from "../logger.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const router = express.Router({
 | 
				
			||||||
 | 
						caseSensitive: true,
 | 
				
			||||||
 | 
						strict: true,
 | 
				
			||||||
 | 
						mergeParams: true,
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * /api/audit-log
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router
 | 
				
			||||||
 | 
						.route("/")
 | 
				
			||||||
 | 
						.options((_, res) => {
 | 
				
			||||||
 | 
							res.sendStatus(204);
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
						.all(jwtdecode())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * GET /api/audit-log
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Retrieve all logs
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.get(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const data = await validator(
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										additionalProperties: false,
 | 
				
			||||||
 | 
										properties: {
 | 
				
			||||||
 | 
											expand: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/expand",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
											query: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/query",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										expand: typeof req.query.expand === "string" ? req.query.expand.split(",") : null,
 | 
				
			||||||
 | 
										query: typeof req.query.query === "string" ? req.query.query : null,
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								);
 | 
				
			||||||
 | 
								const rows = await internalAuditLog.getAll(res.locals.access, data.expand, data.query);
 | 
				
			||||||
 | 
								res.status(200).send(rows);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Specific audit log entry
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * /api/audit-log/123
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router
 | 
				
			||||||
 | 
						.route("/:event_id")
 | 
				
			||||||
 | 
						.options((_, res) => {
 | 
				
			||||||
 | 
							res.sendStatus(204);
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
						.all(jwtdecode())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * GET /api/audit-log/123
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Retrieve a specific entry
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.get(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const data = await validator(
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										required: ["event_id"],
 | 
				
			||||||
 | 
										additionalProperties: false,
 | 
				
			||||||
 | 
										properties: {
 | 
				
			||||||
 | 
											event_id: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/id",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
											expand: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/expand",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										event_id: req.params.event_id,
 | 
				
			||||||
 | 
										expand:
 | 
				
			||||||
 | 
											typeof req.query.expand === "string"
 | 
				
			||||||
 | 
												? req.query.expand.split(",")
 | 
				
			||||||
 | 
												: null,
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								const item = await internalAuditLog.get(res.locals.access, {
 | 
				
			||||||
 | 
									id: data.event_id,
 | 
				
			||||||
 | 
									expand: data.expand,
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
								res.status(200).send(item);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default router;
 | 
				
			||||||
							
								
								
									
										66
									
								
								backend/routes/main.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										66
									
								
								backend/routes/main.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,66 @@
 | 
				
			|||||||
 | 
					import express from "express";
 | 
				
			||||||
 | 
					import errs from "../lib/error.js";
 | 
				
			||||||
 | 
					import pjson from "../package.json" with { type: "json" };
 | 
				
			||||||
 | 
					import { isSetup } from "../setup.js";
 | 
				
			||||||
 | 
					import auditLogRoutes from "./audit-log.js";
 | 
				
			||||||
 | 
					import accessListsRoutes from "./nginx/access_lists.js";
 | 
				
			||||||
 | 
					import certificatesHostsRoutes from "./nginx/certificates.js";
 | 
				
			||||||
 | 
					import deadHostsRoutes from "./nginx/dead_hosts.js";
 | 
				
			||||||
 | 
					import proxyHostsRoutes from "./nginx/proxy_hosts.js";
 | 
				
			||||||
 | 
					import redirectionHostsRoutes from "./nginx/redirection_hosts.js";
 | 
				
			||||||
 | 
					import streamsRoutes from "./nginx/streams.js";
 | 
				
			||||||
 | 
					import reportsRoutes from "./reports.js";
 | 
				
			||||||
 | 
					import schemaRoutes from "./schema.js";
 | 
				
			||||||
 | 
					import settingsRoutes from "./settings.js";
 | 
				
			||||||
 | 
					import tokensRoutes from "./tokens.js";
 | 
				
			||||||
 | 
					import usersRoutes from "./users.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const router = express.Router({
 | 
				
			||||||
 | 
						caseSensitive: true,
 | 
				
			||||||
 | 
						strict: true,
 | 
				
			||||||
 | 
						mergeParams: true,
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Health Check
 | 
				
			||||||
 | 
					 * GET /api
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router.get("/", async (_, res /*, next*/) => {
 | 
				
			||||||
 | 
						const version = pjson.version.split("-").shift().split(".");
 | 
				
			||||||
 | 
						const setup = await isSetup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						res.status(200).send({
 | 
				
			||||||
 | 
							status: "OK",
 | 
				
			||||||
 | 
							setup,
 | 
				
			||||||
 | 
							version: {
 | 
				
			||||||
 | 
								major: Number.parseInt(version.shift(), 10),
 | 
				
			||||||
 | 
								minor: Number.parseInt(version.shift(), 10),
 | 
				
			||||||
 | 
								revision: Number.parseInt(version.shift(), 10),
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					router.use("/schema", schemaRoutes);
 | 
				
			||||||
 | 
					router.use("/tokens", tokensRoutes);
 | 
				
			||||||
 | 
					router.use("/users", usersRoutes);
 | 
				
			||||||
 | 
					router.use("/audit-log", auditLogRoutes);
 | 
				
			||||||
 | 
					router.use("/reports", reportsRoutes);
 | 
				
			||||||
 | 
					router.use("/settings", settingsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/proxy-hosts", proxyHostsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/redirection-hosts", redirectionHostsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/dead-hosts", deadHostsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/streams", streamsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/access-lists", accessListsRoutes);
 | 
				
			||||||
 | 
					router.use("/nginx/certificates", certificatesHostsRoutes);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * API 404 for all other routes
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * ALL /api/*
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router.all(/(.+)/, (req, _, next) => {
 | 
				
			||||||
 | 
						req.params.page = req.params["0"];
 | 
				
			||||||
 | 
						next(new errs.ItemNotFoundError(req.params.page));
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default router;
 | 
				
			||||||
							
								
								
									
										155
									
								
								backend/routes/nginx/access_lists.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										155
									
								
								backend/routes/nginx/access_lists.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,155 @@
 | 
				
			|||||||
 | 
					import express from "express";
 | 
				
			||||||
 | 
					import internalAccessList from "../../internal/access-list.js";
 | 
				
			||||||
 | 
					import jwtdecode from "../../lib/express/jwt-decode.js";
 | 
				
			||||||
 | 
					import apiValidator from "../../lib/validator/api.js";
 | 
				
			||||||
 | 
					import validator from "../../lib/validator/index.js";
 | 
				
			||||||
 | 
					import { express as logger } from "../../logger.js";
 | 
				
			||||||
 | 
					import { getValidationSchema } from "../../schema/index.js";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const router = express.Router({
 | 
				
			||||||
 | 
						caseSensitive: true,
 | 
				
			||||||
 | 
						strict: true,
 | 
				
			||||||
 | 
						mergeParams: true,
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * /api/nginx/access-lists
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router
 | 
				
			||||||
 | 
						.route("/")
 | 
				
			||||||
 | 
						.options((_, res) => {
 | 
				
			||||||
 | 
							res.sendStatus(204);
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
						.all(jwtdecode())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * GET /api/nginx/access-lists
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Retrieve all access-lists
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.get(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const data = await validator(
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										additionalProperties: false,
 | 
				
			||||||
 | 
										properties: {
 | 
				
			||||||
 | 
											expand: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/expand",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
											query: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/query",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										expand: typeof req.query.expand === "string" ? req.query.expand.split(",") : null,
 | 
				
			||||||
 | 
										query: typeof req.query.query === "string" ? req.query.query : null,
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								);
 | 
				
			||||||
 | 
								const rows = await internalAccessList.getAll(res.locals.access, data.expand, data.query);
 | 
				
			||||||
 | 
								res.status(200).send(rows);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * POST /api/nginx/access-lists
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Create a new access-list
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.post(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const payload = await apiValidator(getValidationSchema("/nginx/access-lists", "post"), req.body);
 | 
				
			||||||
 | 
								const result = await internalAccessList.create(res.locals.access, payload);
 | 
				
			||||||
 | 
								res.status(201).send(result);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * Specific access-list
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * /api/nginx/access-lists/123
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					router
 | 
				
			||||||
 | 
						.route("/:list_id")
 | 
				
			||||||
 | 
						.options((_, res) => {
 | 
				
			||||||
 | 
							res.sendStatus(204);
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
						.all(jwtdecode())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * GET /api/nginx/access-lists/123
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Retrieve a specific access-list
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.get(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const data = await validator(
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										required: ["list_id"],
 | 
				
			||||||
 | 
										additionalProperties: false,
 | 
				
			||||||
 | 
										properties: {
 | 
				
			||||||
 | 
											list_id: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/id",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
											expand: {
 | 
				
			||||||
 | 
												$ref: "common#/properties/expand",
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
										list_id: req.params.list_id,
 | 
				
			||||||
 | 
										expand: typeof req.query.expand === "string" ? req.query.expand.split(",") : null,
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
								);
 | 
				
			||||||
 | 
								const row = await internalAccessList.get(res.locals.access, {
 | 
				
			||||||
 | 
									id: Number.parseInt(data.list_id, 10),
 | 
				
			||||||
 | 
									expand: data.expand,
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
								res.status(200).send(row);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * PUT /api/nginx/access-lists/123
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Update and existing access-list
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.put(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const payload = await apiValidator(getValidationSchema("/nginx/access-lists/{listID}", "put"), req.body);
 | 
				
			||||||
 | 
								payload.id = Number.parseInt(req.params.list_id, 10);
 | 
				
			||||||
 | 
								const result = await internalAccessList.update(res.locals.access, payload);
 | 
				
			||||||
 | 
								res.status(200).send(result);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/**
 | 
				
			||||||
 | 
						 * DELETE /api/nginx/access-lists/123
 | 
				
			||||||
 | 
						 *
 | 
				
			||||||
 | 
						 * Delete and existing access-list
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						.delete(async (req, res, next) => {
 | 
				
			||||||
 | 
							try {
 | 
				
			||||||
 | 
								const result = await internalAccessList.delete(res.locals.access, {
 | 
				
			||||||
 | 
									id: Number.parseInt(req.params.list_id, 10),
 | 
				
			||||||
 | 
								});
 | 
				
			||||||
 | 
								res.status(200).send(result);
 | 
				
			||||||
 | 
							} catch (err) {
 | 
				
			||||||
 | 
								logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
				
			||||||
 | 
								next(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						});
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export default router;
 | 
				
			||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user