mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-10-30 15:23:34 +00:00 
			
		
		
		
	Compare commits
	
		
			1277 Commits
		
	
	
		
			v2.2.0
			...
			04b3608b4e
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | 04b3608b4e | ||
|  | 111fc287eb | ||
|  | 95a94a4f8c | ||
|  | 5e7b69c396 | ||
|  | 2723de24fd | ||
|  | 891877afb6 | ||
|  | 8e9e033a72 | ||
|  | e6ec74c2f7 | ||
|  | b3de76c945 | ||
|  | fcf4117f8e | ||
|  | d26e8c1d0c | ||
|  | 19ed4c1212 | ||
|  | 03018d252b | ||
|  | 8351dd41f6 | ||
|  | 97212f2686 | ||
|  | fe068a8b51 | ||
|  | 61e2bde98f | ||
|  | 81c9038929 | ||
|  | 4ea50ca40c | ||
|  | 53ed12bcf2 | ||
|  | cb3e4ed59c | ||
|  | b20dc5eade | ||
|  | 586afc0c91 | ||
|  | 93ea17a9bb | ||
|  | 2075f98cad | ||
|  | 07a4e5791f | ||
|  | 640a1eeb68 | ||
|  | 20646e7bb5 | ||
|  | 87998a03ce | ||
|  | a0b26b9e98 | ||
|  | d6791f4e38 | ||
|  | 62c94f3099 | ||
|  | 25a26d6175 | ||
|  | 17246e418f | ||
|  | f7d3ca0b07 | ||
|  | a55de386e7 | ||
|  | e9d4f5b827 | ||
|  | 1c1cee3836 | ||
|  | eaf6335694 | ||
|  | ffe05ebd41 | ||
|  | 2e9a4f1aed | ||
|  | d17c85e4c8 | ||
|  | dad8d0ca00 | ||
|  | d7e0558a35 | ||
|  | ee41bb5562 | ||
|  | 0cf6b9caa4 | ||
|  | 68a9baf206 | ||
|  | d92421d098 | ||
|  | 96c58b203e | ||
|  | d499e2bfef | ||
|  | 2f9e062718 | ||
|  | edbed1af90 | ||
|  | 8497022e41 | ||
|  | fa2c814fcb | ||
|  | d96a3987c0 | ||
|  | fe2d8895d6 | ||
|  | 5bdc05878f | ||
|  | 929ac3bd7c | ||
|  | f48e1b46a8 | ||
|  | 351ba8dacd | ||
|  | 3b89d5f380 | ||
|  | e5aa880ec4 | ||
|  | 7322d35bd7 | ||
|  | 81b89185f2 | ||
|  | f2bb8f2b3d | ||
|  | b01817bc7f | ||
|  | 5aeb99b856 | ||
|  | e7e4003d15 | ||
|  | 78f3e7281b | ||
|  | c9d97aff38 | ||
|  | 9813071e76 | ||
|  | d7a7fa3496 | ||
|  | 2e72f253a0 | ||
|  | ac47eab23b | ||
|  | 0bfa6c9d4f | ||
|  | f71de7474d | ||
|  | 3a2617e6bf | ||
|  | 6c6722464d | ||
|  | 02a7b43932 | ||
|  | 42a5bb6af3 | ||
|  | a08d18bdb2 | ||
|  | d2d104b723 | ||
|  | e0352ecc48 | ||
|  | 4e035f285d | ||
|  | b046bb3229 | ||
|  | 304899e604 | ||
|  | e525b5470e | ||
|  | aacb2302bf | ||
|  | d21403ca1e | ||
|  | c39d5433bc | ||
|  | 7c97516de6 | ||
|  | 4572b205c9 | ||
|  | 6f7963ee08 | ||
|  | dfe2588523 | ||
|  | a8f1f7f017 | ||
|  | e401095707 | ||
|  | d69cb26157 | ||
|  | 48a9f5f9db | ||
|  | ca9eeb5118 | ||
|  | a03009056c | ||
|  | 554d1ff2b6 | ||
|  | 0042726477 | ||
|  | ed5d87b021 | ||
|  | 894cd25534 | ||
|  | 4446e2f760 | ||
|  | 35d7a3a407 | ||
|  | 63d06da8a8 | ||
|  | b5a0d74654 | ||
|  | 99cce7e2b0 | ||
|  | 120d50e5c0 | ||
|  | 5454fd61b3 | ||
|  | b33012705b | ||
|  | e948b60194 | ||
|  | 7913c9a07d | ||
|  | d1c23b6286 | ||
|  | c7e2946dbf | ||
|  | 8936402229 | ||
|  | 001c77e686 | ||
|  | 5578e825b1 | ||
|  | c93656a7a1 | ||
|  | 50aeae234f | ||
|  | a5c06c1a34 | ||
|  | 51414ced3a | ||
|  | 5e35e538af | ||
|  | 13fec42d1f | ||
|  | b4560d7dde | ||
|  | 6f9eed8a61 | ||
|  | d66e4e03e6 | ||
|  | 1d19c29bb0 | ||
|  | e20a11de4a | ||
|  | d3a654b546 | ||
|  | bed387ebd4 | ||
|  | 6ac9a82279 | ||
|  | ef23e796ec | ||
|  | 3754a569ba | ||
|  | b383f46656 | ||
|  | 3ce477d350 | ||
|  | 516b4d991c | ||
|  | 12d77e3ab6 | ||
|  | 8d80af3a26 | ||
|  | 1f45e6a5e9 | ||
|  | dcb9628c36 | ||
|  | 029b184398 | ||
|  | 2422587530 | ||
|  | 4ee940d3dc | ||
|  | 47dddc548b | ||
|  | 256a667e2c | ||
|  | 79cd0c5294 | ||
|  | 09a03edfd7 | ||
|  | 35f0fe745d | ||
|  | f1e433714e | ||
|  | 035eaed0a4 | ||
|  | 4b100a384d | ||
|  | c5c5fa0a5a | ||
|  | 280bac8b43 | ||
|  | 02aefa50cd | ||
|  | 4d91cfc397 | ||
|  | 79a453f2fe | ||
|  | c62c09569d | ||
|  | 09bcf4010c | ||
|  | 6aeade6c98 | ||
|  | 8655b7d2db | ||
|  | 2d929dffa8 | ||
|  | 52eaa042d8 | ||
|  | b35aa50b88 | ||
|  | c575a706b5 | ||
|  | 587b97c2d3 | ||
|  | 317003beda | ||
|  | 5a761236c5 | ||
|  | b135527347 | ||
|  | abca9cc89c | ||
|  | 6721923601 | ||
|  | a88f77c1a5 | ||
|  | a5b21d0306 | ||
|  | 8eab8d71f2 | ||
|  | d06572bb5f | ||
|  | d40f9e06fc | ||
|  | 69ec017a53 | ||
|  | fa67f257ef | ||
|  | 0dcd648c9d | ||
|  | c989a282e3 | ||
|  | 5aff969c04 | ||
|  | bfbf7519ec | ||
|  | bf36c7966a | ||
|  | 63cd9ba08f | ||
|  | e3d4882c3d | ||
|  | 3e1b73143e | ||
|  | 10ece3548d | ||
|  | 0503a6af75 | ||
|  | 55d765e785 | ||
|  | 1fb9a75a33 | ||
|  | 9c2e838d61 | ||
|  | c55e47aacf | ||
|  | 40d81d6e44 | ||
|  | 1c84eaac02 | ||
|  | 577954ef8c | ||
|  | f0c75641d8 | ||
|  | e42e2acf12 | ||
|  | eaa11fe460 | ||
|  | 5b53825ccb | ||
|  | a94660120f | ||
|  | 39f4836485 | ||
|  | aec30207da | ||
|  | 209c1b3334 | ||
|  | 58138fbac4 | ||
|  | da820db4e1 | ||
|  | 47b868bfc6 | ||
|  | 89a405f60c | ||
|  | 0353051436 | ||
|  | a3630a6286 | ||
|  | 10d9760242 | ||
|  | c722eb1cea | ||
|  | 0472abacd2 | ||
|  | a2e85ceed8 | ||
|  | cddd6fb985 | ||
|  | db23c9a52f | ||
|  | 8646cb5a19 | ||
|  | fe0c04610f | ||
|  | 9f16dae2ff | ||
|  | 00264bcfb2 | ||
|  | 834fb1a361 | ||
|  | 1be87f48c1 | ||
|  | 9c54d1b718 | ||
|  | f7d1c490b3 | ||
|  | fe4bd9fed6 | ||
|  | 58ef9a688e | ||
|  | d19ebf5925 | ||
|  | 96fc6a20bb | ||
|  | e69684919c | ||
|  | be39253a6f | ||
|  | 30772a48bd | ||
|  | 33c867895c | ||
|  | a7fe687bae | ||
|  | 4028120f55 | ||
|  | d1119ec63f | ||
|  | 4c906283df | ||
|  | 8ec0c76f51 | ||
|  | c70f65d349 | ||
|  | 883a272b0a | ||
|  | 6aee2bbcba | ||
|  | 025fc9776b | ||
|  | b699f05f47 | ||
|  | f7c87f63bd | ||
|  | e4ef095254 | ||
|  | 09d5e2c94f | ||
|  | 459b7a2223 | ||
|  | 9c813bcce3 | ||
|  | b8596ac01c | ||
|  | 082c4e1008 | ||
|  | 2273eae6ee | ||
|  | 997e9d431b | ||
|  | b3564b6d4b | ||
|  | 4e27cdabc4 | ||
|  | 965873adc5 | ||
|  | 5de95a8c90 | ||
|  | fa557d8159 | ||
|  | bc8211a6a9 | ||
|  | 1c498f84ad | ||
|  | ea6e9757e3 | ||
|  | 1308ae42c2 | ||
|  | 7be548575b | ||
|  | c6aab8d4e6 | ||
|  | da55e93183 | ||
|  | af475ab5d4 | ||
|  | 7d85463dae | ||
|  | 13d4f98fdb | ||
|  | 388fff84f2 | ||
|  | 49a765516c | ||
|  | 27bc8c4e33 | ||
|  | 881a067aff | ||
|  | 1975e4a151 | ||
|  | 4704bd6a38 | ||
|  | ca56e0483f | ||
|  | 3b8cb86d72 | ||
|  | 5165de4a91 | ||
|  | 1ab3575c68 | ||
|  | ccf9cce825 | ||
|  | 3ad2188f78 | ||
|  | 33dbffb974 | ||
|  | 289e438c59 | ||
|  | e08a4d4490 | ||
|  | d1d1819677 | ||
|  | 4e0768d56c | ||
|  | 3666364418 | ||
|  | 9052502a17 | ||
|  | b608d3392d | ||
|  | edb81ecce0 | ||
|  | e24181936f | ||
|  | 940d06cac9 | ||
|  | 134902d127 | ||
|  | 2df4620d05 | ||
|  | f41b1069ae | ||
|  | 004a93fbc3 | ||
|  | 2d9f04edcd | ||
|  | 53dbe258a5 | ||
|  | e4ba22f0f8 | ||
|  | 3197de41de | ||
|  | 0f7be7987b | ||
|  | 853c48dff6 | ||
|  | 410c3484ab | ||
|  | 44e9f377f9 | ||
|  | 0f3b76f607 | ||
|  | f426e64569 | ||
|  | 4867db078c | ||
|  | 6b565e628f | ||
|  | 881d70502b | ||
|  | 62e4edddf0 | ||
|  | 4b9c02cc0c | ||
|  | 5af834e40b | ||
|  | 6f8db95249 | ||
|  | fe93cb3474 | ||
|  | fa851b61da | ||
|  | 3333a32612 | ||
|  | 9a79fce498 | ||
|  | b1180f5077 | ||
|  | 5454352fe5 | ||
|  | aee93a2f6f | ||
|  | f38cb5b500 | ||
|  | f1b7156c89 | ||
|  | 98465cf1b0 | ||
|  | 137e865b66 | ||
|  | e740fb4064 | ||
|  | f91f0ee8db | ||
|  | 1c9f751512 | ||
|  | a602bdd514 | ||
|  | f7b2be68cc | ||
|  | ab4586fc6b | ||
|  | a984a68065 | ||
|  | 52875fca6e | ||
|  | 63b50fcd95 | ||
|  | 5ab4aea03f | ||
|  | d73135378e | ||
|  | e19d685cb6 | ||
|  | c8caaa56d9 | ||
|  | 11a98f4c12 | ||
|  | 4a85d4ac4e | ||
|  | 3138ba46ce | ||
|  | cdd0b2e6d3 | ||
|  | f458730d87 | ||
|  | d20873dcbb | ||
|  | d1e9407e4d | ||
|  | 63ee69f432 | ||
|  | f39e527680 | ||
|  | 2dd4434ceb | ||
|  | 81054631f9 | ||
|  | 53d61bd626 | ||
|  | 847e879b3f | ||
|  | 4c59400731 | ||
|  | 824c837a38 | ||
|  | 2a06384a4a | ||
|  | 05307aa253 | ||
|  | 3d2406ac3d | ||
|  | 0127dc7f03 | ||
|  | 4349d42636 | ||
|  | 4b6f9d9419 | ||
|  | c3f019c911 | ||
|  | ecf0290203 | ||
|  | 4f41fe0c95 | ||
|  | c3735fdbbb | ||
|  | c432c34fb3 | ||
|  | a1245bc161 | ||
|  | db4ab1d548 | ||
|  | 86ddd9c83c | ||
|  | 67208e43cc | ||
|  | ddf80302c6 | ||
|  | 5f2576946d | ||
|  | 9fe07fa6c3 | ||
|  | d9b9af543e | ||
|  | eb2e2e0478 | ||
|  | 9225d5d442 | ||
|  | 308a7149ed | ||
|  | 8a4a7d0caf | ||
|  | 5d03ede100 | ||
|  | 4a86bb42cc | ||
|  | dad8561ea1 | ||
|  | 56a92e5c0e | ||
|  | 9d672f5813 | ||
|  | d5ed70dbb6 | ||
|  | c197e66d62 | ||
|  | 91cf3c8873 | ||
|  | 7f5e0414ac | ||
|  | d179887c15 | ||
|  | 35abb4d7ae | ||
|  | 61b290e220 | ||
|  | e1bcef6e5c | ||
|  | 81f51f9e2d | ||
|  | 661953db25 | ||
|  | 065c2dac42 | ||
|  | 2926844cbe | ||
|  | c1960f3793 | ||
|  | 11a29a8b67 | ||
|  | c40e48e678 | ||
|  | 124cb18e17 | ||
|  | 5ac9dc0758 | ||
|  | 9a799d51ce | ||
|  | 77eb618758 | ||
|  | 79fedfcea4 | ||
|  | 8fdb8ac853 | ||
|  | 4fdc80be01 | ||
|  | f8e6c8d018 | ||
|  | c3469de61b | ||
|  | ea61b15a40 | ||
|  | 60175e6d8c | ||
|  | 2a07445005 | ||
|  | dad3e1da7c | ||
|  | 82d9452001 | ||
|  | 095bc8f676 | ||
|  | 8c15340b83 | ||
|  | a13f7c3792 | ||
|  | 6748985669 | ||
|  | e2957f070b | ||
|  | fccbde1371 | ||
|  | fec36834f7 | ||
|  | 00aeef75b6 | ||
|  | 5b7682f13c | ||
|  | b30fcb50c8 | ||
|  | 100c56ad10 | ||
|  | 44bebf366a | ||
|  | 6a28701242 | ||
|  | 09d1d3744c | ||
|  | 84e0b30f8d | ||
|  | 546ce8d4bc | ||
|  | 9b40bb288d | ||
|  | c812b674b6 | ||
|  | 86e63197f6 | ||
|  | c371b2e953 | ||
|  | 2142e25029 | ||
|  | 30076a0e66 | ||
|  | 42bd39163a | ||
|  | cc4891d9ec | ||
|  | 40c26839f5 | ||
|  | 2ff66ee238 | ||
|  | 9d60b4a756 | ||
|  | d2becc0681 | ||
|  | 579c32a724 | ||
|  | b08ef17894 | ||
|  | 589ab8757e | ||
|  | abdaac8584 | ||
|  | d5c950a231 | ||
|  | d9a1701927 | ||
|  | 6e500c35dc | ||
|  | a06e96061f | ||
|  | f0513d34f9 | ||
|  | 09349efbbe | ||
|  | 06453e9668 | ||
|  | b1e904df84 | ||
|  | 5f435b6325 | ||
|  | 7b48488c29 | ||
|  | 3f6ad0d807 | ||
|  | edba369ae8 | ||
|  | b77d916bdd | ||
|  | 2706454635 | ||
|  | 32a3bb1d6d | ||
|  | 95665ca378 | ||
|  | 09d6cf7c48 | ||
|  | 2addc48a9b | ||
|  | ebf07a7912 | ||
|  | abe6493244 | ||
|  | 9f192ab275 | ||
|  | 52e013d289 | ||
|  | 331da3841e | ||
|  | e227f4177b | ||
|  | 88fa7cdfff | ||
|  | f3b3072711 | ||
|  | cf6cc7dcc5 | ||
|  | 448c8a2dd5 | ||
|  | 634cfe13f1 | ||
|  | 7597515c20 | ||
|  | 93f57aece5 | ||
|  | ef6da1bbe1 | ||
|  | 4ad9e68886 | ||
|  | 9b35e7c188 | ||
|  | 2aa6e55d6b | ||
|  | 1ac28410ff | ||
|  | b0fd976b97 | ||
|  | 7fe7e94fbd | ||
|  | 8864960eb4 | ||
|  | 23326895b2 | ||
|  | d2f707b76d | ||
|  | a7f0c3b730 | ||
|  | a9e84f1750 | ||
|  | 7ca3a9e7a6 | ||
|  | c80d099193 | ||
|  | 35aba13122 | ||
|  | b69e493c54 | ||
|  | 99d73a2da8 | ||
|  | 3c23aa935e | ||
|  | 8dee139810 | ||
|  | 6349cb6094 | ||
|  | 452838b04a | ||
|  | fd30cfe98b | ||
|  | 6f281fef42 | ||
|  | 5920b0cf5e | ||
|  | 41bbfcf165 | ||
|  | 80a93e17fa | ||
|  | 4a1eebc54b | ||
|  | 264ba71462 | ||
|  | e229fa89f8 | ||
|  | d3b72ae07d | ||
|  | b62b6b5112 | ||
|  | c44f8c6155 | ||
|  | 0dfa3d9ca3 | ||
|  | 8c7c84906b | ||
|  | 662143cf21 | ||
|  | c60fc7926e | ||
|  | cfbdc6c340 | ||
|  | 2f6d8257ec | ||
|  | b9a6b5d4f5 | ||
|  | 32f77dbcee | ||
|  | 052cb8f12d | ||
|  | 03b544023b | ||
|  | 5070499cfd | ||
|  | e77b13d36e | ||
|  | 4bb237d7c2 | ||
|  | aa5a7faa94 | ||
|  | 837f4dcbd4 | ||
|  | d73a246b66 | ||
|  | f85e82973d | ||
|  | 84afec567c | ||
|  | e1525e5d56 | ||
|  | d2688cf08c | ||
|  | 7372319568 | ||
|  | 60ffec5c64 | ||
|  | 23c88f6955 | ||
|  | dd14207b63 | ||
|  | 103adfbb57 | ||
|  | b673ebe2ca | ||
|  | 0e0c3df0cd | ||
|  | 8dbd482e08 | ||
|  | ab5f7c0f26 | ||
|  | 191f493eb9 | ||
|  | d1f4640a9c | ||
|  | 3d97f4578d | ||
|  | fb0ef08fd8 | ||
|  | 0de78205b5 | ||
|  | e0821bd927 | ||
|  | e5966b54a8 | ||
|  | d2f6b09901 | ||
|  | 5c8aa8517b | ||
|  | 1e5916db28 | ||
|  | a3ae6956e2 | ||
|  | 518b84b38b | ||
|  | 932dc4bf02 | ||
|  | bdc3a555b6 | ||
|  | d4dcb61ee6 | ||
|  | cce73beb2d | ||
|  | 4db34f5894 | ||
|  | 063ac4619f | ||
|  | d1a338107b | ||
|  | 0d0b7e117f | ||
|  | 3538f9719f | ||
|  | feaafdc559 | ||
|  | edf369a3d4 | ||
|  | eb148eb8f0 | ||
|  | 4251157ffa | ||
|  | 9866eec21c | ||
|  | e879d41ee4 | ||
|  | bb26f5b2c7 | ||
|  | 8e61d3eadf | ||
|  | 749ab36b1a | ||
|  | c68874743d | ||
|  | 1a76f4ebfc | ||
|  | 59238d1dc1 | ||
|  | 661f3d6899 | ||
|  | 14b889a85f | ||
|  | ac25171420 | ||
|  | 7281ed5968 | ||
|  | dc541b2c72 | ||
|  | 9a854fd8fe | ||
|  | 8eb44c404d | ||
|  | 61b25e1213 | ||
|  | d3a5a3d0d6 | ||
|  | 366fcf0bed | ||
|  | 29c0fcbad6 | ||
|  | de84d5d463 | ||
|  | 078114ee67 | ||
|  | 49f350fb00 | ||
|  | e141b5ff20 | ||
|  | 181f163cb5 | ||
|  | 30a9d3ae8d | ||
|  | 83e09ad5a7 | ||
|  | 8e5255a275 | ||
|  | e4f06368bb | ||
|  | 0edd87324c | ||
|  | 96e034aa75 | ||
|  | 821432263a | ||
|  | 5edb16f36e | ||
|  | a233bc0045 | ||
|  | eed40d095e | ||
|  | 0d0e5295f4 | ||
|  | 51ac4bc688 | ||
|  | 4f97592965 | ||
|  | be5a763d39 | ||
|  | c435ce0224 | ||
|  | 67d8ede247 | ||
|  | 5e98ce32b7 | ||
|  | a2c01655f0 | ||
|  | 3a71281937 | ||
|  | f235ec8b5a | ||
|  | fa7df05b92 | ||
|  | 1f3ac7a9ec | ||
|  | 5bd002a568 | ||
|  | 5fb0cc5fab | ||
|  | 818b9595aa | ||
|  | c78f641e85 | ||
|  | 081380c8d5 | ||
|  | 7e451bce0b | ||
|  | a082ec0604 | ||
|  | 973a10a9d1 | ||
|  | 1ec95096d5 | ||
|  | e81cc45405 | ||
|  | b9ef11e8bf | ||
|  | 0d8dd03c3d | ||
|  | 74d610d9ad | ||
|  | 9146ca6c63 | ||
|  | d7e0ae0fa0 | ||
|  | 29ee48530c | ||
|  | abe53a4bdd | ||
|  | 2d23bedf12 | ||
|  | 4e17fb476b | ||
|  | c803ec7e26 | ||
|  | 7e67f33766 | ||
|  | 9dd5644183 | ||
|  | 5a8028a72d | ||
|  | 747de511d4 | ||
|  | 7800938fd2 | ||
|  | ab80fe13e9 | ||
|  | 5d106c4064 | ||
|  | 2ac1026e4b | ||
|  | b78c7e1c53 | ||
|  | 849bdcda7b | ||
|  | 5aae8cd0e3 | ||
|  | adc5a2020a | ||
|  | 40b1521f72 | ||
|  | ac23c66659 | ||
|  | 84bc33db8a | ||
|  | 6392df36c3 | ||
|  | c82843279c | ||
|  | b394eb8e55 | ||
|  | bb422d4454 | ||
|  | 3dfe23836c | ||
|  | d45f39aae3 | ||
|  | cb091040a8 | ||
|  | ddd538944a | ||
|  | 1f879f67a9 | ||
|  | ee89dedd0f | ||
|  | 9ab5333652 | ||
|  | 3bd97ae1b0 | ||
|  | 432062e0f4 | ||
|  | 0c8bbb4bc2 | ||
|  | 48e96c46d5 | ||
|  | 25e9acf618 | ||
|  | a517e80236 | ||
|  | 3d4d3bc73b | ||
|  | cf4d1f73fa | ||
|  | c203d1a0d8 | ||
|  | 5f29f6b039 | ||
|  | f75b5b867b | ||
|  | 67463ca136 | ||
|  | 8db541f37f | ||
|  | a5229d0e92 | ||
|  | 38ec0f9f95 | ||
|  | 3d80759a21 | ||
|  | d95cd36b3e | ||
|  | 4c6b96ad5d | ||
|  | c3bef2867e | ||
|  | efc5bff2e1 | ||
|  | ffe3db8c08 | ||
|  | 4ada0feae3 | ||
|  | e17de6058e | ||
|  | 9efe6cfb39 | ||
|  | c86a1a50bd | ||
|  | c55476b196 | ||
|  | 3b47decbb0 | ||
|  | d0bfa082e0 | ||
|  | 6b7a8b009e | ||
|  | ca59e585d8 | ||
|  | bbde7a108a | ||
|  | 87731a8b5c | ||
|  | 29d4bd4ccf | ||
|  | 925ad90f91 | ||
|  | 650ae61c43 | ||
|  | 02f3f9704f | ||
|  | da7c3057b4 | ||
|  | 040b45cafa | ||
|  | 8ece310b9f | ||
|  | 96959db3c2 | ||
|  | 6360100611 | ||
|  | b833044cea | ||
|  | 97909830f5 | ||
|  | 8ae2de2f49 | ||
|  | bf7b659e89 | ||
|  | 4e3c7749af | ||
|  | f63441921f | ||
|  | 725ba83606 | ||
|  | 281906c0b5 | ||
|  | 8ed121f43d | ||
|  | 81a9cab2b3 | ||
|  | 8d98a417c5 | ||
|  | 6fa81b179b | ||
|  | 9e169fbb42 | ||
|  | 27f84f880a | ||
|  | 0d9c941b4e | ||
|  | 8865aa9c8c | ||
|  | 6d8c4218f1 | ||
|  | c134a43337 | ||
|  | 780759dc27 | ||
|  | 85128f08f3 | ||
|  | d2f8c1e5f1 | ||
|  | 9c88b9c1e9 | ||
|  | 13fd2ce4e2 | ||
|  | 9979f516d6 | ||
|  | 39a5cd2d6e | ||
|  | 784516283f | ||
|  | ce503232c3 | ||
|  | f2edf9130f | ||
|  | 413ab50fc4 | ||
|  | c1880bd3ff | ||
|  | 0f0a672275 | ||
|  | 06c5f991e7 | ||
|  | babc5b7a38 | ||
|  | b96c996a45 | ||
|  | fb8f2c2f9a | ||
|  | 6794937391 | ||
|  | f022e84979 | ||
|  | fd5ac952cc | ||
|  | 07f60e5c77 | ||
|  | 628b8a7e1f | ||
|  | 30a442807d | ||
|  | 1626c8edd1 | ||
|  | ca6561bf6c | ||
|  | 273a81471d | ||
|  | 8b07a67133 | ||
|  | 32089ea272 | ||
|  | 658acd147c | ||
|  | ca3370a6ac | ||
|  | c4e2557de2 | ||
|  | 6f2b4fdf86 | ||
|  | f302ff71c9 | ||
|  | fee87a44d6 | ||
|  | 8944609b63 | ||
|  | be87c45f27 | ||
|  | 1b1807c79a | ||
|  | a8f4699816 | ||
|  | ac3df6dd77 | ||
|  | 5c67908460 | ||
|  | 7b67ef3015 | ||
|  | e5a3b5ee2f | ||
|  | 5e9ff4d2bf | ||
|  | daa71764b6 | ||
|  | 6a6c2ef192 | ||
|  | 320315956d | ||
|  | 4f10d129c2 | ||
|  | 62eb3fcd85 | ||
|  | ab40e4e2cf | ||
|  | 0bb9450642 | ||
|  | a6e15532b9 | ||
|  | 9a89a8a77e | ||
|  | fe3675dc7a | ||
|  | 5c9acc2bff | ||
|  | c94e937a50 | ||
|  | 3e4e10e644 | ||
|  | ba7bb57ca2 | ||
|  | 14c125150a | ||
|  | 053701a702 | ||
|  | 3fc3e43042 | ||
|  | b0dc68d7d4 | ||
|  | e895baaeb4 | ||
|  | c47f6fdb21 | ||
|  | 9e188e441a | ||
|  | f6efcdf9f9 | ||
|  | b1ceda3af4 | ||
|  | cd3a0684d0 | ||
|  | f25e54c6cb | ||
|  | 66f86cf497 | ||
|  | d260edc547 | ||
|  | ba1e6fa984 | ||
|  | 6b59f36213 | ||
|  | 1894960762 | ||
|  | 83c5c55f32 | ||
|  | fb8c0b9a48 | ||
|  | d34691152c | ||
|  | cea80b482e | ||
|  | c460a8fa5c | ||
|  | 5f852437fe | ||
|  | 8aded1a685 | ||
|  | f2acb9e150 | ||
|  | 6f3a00c9b8 | ||
|  | fbae107c04 | ||
|  | 6c1ae77a2a | ||
|  | 67e8ca6714 | ||
|  | a56d976947 | ||
|  | ac0bb6bee2 | ||
|  | dee67dac75 | ||
|  | 9458cfbd1a | ||
|  | 4b8bdd22b3 | ||
|  | a4c143e2d1 | ||
|  | e91019feb9 | ||
|  | 8a37ec72b7 | ||
|  | c263a33095 | ||
|  | 4b2c0115db | ||
|  | 673f40bd85 | ||
|  | b9f8108cd3 | ||
|  | a16ecf656b | ||
|  | 842cff130b | ||
|  | 346b9b4b79 | ||
|  | 56c317d223 | ||
|  | b7b150a979 | ||
|  | fae848bd1b | ||
|  | a5b8087dc5 | ||
|  | 7aa078e025 | ||
|  | 4b6b276b64 | ||
|  | 0373daae5c | ||
|  | 7f30dd0475 | ||
|  | d2a77c2371 | ||
|  | 104f65b541 | ||
|  | d0fb4b6914 | ||
|  | 42c3272def | ||
|  | 2812889d61 | ||
|  | bd3a13b2a5 | ||
|  | 289d179142 | ||
|  | deca493912 | ||
|  | d16bf7d6c0 | ||
|  | 3f1415dad1 | ||
|  | 3e744b6b2d | ||
|  | 56c4f8a106 | ||
|  | 99ef8bae4c | ||
|  | b7f0343730 | ||
|  | c807b59fb4 | ||
|  | 60fc57431a | ||
|  | d988a3a307 | ||
|  | de763d3fa9 | ||
|  | 21bfb61cc8 | ||
|  | a79adeb280 | ||
|  | 9b7a019222 | ||
|  | e65143d276 | ||
|  | 61bb183eda | ||
|  | f3d3a6db91 | ||
|  | 9ebb443cb7 | ||
|  | fa4c4d0a8d | ||
|  | 3e1518fef6 | ||
|  | e59db84721 | ||
|  | c281b31fc8 | ||
|  | 1c93ca9896 | ||
|  | df5836e573 | ||
|  | 41ef35f0d0 | ||
|  | 5e6ce8643f | ||
|  | f575400bc8 | ||
|  | 6d9a335b0e | ||
|  | f94eb5f318 | ||
|  | 245fa421a2 | ||
|  | 655094a816 | ||
|  | d544650b05 | ||
|  | d9d682585c | ||
|  | 44a202552e | ||
|  | fd6673420b | ||
|  | 0e9cd5db9c | ||
|  | 6da6e6f145 | ||
|  | bdaa7460e4 | ||
|  | d6d1c1ac35 | ||
|  | 67958155fc | ||
|  | 198bd74ec6 | ||
|  | 92eec95dad | ||
|  | b73a034fca | ||
|  | 11b508f021 | ||
|  | c2b5be37f9 | ||
|  | 1a04863a08 | ||
|  | 077d3eb993 | ||
|  | ac38221bdf | ||
|  | 9f146b8fc3 | ||
|  | 9a2d9659a7 | ||
|  | 6faae5350a | ||
|  | 2616709e7f | ||
|  | bed9ff084c | ||
|  | fb3082b0bb | ||
|  | c8439b8429 | ||
|  | 4c3632d3e7 | ||
|  | 24d8cd57da | ||
|  | b7c0a8b0c2 | ||
|  | d6d7b22b1e | ||
|  | 5269c957ce | ||
|  | bf8d2672c8 | ||
|  | 8461acab9b | ||
|  | 731ae43fe8 | ||
|  | 5354c85352 | ||
|  | 22a37bb923 | ||
|  | 07bbece704 | ||
|  | 9af2f50d81 | ||
|  | 7b148f7970 | ||
|  | a1e52d919f | ||
|  | 899b487daa | ||
|  | 86eeb5fc44 | ||
|  | 62a708b416 | ||
|  | a7ce8704b3 | ||
|  | 7319a13077 | ||
|  | 95bd4d93c5 | ||
|  | 69c33f0395 | ||
|  | cd4caea2dc | ||
|  | c9daf19940 | ||
|  | 7c2540b193 | ||
|  | 3e600552dc | ||
|  | 69ee6b1699 | ||
|  | ca1ea042b2 | ||
|  | f26df7d9bb | ||
|  | ba45705571 | ||
|  | bf8ea71c77 | ||
|  | 7deb64a5de | ||
|  | e283865d3d | ||
|  | a32be3e96b | ||
|  | 0cfd6eab3f | ||
|  | c2361f13e6 | ||
|  | bc81de54b9 | ||
|  | 07884bc9b1 | ||
|  | 58c3204187 | ||
|  | 19d3deddd4 | ||
|  | f0233b947e | ||
|  | c6a90a2fd0 | ||
|  | 3607c30d98 | ||
|  | 717105f243 | ||
|  | 2373e4a06d | ||
|  | 4c76803f13 | ||
|  | 6a46e88f8f | ||
|  | e4e94d5be0 | ||
|  | a3b896fa70 | ||
|  | 60347a90e9 | ||
|  | a02d4ec46f | ||
|  | 485bae8f22 | ||
|  | 655477316b | ||
|  | e22f87dee7 | ||
|  | d3337322dd | ||
|  | 6202f4f943 | ||
|  | b42cc9ed3e | ||
|  | fbf72c0f61 | ||
|  | cbd0b0c070 | ||
|  | 874f049323 | ||
|  | 42ab4020e2 | ||
|  | 7ab9683b87 | ||
|  | 865facfd05 | ||
|  | 0951f4a202 | ||
|  | 882ec27969 | ||
|  | a84158c1ff | ||
|  | 161d3ec817 | ||
|  | 5b15249689 | ||
|  | 602fce1c7e | ||
|  | f2f653e345 | ||
|  | b55738bd6e | ||
|  | b39a59ce72 | ||
|  | 9872daf29f | ||
|  | 91044e730b | ||
|  | 656a7dceef | ||
|  | d636502eaa | ||
|  | 389fd158ad | ||
|  | 30fa63b379 | ||
|  | 691063545c | ||
|  | 421934efed | ||
|  | f056b9dc7f | ||
|  | 48d421ba28 | ||
|  | 096b714117 | ||
|  | 0d25dc1aaa | ||
|  | 63d3c2d06f | ||
|  | 5fc704ccad | ||
|  | 61d99561c1 | ||
|  | c26ce2083f | ||
|  | 847d71f72a | ||
|  | 3c35039445 | ||
|  | 1a64d44857 | ||
|  | ba5f0c212c | ||
|  | 4eddb5d7f3 | ||
|  | 3b104710d5 | ||
|  | 74db0004bd | ||
|  | 6e67352a0f | ||
|  | b127f02468 | ||
|  | c9c53d9670 | ||
|  | d36dbb868b | ||
|  | b7fb2cfe92 | ||
|  | d0a0c77556 | ||
|  | 9469b9c78a | ||
|  | e4988f34c7 | ||
|  | 1fe9e24f0a | ||
|  | 9c39de3454 | ||
|  | 9bb68ad4eb | ||
|  | 5bf774bee1 | ||
|  | 99514464fb | ||
|  | 3bf1c1e531 | ||
|  | e2e31094aa | ||
|  | f29ff15167 | ||
|  | 1c64252015 | ||
|  | ead19915f3 | ||
|  | 967e0dd98a | ||
|  | bd0324dba0 | ||
|  | 607fb83a1e | ||
|  | bb5fc58f3a | ||
|  | afbec0aca9 | ||
|  | 1e5d9dfbff | ||
|  | cfcb657cde | ||
|  | 7f243e6f06 | ||
|  | 7e7032c051 | ||
|  | b7b808d98d | ||
|  | a21289bf11 | ||
|  | 4a8d01224a | ||
|  | f0eebc43e3 | ||
|  | 49fbf031d1 | ||
|  | 4060718e5c | ||
|  | 49b0f11ae7 | ||
|  | 9b83d35ef4 | ||
|  | eb20add0c7 | ||
|  | 1f122e9145 | ||
|  | 329d0ecaed | ||
|  | 77a2ee948a | ||
|  | ebeda6345e | ||
|  | e35138ebed | ||
|  | 8ba6c4f7e7 | ||
|  | 6df7b72e08 | ||
|  | fe13b12f43 | ||
|  | ea28da90b2 | ||
|  | b243324c65 | ||
|  | a2dde00f40 | ||
|  | 5ff07faa7e | ||
|  | 272c652847 | ||
|  | 3964bbf3fe | ||
|  | 11175aaa5f | ||
|  | 7fcc4a7ef0 | ||
|  | 5abb9458c7 | ||
|  | 0ca5587a6f | ||
|  | d29650882b | ||
|  | 9c3a7b02ec | ||
|  | ef3a073af5 | ||
|  | 15c4857a4b | ||
|  | 63a71afbc8 | ||
|  | 64761ee9c6 | ||
|  | d6c344b5ec | ||
|  | d27826d10e | ||
|  | 4ac52a0e25 | ||
|  | efa841d75a | ||
|  | d1fac583ea | ||
|  | 8cb44c7b97 | ||
|  | f2293a9dda | ||
|  | da0d1d4a2f | ||
|  | 6a8d5e2166 | ||
|  | d732665a23 | ||
|  | e0748c9bc7 | ||
|  | 23573543a3 | ||
|  | bfb328238e | ||
|  | 64cc4f57d6 | ||
|  | 7a3c91c6a4 | ||
|  | 508bc62852 | ||
|  | 59e8446d47 | ||
|  | d13596d2f7 | ||
|  | 9adccfa341 | ||
|  | 5cc3b53378 | ||
|  | b62b0a2fb7 | ||
|  | 1faac4edf2 | ||
|  | 4c60dce169 | ||
|  | 771f31f44d | ||
|  | 8bedb95e1d | ||
|  | ac4be08df2 | ||
|  | 0d6e058e23 | ||
|  | bee2ceb667 | ||
|  | 6af13d4f40 | ||
|  | 9dd0ebd899 | ||
|  | 6e97bfa717 | ||
|  | 07b69f41eb | ||
|  | 6bd2ac7d6d | ||
|  | 528e5ef3bc | ||
|  | bc1c50ac92 | ||
|  | 8c2ab42b75 | ||
|  | 62053d15d4 | ||
|  | 6fed642aba | ||
|  | 72ac549a58 | ||
|  | 9f38617135 | ||
|  | 94eec805df | ||
|  | 05a940e732 | ||
|  | 1c43cc2181 | ||
|  | 657ee73ff1 | ||
|  | 4ee5d993cf | ||
|  | 70a445e2d7 | ||
|  | 2115da210d | ||
|  | 540554c4f6 | ||
|  | 1337c50d28 | ||
|  | c5ceb3b2b1 | ||
|  | 57fc1d8f08 | ||
|  | 1518ecd1e9 | ||
|  | 6be0343918 | ||
|  | cf8812c932 | ||
|  | 5bc3e474a9 | ||
|  | 13eaa346bc | ||
|  | d7437cc4a7 | ||
|  | ddb3c6590c | ||
|  | 89d6773bda | ||
|  | 3651b9484f | ||
|  | 2200c950b7 | ||
|  | 14f84f01b5 | ||
|  | cb014027bb | ||
|  | 32e5155783 | ||
|  | a3159ad59e | ||
|  | 60a40197f1 | ||
|  | 7d693a4271 | ||
|  | f192748bf9 | ||
|  | 96f401cba6 | ||
|  | ffd2430160 | ||
|  | 190cd2d6bb | ||
|  | 7ba58bdbd3 | ||
|  | 08ab62108f | ||
|  | 1028de8158 | ||
|  | 301499dc52 | ||
|  | 5c2f13ed8e | ||
|  | e30ad81f69 | ||
|  | 21f36f535f | ||
|  | c14236823a | ||
|  | 551a9fe1c6 | ||
|  | e3399e1035 | ||
|  | c413b4af3f | ||
|  | dbf5dec23b | ||
|  | 10f0eb17d7 | ||
|  | e3b680c351 | ||
|  | 0df0545777 | ||
|  | 165bfc9f5f | ||
|  | 5830bd73b9 | ||
|  | 3c4ce839b9 | ||
|  | ac9f052309 | ||
|  | 049e424957 | ||
|  | 07e78aec48 | ||
|  | 3fec135fe5 | ||
|  | 867fe1322b | ||
|  | 95208a50a7 | ||
|  | 514b13fcc2 | ||
|  | 4cbc1f5bbe | ||
|  | 64de36cdf2 | ||
|  | 093b48ad7b | ||
|  | 05f6a55a0b | ||
|  | 2523424f68 | ||
|  | b81325d7bf | ||
|  | 3e10b7b2b1 | ||
|  | e5cb750015 | ||
|  | 28f72086ec | ||
|  | a6b9bd7b01 | ||
|  | 2c5eac9dad | ||
|  | 87f61b8527 | ||
|  | 74bfe490c6 | ||
|  | 015167f34d | ||
|  | 4bafc7ff1a | ||
|  | bf8beb50b4 | ||
|  | e5034a34f5 | ||
|  | a561605653 | ||
|  | e8596c1554 | ||
|  | ab67481e99 | ||
|  | 1b611e67c8 | ||
|  | c5aa2b9f77 | ||
|  | cff6c4d1f5 | ||
|  | 077cf75ef2 | ||
|  | ff1770204c | ||
|  | b9a95840e0 | ||
|  | 2d7576c57e | ||
|  | 251aac716a | ||
|  | 6694a42270 | ||
|  | f78a4c6ad1 | ||
|  | 83fad8bcda | ||
|  | f539e813aa | ||
|  | 5d65166777 | ||
|  | 70346138a7 | ||
|  | d68656559c | ||
|  | 01660b5b80 | ||
|  | 74010acd85 | ||
|  | 7c7d255172 | ||
|  | 058f1e9835 | ||
|  | b4fc629ec0 | ||
|  | ae06b2da75 | ||
|  | 54d423a11f | ||
|  | 5da6c97a00 | ||
|  | bf2f13443f | ||
|  | 9ce4c3fe2f | ||
|  | 4a07bf666d | ||
|  | 5be46b4b20 | ||
|  | 7fd825b76b | ||
|  | b23d59dec7 | ||
|  | 492d450d26 | ||
|  | 04412f3624 | ||
|  | c41057b28a | ||
|  | 8312bc0100 | ||
|  | 85ac43bc5e | ||
|  | d1a0780c7a | ||
|  | f9b8d76527 | ||
|  | 26f00eeae4 | ||
|  | 1bc2df2178 | ||
|  | 8dfbcef198 | ||
|  | 6690b7735d | ||
|  | a9e7222e5e | ||
|  | f8edeb2775 | ||
|  | d1786fe159 | ||
|  | 157a12fb7c | ||
|  | 3f723b1638 | ||
|  | e2e9835d01 | ||
|  | 7599617b67 | ||
|  | 18a5b11033 | ||
|  | fff31b0f34 | ||
|  | c02e30663a | ||
|  | 4c6527cafc | ||
|  | 55bddb12e5 | ||
|  | d95861e1fb | ||
|  | 94754a5cb3 | ||
|  | 546f862236 | ||
|  | f105e29e56 | ||
|  | 5c15993d06 | ||
|  | a369ea1080 | ||
|  | 98068c0f57 | ||
|  | e0ef8683a2 | ||
|  | 66412a75f9 | ||
|  | 84d8fb0899 | ||
|  | c631537dbe | ||
|  | 8d2f49541c | ||
|  | 55a28e3437 | ||
|  | 67ea2d01c8 | ||
|  | dab229e37c | ||
|  | 7084473330 | ||
|  | dd2e335fae | ||
|  | 1ff87bbc12 | ||
|  | 2ebfdcf0c9 | ||
|  | 8ab161a3ee | ||
|  | e74b9617be | ||
|  | c3d88c83e3 | ||
|  | 3e912a7474 | ||
|  | 0d726a1d83 | ||
|  | affabf065e | ||
|  | e6ea77d263 | ||
|  | df73c2a458 | ||
|  | 96c5c79aef | ||
|  | 64922f07ff | ||
|  | bae21f3210 | ||
|  | 0702a4e58e | ||
|  | 31f1d304d6 | ||
|  | 291a74c295 | ||
|  | c0e9d1eb2f | ||
|  | a7cabdde3a | ||
|  | 3af560c2d0 | ||
|  | 1d23d5c761 | ||
|  | 995db12f22 | ||
|  | 4c60bfb66b | ||
|  | 1716747047 | ||
|  | 090b4d0388 | ||
|  | a9f068daa8 | ||
|  | f5ee91aeb3 | ||
|  | e2ee2cbf2d | ||
|  | dcf8364899 | ||
|  | b783602786 | ||
|  | 005e64eb9f | ||
|  | e9e5d293cc | ||
|  | a57255350f | ||
|  | 781442bf1e | ||
|  | 604bd2c576 | ||
|  | d9e1e1bbb7 | ||
|  | 907e9e182d | ||
|  | 0f238a5021 | ||
|  | 8d432bd60a | ||
|  | fd932c7678 | ||
|  | 46a9f5cb96 | ||
|  | f990d3f674 | ||
|  | 4a6de8deee | ||
|  | 9a7a216b23 | ||
|  | fccaaaae4d | ||
|  | a882b0be82 | ||
|  | db7bbab768 | ||
|  | 030e553549 | ||
|  | 8b0ca8e367 | ||
|  | 83b2b07200 | ||
|  | bdb591af9e | ||
|  | 2993a08777 | ||
|  | 2a2d3d57ec | ||
|  | 33c2c131c2 | ||
|  | e4286c96a7 | ||
|  | 2d9486b6fd | ||
|  | 632ee2d0bd | ||
|  | b09f201819 | ||
|  | baaf39c23d | ||
|  | b7467c10e8 | ||
|  | 701ef18606 | ||
|  | 3e7d2b216b | ||
|  | 41f16c20b6 | 
							
								
								
									
										33
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										33
									
								
								.github/ISSUE_TEMPLATE/bug_report.md
									
									
									
									
										vendored
									
									
								
							| @@ -6,15 +6,30 @@ labels: bug | |||||||
| assignees: '' | assignees: '' | ||||||
|  |  | ||||||
| --- | --- | ||||||
|  | <!-- | ||||||
|  |   | ||||||
|  | Are you in the right place? | ||||||
|  | - If you are looking for support on how to get your upstream server forwarding, please consider asking the community on Reddit. | ||||||
|  | - If you are writing code changes to contribute and need to ask about the internals of the software, Gitter is the best place to ask. | ||||||
|  | - If you think you found a bug with NPM (not Nginx, or your upstream server or MySql) then you are in the *right place.* | ||||||
|  |  | ||||||
|  | --> | ||||||
|  |  | ||||||
| **Checklist** | **Checklist** | ||||||
| - Have you pulled and found the error with `jc21/nginx-proxy-manager:latest` docker image? | - Have you pulled and found the error with `jc21/nginx-proxy-manager:latest` docker image? | ||||||
|  |   - Yes / No | ||||||
| - Are you sure you're not using someone else's docker image? | - Are you sure you're not using someone else's docker image? | ||||||
| - If having problems with Lets Encrypt, have you made absolutely sure your site is accessible from outside of your network? |   - Yes / No | ||||||
|  | - Have you searched for similar issues (both open and closed)? | ||||||
|  |   - Yes / No | ||||||
|  |  | ||||||
| **Describe the bug** | **Describe the bug** | ||||||
| - A clear and concise description of what the bug is. | <!-- A clear and concise description of what the bug is. --> | ||||||
| - What version of Nginx Proxy Manager is reported on the login page? |  | ||||||
|  |  | ||||||
|  | **Nginx Proxy Manager Version** | ||||||
|  | <!-- What version of Nginx Proxy Manager is reported on the login page? --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **To Reproduce** | **To Reproduce** | ||||||
| Steps to reproduce the behavior: | Steps to reproduce the behavior: | ||||||
| @@ -23,14 +38,18 @@ Steps to reproduce the behavior: | |||||||
| 3. Scroll down to '....' | 3. Scroll down to '....' | ||||||
| 4. See error | 4. See error | ||||||
|  |  | ||||||
|  |  | ||||||
| **Expected behavior** | **Expected behavior** | ||||||
| A clear and concise description of what you expected to happen. | <!-- A clear and concise description of what you expected to happen. --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Screenshots** | **Screenshots** | ||||||
| If applicable, add screenshots to help explain your problem. | <!-- If applicable, add screenshots to help explain your problem. --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Operating System** | **Operating System** | ||||||
| - Please specify if using a Rpi, Mac, orchestration tool or any other setups that might affect the reproduction of this error. | <!-- Please specify if using a Rpi, Mac, orchestration tool or any other setups that might affect the reproduction of this error. --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Additional context** | **Additional context** | ||||||
| Add any other context about the problem here, docker version, browser version if applicable to the problem. Too much info is better than too little. | <!-- Add any other context about the problem here, docker version, browser version, logs if applicable to the problem. Too much info is better than too little. --> | ||||||
|   | |||||||
							
								
								
									
										18
									
								
								.github/ISSUE_TEMPLATE/dns_challenge_request.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								.github/ISSUE_TEMPLATE/dns_challenge_request.md
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,18 @@ | |||||||
|  | --- | ||||||
|  | name: DNS challenge provider request | ||||||
|  | about: Suggest a new provider to be available for a certificate DNS challenge | ||||||
|  | title: '' | ||||||
|  | labels: dns provider request | ||||||
|  | assignees: '' | ||||||
|  |  | ||||||
|  | --- | ||||||
|  |  | ||||||
|  | **What provider would you like to see added to NPM?** | ||||||
|  | <!-- What is this provider called? --> | ||||||
|  |  | ||||||
|  |  | ||||||
|  | **Have you checked if a certbot plugin exists?** | ||||||
|  | <!--  | ||||||
|  | Currently NPM only supports DNS challenge providers for which a certbot plugin exists.  | ||||||
|  | You can visit pypi.org, and search for a package with the name `certbot-dns-<privider>`. | ||||||
|  | --> | ||||||
							
								
								
									
										20
									
								
								.github/ISSUE_TEMPLATE/feature_request.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										20
									
								
								.github/ISSUE_TEMPLATE/feature_request.md
									
									
									
									
										vendored
									
									
								
							| @@ -7,14 +7,26 @@ assignees: '' | |||||||
|  |  | ||||||
| --- | --- | ||||||
|  |  | ||||||
|  | <!-- | ||||||
|  |  | ||||||
|  | Are you in the right place? | ||||||
|  | - If you are looking for support on how to get your upstream server forwarding, please consider asking the community on Reddit. | ||||||
|  | - If you are writing code changes to contribute and need to ask about the internals of the software, Gitter is the best place to ask. | ||||||
|  | - If you think you found a bug with NPM (not Nginx, or your upstream server or MySql) then you are in the *right place.* | ||||||
|  |  | ||||||
|  | --> | ||||||
|  |  | ||||||
| **Is your feature request related to a problem? Please describe.** | **Is your feature request related to a problem? Please describe.** | ||||||
| A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] | <!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Describe the solution you'd like** | **Describe the solution you'd like** | ||||||
| A clear and concise description of what you want to happen. | <!-- A clear and concise description of what you want to happen. --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Describe alternatives you've considered** | **Describe alternatives you've considered** | ||||||
| A clear and concise description of any alternative solutions or features you've considered. | <!-- A clear and concise description of any alternative solutions or features you've considered. --> | ||||||
|  |  | ||||||
|  |  | ||||||
| **Additional context** | **Additional context** | ||||||
| Add any other context or screenshots about the feature request here. | <!-- Add any other context or screenshots about the feature request here. --> | ||||||
|   | |||||||
							
								
								
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								.github/workflows/stale.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,21 @@ | |||||||
|  | name: 'Close stale issues and PRs' | ||||||
|  | on: | ||||||
|  |   schedule: | ||||||
|  |     - cron: '30 1 * * *' | ||||||
|  |   workflow_dispatch: | ||||||
|  |  | ||||||
|  | jobs: | ||||||
|  |   stale: | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     steps: | ||||||
|  |       - uses: actions/stale@v9 | ||||||
|  |         with: | ||||||
|  |           stale-issue-label: 'stale' | ||||||
|  |           stale-pr-label: 'stale' | ||||||
|  |           stale-issue-message: 'Issue is now considered stale. If you want to keep it open, please comment :+1:' | ||||||
|  |           stale-pr-message: 'PR is now considered stale. If you want to keep it open, please comment :+1:' | ||||||
|  |           close-issue-message: 'Issue was closed due to inactivity.' | ||||||
|  |           close-pr-message: 'PR was closed due to inactivity.' | ||||||
|  |           days-before-stale: 182 | ||||||
|  |           days-before-close: 365 | ||||||
|  |           operations-per-run: 50 | ||||||
							
								
								
									
										6
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -2,4 +2,8 @@ | |||||||
| .idea | .idea | ||||||
| ._* | ._* | ||||||
| .vscode | .vscode | ||||||
|  | certbot-help.txt | ||||||
|  | test/node_modules | ||||||
|  | */node_modules | ||||||
|  | docker/dev/dnsrouter-config.json.tmp | ||||||
|  | docker/dev/resolv.conf | ||||||
|   | |||||||
| @@ -1,10 +0,0 @@ | |||||||
| { |  | ||||||
| 	"database": { |  | ||||||
| 		"engine": "mysql", |  | ||||||
| 		"host": "db", |  | ||||||
| 		"name": "npm", |  | ||||||
| 		"user": "npm", |  | ||||||
| 		"password": "npm", |  | ||||||
| 		"port": 3306 |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
							
								
								
									
										225
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										225
									
								
								Jenkinsfile
									
									
									
									
										vendored
									
									
								
							| @@ -1,3 +1,9 @@ | |||||||
|  | import groovy.transform.Field | ||||||
|  |  | ||||||
|  | @Field | ||||||
|  | def shOutput = "" | ||||||
|  | def buildxPushTags = "" | ||||||
|  |  | ||||||
| pipeline { | pipeline { | ||||||
| 	agent { | 	agent { | ||||||
| 		label 'docker-multiarch' | 		label 'docker-multiarch' | ||||||
| @@ -5,16 +11,15 @@ pipeline { | |||||||
| 	options { | 	options { | ||||||
| 		buildDiscarder(logRotator(numToKeepStr: '5')) | 		buildDiscarder(logRotator(numToKeepStr: '5')) | ||||||
| 		disableConcurrentBuilds() | 		disableConcurrentBuilds() | ||||||
|  | 		ansiColor('xterm') | ||||||
| 	} | 	} | ||||||
| 	environment { | 	environment { | ||||||
| 		IMAGE                      = "nginx-proxy-manager" | 		IMAGE                      = 'nginx-proxy-manager' | ||||||
| 		BUILD_VERSION              = getVersion() | 		BUILD_VERSION              = getVersion() | ||||||
| 		MAJOR_VERSION              = "2" | 		MAJOR_VERSION              = '2' | ||||||
| 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('/', '-')}" | 		BRANCH_LOWER               = "${BRANCH_NAME.toLowerCase().replaceAll('\\\\', '-').replaceAll('/', '-').replaceAll('\\.', '-')}" | ||||||
| 		COMPOSE_PROJECT_NAME       = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | 		BUILDX_NAME                = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}" | ||||||
| 		COMPOSE_FILE               = 'docker/docker-compose.ci.yml' |  | ||||||
| 		COMPOSE_INTERACTIVE_NO_CLI = 1 | 		COMPOSE_INTERACTIVE_NO_CLI = 1 | ||||||
| 		BUILDX_NAME                = "${COMPOSE_PROJECT_NAME}" |  | ||||||
| 	} | 	} | ||||||
| 	stages { | 	stages { | ||||||
| 		stage('Environment') { | 		stage('Environment') { | ||||||
| @@ -25,7 +30,7 @@ pipeline { | |||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 						script { | 						script { | ||||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | 							buildxPushTags = "-t docker.io/jc21/${IMAGE}:${BUILD_VERSION} -t docker.io/jc21/${IMAGE}:${MAJOR_VERSION} -t docker.io/jc21/${IMAGE}:latest" | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| @@ -38,7 +43,7 @@ pipeline { | |||||||
| 					steps { | 					steps { | ||||||
| 						script { | 						script { | ||||||
| 							// Defaults to the Branch name, which is applies to all branches AND pr's | 							// Defaults to the Branch name, which is applies to all branches AND pr's | ||||||
| 							env.BUILDX_PUSH_TAGS = "-t docker.io/jc21/${IMAGE}:github-${BRANCH_LOWER}" | 							buildxPushTags = "-t docker.io/nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}" | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| @@ -51,87 +56,114 @@ pipeline { | |||||||
| 						sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md' | 						sh 'sed -i -E "s/(version-)[0-9]+\\.[0-9]+\\.[0-9]+(-green)/\\1${BUILD_VERSION}\\2/" README.md' | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 			} | 				stage('Docker Login') { | ||||||
| 		} |  | ||||||
| 		stage('Frontend') { |  | ||||||
| 					steps { | 					steps { | ||||||
| 				ansiColor('xterm') { | 						withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { | ||||||
| 					sh './scripts/frontend-build' | 							sh 'docker login -u "${duser}" -p "${dpass}"' | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 		stage('Backend') { | 			} | ||||||
|  | 		} | ||||||
|  | 		stage('Builds') { | ||||||
|  | 			parallel { | ||||||
|  | 				stage('Project') { | ||||||
| 					steps { | 					steps { | ||||||
| 				ansiColor('xterm') { | 						script { | ||||||
| 					echo 'Checking Syntax ...' | 							// Frontend and Backend | ||||||
| 					// See: https://github.com/yarnpkg/yarn/issues/3254 | 							def shStatusCode = sh(label: 'Checking and Building', returnStatus: true, script: ''' | ||||||
| 					sh '''docker run --rm \\ | 								set -e | ||||||
| 						-v "$(pwd)/backend:/app" \\ | 								./scripts/ci/frontend-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||||
| 						-w /app \\ | 								./scripts/ci/test-and-build > ${WORKSPACE}/tmp-sh-build 2>&1 | ||||||
| 						node:latest \\ | 							''') | ||||||
| 						sh -c "yarn install && yarn eslint . && rm -rf node_modules" | 							shOutput = readFile "${env.WORKSPACE}/tmp-sh-build" | ||||||
| 					''' | 							if (shStatusCode != 0) { | ||||||
|  | 								error "${shOutput}" | ||||||
| 					echo 'Docker Build ...' |  | ||||||
| 					sh '''docker build --pull --no-cache --squash --compress \\ |  | ||||||
| 						-t "${IMAGE}:ci-${BUILD_NUMBER}" \\ |  | ||||||
| 						-f docker/Dockerfile \\ |  | ||||||
| 						--build-arg TARGETPLATFORM=linux/amd64 \\ |  | ||||||
| 						--build-arg BUILDPLATFORM=linux/amd64 \\ |  | ||||||
| 						--build-arg BUILD_VERSION="${BUILD_VERSION}" \\ |  | ||||||
| 						--build-arg BUILD_COMMIT="${BUILD_COMMIT}" \\ |  | ||||||
| 						--build-arg BUILD_DATE="$(date '+%Y-%m-%d %T %Z')" \\ |  | ||||||
| 						. |  | ||||||
| 					''' |  | ||||||
| 							} | 							} | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 		stage('Test') { |  | ||||||
| 			steps { |  | ||||||
| 				ansiColor('xterm') { |  | ||||||
| 					// Bring up a stack |  | ||||||
| 					sh 'docker-compose up -d fullstack' |  | ||||||
| 					sh './scripts/wait-healthy $(docker-compose ps -q fullstack) 120' |  | ||||||
|  |  | ||||||
| 					// Run tests |  | ||||||
| 					sh 'rm -rf test/results' |  | ||||||
| 					sh 'docker-compose up cypress' |  | ||||||
| 					// Get results |  | ||||||
| 					sh 'docker cp -L "$(docker-compose ps -q cypress):/results" test/' |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
| 					post { | 					post { | ||||||
| 						always { | 						always { | ||||||
| 					// Dumps to analyze later | 							sh 'rm -f ${WORKSPACE}/tmp-sh-build' | ||||||
| 					sh 'mkdir -p debug' |  | ||||||
| 					sh 'docker-compose logs fullstack | gzip > debug/docker_fullstack.log.gz' |  | ||||||
| 					sh 'docker-compose logs db | gzip > debug/docker_db.log.gz' |  | ||||||
| 					// Cypress videos and screenshot artifacts |  | ||||||
| 					dir(path: 'test/results') { |  | ||||||
| 						archiveArtifacts allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml' |  | ||||||
| 						} | 						} | ||||||
| 					junit 'test/results/junit/*' | 						failure { | ||||||
|  | 							npmGithubPrComment("CI Error:\n\n```\n${shOutput}\n```", true) | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 				stage('Docs') { | 				stage('Docs') { | ||||||
|  | 					steps { | ||||||
|  | 						dir(path: 'docs') { | ||||||
|  | 							sh 'yarn install' | ||||||
|  | 							sh 'yarn build' | ||||||
|  | 						} | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 		stage('Test Sqlite') { | ||||||
|  | 			environment { | ||||||
|  | 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_sqlite" | ||||||
|  | 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.sqlite.yml' | ||||||
|  | 			} | ||||||
| 			when { | 			when { | ||||||
| 				not { | 				not { | ||||||
| 					equals expected: 'UNSTABLE', actual: currentBuild.result | 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 			steps { | 			steps { | ||||||
| 				ansiColor('xterm') { | 				sh 'rm -rf ./test/results/junit/*' | ||||||
| 					dir(path: 'docs') { | 				sh './scripts/ci/fulltest-cypress' | ||||||
| 						sh 'yarn install' |  | ||||||
| 						sh 'yarn build' |  | ||||||
| 			} | 			} | ||||||
|  | 			post { | ||||||
| 					dir(path: 'docs/.vuepress/dist') { | 				always { | ||||||
| 						sh 'tar -czf ../../docs.tgz *' | 					// Dumps to analyze later | ||||||
|  | 					sh 'mkdir -p debug/sqlite' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/sqlite/docker_fullstack.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/sqlite/docker_stepca.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/sqlite/docker_pdns.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/sqlite/docker_pdns-db.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/sqlite/docker_dnsrouter.log 2>&1' | ||||||
|  | 					junit 'test/results/junit/*' | ||||||
|  | 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||||
|  | 				} | ||||||
|  | 				unstable { | ||||||
|  | 					dir(path: 'testing/results') { | ||||||
|  | 						archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml') | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 		stage('Test Mysql') { | ||||||
|  | 			environment { | ||||||
|  | 				COMPOSE_PROJECT_NAME = "npm_${BRANCH_LOWER}_${BUILD_NUMBER}_mysql" | ||||||
|  | 				COMPOSE_FILE         = 'docker/docker-compose.ci.yml:docker/docker-compose.ci.mysql.yml' | ||||||
|  | 			} | ||||||
|  | 			when { | ||||||
|  | 				not { | ||||||
|  | 					equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 			steps { | ||||||
|  | 				sh 'rm -rf ./test/results/junit/*' | ||||||
|  | 				sh './scripts/ci/fulltest-cypress' | ||||||
|  | 			} | ||||||
|  | 			post { | ||||||
|  | 				always { | ||||||
|  | 					// Dumps to analyze later | ||||||
|  | 					sh 'mkdir -p debug/mysql' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q fullstack) > debug/mysql/docker_fullstack.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q stepca) > debug/mysql/docker_stepca.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns) > debug/mysql/docker_pdns.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q pdns-db) > debug/mysql/docker_pdns-db.log 2>&1' | ||||||
|  | 					sh 'docker logs $(docker-compose ps --all -q dnsrouter) > debug/mysql/docker_dnsrouter.log 2>&1' | ||||||
|  | 					junit 'test/results/junit/*' | ||||||
|  | 					sh 'docker-compose down --remove-orphans --volumes -t 30 || true' | ||||||
|  | 				} | ||||||
|  | 				unstable { | ||||||
|  | 					dir(path: 'testing/results') { | ||||||
|  | 						archiveArtifacts(allowEmptyArchive: true, artifacts: '**/*', excludes: '**/*.xml') | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 					archiveArtifacts(artifacts: 'docs/docs.tgz', allowEmptyArchive: false) |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| @@ -142,45 +174,22 @@ pipeline { | |||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 			steps { | 			steps { | ||||||
| 				ansiColor('xterm') { | 				sh "./scripts/buildx --push ${buildxPushTags}" | ||||||
| 					withCredentials([usernamePassword(credentialsId: 'jc21-dockerhub', passwordVariable: 'dpass', usernameVariable: 'duser')]) { |  | ||||||
| 						sh "docker login -u '${duser}' -p '${dpass}'" |  | ||||||
| 						// Buildx with push |  | ||||||
| 						sh "./scripts/buildx --push ${BUILDX_PUSH_TAGS}" |  | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 			} | 		stage('Docs / Comment') { | ||||||
| 		} | 			parallel { | ||||||
| 		stage('Docs Deploy') { | 				stage('Docs Job') { | ||||||
| 					when { | 					when { | ||||||
| 						allOf { | 						allOf { | ||||||
| 					branch 'master' | 							branch pattern: "^(develop|master)\$", comparator: "REGEXP" | ||||||
| 							not { | 							not { | ||||||
| 								equals expected: 'UNSTABLE', actual: currentBuild.result | 								equals expected: 'UNSTABLE', actual: currentBuild.result | ||||||
| 							} | 							} | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 				withCredentials([[$class: 'AmazonWebServicesCredentialsBinding', accessKeyVariable: 'AWS_ACCESS_KEY_ID', credentialsId: 'npm-s3-docs', secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']]) { | 						build wait: false, job: 'nginx-proxy-manager-docs', parameters: [string(name: 'docs_branch', value: "$BRANCH_NAME")] | ||||||
| 					sh """docker run --rm \\ |  | ||||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-upload \\ |  | ||||||
| 						-e S3_BUCKET=jc21-npm-site \\ |  | ||||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ |  | ||||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ |  | ||||||
| 						-v \$(pwd):/app \\ |  | ||||||
| 						-w /app \\ |  | ||||||
| 						jc21/ci-tools \\ |  | ||||||
| 						scripts/docs-upload /app/docs/.vuepress/dist/ |  | ||||||
| 					""" |  | ||||||
|  |  | ||||||
| 					sh """docker run --rm \\ |  | ||||||
| 						--name \${COMPOSE_PROJECT_NAME}-docs-invalidate \\ |  | ||||||
| 						-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \\ |  | ||||||
| 						-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \\ |  | ||||||
| 						jc21/ci-tools \\ |  | ||||||
| 						aws cloudfront create-invalidation --distribution-id EN1G6DEWZUTDT --paths '/*' |  | ||||||
| 					""" |  | ||||||
| 				} |  | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 				stage('PR Comment') { | 				stage('PR Comment') { | ||||||
| @@ -193,9 +202,15 @@ pipeline { | |||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 					steps { | 					steps { | ||||||
| 				ansiColor('xterm') { |  | ||||||
| 						script { | 						script { | ||||||
| 						def comment = pullRequest.comment("Docker Image for build ${BUILD_NUMBER} is available on [DockerHub](https://cloud.docker.com/repository/docker/jc21/${IMAGE}) as `jc21/${IMAGE}:github-${BRANCH_LOWER}`") | 							npmGithubPrComment("""Docker Image for build ${BUILD_NUMBER} is available on | ||||||
|  | [DockerHub](https://cloud.docker.com/repository/docker/nginxproxymanager/${IMAGE}-dev) | ||||||
|  | as `nginxproxymanager/${IMAGE}-dev:${BRANCH_LOWER}` | ||||||
|  |  | ||||||
|  | **Note:** ensure you backup your NPM instance before testing this image! Especially if there are database changes | ||||||
|  | **Note:** this is a different docker image namespace than the official image | ||||||
|  | """, true) | ||||||
|  | 						} | ||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| @@ -203,23 +218,15 @@ pipeline { | |||||||
| 	} | 	} | ||||||
| 	post { | 	post { | ||||||
| 		always { | 		always { | ||||||
| 			sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30' |  | ||||||
| 			sh 'echo Reverting ownership' | 			sh 'echo Reverting ownership' | ||||||
| 			sh 'docker run --rm -v $(pwd):/data ${DOCKER_CI_TOOLS} chown -R $(id -u):$(id -g) /data' | 			sh 'docker run --rm -v "$(pwd):/data" jc21/ci-tools chown -R "$(id -u):$(id -g)" /data' | ||||||
| 		} | 			printResult(true) | ||||||
| 		success { |  | ||||||
| 			juxtapose event: 'success' |  | ||||||
| 			sh 'figlet "SUCCESS"' |  | ||||||
| 		} | 		} | ||||||
| 		failure { | 		failure { | ||||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||||
| 			juxtapose event: 'failure' |  | ||||||
| 			sh 'figlet "FAILURE"' |  | ||||||
| 		} | 		} | ||||||
| 		unstable { | 		unstable { | ||||||
| 			archiveArtifacts(artifacts: 'debug/**.*', allowEmptyArchive: true) | 			archiveArtifacts(artifacts: 'debug/**/*.*', allowEmptyArchive: true) | ||||||
| 			juxtapose event: 'unstable' |  | ||||||
| 			sh 'figlet "UNSTABLE"' |  | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										82
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										82
									
								
								README.md
									
									
									
									
									
								
							| @@ -1,28 +1,25 @@ | |||||||
| <p align="center"> | <p align="center"> | ||||||
| 	<img src="https://nginxproxymanager.com/github.png"> | 	<img src="https://nginxproxymanager.com/github.png"> | ||||||
| 	<br><br> | 	<br><br> | ||||||
|   <img src="https://img.shields.io/badge/version-2.2.0-green.svg?style=for-the-badge"> | 	<img src="https://img.shields.io/badge/version-2.12.1-green.svg?style=for-the-badge"> | ||||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||||
| 		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | 		<img src="https://img.shields.io/docker/stars/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||||
| 	</a> | 	</a> | ||||||
| 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | 	<a href="https://hub.docker.com/repository/docker/jc21/nginx-proxy-manager"> | ||||||
| 		<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | 		<img src="https://img.shields.io/docker/pulls/jc21/nginx-proxy-manager.svg?style=for-the-badge"> | ||||||
| 	</a> | 	</a> | ||||||
|   <a href="https://ci.nginxproxymanager.com/blue/organizations/jenkins/nginx-proxy-manager/branches/"> |  | ||||||
|     <img src="https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fci.nginxproxymanager.com%2Fjob%2Fnginx-proxy-manager%2Fjob%2Fmaster&style=for-the-badge"> |  | ||||||
|   </a> |  | ||||||
| </p> | </p> | ||||||
|  |  | ||||||
| This project comes as a pre-built docker image that enables you to easily forward to your websites | This project comes as a pre-built docker image that enables you to easily forward to your websites | ||||||
| running at home or otherwise, including free SSL, without having to know too much about Nginx or Letsencrypt. | running at home or otherwise, including free SSL, without having to know too much about Nginx or Letsencrypt. | ||||||
|  |  | ||||||
| - [Quick Setup](https://nginxproxymanager.com#quick-setup) | - [Quick Setup](#quick-setup) | ||||||
| - [Full Setup](https://nginxproxymanager.com/setup/) | - [Full Setup](https://nginxproxymanager.com/setup/) | ||||||
| - [Screenshots](https://nginxproxymanager.com/screenshots/) | - [Screenshots](https://nginxproxymanager.com/screenshots/) | ||||||
|  |  | ||||||
| ## Project Goal | ## Project Goal | ||||||
|  |  | ||||||
| I created this project to fill a personal need to provide users with a easy way to accomplish reverse | I created this project to fill a personal need to provide users with an easy way to accomplish reverse | ||||||
| proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed. | proxying hosts with SSL termination and it had to be so easy that a monkey could do it. This goal hasn't changed. | ||||||
| While there might be advanced options they are optional and the project should be as simple as possible | While there might be advanced options they are optional and the project should be as simple as possible | ||||||
| so that the barrier for entry here is low. | so that the barrier for entry here is low. | ||||||
| @@ -48,3 +45,76 @@ I won't go in to too much detail here but here are the basics for someone new to | |||||||
| 2. Add port forwarding for port 80 and 443 to the server hosting this project | 2. Add port forwarding for port 80 and 443 to the server hosting this project | ||||||
| 3. Configure your domain name details to point to your home, either with a static ip or a service like DuckDNS or [Amazon Route53](https://github.com/jc21/route53-ddns) | 3. Configure your domain name details to point to your home, either with a static ip or a service like DuckDNS or [Amazon Route53](https://github.com/jc21/route53-ddns) | ||||||
| 4. Use the Nginx Proxy Manager as your gateway to forward to your other web based services | 4. Use the Nginx Proxy Manager as your gateway to forward to your other web based services | ||||||
|  |  | ||||||
|  | ## Quick Setup | ||||||
|  |  | ||||||
|  | 1. Install Docker and Docker-Compose | ||||||
|  |  | ||||||
|  | - [Docker Install documentation](https://docs.docker.com/install/) | ||||||
|  | - [Docker-Compose Install documentation](https://docs.docker.com/compose/install/) | ||||||
|  |  | ||||||
|  | 2. Create a docker-compose.yml file similar to this: | ||||||
|  |  | ||||||
|  | ```yml | ||||||
|  | services: | ||||||
|  |   app: | ||||||
|  |     image: 'docker.io/jc21/nginx-proxy-manager:latest' | ||||||
|  |     restart: unless-stopped | ||||||
|  |     ports: | ||||||
|  |       - '80:80' | ||||||
|  |       - '81:81' | ||||||
|  |       - '443:443' | ||||||
|  |     volumes: | ||||||
|  |       - ./data:/data | ||||||
|  |       - ./letsencrypt:/etc/letsencrypt | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | This is the bare minimum configuration required. See the [documentation](https://nginxproxymanager.com/setup/) for more. | ||||||
|  |  | ||||||
|  | 3. Bring up your stack by running | ||||||
|  |  | ||||||
|  | ```bash | ||||||
|  | docker-compose up -d | ||||||
|  |  | ||||||
|  | # If using docker-compose-plugin | ||||||
|  | docker compose up -d | ||||||
|  |  | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | 4. Log in to the Admin UI | ||||||
|  |  | ||||||
|  | When your docker container is running, connect to it on port `81` for the admin interface. | ||||||
|  | Sometimes this can take a little bit because of the entropy of keys. | ||||||
|  |  | ||||||
|  | [http://127.0.0.1:81](http://127.0.0.1:81) | ||||||
|  |  | ||||||
|  | Default Admin User: | ||||||
|  | ``` | ||||||
|  | Email:    admin@example.com | ||||||
|  | Password: changeme | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | Immediately after logging in with this default user you will be asked to modify your details and change your password. | ||||||
|  |  | ||||||
|  |  | ||||||
|  | ## Contributing | ||||||
|  |  | ||||||
|  | All are welcome to create pull requests for this project, against the `develop` branch. Official releases are created from the `master` branch. | ||||||
|  |  | ||||||
|  | CI is used in this project. All PR's must pass before being considered. After passing, | ||||||
|  | docker builds for PR's are available on dockerhub for manual verifications. | ||||||
|  |  | ||||||
|  | Documentation within the `develop` branch is available for preview at | ||||||
|  | [https://develop.nginxproxymanager.com](https://develop.nginxproxymanager.com) | ||||||
|  |  | ||||||
|  |  | ||||||
|  | ### Contributors | ||||||
|  |  | ||||||
|  | Special thanks to [all of our contributors](https://github.com/NginxProxyManager/nginx-proxy-manager/graphs/contributors). | ||||||
|  |  | ||||||
|  |  | ||||||
|  | ## Getting Support | ||||||
|  |  | ||||||
|  | 1. [Found a bug?](https://github.com/NginxProxyManager/nginx-proxy-manager/issues) | ||||||
|  | 2. [Discussions](https://github.com/NginxProxyManager/nginx-proxy-manager/discussions) | ||||||
|  | 3. [Reddit](https://reddit.com/r/nginxproxymanager) | ||||||
|   | |||||||
							
								
								
									
										2
									
								
								backend/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								backend/.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -4,3 +4,5 @@ yarn-error.log | |||||||
| tmp | tmp | ||||||
| certbot.log | certbot.log | ||||||
| node_modules | node_modules | ||||||
|  | core.* | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								backend/.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							| @@ -1,8 +0,0 @@ | |||||||
| { |  | ||||||
| 	"editor.insertSpaces": false, |  | ||||||
| 	"editor.formatOnSave": true, |  | ||||||
| 	"files.trimTrailingWhitespace": true, |  | ||||||
| 	"editor.codeActionsOnSave": { |  | ||||||
| 		"source.fixAll.eslint": true |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
| @@ -2,6 +2,7 @@ const express     = require('express'); | |||||||
| const bodyParser  = require('body-parser'); | const bodyParser  = require('body-parser'); | ||||||
| const fileUpload  = require('express-fileupload'); | const fileUpload  = require('express-fileupload'); | ||||||
| const compression = require('compression'); | const compression = require('compression'); | ||||||
|  | const config      = require('./lib/config'); | ||||||
| const log         = require('./logger').express; | const log         = require('./logger').express; | ||||||
|  |  | ||||||
| /** | /** | ||||||
| @@ -24,7 +25,7 @@ app.enable('trust proxy', ['loopback', 'linklocal', 'uniquelocal']); | |||||||
| app.enable('strict routing'); | app.enable('strict routing'); | ||||||
|  |  | ||||||
| // pretty print JSON when not live | // pretty print JSON when not live | ||||||
| if (process.env.NODE_ENV !== 'production') { | if (config.debug()) { | ||||||
| 	app.set('json spaces', 2); | 	app.set('json spaces', 2); | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -40,7 +41,6 @@ app.use(function (req, res, next) { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	res.set({ | 	res.set({ | ||||||
| 		'Strict-Transport-Security': 'includeSubDomains; max-age=631138519; preload', |  | ||||||
| 		'X-XSS-Protection':       '1; mode=block', | 		'X-XSS-Protection':       '1; mode=block', | ||||||
| 		'X-Content-Type-Options': 'nosniff', | 		'X-Content-Type-Options': 'nosniff', | ||||||
| 		'X-Frame-Options':        x_frame_options, | 		'X-Frame-Options':        x_frame_options, | ||||||
| @@ -52,7 +52,7 @@ app.use(function (req, res, next) { | |||||||
| }); | }); | ||||||
|  |  | ||||||
| app.use(require('./lib/express/jwt')()); | app.use(require('./lib/express/jwt')()); | ||||||
| app.use('/', require('./routes/api/main')); | app.use('/', require('./routes/main')); | ||||||
|  |  | ||||||
| // production error handler | // production error handler | ||||||
| // no stacktraces leaked to user | // no stacktraces leaked to user | ||||||
| @@ -66,7 +66,7 @@ app.use(function (err, req, res, next) { | |||||||
| 		} | 		} | ||||||
| 	}; | 	}; | ||||||
|  |  | ||||||
| 	if (process.env.NODE_ENV === 'development') { | 	if (config.debug() || (req.baseUrl + req.path).includes('nginx/certificates')) { | ||||||
| 		payload.debug = { | 		payload.debug = { | ||||||
| 			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null, | 			stack:    typeof err.stack !== 'undefined' && err.stack ? err.stack.split('\n') : null, | ||||||
| 			previous: err.previous | 			previous: err.previous | ||||||
| @@ -75,7 +75,7 @@ app.use(function (err, req, res, next) { | |||||||
|  |  | ||||||
| 	// Not every error is worth logging - but this is good for now until it gets annoying. | 	// Not every error is worth logging - but this is good for now until it gets annoying. | ||||||
| 	if (typeof err.stack !== 'undefined' && err.stack) { | 	if (typeof err.stack !== 'undefined' && err.stack) { | ||||||
| 		if (process.env.NODE_ENV === 'development') { | 		if (config.debug()) { | ||||||
| 			log.debug(err.stack); | 			log.debug(err.stack); | ||||||
| 		} else if (typeof err.public == 'undefined' || !err.public) { | 		} else if (typeof err.public == 'undefined' || !err.public) { | ||||||
| 			log.warn(err.message); | 			log.warn(err.message); | ||||||
|   | |||||||
| @@ -1,6 +1,6 @@ | |||||||
| { | { | ||||||
|   "database": { |   "database": { | ||||||
|     "engine": "mysql", |     "engine": "mysql2", | ||||||
|     "host": "db", |     "host": "db", | ||||||
|     "name": "npm", |     "name": "npm", | ||||||
|     "user": "npm", |     "user": "npm", | ||||||
|   | |||||||
							
								
								
									
										26
									
								
								backend/config/sqlite-test-db.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								backend/config/sqlite-test-db.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,26 @@ | |||||||
|  | { | ||||||
|  |   "database": { | ||||||
|  |       "engine": "knex-native", | ||||||
|  |       "knex": { | ||||||
|  |         "client": "sqlite3", | ||||||
|  |         "connection": { | ||||||
|  |           "filename": "/app/config/mydb.sqlite" | ||||||
|  |         }, | ||||||
|  |         "pool": { | ||||||
|  |           "min": 0, | ||||||
|  |           "max": 1, | ||||||
|  |           "createTimeoutMillis": 3000, | ||||||
|  |           "acquireTimeoutMillis": 30000, | ||||||
|  |           "idleTimeoutMillis": 30000, | ||||||
|  |           "reapIntervalMillis": 1000, | ||||||
|  |           "createRetryIntervalMillis": 100, | ||||||
|  |           "propagateCreateError": false | ||||||
|  |         }, | ||||||
|  |         "migrations": { | ||||||
|  |           "tableName": "migrations", | ||||||
|  |           "stub": "src/backend/lib/migrate_template.js", | ||||||
|  |           "directory": "src/backend/migrations" | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  | } | ||||||
| @@ -1,25 +1,27 @@ | |||||||
| const config = require('config'); | const config = require('./lib/config'); | ||||||
|  |  | ||||||
| if (!config.has('database')) { | if (!config.has('database')) { | ||||||
| 	throw new Error('Database config does not exist! Please read the instructions: https://github.com/jc21/nginx-proxy-manager/blob/master/doc/INSTALL.md'); | 	throw new Error('Database config does not exist! Please read the instructions: https://nginxproxymanager.com/setup/'); | ||||||
| } | } | ||||||
|  |  | ||||||
| let data = { | function generateDbConfig() { | ||||||
| 	client:     config.database.engine, | 	const cfg = config.get('database'); | ||||||
|  | 	if (cfg.engine === 'knex-native') { | ||||||
|  | 		return cfg.knex; | ||||||
|  | 	} | ||||||
|  | 	return { | ||||||
|  | 		client:     cfg.engine, | ||||||
| 		connection: { | 		connection: { | ||||||
| 		host:     config.database.host, | 			host:     cfg.host, | ||||||
| 		user:     config.database.user, | 			user:     cfg.user, | ||||||
| 		password: config.database.password, | 			password: cfg.password, | ||||||
| 		database: config.database.name, | 			database: cfg.name, | ||||||
| 		port:     config.database.port | 			port:     cfg.port | ||||||
| 		}, | 		}, | ||||||
| 		migrations: { | 		migrations: { | ||||||
| 			tableName: 'migrations' | 			tableName: 'migrations' | ||||||
| 		} | 		} | ||||||
| }; | 	}; | ||||||
|  |  | ||||||
| if (typeof config.database.version !== 'undefined') { |  | ||||||
| 	data.version = config.database.version; |  | ||||||
| } | } | ||||||
|  |  | ||||||
| module.exports = require('knex')(data); | module.exports = require('knex')(generateDbConfig()); | ||||||
|   | |||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -1,23 +1,20 @@ | |||||||
| #!/usr/bin/env node | #!/usr/bin/env node | ||||||
|  |  | ||||||
|  | const schema = require('./schema'); | ||||||
| const logger = require('./logger').global; | const logger = require('./logger').global; | ||||||
|  |  | ||||||
| function appStart () { | async function appStart () { | ||||||
| 	const migrate             = require('./migrate'); | 	const migrate             = require('./migrate'); | ||||||
| 	const setup               = require('./setup'); | 	const setup               = require('./setup'); | ||||||
| 	const app                 = require('./app'); | 	const app                 = require('./app'); | ||||||
| 	const apiValidator        = require('./lib/validator/api'); |  | ||||||
| 	const internalCertificate = require('./internal/certificate'); | 	const internalCertificate = require('./internal/certificate'); | ||||||
| 	const internalIpRanges    = require('./internal/ip_ranges'); | 	const internalIpRanges    = require('./internal/ip_ranges'); | ||||||
|  |  | ||||||
| 	return migrate.latest() | 	return migrate.latest() | ||||||
| 		.then(setup) | 		.then(setup) | ||||||
| 		.then(() => { | 		.then(schema.getCompiledSchema) | ||||||
| 			return apiValidator.loadSchemas; |  | ||||||
| 		}) |  | ||||||
| 		.then(internalIpRanges.fetch) | 		.then(internalIpRanges.fetch) | ||||||
| 		.then(() => { | 		.then(() => { | ||||||
|  |  | ||||||
| 			internalCertificate.initTimer(); | 			internalCertificate.initTimer(); | ||||||
| 			internalIpRanges.initTimer(); | 			internalIpRanges.initTimer(); | ||||||
|  |  | ||||||
| @@ -34,7 +31,7 @@ function appStart () { | |||||||
| 			}); | 			}); | ||||||
| 		}) | 		}) | ||||||
| 		.catch((err) => { | 		.catch((err) => { | ||||||
| 			logger.error(err.message); | 			logger.error(err.message, err); | ||||||
| 			setTimeout(appStart, 1000); | 			setTimeout(appStart, 1000); | ||||||
| 		}); | 		}); | ||||||
| } | } | ||||||
| @@ -45,3 +42,4 @@ try { | |||||||
| 	logger.error(err.message, err); | 	logger.error(err.message, err); | ||||||
| 	process.exit(1); | 	process.exit(1); | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
| @@ -3,12 +3,13 @@ const fs                  = require('fs'); | |||||||
| const batchflow             = require('batchflow'); | const batchflow             = require('batchflow'); | ||||||
| const logger                = require('../logger').access; | const logger                = require('../logger').access; | ||||||
| const error                 = require('../lib/error'); | const error                 = require('../lib/error'); | ||||||
|  | const utils                 = require('../lib/utils'); | ||||||
| const accessListModel       = require('../models/access_list'); | const accessListModel       = require('../models/access_list'); | ||||||
| const accessListAuthModel   = require('../models/access_list_auth'); | const accessListAuthModel   = require('../models/access_list_auth'); | ||||||
|  | const accessListClientModel = require('../models/access_list_client'); | ||||||
| const proxyHostModel        = require('../models/proxy_host'); | const proxyHostModel        = require('../models/proxy_host'); | ||||||
| const internalAuditLog      = require('./audit-log'); | const internalAuditLog      = require('./audit-log'); | ||||||
| const internalNginx         = require('./nginx'); | const internalNginx         = require('./nginx'); | ||||||
| const utils               = require('../lib/utils'); |  | ||||||
|  |  | ||||||
| function omissions () { | function omissions () { | ||||||
| 	return ['is_deleted']; | 	return ['is_deleted']; | ||||||
| @@ -26,17 +27,20 @@ const internalAccessList = { | |||||||
| 			.then((/*access_data*/) => { | 			.then((/*access_data*/) => { | ||||||
| 				return accessListModel | 				return accessListModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.insertAndFetch({ | 					.insertAndFetch({ | ||||||
| 						name:          data.name, | 						name:          data.name, | ||||||
|  | 						satisfy_any:   data.satisfy_any, | ||||||
|  | 						pass_auth:     data.pass_auth, | ||||||
| 						owner_user_id: access.token.getUserId(1) | 						owner_user_id: access.token.getUserId(1) | ||||||
| 					}); | 					}) | ||||||
|  | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				data.id = row.id; | 				data.id = row.id; | ||||||
|  |  | ||||||
| 				// Now add the items |  | ||||||
| 				let promises = []; | 				let promises = []; | ||||||
|  |  | ||||||
|  | 				// Now add the items | ||||||
| 				data.items.map((item) => { | 				data.items.map((item) => { | ||||||
| 					promises.push(accessListAuthModel | 					promises.push(accessListAuthModel | ||||||
| 						.query() | 						.query() | ||||||
| @@ -48,13 +52,27 @@ const internalAccessList = { | |||||||
| 					); | 					); | ||||||
| 				}); | 				}); | ||||||
|  |  | ||||||
|  | 				// Now add the clients | ||||||
|  | 				if (typeof data.clients !== 'undefined' && data.clients) { | ||||||
|  | 					data.clients.map((client) => { | ||||||
|  | 						promises.push(accessListClientModel | ||||||
|  | 							.query() | ||||||
|  | 							.insert({ | ||||||
|  | 								access_list_id: row.id, | ||||||
|  | 								address:        client.address, | ||||||
|  | 								directive:      client.directive | ||||||
|  | 							}) | ||||||
|  | 						); | ||||||
|  | 					}); | ||||||
|  | 				} | ||||||
|  |  | ||||||
| 				return Promise.all(promises); | 				return Promise.all(promises); | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// re-fetch with expansions | 				// re-fetch with expansions | ||||||
| 				return internalAccessList.get(access, { | 				return internalAccessList.get(access, { | ||||||
| 					id:     data.id, | 					id:     data.id, | ||||||
| 					expand: ['owner', 'items'] | 					expand: ['owner', 'items', 'clients', 'proxy_hosts.access_list.[clients,items]'] | ||||||
| 				}, true /* <- skip masking */); | 				}, true /* <- skip masking */); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| @@ -64,7 +82,7 @@ const internalAccessList = { | |||||||
| 				return internalAccessList.build(row) | 				return internalAccessList.build(row) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						if (row.proxy_host_count) { | 						if (row.proxy_host_count) { | ||||||
| 							return internalNginx.reload(); | 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | ||||||
| 						} | 						} | ||||||
| 					}) | 					}) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| @@ -100,7 +118,6 @@ const internalAccessList = { | |||||||
| 					// Sanity check that something crazy hasn't happened | 					// Sanity check that something crazy hasn't happened | ||||||
| 					throw new error.InternalValidationError('Access List could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id); | 					throw new error.InternalValidationError('Access List could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// patch name if specified | 				// patch name if specified | ||||||
| @@ -109,7 +126,9 @@ const internalAccessList = { | |||||||
| 						.query() | 						.query() | ||||||
| 						.where({id: data.id}) | 						.where({id: data.id}) | ||||||
| 						.patch({ | 						.patch({ | ||||||
| 							name: data.name | 							name:        data.name, | ||||||
|  | 							satisfy_any: data.satisfy_any, | ||||||
|  | 							pass_auth:   data.pass_auth, | ||||||
| 						}); | 						}); | ||||||
| 				} | 				} | ||||||
| 			}) | 			}) | ||||||
| @@ -153,6 +172,38 @@ const internalAccessList = { | |||||||
| 						}); | 						}); | ||||||
| 				} | 				} | ||||||
| 			}) | 			}) | ||||||
|  | 			.then(() => { | ||||||
|  | 				// Check for clients and add/update/remove them | ||||||
|  | 				if (typeof data.clients !== 'undefined' && data.clients) { | ||||||
|  | 					let promises = []; | ||||||
|  |  | ||||||
|  | 					data.clients.map(function (client) { | ||||||
|  | 						if (client.address) { | ||||||
|  | 							promises.push(accessListClientModel | ||||||
|  | 								.query() | ||||||
|  | 								.insert({ | ||||||
|  | 									access_list_id: data.id, | ||||||
|  | 									address:        client.address, | ||||||
|  | 									directive:      client.directive | ||||||
|  | 								}) | ||||||
|  | 							); | ||||||
|  | 						} | ||||||
|  | 					}); | ||||||
|  |  | ||||||
|  | 					let query = accessListClientModel | ||||||
|  | 						.query() | ||||||
|  | 						.delete() | ||||||
|  | 						.where('access_list_id', data.id); | ||||||
|  |  | ||||||
|  | 					return query | ||||||
|  | 						.then(() => { | ||||||
|  | 							// Add new items | ||||||
|  | 							if (promises.length) { | ||||||
|  | 								return Promise.all(promises); | ||||||
|  | 							} | ||||||
|  | 						}); | ||||||
|  | 				} | ||||||
|  | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// Add to audit log | 				// Add to audit log | ||||||
| 				return internalAuditLog.add(access, { | 				return internalAuditLog.add(access, { | ||||||
| @@ -166,16 +217,16 @@ const internalAccessList = { | |||||||
| 				// re-fetch with expansions | 				// re-fetch with expansions | ||||||
| 				return internalAccessList.get(access, { | 				return internalAccessList.get(access, { | ||||||
| 					id:     data.id, | 					id:     data.id, | ||||||
| 					expand: ['owner', 'items'] | 					expand: ['owner', 'items', 'clients', 'proxy_hosts.[certificate,access_list.[clients,items]]'] | ||||||
| 				}, true /* <- skip masking */); | 				}, true /* <- skip masking */); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				return internalAccessList.build(row) | 				return internalAccessList.build(row) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						if (row.proxy_host_count) { | 						if (row.proxy_host_count) { | ||||||
| 							return internalNginx.reload(); | 							return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts); | ||||||
| 						} | 						} | ||||||
| 					}) | 					}).then(internalNginx.reload) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						return internalAccessList.maskItems(row); | 						return internalAccessList.maskItems(row); | ||||||
| 					}); | 					}); | ||||||
| @@ -204,35 +255,31 @@ const internalAccessList = { | |||||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||||
| 					.where('access_list.is_deleted', 0) | 					.where('access_list.is_deleted', 0) | ||||||
| 					.andWhere('access_list.id', data.id) | 					.andWhere('access_list.id', data.id) | ||||||
| 					.allowEager('[owner,items,proxy_hosts]') | 					.allowGraph('[owner,items,clients,proxy_hosts.[certificate,access_list.[clients,items]]]') | ||||||
| 					.omit(['access_list.is_deleted']) |  | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
|  | 					throw new error.ItemNotFoundError(data.id); | ||||||
|  | 				} | ||||||
| 				if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | 				if (!skip_masking && typeof row.items !== 'undefined' && row.items) { | ||||||
| 					row = internalAccessList.maskItems(row); | 					row = internalAccessList.maskItems(row); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
| 					return _.omit(row, omissions()); | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
| 				} else { | 					row = _.omit(row, data.omit); | ||||||
| 					throw new error.ItemNotFoundError(data.id); |  | ||||||
| 				} | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -246,10 +293,10 @@ const internalAccessList = { | |||||||
| 	delete: (access, data) => { | 	delete: (access, data) => { | ||||||
| 		return access.can('access_lists:delete', data.id) | 		return access.can('access_lists:delete', data.id) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items']}); | 				return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items', 'clients']}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -329,12 +376,11 @@ const internalAccessList = { | |||||||
| 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | 					.joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0') | ||||||
| 					.where('access_list.is_deleted', 0) | 					.where('access_list.is_deleted', 0) | ||||||
| 					.groupBy('access_list.id') | 					.groupBy('access_list.id') | ||||||
| 					.omit(['access_list.is_deleted']) | 					.allowGraph('[owner,items,clients]') | ||||||
| 					.allowEager('[owner,items]') |  | ||||||
| 					.orderBy('access_list.name', 'ASC'); | 					.orderBy('access_list.name', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('access_list.owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| @@ -345,10 +391,10 @@ const internalAccessList = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (rows) { | 				if (rows) { | ||||||
| @@ -455,7 +501,7 @@ const internalAccessList = { | |||||||
| 								if (typeof item.password !== 'undefined' && item.password.length) { | 								if (typeof item.password !== 'undefined' && item.password.length) { | ||||||
| 									logger.info('Adding: ' + item.username); | 									logger.info('Adding: ' + item.username); | ||||||
|  |  | ||||||
| 									utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"') | 									utils.execFile('/usr/bin/htpasswd', ['-b', htpasswd_file, item.username, item.password]) | ||||||
| 										.then((/*result*/) => { | 										.then((/*result*/) => { | ||||||
| 											next(); | 											next(); | ||||||
| 										}) | 										}) | ||||||
|   | |||||||
| @@ -19,7 +19,7 @@ const internalAuditLog = { | |||||||
| 					.orderBy('created_on', 'DESC') | 					.orderBy('created_on', 'DESC') | ||||||
| 					.orderBy('id', 'DESC') | 					.orderBy('id', 'DESC') | ||||||
| 					.limit(100) | 					.limit(100) | ||||||
| 					.allowEager('[user]'); | 					.allowGraph('[user]'); | ||||||
|  |  | ||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| 				if (typeof search_query === 'string') { | 				if (typeof search_query === 'string') { | ||||||
| @@ -29,7 +29,7 @@ const internalAuditLog = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query; | ||||||
|   | |||||||
| @@ -1,33 +1,44 @@ | |||||||
| const fs               = require('fs'); |  | ||||||
| const _                = require('lodash'); | const _                = require('lodash'); | ||||||
| const logger           = require('../logger').ssl; | const fs               = require('fs'); | ||||||
| const error            = require('../lib/error'); | const https            = require('https'); | ||||||
| const certificateModel = require('../models/certificate'); |  | ||||||
| const internalAuditLog = require('./audit-log'); |  | ||||||
| const tempWrite        = require('temp-write'); | const tempWrite        = require('temp-write'); | ||||||
| const utils            = require('../lib/utils'); |  | ||||||
| const moment           = require('moment'); | const moment           = require('moment'); | ||||||
| const debug_mode       = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG; | const archiver         = require('archiver'); | ||||||
| const le_staging       = process.env.NODE_ENV !== 'production'; | const path             = require('path'); | ||||||
|  | const { isArray }      = require('lodash'); | ||||||
|  | const logger           = require('../logger').ssl; | ||||||
|  | const config           = require('../lib/config'); | ||||||
|  | const error            = require('../lib/error'); | ||||||
|  | const utils            = require('../lib/utils'); | ||||||
|  | const certbot          = require('../lib/certbot'); | ||||||
|  | const certificateModel = require('../models/certificate'); | ||||||
|  | const tokenModel       = require('../models/token'); | ||||||
|  | const dnsPlugins       = require('../global/certbot-dns-plugins.json'); | ||||||
|  | const internalAuditLog = require('./audit-log'); | ||||||
| const internalNginx    = require('./nginx'); | const internalNginx    = require('./nginx'); | ||||||
| const internalHost     = require('./host'); | const internalHost     = require('./host'); | ||||||
| const certbot_command  = '/usr/bin/certbot'; |  | ||||||
| const le_config        = '/etc/letsencrypt.ini'; |  | ||||||
|  | const letsencryptStaging = config.useLetsencryptStaging(); | ||||||
|  | const letsencryptServer  = config.useLetsencryptServer(); | ||||||
|  | const letsencryptConfig  = '/etc/letsencrypt.ini'; | ||||||
|  | const certbotCommand     = 'certbot'; | ||||||
|  |  | ||||||
| function omissions() { | function omissions() { | ||||||
| 	return ['is_deleted']; | 	return ['is_deleted', 'owner.is_deleted']; | ||||||
| } | } | ||||||
|  |  | ||||||
| const internalCertificate = { | const internalCertificate = { | ||||||
|  |  | ||||||
| 	allowed_ssl_files:   ['certificate', 'certificate_key', 'intermediate_certificate'], | 	allowedSslFiles:         ['certificate', 'certificate_key', 'intermediate_certificate'], | ||||||
| 	interval_timeout:    1000 * 60 * 60, // 1 hour | 	intervalTimeout:         1000 * 60 * 60, // 1 hour | ||||||
| 	interval:                null, | 	interval:                null, | ||||||
| 	interval_processing: false, | 	intervalProcessing:      false, | ||||||
|  | 	renewBeforeExpirationBy: [30, 'days'], | ||||||
|  |  | ||||||
| 	initTimer: () => { | 	initTimer: () => { | ||||||
| 		logger.info('Let\'s Encrypt Renewal Timer initialized'); | 		logger.info('Let\'s Encrypt Renewal Timer initialized'); | ||||||
| 		internalCertificate.interval = setInterval(internalCertificate.processExpiringHosts, internalCertificate.interval_timeout); | 		internalCertificate.interval = setInterval(internalCertificate.processExpiringHosts, internalCertificate.intervalTimeout); | ||||||
| 		// And do this now as well | 		// And do this now as well | ||||||
| 		internalCertificate.processExpiringHosts(); | 		internalCertificate.processExpiringHosts(); | ||||||
| 	}, | 	}, | ||||||
| @@ -36,67 +47,58 @@ const internalCertificate = { | |||||||
| 	 * Triggered by a timer, this will check for expiring hosts and renew their ssl certs if required | 	 * Triggered by a timer, this will check for expiring hosts and renew their ssl certs if required | ||||||
| 	 */ | 	 */ | ||||||
| 	processExpiringHosts: () => { | 	processExpiringHosts: () => { | ||||||
| 		if (!internalCertificate.interval_processing) { | 		if (!internalCertificate.intervalProcessing) { | ||||||
| 			internalCertificate.interval_processing = true; | 			internalCertificate.intervalProcessing = true; | ||||||
| 			logger.info('Renewing SSL certs close to expiry...'); | 			logger.info('Renewing SSL certs expiring within ' + internalCertificate.renewBeforeExpirationBy[0] + ' ' + internalCertificate.renewBeforeExpirationBy[1] + ' ...'); | ||||||
|  |  | ||||||
| 			let cmd = certbot_command + ' renew --non-interactive --quiet ' + | 			const expirationThreshold = moment().add(internalCertificate.renewBeforeExpirationBy[0], internalCertificate.renewBeforeExpirationBy[1]).format('YYYY-MM-DD HH:mm:ss'); | ||||||
| 				'--config "' + le_config + '" ' + |  | ||||||
| 				'--preferred-challenges "dns,http" ' + |  | ||||||
| 				'--disable-hook-validation ' + |  | ||||||
| 				(le_staging ? '--staging' : ''); |  | ||||||
|  |  | ||||||
| 			return utils.exec(cmd) | 			// Fetch all the letsencrypt certs from the db that will expire within the configured threshold | ||||||
| 				.then((result) => { | 			certificateModel | ||||||
| 					if (result) { |  | ||||||
| 						logger.info('Renew Result: ' + result); |  | ||||||
| 					} |  | ||||||
|  |  | ||||||
| 					return internalNginx.reload() |  | ||||||
| 						.then(() => { |  | ||||||
| 							logger.info('Renew Complete'); |  | ||||||
| 							return result; |  | ||||||
| 						}); |  | ||||||
| 				}) |  | ||||||
| 				.then(() => { |  | ||||||
| 					// Now go and fetch all the letsencrypt certs from the db and query the files and update expiry times |  | ||||||
| 					return certificateModel |  | ||||||
| 				.query() | 				.query() | ||||||
| 				.where('is_deleted', 0) | 				.where('is_deleted', 0) | ||||||
| 				.andWhere('provider', 'letsencrypt') | 				.andWhere('provider', 'letsencrypt') | ||||||
|  | 				.andWhere('expires_on', '<', expirationThreshold) | ||||||
| 				.then((certificates) => { | 				.then((certificates) => { | ||||||
| 							if (certificates && certificates.length) { | 					if (!certificates || !certificates.length) { | ||||||
| 								let promises = []; | 						return null; | ||||||
|  | 					} | ||||||
|  |  | ||||||
| 								certificates.map(function (certificate) { | 					/** | ||||||
| 									promises.push( | 					 * Renews must be run sequentially or we'll get an error 'Another | ||||||
| 										internalCertificate.getCertificateInfoFromFile('/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem') | 					 * instance of Certbot is already running.' | ||||||
| 											.then((cert_info) => { | 					 */ | ||||||
| 												return certificateModel | 					let sequence = Promise.resolve(); | ||||||
| 													.query() |  | ||||||
| 													.where('id', certificate.id) | 					certificates.forEach(function (certificate) { | ||||||
| 													.andWhere('provider', 'letsencrypt') | 						sequence = sequence.then(() => | ||||||
| 													.patch({ | 							internalCertificate | ||||||
| 														expires_on: certificateModel.raw('FROM_UNIXTIME(' + cert_info.dates.to + ')') | 								.renew( | ||||||
| 													}); | 									{ | ||||||
| 											}) | 										can: () => | ||||||
|  | 											Promise.resolve({ | ||||||
|  | 												permission_visibility: 'all', | ||||||
|  | 											}), | ||||||
|  | 										token: new tokenModel(), | ||||||
|  | 									}, | ||||||
|  | 									{ id: certificate.id }, | ||||||
|  | 								) | ||||||
| 								.catch((err) => { | 								.catch((err) => { | ||||||
| 									// Don't want to stop the train here, just log the error | 									// Don't want to stop the train here, just log the error | ||||||
| 									logger.error(err.message); | 									logger.error(err.message); | ||||||
| 											}) | 								}), | ||||||
| 						); | 						); | ||||||
| 					}); | 					}); | ||||||
|  |  | ||||||
| 								return Promise.all(promises); | 					return sequence; | ||||||
| 							} |  | ||||||
| 						}); |  | ||||||
| 				}) | 				}) | ||||||
| 				.then(() => { | 				.then(() => { | ||||||
| 					internalCertificate.interval_processing = false; | 					logger.info('Completed SSL cert renew process'); | ||||||
|  | 					internalCertificate.intervalProcessing = false; | ||||||
| 				}) | 				}) | ||||||
| 				.catch((err) => { | 				.catch((err) => { | ||||||
| 					logger.error(err); | 					logger.error(err); | ||||||
| 					internalCertificate.interval_processing = false; | 					internalCertificate.intervalProcessing = false; | ||||||
| 				}); | 				}); | ||||||
| 		} | 		} | ||||||
| 	}, | 	}, | ||||||
| @@ -112,13 +114,13 @@ const internalCertificate = { | |||||||
| 				data.owner_user_id = access.token.getUserId(1); | 				data.owner_user_id = access.token.getUserId(1); | ||||||
|  |  | ||||||
| 				if (data.provider === 'letsencrypt') { | 				if (data.provider === 'letsencrypt') { | ||||||
| 					data.nice_name = data.domain_names.sort().join(', '); | 					data.nice_name = data.domain_names.join(', '); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return certificateModel | 				return certificateModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((certificate) => { | 			.then((certificate) => { | ||||||
| 				if (certificate.provider === 'letsencrypt') { | 				if (certificate.provider === 'letsencrypt') { | ||||||
| @@ -141,9 +143,33 @@ const internalCertificate = { | |||||||
| 								}); | 								}); | ||||||
| 						}) | 						}) | ||||||
| 						.then((in_use_result) => { | 						.then((in_use_result) => { | ||||||
|  | 							// With DNS challenge no config is needed, so skip 3 and 5. | ||||||
|  | 							if (certificate.meta.dns_challenge) { | ||||||
|  | 								return internalNginx.reload().then(() => { | ||||||
|  | 									// 4. Request cert | ||||||
|  | 									return internalCertificate.requestLetsEncryptSslWithDnsChallenge(certificate); | ||||||
|  | 								}) | ||||||
|  | 									.then(internalNginx.reload) | ||||||
|  | 									.then(() => { | ||||||
|  | 										// 6. Re-instate previously disabled hosts | ||||||
|  | 										return internalCertificate.enableInUseHosts(in_use_result); | ||||||
|  | 									}) | ||||||
|  | 									.then(() => { | ||||||
|  | 										return certificate; | ||||||
|  | 									}) | ||||||
|  | 									.catch((err) => { | ||||||
|  | 										// In the event of failure, revert things and throw err back | ||||||
|  | 										return internalCertificate.enableInUseHosts(in_use_result) | ||||||
|  | 											.then(internalNginx.reload) | ||||||
|  | 											.then(() => { | ||||||
|  | 												throw err; | ||||||
|  | 											}); | ||||||
|  | 									}); | ||||||
|  | 							} else { | ||||||
| 								// 3. Generate the LE config | 								// 3. Generate the LE config | ||||||
| 								return internalNginx.generateLetsEncryptRequestConfig(certificate) | 								return internalNginx.generateLetsEncryptRequestConfig(certificate) | ||||||
| 									.then(internalNginx.reload) | 									.then(internalNginx.reload) | ||||||
|  | 									.then(async() => await new Promise((r) => setTimeout(r, 5000))) | ||||||
| 									.then(() => { | 									.then(() => { | ||||||
| 										// 4. Request cert | 										// 4. Request cert | ||||||
| 										return internalCertificate.requestLetsEncryptSsl(certificate); | 										return internalCertificate.requestLetsEncryptSsl(certificate); | ||||||
| @@ -171,6 +197,7 @@ const internalCertificate = { | |||||||
| 												throw err; | 												throw err; | ||||||
| 											}); | 											}); | ||||||
| 									}); | 									}); | ||||||
|  | 							} | ||||||
| 						}) | 						}) | ||||||
| 						.then(() => { | 						.then(() => { | ||||||
| 							// At this point, the letsencrypt cert should exist on disk. | 							// At this point, the letsencrypt cert should exist on disk. | ||||||
| @@ -180,8 +207,9 @@ const internalCertificate = { | |||||||
| 									return certificateModel | 									return certificateModel | ||||||
| 										.query() | 										.query() | ||||||
| 										.patchAndFetchById(certificate.id, { | 										.patchAndFetchById(certificate.id, { | ||||||
| 											expires_on: certificateModel.raw('FROM_UNIXTIME(' + cert_info.dates.to + ')') | 											expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss') | ||||||
| 										}) | 										}) | ||||||
|  | 										.then(utils.omitRow(omissions())) | ||||||
| 										.then((saved_row) => { | 										.then((saved_row) => { | ||||||
| 											// Add cert data for audit log | 											// Add cert data for audit log | ||||||
| 											saved_row.meta = _.assign({}, saved_row.meta, { | 											saved_row.meta = _.assign({}, saved_row.meta, { | ||||||
| @@ -191,6 +219,13 @@ const internalCertificate = { | |||||||
| 											return saved_row; | 											return saved_row; | ||||||
| 										}); | 										}); | ||||||
| 								}); | 								}); | ||||||
|  | 						}).catch(async (error) => { | ||||||
|  | 							// Delete the certificate from the database if it was not created successfully | ||||||
|  | 							await certificateModel | ||||||
|  | 								.query() | ||||||
|  | 								.deleteById(certificate.id); | ||||||
|  |  | ||||||
|  | 							throw error; | ||||||
| 						}); | 						}); | ||||||
| 				} else { | 				} else { | ||||||
| 					return certificate; | 					return certificate; | ||||||
| @@ -233,8 +268,8 @@ const internalCertificate = { | |||||||
|  |  | ||||||
| 				return certificateModel | 				return certificateModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(row.id, data) | 					.patchAndFetchById(row.id, data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						saved_row.meta = internalCertificate.cleanMeta(saved_row.meta); | 						saved_row.meta = internalCertificate.cleanMeta(saved_row.meta); | ||||||
| 						data.meta      = internalCertificate.cleanMeta(data.meta); | 						data.meta      = internalCertificate.cleanMeta(data.meta); | ||||||
| @@ -252,7 +287,7 @@ const internalCertificate = { | |||||||
| 							meta:        _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw | 							meta:        _.omit(data, ['expires_on']) // this prevents json circular reference because expires_on might be raw | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}); | 			}); | ||||||
| @@ -277,30 +312,93 @@ const internalCertificate = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner]') | 					.allowGraph('[owner]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
|  | 			}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param   {Access}  access | ||||||
|  | 	 * @param   {Object}  data | ||||||
|  | 	 * @param   {Number}  data.id | ||||||
|  | 	 * @returns {Promise} | ||||||
|  | 	 */ | ||||||
|  | 	download: (access, data) => { | ||||||
|  | 		return new Promise((resolve, reject) => { | ||||||
|  | 			access.can('certificates:get', data) | ||||||
|  | 				.then(() => { | ||||||
|  | 					return internalCertificate.get(access, data); | ||||||
|  | 				}) | ||||||
|  | 				.then((certificate) => { | ||||||
|  | 					if (certificate.provider === 'letsencrypt') { | ||||||
|  | 						const zipDirectory = '/etc/letsencrypt/live/npm-' + data.id; | ||||||
|  |  | ||||||
|  | 						if (!fs.existsSync(zipDirectory)) { | ||||||
|  | 							throw new error.ItemNotFoundError('Certificate ' + certificate.nice_name + ' does not exists'); | ||||||
|  | 						} | ||||||
|  |  | ||||||
|  | 						let certFiles      = fs.readdirSync(zipDirectory) | ||||||
|  | 							.filter((fn) => fn.endsWith('.pem')) | ||||||
|  | 							.map((fn) => fs.realpathSync(path.join(zipDirectory, fn))); | ||||||
|  | 						const downloadName = 'npm-' + data.id + '-' + `${Date.now()}.zip`; | ||||||
|  | 						const opName       = '/tmp/' + downloadName; | ||||||
|  | 						internalCertificate.zipFiles(certFiles, opName) | ||||||
|  | 							.then(() => { | ||||||
|  | 								logger.debug('zip completed : ', opName); | ||||||
|  | 								const resp = { | ||||||
|  | 									fileName: opName | ||||||
|  | 								}; | ||||||
|  | 								resolve(resp); | ||||||
|  | 							}).catch((err) => reject(err)); | ||||||
|  | 					} else { | ||||||
|  | 						throw new error.ValidationError('Only Let\'sEncrypt certificates can be downloaded'); | ||||||
|  | 					} | ||||||
|  | 				}).catch((err) => reject(err)); | ||||||
|  | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	* @param   {String}  source | ||||||
|  | 	* @param   {String}  out | ||||||
|  | 	* @returns {Promise} | ||||||
|  | 	*/ | ||||||
|  | 	zipFiles(source, out) { | ||||||
|  | 		const archive = archiver('zip', { zlib: { level: 9 } }); | ||||||
|  | 		const stream  = fs.createWriteStream(out); | ||||||
|  |  | ||||||
|  | 		return new Promise((resolve, reject) => { | ||||||
|  | 			source | ||||||
|  | 				.map((fl) => { | ||||||
|  | 					let fileName = path.basename(fl); | ||||||
|  | 					logger.debug(fl, 'added to certificate zip'); | ||||||
|  | 					archive.file(fl, { name: fileName }); | ||||||
|  | 				}); | ||||||
|  | 			archive | ||||||
|  | 				.on('error', (err) => reject(err)) | ||||||
|  | 				.pipe(stream); | ||||||
|  |  | ||||||
|  | 			stream.on('close', () => resolve()); | ||||||
|  | 			archive.finalize(); | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -317,7 +415,7 @@ const internalCertificate = { | |||||||
| 				return internalCertificate.get(access, {id: data.id}); | 				return internalCertificate.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -365,8 +463,7 @@ const internalCertificate = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner]') | ||||||
| 					.allowEager('[owner]') |  | ||||||
| 					.orderBy('nice_name', 'ASC'); | 					.orderBy('nice_name', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -376,15 +473,15 @@ const internalCertificate = { | |||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| 				if (typeof search_query === 'string') { | 				if (typeof search_query === 'string') { | ||||||
| 					query.where(function () { | 					query.where(function () { | ||||||
| 						this.where('name', 'like', '%' + search_query + '%'); | 						this.where('nice_name', 'like', '%' + search_query + '%'); | ||||||
| 					}); | 					}); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -416,11 +513,9 @@ const internalCertificate = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	writeCustomCert: (certificate) => { | 	writeCustomCert: (certificate) => { | ||||||
| 		if (debug_mode) { |  | ||||||
| 		logger.info('Writing Custom Certificate:', certificate); | 		logger.info('Writing Custom Certificate:', certificate); | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		let dir = '/data/custom_ssl/npm-' + certificate.id; | 		const dir = '/data/custom_ssl/npm-' + certificate.id; | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			if (certificate.provider === 'letsencrypt') { | 			if (certificate.provider === 'letsencrypt') { | ||||||
| @@ -428,9 +523,9 @@ const internalCertificate = { | |||||||
| 				return; | 				return; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			let cert_data = certificate.meta.certificate; | 			let certData = certificate.meta.certificate; | ||||||
| 			if (typeof certificate.meta.intermediate_certificate !== 'undefined') { | 			if (typeof certificate.meta.intermediate_certificate !== 'undefined') { | ||||||
| 				cert_data = cert_data + '\n' + certificate.meta.intermediate_certificate; | 				certData = certData + '\n' + certificate.meta.intermediate_certificate; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			try { | 			try { | ||||||
| @@ -442,7 +537,7 @@ const internalCertificate = { | |||||||
| 				return; | 				return; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			fs.writeFile(dir + '/fullchain.pem', cert_data, function (err) { | 			fs.writeFile(dir + '/fullchain.pem', certData, function (err) { | ||||||
| 				if (err) { | 				if (err) { | ||||||
| 					reject(err); | 					reject(err); | ||||||
| 				} else { | 				} else { | ||||||
| @@ -475,6 +570,7 @@ const internalCertificate = { | |||||||
| 		return internalCertificate.create(access, { | 		return internalCertificate.create(access, { | ||||||
| 			provider:     'letsencrypt', | 			provider:     'letsencrypt', | ||||||
| 			domain_names: data.domain_names, | 			domain_names: data.domain_names, | ||||||
|  | 			ssl_key_type: data.ssl_key_type, | ||||||
| 			meta:         data.meta | 			meta:         data.meta | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
| @@ -492,7 +588,7 @@ const internalCertificate = { | |||||||
| 			// Put file contents into an object | 			// Put file contents into an object | ||||||
| 			let files = {}; | 			let files = {}; | ||||||
| 			_.map(data.files, (file, name) => { | 			_.map(data.files, (file, name) => { | ||||||
| 				if (internalCertificate.allowed_ssl_files.indexOf(name) !== -1) { | 				if (internalCertificate.allowedSslFiles.indexOf(name) !== -1) { | ||||||
| 					files[name] = file.data.toString(); | 					files[name] = file.data.toString(); | ||||||
| 				} | 				} | ||||||
| 			}); | 			}); | ||||||
| @@ -550,7 +646,7 @@ const internalCertificate = { | |||||||
| 						} | 						} | ||||||
|  |  | ||||||
| 						_.map(data.files, (file, name) => { | 						_.map(data.files, (file, name) => { | ||||||
| 							if (internalCertificate.allowed_ssl_files.indexOf(name) !== -1) { | 							if (internalCertificate.allowedSslFiles.indexOf(name) !== -1) { | ||||||
| 								row.meta[name] = file.data.toString(); | 								row.meta[name] = file.data.toString(); | ||||||
| 							} | 							} | ||||||
| 						}); | 						}); | ||||||
| @@ -558,18 +654,17 @@ const internalCertificate = { | |||||||
| 						// TODO: This uses a mysql only raw function that won't translate to postgres | 						// TODO: This uses a mysql only raw function that won't translate to postgres | ||||||
| 						return internalCertificate.update(access, { | 						return internalCertificate.update(access, { | ||||||
| 							id:           data.id, | 							id:           data.id, | ||||||
| 							expires_on:   certificateModel.raw('FROM_UNIXTIME(' + validations.certificate.dates.to + ')'), | 							expires_on:   moment(validations.certificate.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss'), | ||||||
| 							domain_names: [validations.certificate.cn], | 							domain_names: [validations.certificate.cn], | ||||||
| 							meta:         _.clone(row.meta) // Prevent the update method from changing this value that we'll use later | 							meta:         _.clone(row.meta) // Prevent the update method from changing this value that we'll use later | ||||||
| 						}) | 						}) | ||||||
| 							.then((certificate) => { | 							.then((certificate) => { | ||||||
| 								console.log('ROWMETA:', row.meta); |  | ||||||
| 								certificate.meta = row.meta; | 								certificate.meta = row.meta; | ||||||
| 								return internalCertificate.writeCustomCert(certificate); | 								return internalCertificate.writeCustomCert(certificate); | ||||||
| 							}); | 							}); | ||||||
| 					}) | 					}) | ||||||
| 					.then(() => { | 					.then(() => { | ||||||
| 						return _.pick(row.meta, internalCertificate.allowed_ssl_files); | 						return _.pick(row.meta, internalCertificate.allowedSslFiles); | ||||||
| 					}); | 					}); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
| @@ -583,17 +678,25 @@ const internalCertificate = { | |||||||
| 	checkPrivateKey: (private_key) => { | 	checkPrivateKey: (private_key) => { | ||||||
| 		return tempWrite(private_key, '/tmp') | 		return tempWrite(private_key, '/tmp') | ||||||
| 			.then((filepath) => { | 			.then((filepath) => { | ||||||
| 				return utils.exec('openssl rsa -in ' + filepath + ' -check -noout') | 				return new Promise((resolve, reject) => { | ||||||
|  | 					const failTimeout = setTimeout(() => { | ||||||
|  | 						reject(new error.ValidationError('Result Validation Error: Validation timed out. This could be due to the key being passphrase-protected.')); | ||||||
|  | 					}, 10000); | ||||||
|  | 					utils | ||||||
|  | 						.exec('openssl pkey -in ' + filepath + ' -check -noout 2>&1 ') | ||||||
| 						.then((result) => { | 						.then((result) => { | ||||||
| 						if (!result.toLowerCase().includes('key ok')) { | 							clearTimeout(failTimeout); | ||||||
| 							throw new error.ValidationError(result); | 							if (!result.toLowerCase().includes('key is valid')) { | ||||||
|  | 								reject(new error.ValidationError('Result Validation Error: ' + result)); | ||||||
| 							} | 							} | ||||||
|  |  | ||||||
| 							fs.unlinkSync(filepath); | 							fs.unlinkSync(filepath); | ||||||
| 						return true; | 							resolve(true); | ||||||
| 					}).catch((err) => { | 						}) | ||||||
|  | 						.catch((err) => { | ||||||
|  | 							clearTimeout(failTimeout); | ||||||
| 							fs.unlinkSync(filepath); | 							fs.unlinkSync(filepath); | ||||||
| 						throw new error.ValidationError('Certificate Key is not valid (' + err.message + ')', err); | 							reject(new error.ValidationError('Certificate Key is not valid (' + err.message + ')', err)); | ||||||
|  | 						}); | ||||||
| 				}); | 				}); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
| @@ -609,9 +712,9 @@ const internalCertificate = { | |||||||
| 		return tempWrite(certificate, '/tmp') | 		return tempWrite(certificate, '/tmp') | ||||||
| 			.then((filepath) => { | 			.then((filepath) => { | ||||||
| 				return internalCertificate.getCertificateInfoFromFile(filepath, throw_expired) | 				return internalCertificate.getCertificateInfoFromFile(filepath, throw_expired) | ||||||
| 					.then((cert_data) => { | 					.then((certData) => { | ||||||
| 						fs.unlinkSync(filepath); | 						fs.unlinkSync(filepath); | ||||||
| 						return cert_data; | 						return certData; | ||||||
| 					}).catch((err) => { | 					}).catch((err) => { | ||||||
| 						fs.unlinkSync(filepath); | 						fs.unlinkSync(filepath); | ||||||
| 						throw err; | 						throw err; | ||||||
| @@ -627,33 +730,33 @@ const internalCertificate = { | |||||||
| 	 * @param {Boolean} [throw_expired]  Throw when the certificate is out of date | 	 * @param {Boolean} [throw_expired]  Throw when the certificate is out of date | ||||||
| 	 */ | 	 */ | ||||||
| 	getCertificateInfoFromFile: (certificate_file, throw_expired) => { | 	getCertificateInfoFromFile: (certificate_file, throw_expired) => { | ||||||
| 		let cert_data = {}; | 		let certData = {}; | ||||||
|  |  | ||||||
| 		return utils.exec('openssl x509 -in ' + certificate_file + ' -subject -noout') | 		return utils.exec('openssl x509 -in ' + certificate_file + ' -subject -noout') | ||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
|  | 				// Examples: | ||||||
|  | 				// subject=CN = *.jc21.com | ||||||
| 				// subject=CN = something.example.com | 				// subject=CN = something.example.com | ||||||
| 				let regex = /(?:subject=)?[^=]+=\s+(\S+)/gim; | 				const regex = /(?:subject=)?[^=]+=\s+(\S+)/gim; | ||||||
| 				let match = regex.exec(result); | 				const match = regex.exec(result); | ||||||
|  | 				if (match && typeof match[1] !== 'undefined') { | ||||||
| 				if (typeof match[1] === 'undefined') { | 					certData['cn'] = match[1]; | ||||||
| 					throw new error.ValidationError('Could not determine subject from certificate: ' + result); |  | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				cert_data['cn'] = match[1]; |  | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return utils.exec('openssl x509 -in ' + certificate_file + ' -issuer -noout'); | 				return utils.exec('openssl x509 -in ' + certificate_file + ' -issuer -noout'); | ||||||
| 			}) | 			}) | ||||||
|  |  | ||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
|  | 				// Examples: | ||||||
| 				// issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 | 				// issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 | ||||||
| 				let regex = /^(?:issuer=)?(.*)$/gim; | 				// issuer=C = US, O = Let's Encrypt, CN = E5 | ||||||
| 				let match = regex.exec(result); | 				// issuer=O = NginxProxyManager, CN = NginxProxyManager Intermediate CA","O = NginxProxyManager, CN = NginxProxyManager Intermediate CA | ||||||
|  | 				const regex = /^(?:issuer=)?(.*)$/gim; | ||||||
| 				if (typeof match[1] === 'undefined') { | 				const match = regex.exec(result); | ||||||
| 					throw new error.ValidationError('Could not determine issuer from certificate: ' + result); | 				if (match && typeof match[1] !== 'undefined') { | ||||||
|  | 					certData['issuer'] = match[1]; | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				cert_data['issuer'] = match[1]; |  | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return utils.exec('openssl x509 -in ' + certificate_file + ' -dates -noout'); | 				return utils.exec('openssl x509 -in ' + certificate_file + ' -dates -noout'); | ||||||
| @@ -661,39 +764,39 @@ const internalCertificate = { | |||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
| 				// notBefore=Jul 14 04:04:29 2018 GMT | 				// notBefore=Jul 14 04:04:29 2018 GMT | ||||||
| 				// notAfter=Oct 12 04:04:29 2018 GMT | 				// notAfter=Oct 12 04:04:29 2018 GMT | ||||||
| 				let valid_from = null; | 				let validFrom = null; | ||||||
| 				let valid_to   = null; | 				let validTo   = null; | ||||||
|  |  | ||||||
| 				let lines = result.split('\n'); | 				const lines = result.split('\n'); | ||||||
| 				lines.map(function (str) { | 				lines.map(function (str) { | ||||||
| 					let regex = /^(\S+)=(.*)$/gim; | 					const regex = /^(\S+)=(.*)$/gim; | ||||||
| 					let match = regex.exec(str.trim()); | 					const match = regex.exec(str.trim()); | ||||||
|  |  | ||||||
| 					if (match && typeof match[2] !== 'undefined') { | 					if (match && typeof match[2] !== 'undefined') { | ||||||
| 						let date = parseInt(moment(match[2], 'MMM DD HH:mm:ss YYYY z').format('X'), 10); | 						const date = parseInt(moment(match[2], 'MMM DD HH:mm:ss YYYY z').format('X'), 10); | ||||||
|  |  | ||||||
| 						if (match[1].toLowerCase() === 'notbefore') { | 						if (match[1].toLowerCase() === 'notbefore') { | ||||||
| 							valid_from = date; | 							validFrom = date; | ||||||
| 						} else if (match[1].toLowerCase() === 'notafter') { | 						} else if (match[1].toLowerCase() === 'notafter') { | ||||||
| 							valid_to = date; | 							validTo = date; | ||||||
| 						} | 						} | ||||||
| 					} | 					} | ||||||
| 				}); | 				}); | ||||||
|  |  | ||||||
| 				if (!valid_from || !valid_to) { | 				if (!validFrom || !validTo) { | ||||||
| 					throw new error.ValidationError('Could not determine dates from certificate: ' + result); | 					throw new error.ValidationError('Could not determine dates from certificate: ' + result); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (throw_expired && valid_to < parseInt(moment().format('X'), 10)) { | 				if (throw_expired && validTo < parseInt(moment().format('X'), 10)) { | ||||||
| 					throw new error.ValidationError('Certificate has expired'); | 					throw new error.ValidationError('Certificate has expired'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				cert_data['dates'] = { | 				certData['dates'] = { | ||||||
| 					from: valid_from, | 					from: validFrom, | ||||||
| 					to:   valid_to | 					to:   validTo | ||||||
| 				}; | 				}; | ||||||
|  |  | ||||||
| 				return cert_data; | 				return certData; | ||||||
| 			}).catch((err) => { | 			}).catch((err) => { | ||||||
| 				throw new error.ValidationError('Certificate is not valid (' + err.message + ')', err); | 				throw new error.ValidationError('Certificate is not valid (' + err.message + ')', err); | ||||||
| 			}); | 			}); | ||||||
| @@ -707,7 +810,7 @@ const internalCertificate = { | |||||||
| 	 * @returns {Object} | 	 * @returns {Object} | ||||||
| 	 */ | 	 */ | ||||||
| 	cleanMeta: function (meta, remove) { | 	cleanMeta: function (meta, remove) { | ||||||
| 		internalCertificate.allowed_ssl_files.map((key) => { | 		internalCertificate.allowedSslFiles.map((key) => { | ||||||
| 			if (typeof meta[key] !== 'undefined' && meta[key]) { | 			if (typeof meta[key] !== 'undefined' && meta[key]) { | ||||||
| 				if (remove) { | 				if (remove) { | ||||||
| 					delete meta[key]; | 					delete meta[key]; | ||||||
| @@ -721,25 +824,28 @@ const internalCertificate = { | |||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
|  | 	 * Request a certificate using the http challenge | ||||||
| 	 * @param   {Object}  certificate   the certificate row | 	 * @param   {Object}  certificate   the certificate row | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	requestLetsEncryptSsl: (certificate) => { | 	requestLetsEncryptSsl: (certificate) => { | ||||||
| 		logger.info('Requesting Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | 		logger.info('Requesting Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | ||||||
|  |  | ||||||
| 		let cmd = certbot_command + ' certonly --non-interactive ' + | 		const cmd = `${certbotCommand} certonly ` + | ||||||
| 			'--config "' + le_config + '" ' + | 			`--config '${letsencryptConfig}' ` + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			`--key-type '${certificate.ssl_key_type}' ` + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
|  | 			`--cert-name "npm-${certificate.id}" ` + | ||||||
| 			'--agree-tos ' + | 			'--agree-tos ' + | ||||||
| 			'--email "' + certificate.meta.letsencrypt_email + '" ' + | 			'--authenticator webroot ' + | ||||||
|  | 			`--email '${certificate.meta.letsencrypt_email}' ` + | ||||||
| 			'--preferred-challenges "dns,http" ' + | 			'--preferred-challenges "dns,http" ' + | ||||||
| 			'--webroot ' + | 			`--domains "${certificate.domain_names.join(',')}" ` + | ||||||
| 			'--domains "' + certificate.domain_names.join(',') + '" ' + | 			(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') + | ||||||
| 			(le_staging ? '--staging' : ''); | 			(letsencryptStaging && letsencryptServer === null ? '--staging ' : ''); | ||||||
|  |  | ||||||
| 		if (debug_mode) { |  | ||||||
| 		logger.info('Command:', cmd); | 		logger.info('Command:', cmd); | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return utils.exec(cmd) | 		return utils.exec(cmd) | ||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
| @@ -748,6 +854,71 @@ const internalCertificate = { | |||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param   {Object}         certificate          the certificate row | ||||||
|  | 	 * @param   {String}         dns_provider         the dns provider name (key used in `certbot-dns-plugins.json`) | ||||||
|  | 	 * @param   {String | null}  credentials          the content of this providers credentials file | ||||||
|  | 	 * @param   {String}         propagation_seconds | ||||||
|  | 	 * @returns {Promise} | ||||||
|  | 	 */ | ||||||
|  | 	requestLetsEncryptSslWithDnsChallenge: async (certificate) => { | ||||||
|  | 		await certbot.installPlugin(certificate.meta.dns_provider); | ||||||
|  | 		const dnsPlugin = dnsPlugins[certificate.meta.dns_provider]; | ||||||
|  | 		logger.info(`Requesting Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); | ||||||
|  |  | ||||||
|  | 		const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | ||||||
|  | 		fs.mkdirSync('/etc/letsencrypt/credentials', { recursive: true }); | ||||||
|  | 		fs.writeFileSync(credentialsLocation, certificate.meta.dns_provider_credentials, {mode: 0o600}); | ||||||
|  |  | ||||||
|  | 		// Whether the plugin has a --<name>-credentials argument | ||||||
|  | 		const hasConfigArg = certificate.meta.dns_provider !== 'route53'; | ||||||
|  |  | ||||||
|  | 		let mainCmd = certbotCommand + ' certonly ' + | ||||||
|  | 			`--config '${letsencryptConfig}' ` + | ||||||
|  | 			`--key-type '${certificate.ssl_key_type}' ` + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
|  | 			`--cert-name 'npm-${certificate.id}' ` + | ||||||
|  | 			'--agree-tos ' + | ||||||
|  | 			`--email '${certificate.meta.letsencrypt_email}' ` + | ||||||
|  | 			`--domains '${certificate.domain_names.join(',')}' ` + | ||||||
|  | 			`--authenticator '${dnsPlugin.full_plugin_name}' ` + | ||||||
|  | 			( | ||||||
|  | 				hasConfigArg | ||||||
|  | 					? `--${dnsPlugin.full_plugin_name}-credentials '${credentialsLocation}' ` | ||||||
|  | 					: '' | ||||||
|  | 			) + | ||||||
|  | 			( | ||||||
|  | 				certificate.meta.propagation_seconds !== undefined | ||||||
|  | 					? `--${dnsPlugin.full_plugin_name}-propagation-seconds '${certificate.meta.propagation_seconds}' ` | ||||||
|  | 					: '' | ||||||
|  | 			) + | ||||||
|  | 			(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') + | ||||||
|  | 			(letsencryptStaging && letsencryptServer === null ? '--staging ' : ''); | ||||||
|  |  | ||||||
|  | 		// Prepend the path to the credentials file as an environment variable | ||||||
|  | 		if (certificate.meta.dns_provider === 'route53') { | ||||||
|  | 			mainCmd = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd; | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if (certificate.meta.dns_provider === 'duckdns') { | ||||||
|  | 			mainCmd = mainCmd + ' --dns-duckdns-no-txt-restore'; | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logger.info('Command:', mainCmd); | ||||||
|  |  | ||||||
|  | 		try { | ||||||
|  | 			const result = await utils.exec(mainCmd); | ||||||
|  | 			logger.info(result); | ||||||
|  | 			return result; | ||||||
|  | 		} catch (err) { | ||||||
|  | 			// Don't fail if file does not exist, so no need for action in the callback | ||||||
|  | 			fs.unlink(credentialsLocation, () => {}); | ||||||
|  | 			throw err; | ||||||
|  | 		} | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {Access}  access | 	 * @param   {Access}  access | ||||||
| 	 * @param   {Object}  data | 	 * @param   {Object}  data | ||||||
| @@ -761,7 +932,9 @@ const internalCertificate = { | |||||||
| 			}) | 			}) | ||||||
| 			.then((certificate) => { | 			.then((certificate) => { | ||||||
| 				if (certificate.provider === 'letsencrypt') { | 				if (certificate.provider === 'letsencrypt') { | ||||||
| 					return internalCertificate.renewLetsEncryptSsl(certificate) | 					const renewMethod = certificate.meta.dns_challenge ? internalCertificate.renewLetsEncryptSslWithDnsChallenge : internalCertificate.renewLetsEncryptSsl; | ||||||
|  |  | ||||||
|  | 					return renewMethod(certificate) | ||||||
| 						.then(() => { | 						.then(() => { | ||||||
| 							return internalCertificate.getCertificateInfoFromFile('/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem'); | 							return internalCertificate.getCertificateInfoFromFile('/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem'); | ||||||
| 						}) | 						}) | ||||||
| @@ -769,7 +942,7 @@ const internalCertificate = { | |||||||
| 							return certificateModel | 							return certificateModel | ||||||
| 								.query() | 								.query() | ||||||
| 								.patchAndFetchById(certificate.id, { | 								.patchAndFetchById(certificate.id, { | ||||||
| 									expires_on: certificateModel.raw('FROM_UNIXTIME(' + cert_info.dates.to + ')') | 									expires_on: moment(cert_info.dates.to, 'X').format('YYYY-MM-DD HH:mm:ss') | ||||||
| 								}); | 								}); | ||||||
| 						}) | 						}) | ||||||
| 						.then((updated_certificate) => { | 						.then((updated_certificate) => { | ||||||
| @@ -797,16 +970,19 @@ const internalCertificate = { | |||||||
| 	renewLetsEncryptSsl: (certificate) => { | 	renewLetsEncryptSsl: (certificate) => { | ||||||
| 		logger.info('Renewing Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | 		logger.info('Renewing Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | ||||||
|  |  | ||||||
| 		let cmd = certbot_command + ' renew --non-interactive ' + | 		const cmd = certbotCommand + ' renew --force-renewal ' + | ||||||
| 			'--config "' + le_config + '" ' + | 			`--config '${letsencryptConfig}' ` + | ||||||
| 			'--cert-name "npm-' + certificate.id + '" ' + | 			`--key-type '${certificate.ssl_key_type}' ` + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
|  | 			`--cert-name 'npm-${certificate.id}' ` + | ||||||
| 			'--preferred-challenges "dns,http" ' + | 			'--preferred-challenges "dns,http" ' + | ||||||
|  | 			'--no-random-sleep-on-renew ' + | ||||||
| 			'--disable-hook-validation ' + | 			'--disable-hook-validation ' + | ||||||
| 			(le_staging ? '--staging' : ''); | 			(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') + | ||||||
|  | 			(letsencryptStaging && letsencryptServer === null ? '--staging ' : ''); | ||||||
|  |  | ||||||
| 		if (debug_mode) { |  | ||||||
| 		logger.info('Command:', cmd); | 		logger.info('Command:', cmd); | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return utils.exec(cmd) | 		return utils.exec(cmd) | ||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
| @@ -815,6 +991,45 @@ const internalCertificate = { | |||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param   {Object}  certificate   the certificate row | ||||||
|  | 	 * @returns {Promise} | ||||||
|  | 	 */ | ||||||
|  | 	renewLetsEncryptSslWithDnsChallenge: (certificate) => { | ||||||
|  | 		const dnsPlugin = dnsPlugins[certificate.meta.dns_provider]; | ||||||
|  |  | ||||||
|  | 		if (!dnsPlugin) { | ||||||
|  | 			throw Error(`Unknown DNS provider '${certificate.meta.dns_provider}'`); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logger.info(`Renewing Let'sEncrypt certificates via ${dnsPlugin.name} for Cert #${certificate.id}: ${certificate.domain_names.join(', ')}`); | ||||||
|  |  | ||||||
|  | 		let mainCmd = certbotCommand + ' renew --force-renewal ' + | ||||||
|  | 			`--config "${letsencryptConfig}" ` + | ||||||
|  | 			`--key-type '${certificate.ssl_key_type}' ` + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
|  | 			`--cert-name 'npm-${certificate.id}' ` + | ||||||
|  | 			'--disable-hook-validation ' + | ||||||
|  | 			'--no-random-sleep-on-renew ' + | ||||||
|  | 			(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') + | ||||||
|  | 			(letsencryptStaging && letsencryptServer === null ? '--staging ' : ''); | ||||||
|  |  | ||||||
|  | 		// Prepend the path to the credentials file as an environment variable | ||||||
|  | 		if (certificate.meta.dns_provider === 'route53') { | ||||||
|  | 			const credentialsLocation = '/etc/letsencrypt/credentials/credentials-' + certificate.id; | ||||||
|  | 			mainCmd                   = 'AWS_CONFIG_FILE=\'' + credentialsLocation + '\' ' + mainCmd; | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logger.info('Command:', mainCmd); | ||||||
|  |  | ||||||
|  | 		return utils.exec(mainCmd) | ||||||
|  | 			.then(async (result) => { | ||||||
|  | 				logger.info(result); | ||||||
|  | 				return result; | ||||||
|  | 			}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {Object}  certificate    the certificate row | 	 * @param   {Object}  certificate    the certificate row | ||||||
| 	 * @param   {Boolean} [throw_errors] | 	 * @param   {Boolean} [throw_errors] | ||||||
| @@ -823,28 +1038,29 @@ const internalCertificate = { | |||||||
| 	revokeLetsEncryptSsl: (certificate, throw_errors) => { | 	revokeLetsEncryptSsl: (certificate, throw_errors) => { | ||||||
| 		logger.info('Revoking Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | 		logger.info('Revoking Let\'sEncrypt certificates for Cert #' + certificate.id + ': ' + certificate.domain_names.join(', ')); | ||||||
| 		 | 		 | ||||||
| 		let cmd = certbot_command + ' revoke --non-interactive ' + | 		const mainCmd = certbotCommand + ' revoke ' + | ||||||
| 			'--config "' + le_config + '" ' + | 			`--config '${letsencryptConfig}' ` + | ||||||
| 			'--cert-path "/etc/letsencrypt/live/npm-' + certificate.id + '/fullchain.pem" ' + | 			`--key-type '${certificate.ssl_key_type}' ` + | ||||||
|  | 			'--work-dir "/tmp/letsencrypt-lib" ' + | ||||||
|  | 			'--logs-dir "/tmp/letsencrypt-log" ' + | ||||||
|  | 			`--cert-path '/etc/letsencrypt/live/npm-${certificate.id}/fullchain.pem' ` + | ||||||
| 			'--delete-after-revoke ' + | 			'--delete-after-revoke ' + | ||||||
| 			(le_staging ? '--staging' : ''); | 			(letsencryptServer !== null ? `--server '${letsencryptServer}' ` : '') + | ||||||
|  | 			(letsencryptStaging && letsencryptServer === null ? '--staging ' : ''); | ||||||
|  |  | ||||||
| 		if (debug_mode) { | 		// Don't fail command if file does not exist | ||||||
| 			logger.info('Command:', cmd); | 		const delete_credentialsCmd = `rm -f '/etc/letsencrypt/credentials/credentials-${certificate.id}' || true`; | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return utils.exec(cmd) | 		logger.info('Command:', mainCmd + '; ' + delete_credentialsCmd); | ||||||
| 			.then((result) => { |  | ||||||
| 				if (debug_mode) { | 		return utils.exec(mainCmd) | ||||||
| 					logger.info('Command:', cmd); | 			.then(async (result) => { | ||||||
| 				} | 				await utils.exec(delete_credentialsCmd); | ||||||
| 				logger.info(result); | 				logger.info(result); | ||||||
| 				return result; | 				return result; | ||||||
| 			}) | 			}) | ||||||
| 			.catch((err) => { | 			.catch((err) => { | ||||||
| 				if (debug_mode) { |  | ||||||
| 				logger.error(err.message); | 				logger.error(err.message); | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (throw_errors) { | 				if (throw_errors) { | ||||||
| 					throw err; | 					throw err; | ||||||
| @@ -857,9 +1073,9 @@ const internalCertificate = { | |||||||
| 	 * @returns {Boolean} | 	 * @returns {Boolean} | ||||||
| 	 */ | 	 */ | ||||||
| 	hasLetsEncryptSslCerts: (certificate) => { | 	hasLetsEncryptSslCerts: (certificate) => { | ||||||
| 		let le_path = '/etc/letsencrypt/live/npm-' + certificate.id; | 		const letsencryptPath = '/etc/letsencrypt/live/npm-' + certificate.id; | ||||||
|  |  | ||||||
| 		return fs.existsSync(le_path + '/fullchain.pem') && fs.existsSync(le_path + '/privkey.pem'); | 		return fs.existsSync(letsencryptPath + '/fullchain.pem') && fs.existsSync(letsencryptPath + '/privkey.pem'); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| @@ -920,6 +1136,108 @@ const internalCertificate = { | |||||||
| 		} else { | 		} else { | ||||||
| 			return Promise.resolve(); | 			return Promise.resolve(); | ||||||
| 		} | 		} | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	testHttpsChallenge: async (access, domains) => { | ||||||
|  | 		await access.can('certificates:list'); | ||||||
|  |  | ||||||
|  | 		if (!isArray(domains)) { | ||||||
|  | 			throw new error.InternalValidationError('Domains must be an array of strings'); | ||||||
|  | 		} | ||||||
|  | 		if (domains.length === 0) { | ||||||
|  | 			throw new error.InternalValidationError('No domains provided'); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		// Create a test challenge file | ||||||
|  | 		const testChallengeDir  = '/data/letsencrypt-acme-challenge/.well-known/acme-challenge'; | ||||||
|  | 		const testChallengeFile = testChallengeDir + '/test-challenge'; | ||||||
|  | 		fs.mkdirSync(testChallengeDir, {recursive: true}); | ||||||
|  | 		fs.writeFileSync(testChallengeFile, 'Success', {encoding: 'utf8'}); | ||||||
|  |  | ||||||
|  | 		async function performTestForDomain (domain) { | ||||||
|  | 			logger.info('Testing http challenge for ' + domain); | ||||||
|  | 			const url      = `http://${domain}/.well-known/acme-challenge/test-challenge`; | ||||||
|  | 			const formBody = `method=G&url=${encodeURI(url)}&bodytype=T&requestbody=&headername=User-Agent&headervalue=None&locationid=1&ch=false&cc=false`; | ||||||
|  | 			const options  = { | ||||||
|  | 				method:  'POST', | ||||||
|  | 				headers: { | ||||||
|  | 					'User-Agent':     'Mozilla/5.0', | ||||||
|  | 					'Content-Type':   'application/x-www-form-urlencoded', | ||||||
|  | 					'Content-Length': Buffer.byteLength(formBody) | ||||||
|  | 				} | ||||||
|  | 			}; | ||||||
|  |  | ||||||
|  | 			const result = await new Promise((resolve) => { | ||||||
|  |  | ||||||
|  | 				const req = https.request('https://www.site24x7.com/tools/restapi-tester', options, function (res) { | ||||||
|  | 					let responseBody = ''; | ||||||
|  |  | ||||||
|  | 					res.on('data', (chunk) => responseBody = responseBody + chunk); | ||||||
|  | 					res.on('end', function () { | ||||||
|  | 						try { | ||||||
|  | 							const parsedBody = JSON.parse(responseBody + ''); | ||||||
|  | 							if (res.statusCode !== 200) { | ||||||
|  | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned: ${parsedBody.message}`); | ||||||
|  | 								resolve(undefined); | ||||||
|  | 							} else { | ||||||
|  | 								resolve(parsedBody); | ||||||
|  | 							} | ||||||
|  | 						} catch (err) { | ||||||
|  | 							if (res.statusCode !== 200) { | ||||||
|  | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because HTTP status code ${res.statusCode} was returned`); | ||||||
|  | 							} else { | ||||||
|  | 								logger.warn(`Failed to test HTTP challenge for domain ${domain} because response failed to be parsed: ${err.message}`); | ||||||
|  | 							} | ||||||
|  | 							resolve(undefined); | ||||||
|  | 						} | ||||||
|  | 					}); | ||||||
|  | 				}); | ||||||
|  |  | ||||||
|  | 				// Make sure to write the request body. | ||||||
|  | 				req.write(formBody); | ||||||
|  | 				req.end(); | ||||||
|  | 				req.on('error', function (e) { logger.warn(`Failed to test HTTP challenge for domain ${domain}`, e); | ||||||
|  | 					resolve(undefined); }); | ||||||
|  | 			}); | ||||||
|  |  | ||||||
|  | 			if (!result) { | ||||||
|  | 				// Some error occurred while trying to get the data | ||||||
|  | 				return 'failed'; | ||||||
|  | 			} else if (result.error) { | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} because error was returned: ${result.error.msg}`); | ||||||
|  | 				return `other:${result.error.msg}`; | ||||||
|  | 			} else if (`${result.responsecode}` === '200' && result.htmlresponse === 'Success') { | ||||||
|  | 				// Server exists and has responded with the correct data | ||||||
|  | 				return 'ok'; | ||||||
|  | 			} else if (`${result.responsecode}` === '200') { | ||||||
|  | 				// Server exists but has responded with wrong data | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} because of invalid returned data:`, result.htmlresponse); | ||||||
|  | 				return 'wrong-data'; | ||||||
|  | 			} else if (`${result.responsecode}` === '404') { | ||||||
|  | 				// Server exists but responded with a 404 | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} because code 404 was returned`); | ||||||
|  | 				return '404'; | ||||||
|  | 			} else if (`${result.responsecode}` === '0' || (typeof result.reason === 'string' && result.reason.toLowerCase() === 'host unavailable')) { | ||||||
|  | 				// Server does not exist at domain | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} the host was not found`); | ||||||
|  | 				return 'no-host'; | ||||||
|  | 			} else { | ||||||
|  | 				// Other errors | ||||||
|  | 				logger.info(`HTTP challenge test failed for domain ${domain} because code ${result.responsecode} was returned`); | ||||||
|  | 				return `other:${result.responsecode}`; | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		const results = {}; | ||||||
|  |  | ||||||
|  | 		for (const domain of domains){ | ||||||
|  | 			results[domain] = await performTestForDomain(domain); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		// Remove the test challenge file | ||||||
|  | 		fs.unlinkSync(testChallengeFile); | ||||||
|  |  | ||||||
|  | 		return results; | ||||||
| 	} | 	} | ||||||
| }; | }; | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const deadHostModel       = require('../models/dead_host'); | const deadHostModel       = require('../models/dead_host'); | ||||||
| const internalHost        = require('./host'); | const internalHost        = require('./host'); | ||||||
| const internalNginx       = require('./nginx'); | const internalNginx       = require('./nginx'); | ||||||
| @@ -47,10 +48,16 @@ const internalDeadHost = { | |||||||
| 				data.owner_user_id = access.token.getUserId(1); | 				data.owner_user_id = access.token.getUserId(1); | ||||||
| 				data               = internalHost.cleanSslHstsData(data); | 				data               = internalHost.cleanSslHstsData(data); | ||||||
|  |  | ||||||
|  | 				// Fix for db field not having a default value | ||||||
|  | 				// for this optional field. | ||||||
|  | 				if (typeof data.advanced_config === 'undefined') { | ||||||
|  | 					data.advanced_config = ''; | ||||||
|  | 				} | ||||||
|  |  | ||||||
| 				return deadHostModel | 				return deadHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -218,31 +225,28 @@ const internalDeadHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,certificate]') | 					.allowGraph('[owner,certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -259,7 +263,7 @@ const internalDeadHost = { | |||||||
| 				return internalDeadHost.get(access, {id: data.id}); | 				return internalDeadHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -307,7 +311,7 @@ const internalDeadHost = { | |||||||
| 				}); | 				}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (row.enabled) { | 				} else if (row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already enabled'); | 					throw new error.ValidationError('Host is already enabled'); | ||||||
| @@ -353,7 +357,7 @@ const internalDeadHost = { | |||||||
| 				return internalDeadHost.get(access, {id: data.id}); | 				return internalDeadHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (!row.enabled) { | 				} else if (!row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already disabled'); | 					throw new error.ValidationError('Host is already disabled'); | ||||||
| @@ -404,8 +408,7 @@ const internalDeadHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,certificate]') | ||||||
| 					.allowEager('[owner,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -420,10 +423,10 @@ const internalDeadHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -106,7 +106,7 @@ const internalHost = { | |||||||
| 					response_object.total_count      += response_object.redirection_hosts.length; | 					response_object.total_count      += response_object.redirection_hosts.length; | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (promises_results[1]) { | 				if (promises_results[2]) { | ||||||
| 					// Dead Hosts | 					// Dead Hosts | ||||||
| 					response_object.dead_hosts   = internalHost._getHostsWithDomains(promises_results[2], domain_names); | 					response_object.dead_hosts   = internalHost._getHostsWithDomains(promises_results[2], domain_names); | ||||||
| 					response_object.total_count += response_object.dead_hosts.length; | 					response_object.total_count += response_object.dead_hosts.length; | ||||||
| @@ -158,7 +158,7 @@ const internalHost = { | |||||||
| 					} | 					} | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (promises_results[1]) { | 				if (promises_results[2]) { | ||||||
| 					// Dead Hosts | 					// Dead Hosts | ||||||
| 					if (internalHost._checkHostnameRecordsTaken(hostname, promises_results[2], ignore_type === 'dead' && ignore_id ? ignore_id : 0)) { | 					if (internalHost._checkHostnameRecordsTaken(hostname, promises_results[2], ignore_type === 'dead' && ignore_id ? ignore_id : 0)) { | ||||||
| 						is_taken = true; | 						is_taken = true; | ||||||
|   | |||||||
| @@ -2,13 +2,16 @@ const https         = require('https'); | |||||||
| const fs            = require('fs'); | const fs            = require('fs'); | ||||||
| const logger        = require('../logger').ip_ranges; | const logger        = require('../logger').ip_ranges; | ||||||
| const error         = require('../lib/error'); | const error         = require('../lib/error'); | ||||||
|  | const utils         = require('../lib/utils'); | ||||||
| const internalNginx = require('./nginx'); | const internalNginx = require('./nginx'); | ||||||
| const { Liquid }    = require('liquidjs'); |  | ||||||
|  |  | ||||||
| const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json'; | const CLOUDFRONT_URL   = 'https://ip-ranges.amazonaws.com/ip-ranges.json'; | ||||||
| const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4'; | const CLOUDFARE_V4_URL = 'https://www.cloudflare.com/ips-v4'; | ||||||
| const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6'; | const CLOUDFARE_V6_URL = 'https://www.cloudflare.com/ips-v6'; | ||||||
|  |  | ||||||
|  | const regIpV4 = /^(\d+\.?){4}\/\d+/; | ||||||
|  | const regIpV6 = /^(([\da-fA-F]+)?:)+\/\d+/; | ||||||
|  |  | ||||||
| const internalIpRanges = { | const internalIpRanges = { | ||||||
|  |  | ||||||
| 	interval_timeout:    1000 * 60 * 60 * 6, // 6 hours | 	interval_timeout:    1000 * 60 * 60 * 6, // 6 hours | ||||||
| @@ -74,14 +77,14 @@ const internalIpRanges = { | |||||||
| 					return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL); | 					return internalIpRanges.fetchUrl(CLOUDFARE_V4_URL); | ||||||
| 				}) | 				}) | ||||||
| 				.then((cloudfare_data) => { | 				.then((cloudfare_data) => { | ||||||
| 					let items = cloudfare_data.split('\n'); | 					let items = cloudfare_data.split('\n').filter((line) => regIpV4.test(line)); | ||||||
| 					ip_ranges = [... ip_ranges, ... items]; | 					ip_ranges = [... ip_ranges, ... items]; | ||||||
| 				}) | 				}) | ||||||
| 				.then(() => { | 				.then(() => { | ||||||
| 					return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL); | 					return internalIpRanges.fetchUrl(CLOUDFARE_V6_URL); | ||||||
| 				}) | 				}) | ||||||
| 				.then((cloudfare_data) => { | 				.then((cloudfare_data) => { | ||||||
| 					let items = cloudfare_data.split('\n'); | 					let items = cloudfare_data.split('\n').filter((line) => regIpV6.test(line)); | ||||||
| 					ip_ranges = [... ip_ranges, ... items]; | 					ip_ranges = [... ip_ranges, ... items]; | ||||||
| 				}) | 				}) | ||||||
| 				.then(() => { | 				.then(() => { | ||||||
| @@ -116,10 +119,7 @@ const internalIpRanges = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateConfig: (ip_ranges) => { | 	generateConfig: (ip_ranges) => { | ||||||
| 		let renderEngine = new Liquid({ | 		const renderEngine = utils.getRenderEngine(); | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| 			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf'; | 			let filename = '/etc/nginx/conf.d/include/ip_ranges.conf'; | ||||||
|   | |||||||
| @@ -1,10 +1,9 @@ | |||||||
| const _      = require('lodash'); | const _      = require('lodash'); | ||||||
| const fs     = require('fs'); | const fs     = require('fs'); | ||||||
| const logger = require('../logger').nginx; | const logger = require('../logger').nginx; | ||||||
|  | const config = require('../lib/config'); | ||||||
| const utils  = require('../lib/utils'); | const utils  = require('../lib/utils'); | ||||||
| const error  = require('../lib/error'); | const error  = require('../lib/error'); | ||||||
| const { Liquid } = require('liquidjs'); |  | ||||||
| const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG; |  | ||||||
|  |  | ||||||
| const internalNginx = { | const internalNginx = { | ||||||
|  |  | ||||||
| @@ -29,7 +28,9 @@ const internalNginx = { | |||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				// Nginx is OK | 				// Nginx is OK | ||||||
| 				// We're deleting this config regardless. | 				// We're deleting this config regardless. | ||||||
| 				return internalNginx.deleteConfig(host_type, host); // Don't throw errors, as the file may not exist at all | 				// Don't throw errors, as the file may not exist at all | ||||||
|  | 				// Delete the .err file too | ||||||
|  | 				return internalNginx.deleteConfig(host_type, host, false, true); | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalNginx.generateConfig(host_type, host); | 				return internalNginx.generateConfig(host_type, host); | ||||||
| @@ -64,7 +65,7 @@ const internalNginx = { | |||||||
| 							} | 							} | ||||||
| 						}); | 						}); | ||||||
|  |  | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.error('Nginx test failed:', valid_lines.join('\n')); | 							logger.error('Nginx test failed:', valid_lines.join('\n')); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -80,6 +81,9 @@ const internalNginx = { | |||||||
| 							.patch({ | 							.patch({ | ||||||
| 								meta: combined_meta | 								meta: combined_meta | ||||||
| 							}) | 							}) | ||||||
|  | 							.then(() => { | ||||||
|  | 								internalNginx.renameConfigAsError(host_type, host); | ||||||
|  | 							}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return internalNginx.deleteConfig(host_type, host, true); | 								return internalNginx.deleteConfig(host_type, host, true); | ||||||
| 							}); | 							}); | ||||||
| @@ -97,7 +101,7 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	test: () => { | 	test: () => { | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Testing Nginx configuration'); | 			logger.info('Testing Nginx configuration'); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| @@ -121,13 +125,10 @@ const internalNginx = { | |||||||
| 	 * @returns {String} | 	 * @returns {String} | ||||||
| 	 */ | 	 */ | ||||||
| 	getConfigName: (host_type, host_id) => { | 	getConfigName: (host_type, host_id) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); |  | ||||||
|  |  | ||||||
| 		if (host_type === 'default') { | 		if (host_type === 'default') { | ||||||
| 			return '/data/nginx/default_host/site.conf'; | 			return '/data/nginx/default_host/site.conf'; | ||||||
| 		} | 		} | ||||||
|  | 		return '/data/nginx/' + internalNginx.getFileFriendlyHostType(host_type) + '/' + host_id + '.conf'; | ||||||
| 		return '/data/nginx/' + host_type + '/' + host_id + '.conf'; |  | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| @@ -146,12 +147,16 @@ const internalNginx = { | |||||||
| 				return; | 				return; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			let renderer          = new Liquid(); | 			const renderEngine    = utils.getRenderEngine(); | ||||||
| 			let renderedLocations = ''; | 			let renderedLocations = ''; | ||||||
|  |  | ||||||
| 			const locationRendering = async () => { | 			const locationRendering = async () => { | ||||||
| 				for (let i = 0; i < host.locations.length; i++) { | 				for (let i = 0; i < host.locations.length; i++) { | ||||||
| 					let locationCopy = Object.assign({}, host.locations[i]); | 					let locationCopy = Object.assign({}, {access_list_id: host.access_list_id}, {certificate_id: host.certificate_id}, | ||||||
|  | 						{ssl_forced: host.ssl_forced}, {caching_enabled: host.caching_enabled}, {block_exploits: host.block_exploits}, | ||||||
|  | 						{allow_websocket_upgrade: host.allow_websocket_upgrade}, {http2_support: host.http2_support}, | ||||||
|  | 						{hsts_enabled: host.hsts_enabled}, {hsts_subdomains: host.hsts_subdomains}, {access_list: host.access_list}, | ||||||
|  | 						{certificate: host.certificate}, host.locations[i]); | ||||||
|  |  | ||||||
| 					if (locationCopy.forward_host.indexOf('/') > -1) { | 					if (locationCopy.forward_host.indexOf('/') > -1) { | ||||||
| 						const splitted = locationCopy.forward_host.split('/'); | 						const splitted = locationCopy.forward_host.split('/'); | ||||||
| @@ -161,11 +166,13 @@ const internalNginx = { | |||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 					// eslint-disable-next-line | 					// eslint-disable-next-line | ||||||
| 					renderedLocations += await renderer.parseAndRender(template, locationCopy); | 					renderedLocations += await renderEngine.parseAndRender(template, locationCopy); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 			}; | 			}; | ||||||
|  |  | ||||||
| 			locationRendering().then(() => resolve(renderedLocations)); | 			locationRendering().then(() => resolve(renderedLocations)); | ||||||
|  |  | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -174,23 +181,23 @@ const internalNginx = { | |||||||
| 	 * @param   {Object}  host | 	 * @param   {Object}  host | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateConfig: (host_type, host) => { | 	generateConfig: (host_type, host_row) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | 		// Prevent modifying the original object: | ||||||
|  | 		let host             = JSON.parse(JSON.stringify(host_row)); | ||||||
|  | 		const nice_host_type = internalNginx.getFileFriendlyHostType(host_type); | ||||||
|  |  | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Generating ' + host_type + ' Config:', host); | 			logger.info('Generating ' + nice_host_type + ' Config:', JSON.stringify(host, null, 2)); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		let renderEngine = new Liquid({ | 		const renderEngine = utils.getRenderEngine(); | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| 			let filename = internalNginx.getConfigName(host_type, host.id); | 			let filename = internalNginx.getConfigName(nice_host_type, host.id); | ||||||
|  |  | ||||||
| 			try { | 			try { | ||||||
| 				template = fs.readFileSync(__dirname + '/../templates/' + host_type + '.conf', {encoding: 'utf8'}); | 				template = fs.readFileSync(__dirname + '/../templates/' + nice_host_type + '.conf', {encoding: 'utf8'}); | ||||||
| 			} catch (err) { | 			} catch (err) { | ||||||
| 				reject(new error.ConfigurationError(err.message)); | 				reject(new error.ConfigurationError(err.message)); | ||||||
| 				return; | 				return; | ||||||
| @@ -200,7 +207,7 @@ const internalNginx = { | |||||||
| 			let origLocations; | 			let origLocations; | ||||||
|  |  | ||||||
| 			// Manipulate the data a bit before sending it to the template | 			// Manipulate the data a bit before sending it to the template | ||||||
| 			if (host_type !== 'default') { | 			if (nice_host_type !== 'default') { | ||||||
| 				host.use_default_location = true; | 				host.use_default_location = true; | ||||||
| 				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) { | 				if (typeof host.advanced_config !== 'undefined' && host.advanced_config) { | ||||||
| 					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config); | 					host.use_default_location = !internalNginx.advancedConfigHasDefaultLocation(host.advanced_config); | ||||||
| @@ -208,6 +215,7 @@ const internalNginx = { | |||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			if (host.locations) { | 			if (host.locations) { | ||||||
|  | 				//logger.info ('host.locations = ' + JSON.stringify(host.locations, null, 2)); | ||||||
| 				origLocations    = [].concat(host.locations); | 				origLocations    = [].concat(host.locations); | ||||||
| 				locationsPromise = internalNginx.renderLocations(host).then((renderedLocations) => { | 				locationsPromise = internalNginx.renderLocations(host).then((renderedLocations) => { | ||||||
| 					host.locations = renderedLocations; | 					host.locations = renderedLocations; | ||||||
| @@ -224,13 +232,16 @@ const internalNginx = { | |||||||
| 				locationsPromise = Promise.resolve(); | 				locationsPromise = Promise.resolve(); | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
|  | 			// Set the IPv6 setting for the host | ||||||
|  | 			host.ipv6 = internalNginx.ipv6Enabled(); | ||||||
|  |  | ||||||
| 			locationsPromise.then(() => { | 			locationsPromise.then(() => { | ||||||
| 				renderEngine | 				renderEngine | ||||||
| 					.parseAndRender(template, host) | 					.parseAndRender(template, host) | ||||||
| 					.then((config_text) => { | 					.then((config_text) => { | ||||||
| 						fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | 						fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||||
|  |  | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.success('Wrote config:', filename, config_text); | 							logger.success('Wrote config:', filename, config_text); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -240,7 +251,7 @@ const internalNginx = { | |||||||
| 						resolve(true); | 						resolve(true); | ||||||
| 					}) | 					}) | ||||||
| 					.catch((err) => { | 					.catch((err) => { | ||||||
| 						if (debug_mode) { | 						if (config.debug()) { | ||||||
| 							logger.warn('Could not write ' + filename + ':', err.message); | 							logger.warn('Could not write ' + filename + ':', err.message); | ||||||
| 						} | 						} | ||||||
|  |  | ||||||
| @@ -259,17 +270,16 @@ const internalNginx = { | |||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	generateLetsEncryptRequestConfig: (certificate) => { | 	generateLetsEncryptRequestConfig: (certificate) => { | ||||||
| 		if (debug_mode) { | 		if (config.debug()) { | ||||||
| 			logger.info('Generating LetsEncrypt Request Config:', certificate); | 			logger.info('Generating LetsEncrypt Request Config:', certificate); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		let renderEngine = new Liquid({ | 		const renderEngine = utils.getRenderEngine(); | ||||||
| 			root: __dirname + '/../templates/' |  | ||||||
| 		}); |  | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			let template = null; | 			let template = null; | ||||||
| 			let filename = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | 			let filename = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | ||||||
|  |  | ||||||
| 			try { | 			try { | ||||||
| 				template = fs.readFileSync(__dirname + '/../templates/letsencrypt-request.conf', {encoding: 'utf8'}); | 				template = fs.readFileSync(__dirname + '/../templates/letsencrypt-request.conf', {encoding: 'utf8'}); | ||||||
| 			} catch (err) { | 			} catch (err) { | ||||||
| @@ -277,19 +287,21 @@ const internalNginx = { | |||||||
| 				return; | 				return; | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
|  | 			certificate.ipv6 = internalNginx.ipv6Enabled(); | ||||||
|  |  | ||||||
| 			renderEngine | 			renderEngine | ||||||
| 				.parseAndRender(template, certificate) | 				.parseAndRender(template, certificate) | ||||||
| 				.then((config_text) => { | 				.then((config_text) => { | ||||||
| 					fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | 					fs.writeFileSync(filename, config_text, {encoding: 'utf8'}); | ||||||
|  |  | ||||||
| 					if (debug_mode) { | 					if (config.debug()) { | ||||||
| 						logger.success('Wrote config:', filename, config_text); | 						logger.success('Wrote config:', filename, config_text); | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 					resolve(true); | 					resolve(true); | ||||||
| 				}) | 				}) | ||||||
| 				.catch((err) => { | 				.catch((err) => { | ||||||
| 					if (debug_mode) { | 					if (config.debug()) { | ||||||
| 						logger.warn('Could not write ' + filename + ':', err.message); | 						logger.warn('Could not write ' + filename + ':', err.message); | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| @@ -298,33 +310,39 @@ const internalNginx = { | |||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * A simple wrapper around unlinkSync that writes to the logger | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {String}  filename | ||||||
|  | 	 */ | ||||||
|  | 	deleteFile: (filename) => { | ||||||
|  | 		logger.debug('Deleting file: ' + filename); | ||||||
|  | 		try { | ||||||
|  | 			fs.unlinkSync(filename); | ||||||
|  | 		} catch (err) { | ||||||
|  | 			logger.debug('Could not delete file:', JSON.stringify(err, null, 2)); | ||||||
|  | 		} | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {String} host_type | ||||||
|  | 	 * @returns String | ||||||
|  | 	 */ | ||||||
|  | 	getFileFriendlyHostType: (host_type) => { | ||||||
|  | 		return host_type.replace(new RegExp('-', 'g'), '_'); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig` | 	 * This removes the temporary nginx config file generated by `generateLetsEncryptRequestConfig` | ||||||
| 	 * | 	 * | ||||||
| 	 * @param   {Object}  certificate | 	 * @param   {Object}  certificate | ||||||
| 	 * @param   {Boolean} [throw_errors] |  | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	deleteLetsEncryptRequestConfig: (certificate, throw_errors) => { | 	deleteLetsEncryptRequestConfig: (certificate) => { | ||||||
| 		return new Promise((resolve, reject) => { | 		const config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | ||||||
| 			try { | 		return new Promise((resolve/*, reject*/) => { | ||||||
| 				let config_file = '/data/nginx/temp/letsencrypt_' + certificate.id + '.conf'; | 			internalNginx.deleteFile(config_file); | ||||||
|  |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Deleting nginx config: ' + config_file); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				fs.unlinkSync(config_file); |  | ||||||
| 			} catch (err) { |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Could not delete config:', err.message); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (throw_errors) { |  | ||||||
| 					reject(err); |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			resolve(); | 			resolve(); | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
| @@ -332,35 +350,42 @@ const internalNginx = { | |||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Object}  [host] | 	 * @param   {Object}  [host] | ||||||
| 	 * @param   {Boolean} [throw_errors] | 	 * @param   {Boolean} [delete_err_file] | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	deleteConfig: (host_type, host, throw_errors) => { | 	deleteConfig: (host_type, host, delete_err_file) => { | ||||||
| 		host_type = host_type.replace(new RegExp('-', 'g'), '_'); | 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||||
|  | 		const config_file_err = config_file + '.err'; | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve/*, reject*/) => { | ||||||
| 			try { | 			internalNginx.deleteFile(config_file); | ||||||
| 				let config_file = internalNginx.getConfigName(host_type, typeof host === 'undefined' ? 0 : host.id); | 			if (delete_err_file) { | ||||||
|  | 				internalNginx.deleteFile(config_file_err); | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Deleting nginx config: ' + config_file); |  | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 				fs.unlinkSync(config_file); |  | ||||||
| 			} catch (err) { |  | ||||||
| 				if (debug_mode) { |  | ||||||
| 					logger.warn('Could not delete config:', err.message); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (throw_errors) { |  | ||||||
| 					reject(err); |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			resolve(); | 			resolve(); | ||||||
| 		}); | 		}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param   {String}  host_type | ||||||
|  | 	 * @param   {Object}  [host] | ||||||
|  | 	 * @returns {Promise} | ||||||
|  | 	 */ | ||||||
|  | 	renameConfigAsError: (host_type, host) => { | ||||||
|  | 		const config_file     = internalNginx.getConfigName(internalNginx.getFileFriendlyHostType(host_type), typeof host === 'undefined' ? 0 : host.id); | ||||||
|  | 		const config_file_err = config_file + '.err'; | ||||||
|  |  | ||||||
|  | 		return new Promise((resolve/*, reject*/) => { | ||||||
|  | 			fs.unlink(config_file, () => { | ||||||
|  | 				// ignore result, continue | ||||||
|  | 				fs.rename(config_file, config_file_err, () => { | ||||||
|  | 					// also ignore result, as this is a debugging informative file anyway | ||||||
|  | 					resolve(); | ||||||
|  | 				}); | ||||||
|  | 			}); | ||||||
|  | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Array}   hosts | 	 * @param   {Array}   hosts | ||||||
| @@ -378,13 +403,12 @@ const internalNginx = { | |||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String}  host_type | 	 * @param   {String}  host_type | ||||||
| 	 * @param   {Array}   hosts | 	 * @param   {Array}   hosts | ||||||
| 	 * @param   {Boolean} [throw_errors] |  | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	bulkDeleteConfigs: (host_type, hosts, throw_errors) => { | 	bulkDeleteConfigs: (host_type, hosts) => { | ||||||
| 		let promises = []; | 		let promises = []; | ||||||
| 		hosts.map(function (host) { | 		hosts.map(function (host) { | ||||||
| 			promises.push(internalNginx.deleteConfig(host_type, host, throw_errors)); | 			promises.push(internalNginx.deleteConfig(host_type, host, true)); | ||||||
| 		}); | 		}); | ||||||
|  |  | ||||||
| 		return Promise.all(promises); | 		return Promise.all(promises); | ||||||
| @@ -394,8 +418,20 @@ const internalNginx = { | |||||||
| 	 * @param   {string}  config | 	 * @param   {string}  config | ||||||
| 	 * @returns {boolean} | 	 * @returns {boolean} | ||||||
| 	 */ | 	 */ | ||||||
| 	advancedConfigHasDefaultLocation: function (config) { | 	advancedConfigHasDefaultLocation: function (cfg) { | ||||||
| 		return !!config.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im); | 		return !!cfg.match(/^(?:.*;)?\s*?location\s*?\/\s*?{/im); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	ipv6Enabled: function () { | ||||||
|  | 		if (typeof process.env.DISABLE_IPV6 !== 'undefined') { | ||||||
|  | 			const disabled = process.env.DISABLE_IPV6.toLowerCase(); | ||||||
|  | 			return !(disabled === 'on' || disabled === 'true' || disabled === '1' || disabled === 'yes'); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		return true; | ||||||
| 	} | 	} | ||||||
| }; | }; | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const proxyHostModel      = require('../models/proxy_host'); | const proxyHostModel      = require('../models/proxy_host'); | ||||||
| const internalHost        = require('./host'); | const internalHost        = require('./host'); | ||||||
| const internalNginx       = require('./nginx'); | const internalNginx       = require('./nginx'); | ||||||
| @@ -7,7 +8,7 @@ const internalAuditLog    = require('./audit-log'); | |||||||
| const internalCertificate = require('./certificate'); | const internalCertificate = require('./certificate'); | ||||||
|  |  | ||||||
| function omissions () { | function omissions () { | ||||||
| 	return ['is_deleted']; | 	return ['is_deleted', 'owner.is_deleted']; | ||||||
| } | } | ||||||
|  |  | ||||||
| const internalProxyHost = { | const internalProxyHost = { | ||||||
| @@ -47,10 +48,16 @@ const internalProxyHost = { | |||||||
| 				data.owner_user_id = access.token.getUserId(1); | 				data.owner_user_id = access.token.getUserId(1); | ||||||
| 				data               = internalHost.cleanSslHstsData(data); | 				data               = internalHost.cleanSslHstsData(data); | ||||||
|  |  | ||||||
|  | 				// Fix for db field not having a default value | ||||||
|  | 				// for this optional field. | ||||||
|  | 				if (typeof data.advanced_config === 'undefined') { | ||||||
|  | 					data.advanced_config = ''; | ||||||
|  | 				} | ||||||
|  |  | ||||||
| 				return proxyHostModel | 				return proxyHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -73,7 +80,7 @@ const internalProxyHost = { | |||||||
| 				// re-fetch with cert | 				// re-fetch with cert | ||||||
| 				return internalProxyHost.get(access, { | 				return internalProxyHost.get(access, { | ||||||
| 					id:     row.id, | 					id:     row.id, | ||||||
| 					expand: ['certificate', 'owner', 'access_list'] | 					expand: ['certificate', 'owner', 'access_list.[clients,items]'] | ||||||
| 				}); | 				}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| @@ -145,6 +152,7 @@ const internalProxyHost = { | |||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| 					return internalCertificate.createQuickCertificate(access, { | 					return internalCertificate.createQuickCertificate(access, { | ||||||
| 						domain_names: data.domain_names || row.domain_names, | 						domain_names: data.domain_names || row.domain_names, | ||||||
|  | 						ssl_key_type: data.ssl_key_type || row.ssl_key_type, | ||||||
| 						meta:         _.assign({}, row.meta, data.meta) | 						meta:         _.assign({}, row.meta, data.meta) | ||||||
| 					}) | 					}) | ||||||
| 						.then((cert) => { | 						.then((cert) => { | ||||||
| @@ -170,6 +178,7 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where({id: data.id}) | 					.where({id: data.id}) | ||||||
| 					.patch(data) | 					.patch(data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						// Add to audit log | 						// Add to audit log | ||||||
| 						return internalAuditLog.add(access, { | 						return internalAuditLog.add(access, { | ||||||
| @@ -179,16 +188,20 @@ const internalProxyHost = { | |||||||
| 							meta:        data | 							meta:        data | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalProxyHost.get(access, { | 				return internalProxyHost.get(access, { | ||||||
| 					id:     data.id, | 					id:     data.id, | ||||||
| 					expand: ['owner', 'certificate', 'access_list'] | 					expand: ['owner', 'certificate', 'access_list.[clients,items]'] | ||||||
| 				}) | 				}) | ||||||
| 					.then((row) => { | 					.then((row) => { | ||||||
|  | 						if (!row.enabled) { | ||||||
|  | 							// No need to add nginx config if host is disabled | ||||||
|  | 							return row; | ||||||
|  | 						} | ||||||
| 						// Configure nginx | 						// Configure nginx | ||||||
| 						return internalNginx.configure(proxyHostModel, 'proxy_host', row) | 						return internalNginx.configure(proxyHostModel, 'proxy_host', row) | ||||||
| 							.then((new_meta) => { | 							.then((new_meta) => { | ||||||
| @@ -219,31 +232,29 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,access_list,certificate]') | 					.allowGraph('[owner,access_list.[clients,items],certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				row = internalHost.cleanRowCertificateMeta(row); | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -260,7 +271,7 @@ const internalProxyHost = { | |||||||
| 				return internalProxyHost.get(access, {id: data.id}); | 				return internalProxyHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -308,7 +319,7 @@ const internalProxyHost = { | |||||||
| 				}); | 				}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (row.enabled) { | 				} else if (row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already enabled'); | 					throw new error.ValidationError('Host is already enabled'); | ||||||
| @@ -354,7 +365,7 @@ const internalProxyHost = { | |||||||
| 				return internalProxyHost.get(access, {id: data.id}); | 				return internalProxyHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (!row.enabled) { | 				} else if (!row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already disabled'); | 					throw new error.ValidationError('Host is already disabled'); | ||||||
| @@ -405,8 +416,7 @@ const internalProxyHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,access_list,certificate]') | ||||||
| 					.allowEager('[owner,access_list,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -421,10 +431,10 @@ const internalProxyHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                    = require('lodash'); | const _                    = require('lodash'); | ||||||
| const error                = require('../lib/error'); | const error                = require('../lib/error'); | ||||||
|  | const utils                = require('../lib/utils'); | ||||||
| const redirectionHostModel = require('../models/redirection_host'); | const redirectionHostModel = require('../models/redirection_host'); | ||||||
| const internalHost         = require('./host'); | const internalHost         = require('./host'); | ||||||
| const internalNginx        = require('./nginx'); | const internalNginx        = require('./nginx'); | ||||||
| @@ -47,10 +48,16 @@ const internalRedirectionHost = { | |||||||
| 				data.owner_user_id = access.token.getUserId(1); | 				data.owner_user_id = access.token.getUserId(1); | ||||||
| 				data               = internalHost.cleanSslHstsData(data); | 				data               = internalHost.cleanSslHstsData(data); | ||||||
|  |  | ||||||
|  | 				// Fix for db field not having a default value | ||||||
|  | 				// for this optional field. | ||||||
|  | 				if (typeof data.advanced_config === 'undefined') { | ||||||
|  | 					data.advanced_config = ''; | ||||||
|  | 				} | ||||||
|  |  | ||||||
| 				return redirectionHostModel | 				return redirectionHostModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (create_certificate) { | 				if (create_certificate) { | ||||||
| @@ -65,9 +72,8 @@ const internalRedirectionHost = { | |||||||
| 						.then(() => { | 						.then(() => { | ||||||
| 							return row; | 							return row; | ||||||
| 						}); | 						}); | ||||||
| 				} else { |  | ||||||
| 					return row; |  | ||||||
| 				} | 				} | ||||||
|  | 				return row; | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				// re-fetch with cert | 				// re-fetch with cert | ||||||
| @@ -218,31 +224,29 @@ const internalRedirectionHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner,certificate]') | 					.allowGraph('[owner,certificate]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					row = internalHost.cleanRowCertificateMeta(row); |  | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				row = internalHost.cleanRowCertificateMeta(row); | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -259,7 +263,7 @@ const internalRedirectionHost = { | |||||||
| 				return internalRedirectionHost.get(access, {id: data.id}); | 				return internalRedirectionHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -307,7 +311,7 @@ const internalRedirectionHost = { | |||||||
| 				}); | 				}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (row.enabled) { | 				} else if (row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already enabled'); | 					throw new error.ValidationError('Host is already enabled'); | ||||||
| @@ -353,7 +357,7 @@ const internalRedirectionHost = { | |||||||
| 				return internalRedirectionHost.get(access, {id: data.id}); | 				return internalRedirectionHost.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (!row.enabled) { | 				} else if (!row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already disabled'); | 					throw new error.ValidationError('Host is already disabled'); | ||||||
| @@ -404,8 +408,7 @@ const internalRedirectionHost = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner,certificate]') | ||||||
| 					.allowEager('[owner,certificate]') |  | ||||||
| 					.orderBy('domain_names', 'ASC'); | 					.orderBy('domain_names', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -420,10 +423,10 @@ const internalRedirectionHost = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | 				if (typeof expand !== 'undefined' && expand !== null && expand.indexOf('certificate') !== -1) { | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                = require('lodash'); | const _                = require('lodash'); | ||||||
| const error            = require('../lib/error'); | const error            = require('../lib/error'); | ||||||
|  | const utils            = require('../lib/utils'); | ||||||
| const streamModel      = require('../models/stream'); | const streamModel      = require('../models/stream'); | ||||||
| const internalNginx    = require('./nginx'); | const internalNginx    = require('./nginx'); | ||||||
| const internalAuditLog = require('./audit-log'); | const internalAuditLog = require('./audit-log'); | ||||||
| @@ -27,8 +28,8 @@ const internalStream = { | |||||||
|  |  | ||||||
| 				return streamModel | 				return streamModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				// Configure nginx | 				// Configure nginx | ||||||
| @@ -71,8 +72,8 @@ const internalStream = { | |||||||
|  |  | ||||||
| 				return streamModel | 				return streamModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(row.id, data) | 					.patchAndFetchById(row.id, data) | ||||||
|  | 					.then(utils.omitRow(omissions())) | ||||||
| 					.then((saved_row) => { | 					.then((saved_row) => { | ||||||
| 						return internalNginx.configure(streamModel, 'stream', saved_row) | 						return internalNginx.configure(streamModel, 'stream', saved_row) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| @@ -88,7 +89,7 @@ const internalStream = { | |||||||
| 							meta:        data | 							meta:        data | ||||||
| 						}) | 						}) | ||||||
| 							.then(() => { | 							.then(() => { | ||||||
| 								return _.omit(saved_row, omissions()); | 								return saved_row; | ||||||
| 							}); | 							}); | ||||||
| 					}); | 					}); | ||||||
| 			}); | 			}); | ||||||
| @@ -113,30 +114,28 @@ const internalStream = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[owner]') | 					.allowGraph('[owner]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| 					query.andWhere('owner_user_id', access.token.getUserId(1)); | 					query.andWhere('owner_user_id', access.token.getUserId(1)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -153,7 +152,7 @@ const internalStream = { | |||||||
| 				return internalStream.get(access, {id: data.id}); | 				return internalStream.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| @@ -201,7 +200,7 @@ const internalStream = { | |||||||
| 				}); | 				}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (row.enabled) { | 				} else if (row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already enabled'); | 					throw new error.ValidationError('Host is already enabled'); | ||||||
| @@ -247,7 +246,7 @@ const internalStream = { | |||||||
| 				return internalStream.get(access, {id: data.id}); | 				return internalStream.get(access, {id: data.id}); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (!row) { | 				if (!row || !row.id) { | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} else if (!row.enabled) { | 				} else if (!row.enabled) { | ||||||
| 					throw new error.ValidationError('Host is already disabled'); | 					throw new error.ValidationError('Host is already disabled'); | ||||||
| @@ -298,8 +297,7 @@ const internalStream = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[owner]') | ||||||
| 					.allowEager('[owner]') |  | ||||||
| 					.orderBy('incoming_port', 'ASC'); | 					.orderBy('incoming_port', 'ASC'); | ||||||
|  |  | ||||||
| 				if (access_data.permission_visibility !== 'all') { | 				if (access_data.permission_visibility !== 'all') { | ||||||
| @@ -314,10 +312,10 @@ const internalStream = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|   | |||||||
| @@ -5,6 +5,8 @@ const authModel  = require('../models/auth'); | |||||||
| const helpers    = require('../lib/helpers'); | const helpers    = require('../lib/helpers'); | ||||||
| const TokenModel = require('../models/token'); | const TokenModel = require('../models/token'); | ||||||
|  |  | ||||||
|  | const ERROR_MESSAGE_INVALID_AUTH = 'Invalid email or password'; | ||||||
|  |  | ||||||
| module.exports = { | module.exports = { | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| @@ -24,7 +26,7 @@ module.exports = { | |||||||
|  |  | ||||||
| 		return userModel | 		return userModel | ||||||
| 			.query() | 			.query() | ||||||
| 			.where('email', data.identity) | 			.where('email', data.identity.toLowerCase().trim()) | ||||||
| 			.andWhere('is_deleted', 0) | 			.andWhere('is_deleted', 0) | ||||||
| 			.andWhere('is_disabled', 0) | 			.andWhere('is_disabled', 0) | ||||||
| 			.first() | 			.first() | ||||||
| @@ -69,15 +71,15 @@ module.exports = { | |||||||
| 													}; | 													}; | ||||||
| 												}); | 												}); | ||||||
| 										} else { | 										} else { | ||||||
| 											throw new error.AuthError('Invalid password'); | 											throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||||
| 										} | 										} | ||||||
| 									}); | 									}); | ||||||
| 							} else { | 							} else { | ||||||
| 								throw new error.AuthError('No password auth for user'); | 								throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||||
| 							} | 							} | ||||||
| 						}); | 						}); | ||||||
| 				} else { | 				} else { | ||||||
| 					throw new error.AuthError('No relevant user found'); | 					throw new error.AuthError(ERROR_MESSAGE_INVALID_AUTH); | ||||||
| 				} | 				} | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| const _                   = require('lodash'); | const _                   = require('lodash'); | ||||||
| const error               = require('../lib/error'); | const error               = require('../lib/error'); | ||||||
|  | const utils               = require('../lib/utils'); | ||||||
| const userModel           = require('../models/user'); | const userModel           = require('../models/user'); | ||||||
| const userPermissionModel = require('../models/user_permission'); | const userPermissionModel = require('../models/user_permission'); | ||||||
| const authModel           = require('../models/auth'); | const authModel           = require('../models/auth'); | ||||||
| @@ -35,8 +36,8 @@ const internalUser = { | |||||||
|  |  | ||||||
| 				return userModel | 				return userModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) | 					.insertAndFetch(data) | ||||||
| 					.insertAndFetch(data); | 					.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((user) => { | 			.then((user) => { | ||||||
| 				if (auth) { | 				if (auth) { | ||||||
| @@ -140,11 +141,8 @@ const internalUser = { | |||||||
|  |  | ||||||
| 				return userModel | 				return userModel | ||||||
| 					.query() | 					.query() | ||||||
| 					.omit(omissions()) |  | ||||||
| 					.patchAndFetchById(user.id, data) | 					.patchAndFetchById(user.id, data) | ||||||
| 					.then((saved_user) => { | 					.then(utils.omitRow(omissions())); | ||||||
| 						return _.omit(saved_user, omissions()); |  | ||||||
| 					}); |  | ||||||
| 			}) | 			}) | ||||||
| 			.then(() => { | 			.then(() => { | ||||||
| 				return internalUser.get(access, {id: data.id}); | 				return internalUser.get(access, {id: data.id}); | ||||||
| @@ -186,26 +184,24 @@ const internalUser = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.andWhere('id', data.id) | 					.andWhere('id', data.id) | ||||||
| 					.allowEager('[permissions]') | 					.allowGraph('[permissions]') | ||||||
| 					.first(); | 					.first(); | ||||||
|  |  | ||||||
| 				// Custom omissions |  | ||||||
| 				if (typeof data.omit !== 'undefined' && data.omit !== null) { |  | ||||||
| 					query.omit(data.omit); |  | ||||||
| 				} |  | ||||||
|  |  | ||||||
| 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | 				if (typeof data.expand !== 'undefined' && data.expand !== null) { | ||||||
| 					query.eager('[' + data.expand.join(', ') + ']'); | 					query.withGraphFetched('[' + data.expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRow(omissions())); | ||||||
| 			}) | 			}) | ||||||
| 			.then((row) => { | 			.then((row) => { | ||||||
| 				if (row) { | 				if (!row || !row.id) { | ||||||
| 					return _.omit(row, omissions()); |  | ||||||
| 				} else { |  | ||||||
| 					throw new error.ItemNotFoundError(data.id); | 					throw new error.ItemNotFoundError(data.id); | ||||||
| 				} | 				} | ||||||
|  | 				// Custom omissions | ||||||
|  | 				if (typeof data.omit !== 'undefined' && data.omit !== null) { | ||||||
|  | 					row = _.omit(row, data.omit); | ||||||
|  | 				} | ||||||
|  | 				return row; | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| @@ -322,8 +318,7 @@ const internalUser = { | |||||||
| 					.query() | 					.query() | ||||||
| 					.where('is_deleted', 0) | 					.where('is_deleted', 0) | ||||||
| 					.groupBy('id') | 					.groupBy('id') | ||||||
| 					.omit(['is_deleted']) | 					.allowGraph('[permissions]') | ||||||
| 					.allowEager('[permissions]') |  | ||||||
| 					.orderBy('name', 'ASC'); | 					.orderBy('name', 'ASC'); | ||||||
|  |  | ||||||
| 				// Query is used for searching | 				// Query is used for searching | ||||||
| @@ -335,10 +330,10 @@ const internalUser = { | |||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if (typeof expand !== 'undefined' && expand !== null) { | 				if (typeof expand !== 'undefined' && expand !== null) { | ||||||
| 					query.eager('[' + expand.join(', ') + ']'); | 					query.withGraphFetched('[' + expand.join(', ') + ']'); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				return query; | 				return query.then(utils.omitRows(omissions())); | ||||||
| 			}); | 			}); | ||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,6 +1,6 @@ | |||||||
| module.exports = { | module.exports = { | ||||||
| 	development: { | 	development: { | ||||||
| 		client:     'mysql', | 		client:     'mysql2', | ||||||
| 		migrations: { | 		migrations: { | ||||||
| 			tableName: 'migrations', | 			tableName: 'migrations', | ||||||
| 			stub:      'lib/migrate_template.js', | 			stub:      'lib/migrate_template.js', | ||||||
| @@ -9,7 +9,7 @@ module.exports = { | |||||||
| 	}, | 	}, | ||||||
|  |  | ||||||
| 	production: { | 	production: { | ||||||
| 		client:     'mysql', | 		client:     'mysql2', | ||||||
| 		migrations: { | 		migrations: { | ||||||
| 			tableName: 'migrations', | 			tableName: 'migrations', | ||||||
| 			stub:      'lib/migrate_template.js', | 			stub:      'lib/migrate_template.js', | ||||||
|   | |||||||
| @@ -10,7 +10,7 @@ | |||||||
|  |  | ||||||
| const _              = require('lodash'); | const _              = require('lodash'); | ||||||
| const logger         = require('../logger').access; | const logger         = require('../logger').access; | ||||||
| const validator      = require('ajv'); | const Ajv            = require('ajv/dist/2020'); | ||||||
| const error          = require('./error'); | const error          = require('./error'); | ||||||
| const userModel      = require('../models/user'); | const userModel      = require('../models/user'); | ||||||
| const proxyHostModel = require('../models/proxy_host'); | const proxyHostModel = require('../models/proxy_host'); | ||||||
| @@ -55,8 +55,8 @@ module.exports = function (token_string) { | |||||||
| 								.where('id', token_data.attrs.id) | 								.where('id', token_data.attrs.id) | ||||||
| 								.andWhere('is_deleted', 0) | 								.andWhere('is_deleted', 0) | ||||||
| 								.andWhere('is_disabled', 0) | 								.andWhere('is_disabled', 0) | ||||||
| 								.allowEager('[permissions]') | 								.allowGraph('[permissions]') | ||||||
| 								.eager('[permissions]') | 								.withGraphFetched('[permissions]') | ||||||
| 								.first() | 								.first() | ||||||
| 								.then((user) => { | 								.then((user) => { | ||||||
| 									if (user) { | 									if (user) { | ||||||
| @@ -174,7 +174,6 @@ module.exports = function (token_string) { | |||||||
|  |  | ||||||
| 		let schema = { | 		let schema = { | ||||||
| 			$id:                  'objects', | 			$id:                  'objects', | ||||||
| 			$schema:              'http://json-schema.org/draft-07/schema#', |  | ||||||
| 			description:          'Actor Properties', | 			description:          'Actor Properties', | ||||||
| 			type:                 'object', | 			type:                 'object', | ||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| @@ -251,7 +250,7 @@ module.exports = function (token_string) { | |||||||
| 						// Initialised, token decoded ok | 						// Initialised, token decoded ok | ||||||
| 						return this.getObjectSchema(permission) | 						return this.getObjectSchema(permission) | ||||||
| 							.then((objectSchema) => { | 							.then((objectSchema) => { | ||||||
| 								let data_schema = { | 								const data_schema = { | ||||||
| 									[permission]: { | 									[permission]: { | ||||||
| 										data:                         data, | 										data:                         data, | ||||||
| 										scope:                        Token.get('scope'), | 										scope:                        Token.get('scope'), | ||||||
| @@ -267,24 +266,18 @@ module.exports = function (token_string) { | |||||||
| 								}; | 								}; | ||||||
|  |  | ||||||
| 								let permissionSchema = { | 								let permissionSchema = { | ||||||
| 									$schema:              'http://json-schema.org/draft-07/schema#', |  | ||||||
| 									$async:               true, | 									$async:               true, | ||||||
| 									$id:                  'permissions', | 									$id:                  'permissions', | ||||||
|  | 									type:                 'object', | ||||||
| 									additionalProperties: false, | 									additionalProperties: false, | ||||||
| 									properties:           {} | 									properties:           {} | ||||||
| 								}; | 								}; | ||||||
|  |  | ||||||
| 								permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json'); | 								permissionSchema.properties[permission] = require('./access/' + permission.replace(/:/gim, '-') + '.json'); | ||||||
|  |  | ||||||
| 								// logger.info('objectSchema', JSON.stringify(objectSchema, null, 2)); | 								const ajv = new Ajv({ | ||||||
| 								// logger.info('permissionSchema', JSON.stringify(permissionSchema, null, 2)); |  | ||||||
| 								// logger.info('data_schema', JSON.stringify(data_schema, null, 2)); |  | ||||||
|  |  | ||||||
| 								let ajv = validator({ |  | ||||||
| 									verbose:      true, | 									verbose:      true, | ||||||
| 									allErrors:    true, | 									allErrors:    true, | ||||||
| 									format:       'full', |  | ||||||
| 									missingRefs:  'fail', |  | ||||||
| 									breakOnError: true, | 									breakOnError: true, | ||||||
| 									coerceTypes:  true, | 									coerceTypes:  true, | ||||||
| 									schemas:      [ | 									schemas:      [ | ||||||
|   | |||||||
| @@ -1,5 +1,4 @@ | |||||||
| { | { | ||||||
| 	"$schema": "http://json-schema.org/draft-07/schema#", |  | ||||||
| 	"$id": "perms", | 	"$id": "perms", | ||||||
| 	"definitions": { | 	"definitions": { | ||||||
| 		"view": { | 		"view": { | ||||||
|   | |||||||
| @@ -1,5 +1,4 @@ | |||||||
| { | { | ||||||
| 	"$schema": "http://json-schema.org/draft-07/schema#", |  | ||||||
| 	"$id": "roles", | 	"$id": "roles", | ||||||
| 	"definitions": { | 	"definitions": { | ||||||
| 		"admin": { | 		"admin": { | ||||||
|   | |||||||
							
								
								
									
										78
									
								
								backend/lib/certbot.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								backend/lib/certbot.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,78 @@ | |||||||
|  | const dnsPlugins = require('../global/certbot-dns-plugins.json'); | ||||||
|  | const utils      = require('./utils'); | ||||||
|  | const error      = require('./error'); | ||||||
|  | const logger     = require('../logger').certbot; | ||||||
|  | const batchflow  = require('batchflow'); | ||||||
|  |  | ||||||
|  | const CERTBOT_VERSION_REPLACEMENT = '$(certbot --version | grep -Eo \'[0-9](\\.[0-9]+)+\')'; | ||||||
|  |  | ||||||
|  | const certbot = { | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @param {array} pluginKeys | ||||||
|  | 	 */ | ||||||
|  | 	installPlugins: async function (pluginKeys) { | ||||||
|  | 		let hasErrors = false; | ||||||
|  |  | ||||||
|  | 		return new Promise((resolve, reject) => { | ||||||
|  | 			if (pluginKeys.length === 0) { | ||||||
|  | 				resolve(); | ||||||
|  | 				return; | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			batchflow(pluginKeys).sequential() | ||||||
|  | 				.each((i, pluginKey, next) => { | ||||||
|  | 					certbot.installPlugin(pluginKey) | ||||||
|  | 						.then(() => { | ||||||
|  | 							next(); | ||||||
|  | 						}) | ||||||
|  | 						.catch((err) => { | ||||||
|  | 							hasErrors = true; | ||||||
|  | 							next(err); | ||||||
|  | 						}); | ||||||
|  | 				}) | ||||||
|  | 				.error((err) => { | ||||||
|  | 					logger.error(err.message); | ||||||
|  | 				}) | ||||||
|  | 				.end(() => { | ||||||
|  | 					if (hasErrors) { | ||||||
|  | 						reject(new error.CommandError('Some plugins failed to install. Please check the logs above', 1)); | ||||||
|  | 					} else { | ||||||
|  | 						resolve(); | ||||||
|  | 					} | ||||||
|  | 				}); | ||||||
|  | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Installs a cerbot plugin given the key for the object from | ||||||
|  | 	 * ../global/certbot-dns-plugins.json | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {string}  pluginKey | ||||||
|  | 	 * @returns {Object} | ||||||
|  | 	 */ | ||||||
|  | 	installPlugin: async function (pluginKey) { | ||||||
|  | 		if (typeof dnsPlugins[pluginKey] === 'undefined') { | ||||||
|  | 			// throw Error(`Certbot plugin ${pluginKey} not found`); | ||||||
|  | 			throw new error.ItemNotFoundError(pluginKey); | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		const plugin = dnsPlugins[pluginKey]; | ||||||
|  | 		logger.start(`Installing ${pluginKey}...`); | ||||||
|  |  | ||||||
|  | 		plugin.version      = plugin.version.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||||
|  | 		plugin.dependencies = plugin.dependencies.replace(/{{certbot-version}}/g, CERTBOT_VERSION_REPLACEMENT); | ||||||
|  |  | ||||||
|  | 		const cmd = '. /opt/certbot/bin/activate && pip install --no-cache-dir ' + plugin.dependencies + ' ' + plugin.package_name + plugin.version + ' ' + ' && deactivate'; | ||||||
|  | 		return utils.exec(cmd) | ||||||
|  | 			.then((result) => { | ||||||
|  | 				logger.complete(`Installed ${pluginKey}`); | ||||||
|  | 				return result; | ||||||
|  | 			}) | ||||||
|  | 			.catch((err) => { | ||||||
|  | 				throw err; | ||||||
|  | 			}); | ||||||
|  | 	}, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | module.exports = certbot; | ||||||
							
								
								
									
										194
									
								
								backend/lib/config.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										194
									
								
								backend/lib/config.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,194 @@ | |||||||
|  | const fs      = require('fs'); | ||||||
|  | const NodeRSA = require('node-rsa'); | ||||||
|  | const logger  = require('../logger').global; | ||||||
|  |  | ||||||
|  | const keysFile = '/data/keys.json'; | ||||||
|  |  | ||||||
|  | let instance = null; | ||||||
|  |  | ||||||
|  | // 1. Load from config file first (not recommended anymore) | ||||||
|  | // 2. Use config env variables next | ||||||
|  | const configure = () => { | ||||||
|  | 	const filename = (process.env.NODE_CONFIG_DIR || './config') + '/' + (process.env.NODE_ENV || 'default') + '.json'; | ||||||
|  | 	if (fs.existsSync(filename)) { | ||||||
|  | 		let configData; | ||||||
|  | 		try { | ||||||
|  | 			configData = require(filename); | ||||||
|  | 		} catch (err) { | ||||||
|  | 			// do nothing | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if (configData && configData.database) { | ||||||
|  | 			logger.info(`Using configuration from file: ${filename}`); | ||||||
|  | 			instance      = configData; | ||||||
|  | 			instance.keys = getKeys(); | ||||||
|  | 			return; | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	const envMysqlHost = process.env.DB_MYSQL_HOST || null; | ||||||
|  | 	const envMysqlUser = process.env.DB_MYSQL_USER || null; | ||||||
|  | 	const envMysqlName = process.env.DB_MYSQL_NAME || null; | ||||||
|  | 	if (envMysqlHost && envMysqlUser && envMysqlName) { | ||||||
|  | 		// we have enough mysql creds to go with mysql | ||||||
|  | 		logger.info('Using MySQL configuration'); | ||||||
|  | 		instance = { | ||||||
|  | 			database: { | ||||||
|  | 				engine:   'mysql2', | ||||||
|  | 				host:     envMysqlHost, | ||||||
|  | 				port:     process.env.DB_MYSQL_PORT || 3306, | ||||||
|  | 				user:     envMysqlUser, | ||||||
|  | 				password: process.env.DB_MYSQL_PASSWORD, | ||||||
|  | 				name:     envMysqlName, | ||||||
|  | 			}, | ||||||
|  | 			keys: getKeys(), | ||||||
|  | 		}; | ||||||
|  | 		return; | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	const envSqliteFile = process.env.DB_SQLITE_FILE || '/data/database.sqlite'; | ||||||
|  | 	logger.info(`Using Sqlite: ${envSqliteFile}`); | ||||||
|  | 	instance = { | ||||||
|  | 		database: { | ||||||
|  | 			engine: 'knex-native', | ||||||
|  | 			knex:   { | ||||||
|  | 				client:     'sqlite3', | ||||||
|  | 				connection: { | ||||||
|  | 					filename: envSqliteFile | ||||||
|  | 				}, | ||||||
|  | 				useNullAsDefault: true | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
|  | 		keys: getKeys(), | ||||||
|  | 	}; | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | const getKeys = () => { | ||||||
|  | 	// Get keys from file | ||||||
|  | 	if (!fs.existsSync(keysFile)) { | ||||||
|  | 		generateKeys(); | ||||||
|  | 	} else if (process.env.DEBUG) { | ||||||
|  | 		logger.info('Keys file exists OK'); | ||||||
|  | 	} | ||||||
|  | 	try { | ||||||
|  | 		return require(keysFile); | ||||||
|  | 	} catch (err) { | ||||||
|  | 		logger.error('Could not read JWT key pair from config file: ' + keysFile, err); | ||||||
|  | 		process.exit(1); | ||||||
|  | 	} | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | const generateKeys = () => { | ||||||
|  | 	logger.info('Creating a new JWT key pair...'); | ||||||
|  | 	// Now create the keys and save them in the config. | ||||||
|  | 	const key = new NodeRSA({ b: 2048 }); | ||||||
|  | 	key.generateKeyPair(); | ||||||
|  |  | ||||||
|  | 	const keys = { | ||||||
|  | 		key: key.exportKey('private').toString(), | ||||||
|  | 		pub: key.exportKey('public').toString(), | ||||||
|  | 	}; | ||||||
|  |  | ||||||
|  | 	// Write keys config | ||||||
|  | 	try { | ||||||
|  | 		fs.writeFileSync(keysFile, JSON.stringify(keys, null, 2)); | ||||||
|  | 	} catch (err) { | ||||||
|  | 		logger.error('Could not write JWT key pair to config file: ' + keysFile + ': ' + err.message); | ||||||
|  | 		process.exit(1); | ||||||
|  | 	} | ||||||
|  | 	logger.info('Wrote JWT key pair to config file: ' + keysFile); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | module.exports = { | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {string}  key   ie: 'database' or 'database.engine' | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	has: function(key) { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		const keys = key.split('.'); | ||||||
|  | 		let level  = instance; | ||||||
|  | 		let has    = true; | ||||||
|  | 		keys.forEach((keyItem) =>{ | ||||||
|  | 			if (typeof level[keyItem] === 'undefined') { | ||||||
|  | 				has = false; | ||||||
|  | 			} else { | ||||||
|  | 				level = level[keyItem]; | ||||||
|  | 			} | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		return has; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Gets a specific key from the top level | ||||||
|  | 	 * | ||||||
|  | 	 * @param {string} key | ||||||
|  | 	 * @returns {*} | ||||||
|  | 	 */ | ||||||
|  | 	get: function (key) { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		if (key && typeof instance[key] !== 'undefined') { | ||||||
|  | 			return instance[key]; | ||||||
|  | 		} | ||||||
|  | 		return instance; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Is this a sqlite configuration? | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	isSqlite: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.database.knex && instance.database.knex.client === 'sqlite3'; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Are we running in debug mdoe? | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	debug: function () { | ||||||
|  | 		return !!process.env.DEBUG; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Returns a public key | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {string} | ||||||
|  | 	 */ | ||||||
|  | 	getPublicKey: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.keys.pub; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Returns a private key | ||||||
|  | 	 * | ||||||
|  | 	 * @returns {string} | ||||||
|  | 	 */ | ||||||
|  | 	getPrivateKey: function () { | ||||||
|  | 		instance === null && configure(); | ||||||
|  | 		return instance.keys.key; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {boolean} | ||||||
|  | 	 */ | ||||||
|  | 	useLetsencryptStaging: function () { | ||||||
|  | 		return !!process.env.LE_STAGING; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {string|null} | ||||||
|  | 	 */ | ||||||
|  | 	useLetsencryptServer: function () { | ||||||
|  | 		if (process.env.LE_SERVER) { | ||||||
|  | 			return process.env.LE_SERVER; | ||||||
|  | 		} | ||||||
|  | 		return null; | ||||||
|  | 	} | ||||||
|  | }; | ||||||
| @@ -82,7 +82,16 @@ module.exports = { | |||||||
| 		this.message  = message; | 		this.message  = message; | ||||||
| 		this.public   = false; | 		this.public   = false; | ||||||
| 		this.status   = 400; | 		this.status   = 400; | ||||||
| 	} | 	}, | ||||||
|  |  | ||||||
|  | 	CommandError: function (stdErr, code, previous) { | ||||||
|  | 		Error.captureStackTrace(this, this.constructor); | ||||||
|  | 		this.name     = this.constructor.name; | ||||||
|  | 		this.previous = previous; | ||||||
|  | 		this.message  = stdErr; | ||||||
|  | 		this.code     = code; | ||||||
|  | 		this.public   = false; | ||||||
|  | 	}, | ||||||
| }; | }; | ||||||
|  |  | ||||||
| _.forEach(module.exports, function (error) { | _.forEach(module.exports, function (error) { | ||||||
|   | |||||||
| @@ -1,15 +1,5 @@ | |||||||
| const validator = require('../validator'); |  | ||||||
|  |  | ||||||
| module.exports = function (req, res, next) { | module.exports = function (req, res, next) { | ||||||
|  |  | ||||||
| 	if (req.headers.origin) { | 	if (req.headers.origin) { | ||||||
|  |  | ||||||
| 		// very relaxed validation.... |  | ||||||
| 		validator({ |  | ||||||
| 			type:    'string', |  | ||||||
| 			pattern: '^[a-z\\-]+:\\/\\/(?:[\\w\\-\\.]+(:[0-9]+)?/?)?$' |  | ||||||
| 		}, req.headers.origin) |  | ||||||
| 			.then(function () { |  | ||||||
| 		res.set({ | 		res.set({ | ||||||
| 			'Access-Control-Allow-Origin':      req.headers.origin, | 			'Access-Control-Allow-Origin':      req.headers.origin, | ||||||
| 			'Access-Control-Allow-Credentials': true, | 			'Access-Control-Allow-Credentials': true, | ||||||
| @@ -19,12 +9,8 @@ module.exports = function (req, res, next) { | |||||||
| 			'Access-Control-Expose-Headers':    'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit' | 			'Access-Control-Expose-Headers':    'X-Dataset-Total, X-Dataset-Offset, X-Dataset-Limit' | ||||||
| 		}); | 		}); | ||||||
| 		next(); | 		next(); | ||||||
| 			}) |  | ||||||
| 			.catch(next); |  | ||||||
|  |  | ||||||
| 	} else { | 	} else { | ||||||
| 		// No origin | 		// No origin | ||||||
| 		next(); | 		next(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -27,6 +27,24 @@ module.exports = { | |||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		return null; | 		return null; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	convertIntFieldsToBool: function (obj, fields) { | ||||||
|  | 		fields.forEach(function (field) { | ||||||
|  | 			if (typeof obj[field] !== 'undefined') { | ||||||
|  | 				obj[field] = obj[field] === 1; | ||||||
|  | 			} | ||||||
|  | 		}); | ||||||
|  | 		return obj; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	convertBoolFieldsToInt: function (obj, fields) { | ||||||
|  | 		fields.forEach(function (field) { | ||||||
|  | 			if (typeof obj[field] !== 'undefined') { | ||||||
|  | 				obj[field] = obj[field] ? 1 : 0; | ||||||
|  | 			} | ||||||
|  | 		}); | ||||||
|  | 		return obj; | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -1,14 +1,41 @@ | |||||||
|  | const _          = require('lodash'); | ||||||
| const exec       = require('child_process').exec; | const exec       = require('child_process').exec; | ||||||
|  | const execFile   = require('child_process').execFile; | ||||||
|  | const { Liquid } = require('liquidjs'); | ||||||
|  | const logger     = require('../logger').global; | ||||||
|  | const error      = require('./error'); | ||||||
|  |  | ||||||
| module.exports = { | module.exports = { | ||||||
|  |  | ||||||
|  | 	exec: async function(cmd, options = {}) { | ||||||
|  | 		logger.debug('CMD:', cmd); | ||||||
|  |  | ||||||
|  | 		const { stdout, stderr } = await new Promise((resolve, reject) => { | ||||||
|  | 			const child = exec(cmd, options, (isError, stdout, stderr) => { | ||||||
|  | 				if (isError) { | ||||||
|  | 					reject(new error.CommandError(stderr, isError)); | ||||||
|  | 				} else { | ||||||
|  | 					resolve({ stdout, stderr }); | ||||||
|  | 				} | ||||||
|  | 			}); | ||||||
|  |  | ||||||
|  | 			child.on('error', (e) => { | ||||||
|  | 				reject(new error.CommandError(stderr, 1, e)); | ||||||
|  | 			}); | ||||||
|  | 		}); | ||||||
|  | 		return stdout; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * @param   {String} cmd | 	 * @param   {String} cmd | ||||||
|  | 	 * @param   {Array}  args | ||||||
| 	 * @returns {Promise} | 	 * @returns {Promise} | ||||||
| 	 */ | 	 */ | ||||||
| 	exec: function (cmd) { | 	execFile: function (cmd, args) { | ||||||
|  | 		// logger.debug('CMD: ' + cmd + ' ' + (args ? args.join(' ') : '')); | ||||||
|  |  | ||||||
| 		return new Promise((resolve, reject) => { | 		return new Promise((resolve, reject) => { | ||||||
| 			exec(cmd, function (err, stdout, /*stderr*/) { | 			execFile(cmd, args, function (err, stdout, /*stderr*/) { | ||||||
| 				if (err && typeof err === 'object') { | 				if (err && typeof err === 'object') { | ||||||
| 					reject(err); | 					reject(err); | ||||||
| 				} else { | 				} else { | ||||||
| @@ -16,5 +43,64 @@ module.exports = { | |||||||
| 				} | 				} | ||||||
| 			}); | 			}); | ||||||
| 		}); | 		}); | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Used in objection query builder | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {Array}  omissions | ||||||
|  | 	 * @returns {Function} | ||||||
|  | 	 */ | ||||||
|  | 	omitRow: function (omissions) { | ||||||
|  | 		/** | ||||||
|  | 		 * @param   {Object} row | ||||||
|  | 		 * @returns {Object} | ||||||
|  | 		 */ | ||||||
|  | 		return (row) => { | ||||||
|  | 			return _.omit(row, omissions); | ||||||
|  | 		}; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * Used in objection query builder | ||||||
|  | 	 * | ||||||
|  | 	 * @param   {Array}  omissions | ||||||
|  | 	 * @returns {Function} | ||||||
|  | 	 */ | ||||||
|  | 	omitRows: function (omissions) { | ||||||
|  | 		/** | ||||||
|  | 		 * @param   {Array} rows | ||||||
|  | 		 * @returns {Object} | ||||||
|  | 		 */ | ||||||
|  | 		return (rows) => { | ||||||
|  | 			rows.forEach((row, idx) => { | ||||||
|  | 				rows[idx] = _.omit(row, omissions); | ||||||
|  | 			}); | ||||||
|  | 			return rows; | ||||||
|  | 		}; | ||||||
|  | 	}, | ||||||
|  |  | ||||||
|  | 	/** | ||||||
|  | 	 * @returns {Object} Liquid render engine | ||||||
|  | 	 */ | ||||||
|  | 	getRenderEngine: function () { | ||||||
|  | 		const renderEngine = new Liquid({ | ||||||
|  | 			root: __dirname + '/../templates/' | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		/** | ||||||
|  | 		 * nginxAccessRule expects the object given to have 2 properties: | ||||||
|  | 		 * | ||||||
|  | 		 * directive  string | ||||||
|  | 		 * address    string | ||||||
|  | 		 */ | ||||||
|  | 		renderEngine.registerFilter('nginxAccessRule', (v) => { | ||||||
|  | 			if (typeof v.directive !== 'undefined' && typeof v.address !== 'undefined' && v.directive && v.address) { | ||||||
|  | 				return `${v.directive} ${v.address};`; | ||||||
|  | 			} | ||||||
|  | 			return ''; | ||||||
|  | 		}); | ||||||
|  |  | ||||||
|  | 		return renderEngine; | ||||||
| 	} | 	} | ||||||
| }; | }; | ||||||
|   | |||||||
| @@ -1,13 +1,12 @@ | |||||||
|  | const Ajv   = require('ajv/dist/2020'); | ||||||
| const error = require('../error'); | const error = require('../error'); | ||||||
| const path   = require('path'); |  | ||||||
| const parser = require('json-schema-ref-parser'); |  | ||||||
|  |  | ||||||
| const ajv = require('ajv')({ | const ajv = new Ajv({ | ||||||
| 	verbose:         true, | 	verbose:         true, | ||||||
| 	validateSchema: true, | 	allErrors:       true, | ||||||
| 	allErrors:      false, | 	allowUnionTypes: true, | ||||||
| 	format:         'full', | 	strict:          false, | ||||||
| 	coerceTypes:    true | 	coerceTypes:     true, | ||||||
| }); | }); | ||||||
|  |  | ||||||
| /** | /** | ||||||
| @@ -17,12 +16,18 @@ const ajv = require('ajv')({ | |||||||
|  */ |  */ | ||||||
| function apiValidator (schema, payload/*, description*/) { | function apiValidator (schema, payload/*, description*/) { | ||||||
| 	return new Promise(function Promise_apiValidator (resolve, reject) { | 	return new Promise(function Promise_apiValidator (resolve, reject) { | ||||||
| 		if (typeof payload === 'undefined') { | 		if (schema === null) { | ||||||
| 			reject(new error.ValidationError('Payload is undefined')); | 			reject(new error.ValidationError('Schema is undefined')); | ||||||
|  | 			return; | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		let validate = ajv.compile(schema); | 		if (typeof payload === 'undefined') { | ||||||
| 		let valid    = validate(payload); | 			reject(new error.ValidationError('Payload is undefined')); | ||||||
|  | 			return; | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		const validate = ajv.compile(schema); | ||||||
|  | 		const valid    = validate(payload); | ||||||
|  |  | ||||||
| 		if (valid && !validate.errors) { | 		if (valid && !validate.errors) { | ||||||
| 			resolve(payload); | 			resolve(payload); | ||||||
| @@ -35,11 +40,4 @@ function apiValidator (schema, payload/*, description*/) { | |||||||
| 	}); | 	}); | ||||||
| } | } | ||||||
|  |  | ||||||
| apiValidator.loadSchemas = parser |  | ||||||
| 	.dereference(path.resolve('schema/index.json')) |  | ||||||
| 	.then((schema) => { |  | ||||||
| 		ajv.addSchema(schema); |  | ||||||
| 		return schema; |  | ||||||
| 	}); |  | ||||||
|  |  | ||||||
| module.exports = apiValidator; | module.exports = apiValidator; | ||||||
|   | |||||||
| @@ -1,17 +1,17 @@ | |||||||
| const _                 = require('lodash'); | const _                 = require('lodash'); | ||||||
|  | const Ajv               = require('ajv/dist/2020'); | ||||||
| const error             = require('../error'); | const error             = require('../error'); | ||||||
| const definitions = require('../../schema/definitions.json'); | const commonDefinitions = require('../../schema/common.json'); | ||||||
|  |  | ||||||
| RegExp.prototype.toJSON = RegExp.prototype.toString; | RegExp.prototype.toJSON = RegExp.prototype.toString; | ||||||
|  |  | ||||||
| const ajv = require('ajv')({ | const ajv = new Ajv({ | ||||||
| 	verbose:     true, //process.env.NODE_ENV === 'development', | 	verbose:         true, | ||||||
| 	allErrors:       true, | 	allErrors:       true, | ||||||
| 	format:      'full',  // strict regexes for format checks | 	allowUnionTypes: true, | ||||||
| 	coerceTypes:     true, | 	coerceTypes:     true, | ||||||
| 	schemas:     [ | 	strict:          false, | ||||||
| 		definitions | 	schemas:         [commonDefinitions] | ||||||
| 	] |  | ||||||
| }); | }); | ||||||
|  |  | ||||||
| /** | /** | ||||||
| @@ -27,23 +27,19 @@ function validator (schema, payload) { | |||||||
| 		} else { | 		} else { | ||||||
| 			try { | 			try { | ||||||
| 				let validate = ajv.compile(schema); | 				let validate = ajv.compile(schema); | ||||||
|  |  | ||||||
| 				let valid    = validate(payload); | 				let valid    = validate(payload); | ||||||
|  |  | ||||||
| 				if (valid && !validate.errors) { | 				if (valid && !validate.errors) { | ||||||
| 					resolve(_.cloneDeep(payload)); | 					resolve(_.cloneDeep(payload)); | ||||||
| 				} else { | 				} else { | ||||||
| 					let message = ajv.errorsText(validate.errors); | 					let message = ajv.errorsText(validate.errors); | ||||||
| 					reject(new error.InternalValidationError(message)); | 					reject(new error.InternalValidationError(message)); | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 			} catch (err) { | 			} catch (err) { | ||||||
| 				reject(err); | 				reject(err); | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 	}); | 	}); | ||||||
|  |  | ||||||
| } | } | ||||||
|  |  | ||||||
| module.exports = validator; | module.exports = validator; | ||||||
|   | |||||||
| @@ -7,6 +7,7 @@ module.exports = { | |||||||
| 	access:    new Signale({scope: 'Access   '}), | 	access:    new Signale({scope: 'Access   '}), | ||||||
| 	nginx:     new Signale({scope: 'Nginx    '}), | 	nginx:     new Signale({scope: 'Nginx    '}), | ||||||
| 	ssl:       new Signale({scope: 'SSL      '}), | 	ssl:       new Signale({scope: 'SSL      '}), | ||||||
|  | 	certbot:   new Signale({scope: 'Certbot  '}), | ||||||
| 	import:    new Signale({scope: 'Importer '}), | 	import:    new Signale({scope: 'Importer '}), | ||||||
| 	setup:     new Signale({scope: 'Setup    '}), | 	setup:     new Signale({scope: 'Setup    '}), | ||||||
| 	ip_ranges: new Signale({scope: 'IP Ranges'}) | 	ip_ranges: new Signale({scope: 'IP Ranges'}) | ||||||
|   | |||||||
| @@ -22,22 +22,6 @@ exports.up = function (knex/*, Promise*/) { | |||||||
| 	}) | 	}) | ||||||
| 		.then(() => { | 		.then(() => { | ||||||
| 			logger.info('[' + migrate_name + '] setting Table created'); | 			logger.info('[' + migrate_name + '] setting Table created'); | ||||||
|  |  | ||||||
| 			// TODO: add settings |  | ||||||
| 			let settingModel = require('../models/setting'); |  | ||||||
|  |  | ||||||
| 			return settingModel |  | ||||||
| 				.query() |  | ||||||
| 				.insert({ |  | ||||||
| 					id:          'default-site', |  | ||||||
| 					name:        'Default Site', |  | ||||||
| 					description: 'What to show when Nginx is hit with an unknown Host', |  | ||||||
| 					value:       'congratulations', |  | ||||||
| 					meta:        {} |  | ||||||
| 				}); |  | ||||||
| 		}) |  | ||||||
| 		.then(() => { |  | ||||||
| 			logger.info('[' + migrate_name + '] Default settings added'); |  | ||||||
| 		}); | 		}); | ||||||
| }; | }; | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										53
									
								
								backend/migrations/20200410143839_access_list_client.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										53
									
								
								backend/migrations/20200410143839_access_list_client.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,53 @@ | |||||||
|  | const migrate_name = 'access_list_client'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  |  | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.createTable('access_list_client', (table) => { | ||||||
|  | 		table.increments().primary(); | ||||||
|  | 		table.dateTime('created_on').notNull(); | ||||||
|  | 		table.dateTime('modified_on').notNull(); | ||||||
|  | 		table.integer('access_list_id').notNull().unsigned(); | ||||||
|  | 		table.string('address').notNull(); | ||||||
|  | 		table.string('directive').notNull(); | ||||||
|  | 		table.json('meta').notNull(); | ||||||
|  |  | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list_client Table created'); | ||||||
|  |  | ||||||
|  | 			return knex.schema.table('access_list', function (access_list) { | ||||||
|  | 				access_list.integer('satify_any').notNull().defaultTo(0); | ||||||
|  | 			}); | ||||||
|  | 		}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.dropTable('access_list_client') | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list_client Table dropped'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										34
									
								
								backend/migrations/20200410143840_access_list_client_fix.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										34
									
								
								backend/migrations/20200410143840_access_list_client_fix.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,34 @@ | |||||||
|  | const migrate_name = 'access_list_client_fix'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('access_list', function (access_list) { | ||||||
|  | 		access_list.renameColumn('satify_any', 'satisfy_any'); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex, Promise) { | ||||||
|  | 	logger.warn('[' + migrate_name + '] You can\'t migrate down this one.'); | ||||||
|  | 	return Promise.resolve(true); | ||||||
|  | }; | ||||||
							
								
								
									
										41
									
								
								backend/migrations/20201014143841_pass_auth.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								backend/migrations/20201014143841_pass_auth.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | const migrate_name = 'pass_auth'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object}  knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  |  | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('access_list', function (access_list) { | ||||||
|  | 		access_list.integer('pass_auth').notNull().defaultTo(1); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('access_list', function (access_list) { | ||||||
|  | 		access_list.dropColumn('pass_auth'); | ||||||
|  | 	}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			logger.info('[' + migrate_name + '] access_list pass_auth Column dropped'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										41
									
								
								backend/migrations/20210210154702_redirection_scheme.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								backend/migrations/20210210154702_redirection_scheme.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | const migrate_name = 'redirection_scheme'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object} knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  |  | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('redirection_host', (table) => { | ||||||
|  | 		table.string('forward_scheme').notNull().defaultTo('$scheme'); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] redirection_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param   {Object} knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('redirection_host', (table) => { | ||||||
|  | 		table.dropColumn('forward_scheme'); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] redirection_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										41
									
								
								backend/migrations/20210210154703_redirection_status_code.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								backend/migrations/20210210154703_redirection_status_code.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | const migrate_name = 'redirection_status_code'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param   {Object} knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  |  | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('redirection_host', (table) => { | ||||||
|  | 		table.integer('forward_http_code').notNull().unsigned().defaultTo(302); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] redirection_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param   {Object} knex | ||||||
|  |  * @param   {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('redirection_host', (table) => { | ||||||
|  | 		table.dropColumn('forward_http_code'); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] redirection_host Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										40
									
								
								backend/migrations/20210423103500_stream_domain.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								backend/migrations/20210423103500_stream_domain.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,40 @@ | |||||||
|  | const migrate_name = 'stream_domain'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  | 	* Migrate | ||||||
|  | 	* | ||||||
|  | 	* @see http://knexjs.org/#Schema | ||||||
|  | 	* | ||||||
|  | 	* @param   {Object} knex | ||||||
|  | 	* @param   {Promise} Promise | ||||||
|  | 	* @returns {Promise} | ||||||
|  | 	*/ | ||||||
|  | exports.up = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('stream', (table) => { | ||||||
|  | 		table.renameColumn('forward_ip', 'forwarding_host'); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  | 	* Undo Migrate | ||||||
|  | 	* | ||||||
|  | 	* @param   {Object} knex | ||||||
|  | 	* @param   {Promise} Promise | ||||||
|  | 	* @returns {Promise} | ||||||
|  | 	*/ | ||||||
|  | exports.down = function (knex/*, Promise*/) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return knex.schema.table('stream', (table) => { | ||||||
|  | 		table.renameColumn('forwarding_host', 'forward_ip'); | ||||||
|  | 	}) | ||||||
|  | 		.then(function () { | ||||||
|  | 			logger.info('[' + migrate_name + '] stream Table altered'); | ||||||
|  | 		}); | ||||||
|  | }; | ||||||
							
								
								
									
										50
									
								
								backend/migrations/20211108145214_regenerate_default_host.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										50
									
								
								backend/migrations/20211108145214_regenerate_default_host.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,50 @@ | |||||||
|  | const migrate_name  = 'stream_domain'; | ||||||
|  | const logger        = require('../logger').migrate; | ||||||
|  | const internalNginx = require('../internal/nginx'); | ||||||
|  |  | ||||||
|  | async function regenerateDefaultHost(knex) { | ||||||
|  | 	const row = await knex('setting').select('*').where('id', 'default-site').first(); | ||||||
|  |  | ||||||
|  | 	if (!row) { | ||||||
|  | 		return Promise.resolve(); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	return internalNginx.deleteConfig('default') | ||||||
|  | 		.then(() => { | ||||||
|  | 			return internalNginx.generateConfig('default', row); | ||||||
|  | 		}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			return internalNginx.test(); | ||||||
|  | 		}) | ||||||
|  | 		.then(() => { | ||||||
|  | 			return internalNginx.reload(); | ||||||
|  | 		}); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | /** | ||||||
|  | 	* Migrate | ||||||
|  | 	* | ||||||
|  | 	* @see http://knexjs.org/#Schema | ||||||
|  | 	* | ||||||
|  | 	* @param   {Object} knex | ||||||
|  | 	* @param   {Promise} Promise | ||||||
|  | 	* @returns {Promise} | ||||||
|  | 	*/ | ||||||
|  | exports.up = function (knex) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Up...'); | ||||||
|  |  | ||||||
|  | 	return regenerateDefaultHost(knex); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  | 	* Undo Migrate | ||||||
|  | 	* | ||||||
|  | 	* @param   {Object} knex | ||||||
|  | 	* @param   {Promise} Promise | ||||||
|  | 	* @returns {Promise} | ||||||
|  | 	*/ | ||||||
|  | exports.down = function (knex) { | ||||||
|  | 	logger.info('[' + migrate_name + '] Migrating Down...'); | ||||||
|  |  | ||||||
|  | 	return regenerateDefaultHost(knex); | ||||||
|  | }; | ||||||
							
								
								
									
										39
									
								
								backend/migrations/20241209062244_ssl_key_type.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										39
									
								
								backend/migrations/20241209062244_ssl_key_type.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,39 @@ | |||||||
|  | const migrate_name = 'identifier_for_migrate'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex) { | ||||||
|  |  | ||||||
|  | 	logger.info(`[${migrate_name}] Migrating Up...`); | ||||||
|  |  | ||||||
|  | 	return knex.schema.alterTable('proxy_host', (table) => { | ||||||
|  | 		table.enum('ssl_key_type', ['ecdsa', 'rsa']).defaultTo('ecdsa').notNullable(); | ||||||
|  | 	}).then(() => { | ||||||
|  | 		logger.info(`[${migrate_name}] Column 'ssl_key_type' added to table 'proxy_host'`); | ||||||
|  | 	}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex) { | ||||||
|  | 	logger.info(`[${migrate_name}] Migrating Down...`); | ||||||
|  |  | ||||||
|  | 	return knex.schema.alterTable('proxy_host', (table) => { | ||||||
|  | 		table.dropColumn('ssl_key_type'); | ||||||
|  | 	}).then(() => { | ||||||
|  | 		logger.info(`[${migrate_name}] Column 'ssl_key_type' removed from table 'proxy_host'`); | ||||||
|  | 	}); | ||||||
|  | }; | ||||||
							
								
								
									
										39
									
								
								backend/migrations/20241211081223_ssl_key_type_in_proxy.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										39
									
								
								backend/migrations/20241211081223_ssl_key_type_in_proxy.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,39 @@ | |||||||
|  | const migrate_name = 'identifier_for_migrate'; | ||||||
|  | const logger       = require('../logger').migrate; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Migrate | ||||||
|  |  * | ||||||
|  |  * @see http://knexjs.org/#Schema | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.up = function (knex) { | ||||||
|  |  | ||||||
|  | 	logger.info(`[${migrate_name}] Migrating Up...`); | ||||||
|  |  | ||||||
|  | 	return knex.schema.alterTable('certificate', (table) => { | ||||||
|  | 		table.enum('ssl_key_type', ['ecdsa', 'rsa']).defaultTo('ecdsa').notNullable(); | ||||||
|  | 	}).then(() => { | ||||||
|  | 		logger.info(`[${migrate_name}] Column 'ssl_key_type' added to table 'proxy_host'`); | ||||||
|  | 	}); | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | /** | ||||||
|  |  * Undo Migrate | ||||||
|  |  * | ||||||
|  |  * @param {Object} knex | ||||||
|  |  * @param {Promise} Promise | ||||||
|  |  * @returns {Promise} | ||||||
|  |  */ | ||||||
|  | exports.down = function (knex) { | ||||||
|  | 	logger.info(`[${migrate_name}] Migrating Down...`); | ||||||
|  |  | ||||||
|  | 	return knex.schema.alterTable('certificate', (table) => { | ||||||
|  | 		table.dropColumn('ssl_key_type'); | ||||||
|  | 	}).then(() => { | ||||||
|  | 		logger.info(`[${migrate_name}] Column 'ssl_key_type' removed from table 'proxy_host'`); | ||||||
|  | 	}); | ||||||
|  | }; | ||||||
| @@ -2,16 +2,25 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db               = require('../db'); | const db               = require('../db'); | ||||||
|  | const helpers          = require('../lib/helpers'); | ||||||
| const Model            = require('objection').Model; | const Model            = require('objection').Model; | ||||||
| const User             = require('./user'); | const User             = require('./user'); | ||||||
| const AccessListAuth   = require('./access_list_auth'); | const AccessListAuth   = require('./access_list_auth'); | ||||||
|  | const AccessListClient = require('./access_list_client'); | ||||||
|  | const now              = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'satisfy_any', | ||||||
|  | 	'pass_auth', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class AccessList extends Model { | class AccessList extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| @@ -20,7 +29,17 @@ class AccessList extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -48,7 +67,6 @@ class AccessList extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			items: { | 			items: { | ||||||
| @@ -57,9 +75,14 @@ class AccessList extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'access_list.id', | 					from: 'access_list.id', | ||||||
| 					to:   'access_list_auth.access_list_id' | 					to:   'access_list_auth.access_list_id' | ||||||
|  | 				} | ||||||
| 			}, | 			}, | ||||||
| 				modify: function (qb) { | 			clients: { | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'access_list_id', 'meta']); | 				relation:   Model.HasManyRelation, | ||||||
|  | 				modelClass: AccessListClient, | ||||||
|  | 				join:       { | ||||||
|  | 					from: 'access_list.id', | ||||||
|  | 					to:   'access_list_client.access_list_id' | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			proxy_hosts: { | 			proxy_hosts: { | ||||||
| @@ -71,7 +94,6 @@ class AccessList extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('proxy_host.is_deleted', 0); | 					qb.where('proxy_host.is_deleted', 0); | ||||||
| 					qb.omit(['is_deleted', 'meta']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -3,13 +3,14 @@ | |||||||
|  |  | ||||||
| const db    = require('../db'); | const db    = require('../db'); | ||||||
| const Model = require('objection').Model; | const Model = require('objection').Model; | ||||||
|  | const now   = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
| class AccessListAuth extends Model { | class AccessListAuth extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| @@ -18,7 +19,7 @@ class AccessListAuth extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -44,7 +45,6 @@ class AccessListAuth extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('access_list.is_deleted', 0); | 					qb.where('access_list.is_deleted', 0); | ||||||
| 					qb.omit(['created_on', 'modified_on', 'is_deleted', 'access_list_id']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
							
								
								
									
										54
									
								
								backend/models/access_list_client.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								backend/models/access_list_client.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,54 @@ | |||||||
|  | // Objection Docs: | ||||||
|  | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
|  | const db    = require('../db'); | ||||||
|  | const Model = require('objection').Model; | ||||||
|  | const now   = require('./now_helper'); | ||||||
|  |  | ||||||
|  | Model.knex(db); | ||||||
|  |  | ||||||
|  | class AccessListClient extends Model { | ||||||
|  | 	$beforeInsert () { | ||||||
|  | 		this.created_on  = now(); | ||||||
|  | 		this.modified_on = now(); | ||||||
|  |  | ||||||
|  | 		// Default for meta | ||||||
|  | 		if (typeof this.meta === 'undefined') { | ||||||
|  | 			this.meta = {}; | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$beforeUpdate () { | ||||||
|  | 		this.modified_on = now(); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	static get name () { | ||||||
|  | 		return 'AccessListClient'; | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	static get tableName () { | ||||||
|  | 		return 'access_list_client'; | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	static get jsonAttributes () { | ||||||
|  | 		return ['meta']; | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	static get relationMappings () { | ||||||
|  | 		return { | ||||||
|  | 			access_list: { | ||||||
|  | 				relation:   Model.HasOneRelation, | ||||||
|  | 				modelClass: require('./access_list'), | ||||||
|  | 				join:       { | ||||||
|  | 					from: 'access_list_client.access_list_id', | ||||||
|  | 					to:   'access_list.id' | ||||||
|  | 				}, | ||||||
|  | 				modify: function (qb) { | ||||||
|  | 					qb.where('access_list.is_deleted', 0); | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		}; | ||||||
|  | 	} | ||||||
|  | } | ||||||
|  |  | ||||||
|  | module.exports = AccessListClient; | ||||||
| @@ -4,13 +4,14 @@ | |||||||
| const db    = require('../db'); | const db    = require('../db'); | ||||||
| const Model = require('objection').Model; | const Model = require('objection').Model; | ||||||
| const User  = require('./user'); | const User  = require('./user'); | ||||||
|  | const now   = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
| class AuditLog extends Model { | class AuditLog extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| @@ -19,7 +20,7 @@ class AuditLog extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -42,9 +43,6 @@ class AuditLog extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'audit_log.user_id', | 					from: 'audit_log.user_id', | ||||||
| 					to:   'user.id' | 					to:   'user.id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -3,11 +3,17 @@ | |||||||
|  |  | ||||||
| const bcrypt  = require('bcrypt'); | const bcrypt  = require('bcrypt'); | ||||||
| const db      = require('../db'); | const db      = require('../db'); | ||||||
|  | const helpers = require('../lib/helpers'); | ||||||
| const Model   = require('objection').Model; | const Model   = require('objection').Model; | ||||||
| const User    = require('./user'); | const User    = require('./user'); | ||||||
|  | const now     = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| function encryptPassword () { | function encryptPassword () { | ||||||
| 	/* jshint -W040 */ | 	/* jshint -W040 */ | ||||||
| 	let _this = this; | 	let _this = this; | ||||||
| @@ -24,8 +30,8 @@ function encryptPassword () { | |||||||
|  |  | ||||||
| class Auth extends Model { | class Auth extends Model { | ||||||
| 	$beforeInsert (queryContext) { | 	$beforeInsert (queryContext) { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| @@ -36,10 +42,20 @@ class Auth extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate (queryContext) { | 	$beforeUpdate (queryContext) { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
| 		return encryptPassword.apply(this, queryContext); | 		return encryptPassword.apply(this, queryContext); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	/** | 	/** | ||||||
| 	 * Verify a plain password against the encrypted password | 	 * Verify a plain password against the encrypted password | ||||||
| 	 * | 	 * | ||||||
| @@ -73,9 +89,6 @@ class Auth extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				filter: { | 				filter: { | ||||||
| 					is_deleted: 0 | 					is_deleted: 0 | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -2,19 +2,25 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db      = require('../db'); | const db      = require('../db'); | ||||||
|  | const helpers = require('../lib/helpers'); | ||||||
| const Model   = require('objection').Model; | const Model   = require('objection').Model; | ||||||
| const User    = require('./user'); | const User    = require('./user'); | ||||||
|  | const now     = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class Certificate extends Model { | class Certificate extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for expires_on | 		// Default for expires_on | ||||||
| 		if (typeof this.expires_on === 'undefined') { | 		if (typeof this.expires_on === 'undefined') { | ||||||
| 			this.expires_on = Model.raw('NOW()'); | 			this.expires_on = now(); | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		// Default for domain_names | 		// Default for domain_names | ||||||
| @@ -31,7 +37,7 @@ class Certificate extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Sort domain_names | 		// Sort domain_names | ||||||
| 		if (typeof this.domain_names !== 'undefined') { | 		if (typeof this.domain_names !== 'undefined') { | ||||||
| @@ -39,6 +45,16 @@ class Certificate extends Model { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| 		return 'Certificate'; | 		return 'Certificate'; | ||||||
| 	} | 	} | ||||||
| @@ -62,7 +78,6 @@ class Certificate extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -2,16 +2,23 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db          = require('../db'); | const db          = require('../db'); | ||||||
|  | const helpers     = require('../lib/helpers'); | ||||||
| const Model       = require('objection').Model; | const Model       = require('objection').Model; | ||||||
| const User        = require('./user'); | const User        = require('./user'); | ||||||
| const Certificate = require('./certificate'); | const Certificate = require('./certificate'); | ||||||
|  | const now         = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'enabled', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class DeadHost extends Model { | class DeadHost extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for domain_names | 		// Default for domain_names | ||||||
| 		if (typeof this.domain_names === 'undefined') { | 		if (typeof this.domain_names === 'undefined') { | ||||||
| @@ -27,7 +34,7 @@ class DeadHost extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Sort domain_names | 		// Sort domain_names | ||||||
| 		if (typeof this.domain_names !== 'undefined') { | 		if (typeof this.domain_names !== 'undefined') { | ||||||
| @@ -35,6 +42,16 @@ class DeadHost extends Model { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| 		return 'DeadHost'; | 		return 'DeadHost'; | ||||||
| 	} | 	} | ||||||
| @@ -58,7 +75,6 @@ class DeadHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -70,7 +86,6 @@ class DeadHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
							
								
								
									
										13
									
								
								backend/models/now_helper.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								backend/models/now_helper.js
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,13 @@ | |||||||
|  | const db     = require('../db'); | ||||||
|  | const config = require('../lib/config'); | ||||||
|  | const Model  = require('objection').Model; | ||||||
|  |  | ||||||
|  | Model.knex(db); | ||||||
|  |  | ||||||
|  | module.exports = function () { | ||||||
|  | 	if (config.isSqlite()) { | ||||||
|  | 		// eslint-disable-next-line | ||||||
|  | 		return Model.raw("datetime('now','localtime')"); | ||||||
|  | 	} | ||||||
|  | 	return Model.raw('NOW()'); | ||||||
|  | }; | ||||||
| @@ -2,17 +2,31 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db          = require('../db'); | const db          = require('../db'); | ||||||
|  | const helpers     = require('../lib/helpers'); | ||||||
| const Model       = require('objection').Model; | const Model       = require('objection').Model; | ||||||
| const User        = require('./user'); | const User        = require('./user'); | ||||||
| const AccessList  = require('./access_list'); | const AccessList  = require('./access_list'); | ||||||
| const Certificate = require('./certificate'); | const Certificate = require('./certificate'); | ||||||
|  | const now         = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'ssl_forced', | ||||||
|  | 	'caching_enabled', | ||||||
|  | 	'block_exploits', | ||||||
|  | 	'allow_websocket_upgrade', | ||||||
|  | 	'http2_support', | ||||||
|  | 	'enabled', | ||||||
|  | 	'hsts_enabled', | ||||||
|  | 	'hsts_subdomains', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class ProxyHost extends Model { | class ProxyHost extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for domain_names | 		// Default for domain_names | ||||||
| 		if (typeof this.domain_names === 'undefined') { | 		if (typeof this.domain_names === 'undefined') { | ||||||
| @@ -28,7 +42,7 @@ class ProxyHost extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Sort domain_names | 		// Sort domain_names | ||||||
| 		if (typeof this.domain_names !== 'undefined') { | 		if (typeof this.domain_names !== 'undefined') { | ||||||
| @@ -36,6 +50,16 @@ class ProxyHost extends Model { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| 		return 'ProxyHost'; | 		return 'ProxyHost'; | ||||||
| 	} | 	} | ||||||
| @@ -59,7 +83,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			access_list: { | 			access_list: { | ||||||
| @@ -71,7 +94,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('access_list.is_deleted', 0); | 					qb.where('access_list.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -83,7 +105,6 @@ class ProxyHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -1,17 +1,28 @@ | |||||||
|  |  | ||||||
| // Objection Docs: | // Objection Docs: | ||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db          = require('../db'); | const db          = require('../db'); | ||||||
|  | const helpers     = require('../lib/helpers'); | ||||||
| const Model       = require('objection').Model; | const Model       = require('objection').Model; | ||||||
| const User        = require('./user'); | const User        = require('./user'); | ||||||
| const Certificate = require('./certificate'); | const Certificate = require('./certificate'); | ||||||
|  | const now         = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'enabled', | ||||||
|  | 	'preserve_path', | ||||||
|  | 	'ssl_forced', | ||||||
|  | 	'block_exploits', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class RedirectionHost extends Model { | class RedirectionHost extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for domain_names | 		// Default for domain_names | ||||||
| 		if (typeof this.domain_names === 'undefined') { | 		if (typeof this.domain_names === 'undefined') { | ||||||
| @@ -27,7 +38,7 @@ class RedirectionHost extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Sort domain_names | 		// Sort domain_names | ||||||
| 		if (typeof this.domain_names !== 'undefined') { | 		if (typeof this.domain_names !== 'undefined') { | ||||||
| @@ -35,6 +46,16 @@ class RedirectionHost extends Model { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| 		return 'RedirectionHost'; | 		return 'RedirectionHost'; | ||||||
| 	} | 	} | ||||||
| @@ -58,7 +79,6 @@ class RedirectionHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			}, | 			}, | ||||||
| 			certificate: { | 			certificate: { | ||||||
| @@ -70,7 +90,6 @@ class RedirectionHost extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('certificate.is_deleted', 0); | 					qb.where('certificate.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -2,15 +2,23 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db      = require('../db'); | const db      = require('../db'); | ||||||
|  | const helpers = require('../lib/helpers'); | ||||||
| const Model   = require('objection').Model; | const Model   = require('objection').Model; | ||||||
| const User    = require('./user'); | const User    = require('./user'); | ||||||
|  | const now     = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'tcp_forwarding', | ||||||
|  | 	'udp_forwarding', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class Stream extends Model { | class Stream extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for meta | 		// Default for meta | ||||||
| 		if (typeof this.meta === 'undefined') { | 		if (typeof this.meta === 'undefined') { | ||||||
| @@ -19,7 +27,17 @@ class Stream extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -45,7 +63,6 @@ class Stream extends Model { | |||||||
| 				}, | 				}, | ||||||
| 				modify: function (qb) { | 				modify: function (qb) { | ||||||
| 					qb.where('user.is_deleted', 0); | 					qb.where('user.is_deleted', 0); | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'is_deleted', 'email', 'roles']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -4,36 +4,38 @@ | |||||||
|  */ |  */ | ||||||
|  |  | ||||||
| const _      = require('lodash'); | const _      = require('lodash'); | ||||||
| const config = require('config'); |  | ||||||
| const jwt    = require('jsonwebtoken'); | const jwt    = require('jsonwebtoken'); | ||||||
| const crypto = require('crypto'); | const crypto = require('crypto'); | ||||||
|  | const config = require('../lib/config'); | ||||||
| const error  = require('../lib/error'); | const error  = require('../lib/error'); | ||||||
|  | const logger = require('../logger').global; | ||||||
| const ALGO   = 'RS256'; | const ALGO   = 'RS256'; | ||||||
|  |  | ||||||
| module.exports = function () { | module.exports = function () { | ||||||
| 	const public_key  = config.get('jwt.pub'); |  | ||||||
| 	const private_key = config.get('jwt.key'); |  | ||||||
|  |  | ||||||
| 	let token_data = {}; | 	let token_data = {}; | ||||||
|  |  | ||||||
| 	let self = { | 	const self = { | ||||||
| 		/** | 		/** | ||||||
| 		 * @param {Object}  payload | 		 * @param {Object}  payload | ||||||
| 		 * @returns {Promise} | 		 * @returns {Promise} | ||||||
| 		 */ | 		 */ | ||||||
| 		create: (payload) => { | 		create: (payload) => { | ||||||
|  | 			if (!config.getPrivateKey()) { | ||||||
|  | 				logger.error('Private key is empty!'); | ||||||
|  | 			} | ||||||
| 			// sign with RSA SHA256 | 			// sign with RSA SHA256 | ||||||
| 			let options = { | 			const options = { | ||||||
| 				algorithm: ALGO, | 				algorithm: ALGO, | ||||||
| 				expiresIn: payload.expiresIn || '1d' | 				expiresIn: payload.expiresIn || '1d' | ||||||
| 			}; | 			}; | ||||||
|  |  | ||||||
| 			payload.jti = crypto.randomBytes(12) | 			payload.jti = crypto.randomBytes(12) | ||||||
| 				.toString('base64') | 				.toString('base64') | ||||||
| 				.substr(-8); | 				.substring(-8); | ||||||
|  |  | ||||||
| 			return new Promise((resolve, reject) => { | 			return new Promise((resolve, reject) => { | ||||||
| 				jwt.sign(payload, private_key, options, (err, token) => { | 				jwt.sign(payload, config.getPrivateKey(), options, (err, token) => { | ||||||
| 					if (err) { | 					if (err) { | ||||||
| 						reject(err); | 						reject(err); | ||||||
| 					} else { | 					} else { | ||||||
| @@ -52,12 +54,15 @@ module.exports = function () { | |||||||
| 		 * @returns {Promise} | 		 * @returns {Promise} | ||||||
| 		 */ | 		 */ | ||||||
| 		load: function (token) { | 		load: function (token) { | ||||||
|  | 			if (!config.getPublicKey()) { | ||||||
|  | 				logger.error('Public key is empty!'); | ||||||
|  | 			} | ||||||
| 			return new Promise((resolve, reject) => { | 			return new Promise((resolve, reject) => { | ||||||
| 				try { | 				try { | ||||||
| 					if (!token || token === null || token === 'null') { | 					if (!token || token === null || token === 'null') { | ||||||
| 						reject(new error.AuthError('Empty token')); | 						reject(new error.AuthError('Empty token')); | ||||||
| 					} else { | 					} else { | ||||||
| 						jwt.verify(token, public_key, {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | 						jwt.verify(token, config.getPublicKey(), {ignoreExpiration: false, algorithms: [ALGO]}, (err, result) => { | ||||||
| 							if (err) { | 							if (err) { | ||||||
|  |  | ||||||
| 								if (err.name === 'TokenExpiredError') { | 								if (err.name === 'TokenExpiredError') { | ||||||
| @@ -72,8 +77,6 @@ module.exports = function () { | |||||||
| 								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'. | 								// Hack: some tokens out in the wild have a scope of 'all' instead of 'user'. | ||||||
| 								// For 30 days at least, we need to replace 'all' with user. | 								// For 30 days at least, we need to replace 'all' with user. | ||||||
| 								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) { | 								if ((typeof token_data.scope !== 'undefined' && _.indexOf(token_data.scope, 'all') !== -1)) { | ||||||
| 									//console.log('Warning! Replacing "all" scope with "user"'); |  | ||||||
|  |  | ||||||
| 									token_data.scope = ['user']; | 									token_data.scope = ['user']; | ||||||
| 								} | 								} | ||||||
|  |  | ||||||
| @@ -123,7 +126,7 @@ module.exports = function () { | |||||||
| 		 * @returns {Integer} | 		 * @returns {Integer} | ||||||
| 		 */ | 		 */ | ||||||
| 		getUserId: (default_value) => { | 		getUserId: (default_value) => { | ||||||
| 			let attrs = self.get('attrs'); | 			const attrs = self.get('attrs'); | ||||||
| 			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) { | 			if (attrs && typeof attrs.id !== 'undefined' && attrs.id) { | ||||||
| 				return attrs.id; | 				return attrs.id; | ||||||
| 			} | 			} | ||||||
|   | |||||||
| @@ -2,15 +2,22 @@ | |||||||
| // http://vincit.github.io/objection.js/ | // http://vincit.github.io/objection.js/ | ||||||
|  |  | ||||||
| const db             = require('../db'); | const db             = require('../db'); | ||||||
|  | const helpers        = require('../lib/helpers'); | ||||||
| const Model          = require('objection').Model; | const Model          = require('objection').Model; | ||||||
| const UserPermission = require('./user_permission'); | const UserPermission = require('./user_permission'); | ||||||
|  | const now            = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
|  | const boolFields = [ | ||||||
|  | 	'is_deleted', | ||||||
|  | 	'is_disabled', | ||||||
|  | ]; | ||||||
|  |  | ||||||
| class User extends Model { | class User extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  |  | ||||||
| 		// Default for roles | 		// Default for roles | ||||||
| 		if (typeof this.roles === 'undefined') { | 		if (typeof this.roles === 'undefined') { | ||||||
| @@ -19,7 +26,17 @@ class User extends Model { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$parseDatabaseJson(json) { | ||||||
|  | 		json = super.$parseDatabaseJson(json); | ||||||
|  | 		return helpers.convertIntFieldsToBool(json, boolFields); | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	$formatDatabaseJson(json) { | ||||||
|  | 		json = helpers.convertBoolFieldsToInt(json, boolFields); | ||||||
|  | 		return super.$formatDatabaseJson(json); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
| @@ -42,9 +59,6 @@ class User extends Model { | |||||||
| 				join:       { | 				join:       { | ||||||
| 					from: 'user.id', | 					from: 'user.id', | ||||||
| 					to:   'user_permission.user_id' | 					to:   'user_permission.user_id' | ||||||
| 				}, |  | ||||||
| 				modify: function (qb) { |  | ||||||
| 					qb.omit(['id', 'created_on', 'modified_on', 'user_id']); |  | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}; | 		}; | ||||||
|   | |||||||
| @@ -3,17 +3,18 @@ | |||||||
|  |  | ||||||
| const db    = require('../db'); | const db    = require('../db'); | ||||||
| const Model = require('objection').Model; | const Model = require('objection').Model; | ||||||
|  | const now   = require('./now_helper'); | ||||||
|  |  | ||||||
| Model.knex(db); | Model.knex(db); | ||||||
|  |  | ||||||
| class UserPermission extends Model { | class UserPermission extends Model { | ||||||
| 	$beforeInsert () { | 	$beforeInsert () { | ||||||
| 		this.created_on  = Model.raw('NOW()'); | 		this.created_on  = now(); | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	$beforeUpdate () { | 	$beforeUpdate () { | ||||||
| 		this.modified_on = Model.raw('NOW()'); | 		this.modified_on = now(); | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	static get name () { | 	static get name () { | ||||||
|   | |||||||
| @@ -2,34 +2,30 @@ | |||||||
| 	"name": "nginx-proxy-manager", | 	"name": "nginx-proxy-manager", | ||||||
| 	"version": "0.0.0", | 	"version": "0.0.0", | ||||||
| 	"description": "A beautiful interface for creating Nginx endpoints", | 	"description": "A beautiful interface for creating Nginx endpoints", | ||||||
| 	"main": "js/index.js", | 	"main": "index.js", | ||||||
| 	"dependencies": { | 	"dependencies": { | ||||||
| 		"ajv": "^6.11.0", | 		"@apidevtools/json-schema-ref-parser": "^11.7.0", | ||||||
|  | 		"ajv": "^8.17.1", | ||||||
|  | 		"archiver": "^5.3.0", | ||||||
| 		"batchflow": "^0.4.0", | 		"batchflow": "^0.4.0", | ||||||
| 		"bcrypt": "^3.0.8", | 		"bcrypt": "^5.0.0", | ||||||
| 		"body-parser": "^1.19.0", | 		"body-parser": "^1.20.3", | ||||||
| 		"compression": "^1.7.4", | 		"compression": "^1.7.4", | ||||||
| 		"config": "^3.2.5", | 		"express": "^4.20.0", | ||||||
| 		"diskdb": "^0.1.17", | 		"express-fileupload": "^1.1.9", | ||||||
| 		"express": "^4.17.1", |  | ||||||
| 		"express-fileupload": "^1.1.6", |  | ||||||
| 		"gravatar": "^1.8.0", | 		"gravatar": "^1.8.0", | ||||||
| 		"html-entities": "^1.2.1", | 		"jsonwebtoken": "^9.0.0", | ||||||
| 		"json-schema-ref-parser": "^7.1.3", | 		"knex": "2.4.2", | ||||||
| 		"jsonwebtoken": "^8.5.1", | 		"liquidjs": "10.6.1", | ||||||
| 		"knex": "^0.20.10", | 		"lodash": "^4.17.21", | ||||||
| 		"liquidjs": "^9.7.1", | 		"moment": "^2.29.4", | ||||||
| 		"lodash": "^4.17.15", | 		"mysql2": "^3.11.1", | ||||||
| 		"moment": "^2.24.0", | 		"node-rsa": "^1.0.8", | ||||||
| 		"mysql": "^2.18.1", | 		"objection": "3.0.1", | ||||||
| 		"node-rsa": "^1.0.7", |  | ||||||
| 		"nodemon": "^2.0.2", |  | ||||||
| 		"objection": "^2.1.3", |  | ||||||
| 		"path": "^0.12.7", | 		"path": "^0.12.7", | ||||||
| 		"restler": "^3.4.0", | 		"signale": "1.4.0", | ||||||
| 		"signale": "^1.4.0", | 		"sqlite3": "5.1.6", | ||||||
| 		"temp-write": "^4.0.0", | 		"temp-write": "^4.0.0" | ||||||
| 		"unix-timestamp": "^0.2.0" |  | ||||||
| 	}, | 	}, | ||||||
| 	"signale": { | 	"signale": { | ||||||
| 		"displayDate": true, | 		"displayDate": true, | ||||||
| @@ -38,8 +34,14 @@ | |||||||
| 	"author": "Jamie Curnow <jc@jc21.com>", | 	"author": "Jamie Curnow <jc@jc21.com>", | ||||||
| 	"license": "MIT", | 	"license": "MIT", | ||||||
| 	"devDependencies": { | 	"devDependencies": { | ||||||
| 		"eslint": "^6.8.0", | 		"@apidevtools/swagger-parser": "^10.1.0", | ||||||
|  | 		"chalk": "4.1.2", | ||||||
|  | 		"eslint": "^8.36.0", | ||||||
| 		"eslint-plugin-align-assignments": "^1.1.2", | 		"eslint-plugin-align-assignments": "^1.1.2", | ||||||
| 		"prettier": "^1.19.1" | 		"nodemon": "^2.0.2", | ||||||
|  | 		"prettier": "^2.0.4" | ||||||
|  | 	}, | ||||||
|  | 	"scripts": { | ||||||
|  | 		"validate-schema": "node validate-schema.js" | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,7 +1,7 @@ | |||||||
| const express          = require('express'); | const express          = require('express'); | ||||||
| const validator        = require('../../lib/validator'); | const validator        = require('../lib/validator'); | ||||||
| const jwtdecode        = require('../../lib/express/jwt-decode'); | const jwtdecode        = require('../lib/express/jwt-decode'); | ||||||
| const internalAuditLog = require('../../internal/audit-log'); | const internalAuditLog = require('../internal/audit-log'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -14,7 +14,7 @@ let router = express.Router({ | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -29,10 +29,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -1,6 +1,6 @@ | |||||||
| const express = require('express'); | const express = require('express'); | ||||||
| const pjson   = require('../../package.json'); | const pjson   = require('../package.json'); | ||||||
| const error   = require('../../lib/error'); | const error   = require('../lib/error'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -43,7 +43,7 @@ router.use('/nginx/certificates', require('./nginx/certificates')); | |||||||
|  * |  * | ||||||
|  * ALL /api/* |  * ALL /api/* | ||||||
|  */ |  */ | ||||||
| router.all(/(.+)/, function (req, res, next) { | router.all(/(.+)/, function (req, _, next) { | ||||||
| 	req.params.page = req.params['0']; | 	req.params.page = req.params['0']; | ||||||
| 	next(new error.ItemNotFoundError(req.params.page)); | 	next(new error.ItemNotFoundError(req.params.page)); | ||||||
| }); | }); | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express            = require('express'); | const express            = require('express'); | ||||||
| const validator          = require('../../../lib/validator'); | const validator          = require('../../lib/validator'); | ||||||
| const jwtdecode          = require('../../../lib/express/jwt-decode'); | const jwtdecode          = require('../../lib/express/jwt-decode'); | ||||||
| const internalAccessList = require('../../../internal/access-list'); | const apiValidator       = require('../../lib/validator/api'); | ||||||
| const apiValidator       = require('../../../lib/validator/api'); | const internalAccessList = require('../../internal/access-list'); | ||||||
|  | const schema             = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -30,10 +31,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,7 +57,7 @@ router | |||||||
| 	 * Create a new access-list | 	 * Create a new access-list | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/access-lists#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/access-lists', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalAccessList.create(res.locals.access, payload); | 				return internalAccessList.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -74,7 +75,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:list_id') | 	.route('/:list_id') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -90,10 +91,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				list_id: { | 				list_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -119,7 +120,7 @@ router | |||||||
| 	 * Update and existing access-list | 	 * Update and existing access-list | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/access-lists#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/access-lists/{listID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = parseInt(req.params.list_id, 10); | 				payload.id = parseInt(req.params.list_id, 10); | ||||||
| 				return internalAccessList.update(res.locals.access, payload); | 				return internalAccessList.update(res.locals.access, payload); | ||||||
| @@ -1,8 +1,10 @@ | |||||||
| const express             = require('express'); | const express             = require('express'); | ||||||
| const validator           = require('../../../lib/validator'); | const error               = require('../../lib/error'); | ||||||
| const jwtdecode           = require('../../../lib/express/jwt-decode'); | const validator           = require('../../lib/validator'); | ||||||
| const internalCertificate = require('../../../internal/certificate'); | const jwtdecode           = require('../../lib/express/jwt-decode'); | ||||||
| const apiValidator        = require('../../../lib/validator/api'); | const apiValidator        = require('../../lib/validator/api'); | ||||||
|  | const internalCertificate = require('../../internal/certificate'); | ||||||
|  | const schema              = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -15,7 +17,7 @@ let router = express.Router({ | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -30,10 +32,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,8 +58,9 @@ router | |||||||
| 	 * Create a new certificate | 	 * Create a new certificate | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/certificates#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/certificates', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
|  | 				req.setTimeout(900000); // 15 minutes timeout
 | ||||||
| 				return internalCertificate.create(res.locals.access, payload); | 				return internalCertificate.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| 			.then((result) => { | 			.then((result) => { | ||||||
| @@ -67,6 +70,37 @@ router | |||||||
| 			.catch(next); | 			.catch(next); | ||||||
| 	}); | 	}); | ||||||
| 
 | 
 | ||||||
|  | /** | ||||||
|  |  * Test HTTP challenge for domains | ||||||
|  |  * | ||||||
|  |  * /api/nginx/certificates/test-http | ||||||
|  |  */ | ||||||
|  | router | ||||||
|  | 	.route('/test-http') | ||||||
|  | 	.options((_, res) => { | ||||||
|  | 		res.sendStatus(204); | ||||||
|  | 	}) | ||||||
|  | 	.all(jwtdecode()) | ||||||
|  | 
 | ||||||
|  | 	/** | ||||||
|  | 	 * GET /api/nginx/certificates/test-http | ||||||
|  | 	 * | ||||||
|  | 	 * Test HTTP challenge for domains | ||||||
|  | 	 */ | ||||||
|  | 	.get((req, res, next) => { | ||||||
|  | 		if (req.query.domains === undefined) { | ||||||
|  | 			next(new error.ValidationError('Domains are required as query parameters')); | ||||||
|  | 			return; | ||||||
|  | 		} | ||||||
|  | 
 | ||||||
|  | 		internalCertificate.testHttpsChallenge(res.locals.access, JSON.parse(req.query.domains)) | ||||||
|  | 			.then((result) => { | ||||||
|  | 				res.status(200) | ||||||
|  | 					.send(result); | ||||||
|  | 			}) | ||||||
|  | 			.catch(next); | ||||||
|  | 	}); | ||||||
|  | 
 | ||||||
| /** | /** | ||||||
|  * Specific certificate |  * Specific certificate | ||||||
|  * |  * | ||||||
| @@ -74,7 +108,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:certificate_id') | 	.route('/:certificate_id') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -90,10 +124,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				certificate_id: { | 				certificate_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -113,24 +147,6 @@ router | |||||||
| 			.catch(next); | 			.catch(next); | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	/** |  | ||||||
| 	 * PUT /api/nginx/certificates/123 |  | ||||||
| 	 * |  | ||||||
| 	 * Update and existing certificate |  | ||||||
| 	 */ |  | ||||||
| 	.put((req, res, next) => { |  | ||||||
| 		apiValidator({$ref: 'endpoints/certificates#/links/2/schema'}, req.body) |  | ||||||
| 			.then((payload) => { |  | ||||||
| 				payload.id = parseInt(req.params.certificate_id, 10); |  | ||||||
| 				return internalCertificate.update(res.locals.access, payload); |  | ||||||
| 			}) |  | ||||||
| 			.then((result) => { |  | ||||||
| 				res.status(200) |  | ||||||
| 					.send(result); |  | ||||||
| 			}) |  | ||||||
| 			.catch(next); |  | ||||||
| 	}) |  | ||||||
| 
 |  | ||||||
| 	/** | 	/** | ||||||
| 	 * DELETE /api/nginx/certificates/123 | 	 * DELETE /api/nginx/certificates/123 | ||||||
| 	 * | 	 * | ||||||
| @@ -152,7 +168,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:certificate_id/upload') | 	.route('/:certificate_id/upload') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -186,7 +202,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:certificate_id/renew') | 	.route('/:certificate_id/renew') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -197,6 +213,7 @@ router | |||||||
| 	 * Renew certificate | 	 * Renew certificate | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
|  | 		req.setTimeout(900000); // 15 minutes timeout
 | ||||||
| 		internalCertificate.renew(res.locals.access, { | 		internalCertificate.renew(res.locals.access, { | ||||||
| 			id: parseInt(req.params.certificate_id, 10) | 			id: parseInt(req.params.certificate_id, 10) | ||||||
| 		}) | 		}) | ||||||
| @@ -207,6 +224,34 @@ router | |||||||
| 			.catch(next); | 			.catch(next); | ||||||
| 	}); | 	}); | ||||||
| 
 | 
 | ||||||
|  | /** | ||||||
|  |  * Download LE Certs | ||||||
|  |  * | ||||||
|  |  * /api/nginx/certificates/123/download | ||||||
|  |  */ | ||||||
|  | router | ||||||
|  | 	.route('/:certificate_id/download') | ||||||
|  | 	.options((req, res) => { | ||||||
|  | 		res.sendStatus(204); | ||||||
|  | 	}) | ||||||
|  | 	.all(jwtdecode()) | ||||||
|  | 
 | ||||||
|  | 	/** | ||||||
|  | 	 * GET /api/nginx/certificates/123/download | ||||||
|  | 	 * | ||||||
|  | 	 * Renew certificate | ||||||
|  | 	 */ | ||||||
|  | 	.get((req, res, next) => { | ||||||
|  | 		internalCertificate.download(res.locals.access, { | ||||||
|  | 			id: parseInt(req.params.certificate_id, 10) | ||||||
|  | 		}) | ||||||
|  | 			.then((result) => { | ||||||
|  | 				res.status(200) | ||||||
|  | 					.download(result.fileName); | ||||||
|  | 			}) | ||||||
|  | 			.catch(next); | ||||||
|  | 	}); | ||||||
|  | 
 | ||||||
| /** | /** | ||||||
|  * Validate Certs before saving |  * Validate Certs before saving | ||||||
|  * |  * | ||||||
| @@ -214,7 +259,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/validate') | 	.route('/validate') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express          = require('express'); | const express          = require('express'); | ||||||
| const validator        = require('../../../lib/validator'); | const validator        = require('../../lib/validator'); | ||||||
| const jwtdecode        = require('../../../lib/express/jwt-decode'); | const jwtdecode        = require('../../lib/express/jwt-decode'); | ||||||
| const internalDeadHost = require('../../../internal/dead-host'); | const apiValidator     = require('../../lib/validator/api'); | ||||||
| const apiValidator     = require('../../../lib/validator/api'); | const internalDeadHost = require('../../internal/dead-host'); | ||||||
|  | const schema           = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -15,7 +16,7 @@ let router = express.Router({ | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -30,10 +31,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,7 +57,7 @@ router | |||||||
| 	 * Create a new dead-host | 	 * Create a new dead-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/dead-hosts#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/dead-hosts', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalDeadHost.create(res.locals.access, payload); | 				return internalDeadHost.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -90,10 +91,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				host_id: { | 				host_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -119,7 +120,7 @@ router | |||||||
| 	 * Update and existing dead-host | 	 * Update and existing dead-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/dead-hosts#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/dead-hosts/{hostID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = parseInt(req.params.host_id, 10); | 				payload.id = parseInt(req.params.host_id, 10); | ||||||
| 				return internalDeadHost.update(res.locals.access, payload); | 				return internalDeadHost.update(res.locals.access, payload); | ||||||
| @@ -152,7 +153,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/enable') | 	.route('/:host_id/enable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -176,7 +177,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/disable') | 	.route('/:host_id/disable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express           = require('express'); | const express           = require('express'); | ||||||
| const validator         = require('../../../lib/validator'); | const validator         = require('../../lib/validator'); | ||||||
| const jwtdecode         = require('../../../lib/express/jwt-decode'); | const jwtdecode         = require('../../lib/express/jwt-decode'); | ||||||
| const internalProxyHost = require('../../../internal/proxy-host'); | const apiValidator      = require('../../lib/validator/api'); | ||||||
| const apiValidator      = require('../../../lib/validator/api'); | const internalProxyHost = require('../../internal/proxy-host'); | ||||||
|  | const schema            = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -30,10 +31,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,7 +57,7 @@ router | |||||||
| 	 * Create a new proxy-host | 	 * Create a new proxy-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/proxy-hosts#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/proxy-hosts', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalProxyHost.create(res.locals.access, payload); | 				return internalProxyHost.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -90,10 +91,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				host_id: { | 				host_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -119,7 +120,7 @@ router | |||||||
| 	 * Update and existing proxy-host | 	 * Update and existing proxy-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/proxy-hosts#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/proxy-hosts/{hostID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = parseInt(req.params.host_id, 10); | 				payload.id = parseInt(req.params.host_id, 10); | ||||||
| 				return internalProxyHost.update(res.locals.access, payload); | 				return internalProxyHost.update(res.locals.access, payload); | ||||||
| @@ -152,7 +153,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/enable') | 	.route('/:host_id/enable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -176,7 +177,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/disable') | 	.route('/:host_id/disable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express                 = require('express'); | const express                 = require('express'); | ||||||
| const validator               = require('../../../lib/validator'); | const validator               = require('../../lib/validator'); | ||||||
| const jwtdecode               = require('../../../lib/express/jwt-decode'); | const jwtdecode               = require('../../lib/express/jwt-decode'); | ||||||
| const internalRedirectionHost = require('../../../internal/redirection-host'); | const apiValidator            = require('../../lib/validator/api'); | ||||||
| const apiValidator            = require('../../../lib/validator/api'); | const internalRedirectionHost = require('../../internal/redirection-host'); | ||||||
|  | const schema                  = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -30,10 +31,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,7 +57,7 @@ router | |||||||
| 	 * Create a new redirection-host | 	 * Create a new redirection-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/redirection-hosts#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/redirection-hosts', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalRedirectionHost.create(res.locals.access, payload); | 				return internalRedirectionHost.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -90,10 +91,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				host_id: { | 				host_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -119,7 +120,7 @@ router | |||||||
| 	 * Update and existing redirection-host | 	 * Update and existing redirection-host | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/redirection-hosts#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/redirection-hosts/{hostID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = parseInt(req.params.host_id, 10); | 				payload.id = parseInt(req.params.host_id, 10); | ||||||
| 				return internalRedirectionHost.update(res.locals.access, payload); | 				return internalRedirectionHost.update(res.locals.access, payload); | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express        = require('express'); | const express        = require('express'); | ||||||
| const validator      = require('../../../lib/validator'); | const validator      = require('../../lib/validator'); | ||||||
| const jwtdecode      = require('../../../lib/express/jwt-decode'); | const jwtdecode      = require('../../lib/express/jwt-decode'); | ||||||
| const internalStream = require('../../../internal/stream'); | const apiValidator   = require('../../lib/validator/api'); | ||||||
| const apiValidator   = require('../../../lib/validator/api'); | const internalStream = require('../../internal/stream'); | ||||||
|  | const schema         = require('../../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -30,10 +31,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -56,7 +57,7 @@ router | |||||||
| 	 * Create a new stream | 	 * Create a new stream | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/streams#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/streams', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalStream.create(res.locals.access, payload); | 				return internalStream.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -90,10 +91,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				stream_id: { | 				stream_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -119,7 +120,7 @@ router | |||||||
| 	 * Update and existing stream | 	 * Update and existing stream | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/streams#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/nginx/streams/{streamID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = parseInt(req.params.stream_id, 10); | 				payload.id = parseInt(req.params.stream_id, 10); | ||||||
| 				return internalStream.update(res.locals.access, payload); | 				return internalStream.update(res.locals.access, payload); | ||||||
| @@ -152,7 +153,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/enable') | 	.route('/:host_id/enable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -176,7 +177,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:host_id/disable') | 	.route('/:host_id/disable') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -1,6 +1,6 @@ | |||||||
| const express        = require('express'); | const express        = require('express'); | ||||||
| const jwtdecode      = require('../../lib/express/jwt-decode'); | const jwtdecode      = require('../lib/express/jwt-decode'); | ||||||
| const internalReport = require('../../internal/report'); | const internalReport = require('../internal/report'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -10,14 +10,14 @@ let router = express.Router({ | |||||||
| 
 | 
 | ||||||
| router | router | ||||||
| 	.route('/hosts') | 	.route('/hosts') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	/** | 	/** | ||||||
| 	 * GET /reports/hosts | 	 * GET /reports/hosts | ||||||
| 	 */ | 	 */ | ||||||
| 	.get(jwtdecode(), (req, res, next) => { | 	.get(jwtdecode(), (_, res, next) => { | ||||||
| 		internalReport.getHostsReport(res.locals.access) | 		internalReport.getHostsReport(res.locals.access) | ||||||
| 			.then((data) => { | 			.then((data) => { | ||||||
| 				res.status(200) | 				res.status(200) | ||||||
| @@ -1,8 +1,8 @@ | |||||||
| const express = require('express'); | const express = require('express'); | ||||||
| const swaggerJSON = require('../../doc/api.swagger.json'); | const schema  = require('../schema'); | ||||||
| const PACKAGE     = require('../../package.json'); | const PACKAGE = require('../package.json'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | const router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| 	strict:        true, | 	strict:        true, | ||||||
| 	mergeParams:   true | 	mergeParams:   true | ||||||
| @@ -10,14 +10,16 @@ let router = express.Router({ | |||||||
| 
 | 
 | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	/** | 	/** | ||||||
| 	 * GET /schema | 	 * GET /schema | ||||||
| 	 */ | 	 */ | ||||||
| 	.get((req, res/*, next*/) => { | 	.get(async (req, res) => { | ||||||
|  | 		let swaggerJSON = await schema.getCompiledSchema(); | ||||||
|  | 
 | ||||||
| 		let proto = req.protocol; | 		let proto = req.protocol; | ||||||
| 		if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) { | 		if (typeof req.headers['x-forwarded-proto'] !== 'undefined' && req.headers['x-forwarded-proto']) { | ||||||
| 			proto = req.headers['x-forwarded-proto']; | 			proto = req.headers['x-forwarded-proto']; | ||||||
| @@ -1,8 +1,9 @@ | |||||||
| const express         = require('express'); | const express         = require('express'); | ||||||
| const validator       = require('../../lib/validator'); | const validator       = require('../lib/validator'); | ||||||
| const jwtdecode       = require('../../lib/express/jwt-decode'); | const jwtdecode       = require('../lib/express/jwt-decode'); | ||||||
| const internalSetting = require('../../internal/setting'); | const apiValidator    = require('../lib/validator/api'); | ||||||
| const apiValidator    = require('../../lib/validator/api'); | const internalSetting = require('../internal/setting'); | ||||||
|  | const schema          = require('../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -15,7 +16,7 @@ let router = express.Router({ | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -25,7 +26,7 @@ router | |||||||
| 	 * | 	 * | ||||||
| 	 * Retrieve all settings | 	 * Retrieve all settings | ||||||
| 	 */ | 	 */ | ||||||
| 	.get((req, res, next) => { | 	.get((_, res, next) => { | ||||||
| 		internalSetting.getAll(res.locals.access) | 		internalSetting.getAll(res.locals.access) | ||||||
| 			.then((rows) => { | 			.then((rows) => { | ||||||
| 				res.status(200) | 				res.status(200) | ||||||
| @@ -41,7 +42,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:setting_id') | 	.route('/:setting_id') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -57,7 +58,8 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				setting_id: { | 				setting_id: { | ||||||
| 					$ref: 'definitions#/definitions/setting_id' | 					type:      'string', | ||||||
|  | 					minLength: 1 | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -81,7 +83,7 @@ router | |||||||
| 	 * Update and existing setting | 	 * Update and existing setting | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/settings#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/settings/{settingID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = req.params.setting_id; | 				payload.id = req.params.setting_id; | ||||||
| 				return internalSetting.update(res.locals.access, payload); | 				return internalSetting.update(res.locals.access, payload); | ||||||
| @@ -1,7 +1,8 @@ | |||||||
| const express       = require('express'); | const express       = require('express'); | ||||||
| const jwtdecode     = require('../../lib/express/jwt-decode'); | const jwtdecode     = require('../lib/express/jwt-decode'); | ||||||
| const internalToken = require('../../internal/token'); | const apiValidator  = require('../lib/validator/api'); | ||||||
| const apiValidator  = require('../../lib/validator/api'); | const internalToken = require('../internal/token'); | ||||||
|  | const schema        = require('../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -11,7 +12,7 @@ let router = express.Router({ | |||||||
| 
 | 
 | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| @@ -39,11 +40,9 @@ router | |||||||
| 	 * | 	 * | ||||||
| 	 * Create a new Token | 	 * Create a new Token | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post(async (req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/tokens#/links/0/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/tokens', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then(internalToken.getTokenFromEmail) | ||||||
| 				return internalToken.getTokenFromEmail(payload); |  | ||||||
| 			}) |  | ||||||
| 			.then((data) => { | 			.then((data) => { | ||||||
| 				res.status(200) | 				res.status(200) | ||||||
| 					.send(data); | 					.send(data); | ||||||
| @@ -1,9 +1,10 @@ | |||||||
| const express      = require('express'); | const express      = require('express'); | ||||||
| const validator    = require('../../lib/validator'); | const validator    = require('../lib/validator'); | ||||||
| const jwtdecode    = require('../../lib/express/jwt-decode'); | const jwtdecode    = require('../lib/express/jwt-decode'); | ||||||
| const userIdFromMe = require('../../lib/express/user-id-from-me'); | const userIdFromMe = require('../lib/express/user-id-from-me'); | ||||||
| const internalUser = require('../../internal/user'); | const internalUser = require('../internal/user'); | ||||||
| const apiValidator = require('../../lib/validator/api'); | const apiValidator = require('../lib/validator/api'); | ||||||
|  | const schema       = require('../schema'); | ||||||
| 
 | 
 | ||||||
| let router = express.Router({ | let router = express.Router({ | ||||||
| 	caseSensitive: true, | 	caseSensitive: true, | ||||||
| @@ -16,7 +17,7 @@ let router = express.Router({ | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/') | 	.route('/') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -31,10 +32,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				}, | 				}, | ||||||
| 				query: { | 				query: { | ||||||
| 					$ref: 'definitions#/definitions/query' | 					$ref: 'common#/properties/query' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -48,7 +49,11 @@ router | |||||||
| 				res.status(200) | 				res.status(200) | ||||||
| 					.send(users); | 					.send(users); | ||||||
| 			}) | 			}) | ||||||
| 			.catch(next); | 			.catch((err) => { | ||||||
|  | 				console.log(err); | ||||||
|  | 				next(err); | ||||||
|  | 			}); | ||||||
|  | 		//.catch(next);
 | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	/** | 	/** | ||||||
| @@ -57,7 +62,7 @@ router | |||||||
| 	 * Create a new User | 	 * Create a new User | ||||||
| 	 */ | 	 */ | ||||||
| 	.post((req, res, next) => { | 	.post((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/users#/links/1/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/users', 'post'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				return internalUser.create(res.locals.access, payload); | 				return internalUser.create(res.locals.access, payload); | ||||||
| 			}) | 			}) | ||||||
| @@ -75,7 +80,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:user_id') | 	.route('/:user_id') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
| @@ -92,10 +97,10 @@ router | |||||||
| 			additionalProperties: false, | 			additionalProperties: false, | ||||||
| 			properties:           { | 			properties:           { | ||||||
| 				user_id: { | 				user_id: { | ||||||
| 					$ref: 'definitions#/definitions/id' | 					$ref: 'common#/properties/id' | ||||||
| 				}, | 				}, | ||||||
| 				expand: { | 				expand: { | ||||||
| 					$ref: 'definitions#/definitions/expand' | 					$ref: 'common#/properties/expand' | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 		}, { | 		}, { | ||||||
| @@ -113,7 +118,10 @@ router | |||||||
| 				res.status(200) | 				res.status(200) | ||||||
| 					.send(user); | 					.send(user); | ||||||
| 			}) | 			}) | ||||||
| 			.catch(next); | 			.catch((err) => { | ||||||
|  | 				console.log(err); | ||||||
|  | 				next(err); | ||||||
|  | 			}); | ||||||
| 	}) | 	}) | ||||||
| 
 | 
 | ||||||
| 	/** | 	/** | ||||||
| @@ -122,7 +130,7 @@ router | |||||||
| 	 * Update and existing user | 	 * Update and existing user | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/users#/links/2/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/users/{userID}', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = req.params.user_id; | 				payload.id = req.params.user_id; | ||||||
| 				return internalUser.update(res.locals.access, payload); | 				return internalUser.update(res.locals.access, payload); | ||||||
| @@ -167,7 +175,7 @@ router | |||||||
| 	 * Update password for a user | 	 * Update password for a user | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/users#/links/4/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/users/{userID}/auth', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = req.params.user_id; | 				payload.id = req.params.user_id; | ||||||
| 				return internalUser.setPassword(res.locals.access, payload); | 				return internalUser.setPassword(res.locals.access, payload); | ||||||
| @@ -198,7 +206,7 @@ router | |||||||
| 	 * Set some or all permissions for a user | 	 * Set some or all permissions for a user | ||||||
| 	 */ | 	 */ | ||||||
| 	.put((req, res, next) => { | 	.put((req, res, next) => { | ||||||
| 		apiValidator({$ref: 'endpoints/users#/links/5/schema'}, req.body) | 		apiValidator(schema.getValidationSchema('/users/{userID}/permissions', 'put'), req.body) | ||||||
| 			.then((payload) => { | 			.then((payload) => { | ||||||
| 				payload.id = req.params.user_id; | 				payload.id = req.params.user_id; | ||||||
| 				return internalUser.setPermissions(res.locals.access, payload); | 				return internalUser.setPermissions(res.locals.access, payload); | ||||||
| @@ -217,7 +225,7 @@ router | |||||||
|  */ |  */ | ||||||
| router | router | ||||||
| 	.route('/:user_id/login') | 	.route('/:user_id/login') | ||||||
| 	.options((req, res) => { | 	.options((_, res) => { | ||||||
| 		res.sendStatus(204); | 		res.sendStatus(204); | ||||||
| 	}) | 	}) | ||||||
| 	.all(jwtdecode()) | 	.all(jwtdecode()) | ||||||
							
								
								
									
										115
									
								
								backend/schema/common.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										115
									
								
								backend/schema/common.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,115 @@ | |||||||
|  | { | ||||||
|  | 	"$schema": "https://json-schema.org/draft/2020-12/schema", | ||||||
|  | 	"$id": "common", | ||||||
|  | 	"type": "object", | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"description": "Unique identifier", | ||||||
|  | 			"readOnly": true, | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 1 | ||||||
|  | 		}, | ||||||
|  | 		"expand": { | ||||||
|  | 			"anyOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "null" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "array", | ||||||
|  | 					"minItems": 1, | ||||||
|  | 					"items": { | ||||||
|  | 						"type": "string" | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"query": { | ||||||
|  | 			"anyOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "null" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"minLength": 1, | ||||||
|  | 					"maxLength": 255 | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"description": "Date and time of creation", | ||||||
|  | 			"readOnly": true, | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"description": "Date and time of last update", | ||||||
|  | 			"readOnly": true, | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"user_id": { | ||||||
|  | 			"description": "User ID", | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 1 | ||||||
|  | 		}, | ||||||
|  | 		"certificate_id": { | ||||||
|  | 			"description": "Certificate ID", | ||||||
|  | 			"anyOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "integer", | ||||||
|  | 					"minimum": 0 | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"pattern": "^new$" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"access_list_id": { | ||||||
|  | 			"description": "Access List ID", | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 0 | ||||||
|  | 		}, | ||||||
|  | 		"domain_names": { | ||||||
|  | 			"description": "Domain Names separated by a comma", | ||||||
|  | 			"type": "array", | ||||||
|  | 			"minItems": 1, | ||||||
|  | 			"maxItems": 100, | ||||||
|  | 			"uniqueItems": true, | ||||||
|  | 			"items": { | ||||||
|  | 				"type": "string", | ||||||
|  | 				"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$" | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
|  | 		"enabled": { | ||||||
|  | 			"description": "Is Enabled", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"ssl_forced": { | ||||||
|  | 			"description": "Is SSL Forced", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_enabled": { | ||||||
|  | 			"description": "Is HSTS Enabled", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_subdomains": { | ||||||
|  | 			"description": "Is HSTS applicable to all subdomains", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"ssl_provider": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"pattern": "^(letsencrypt|other)$" | ||||||
|  | 		}, | ||||||
|  | 		"http2_support": { | ||||||
|  | 			"description": "HTTP2 Protocol Support", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"block_exploits": { | ||||||
|  | 			"description": "Should we block common exploits", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"caching_enabled": { | ||||||
|  | 			"description": "Should we cache assets", | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										53
									
								
								backend/schema/components/access-list-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										53
									
								
								backend/schema/components/access-list-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,53 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Access List object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "owner_user_id", "name", "directive", "address", "satisfy_any", "pass_auth", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"name": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"minLength": 1 | ||||||
|  | 		}, | ||||||
|  | 		"directive": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"enum": ["allow", "deny"] | ||||||
|  | 		}, | ||||||
|  | 		"address": { | ||||||
|  | 			"oneOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}(/([0-9]|[1-2][0-9]|3[0-2]))?$" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"pattern": "^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"pattern": "^all$" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"satisfy_any": { | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"pass_auth": { | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										32
									
								
								backend/schema/components/audit-log-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								backend/schema/components/audit-log-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,32 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Audit Log object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "user_id", "object_type", "object_id", "action", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"object_type": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"object_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"action": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/certificate-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/certificate-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "Certificates list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./certificate-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										81
									
								
								backend/schema/components/certificate-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										81
									
								
								backend/schema/components/certificate-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,81 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Certificate object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "owner_user_id", "provider", "nice_name", "domain_names", "expires_on", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"provider": { | ||||||
|  | 			"$ref": "../common.json#/properties/ssl_provider" | ||||||
|  | 		}, | ||||||
|  | 		"nice_name": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Nice Name for the custom certificate" | ||||||
|  | 		}, | ||||||
|  | 		"domain_names": { | ||||||
|  | 			"description": "Domain Names separated by a comma", | ||||||
|  | 			"type": "array", | ||||||
|  | 			"maxItems": 100, | ||||||
|  | 			"uniqueItems": true, | ||||||
|  | 			"items": { | ||||||
|  | 				"type": "string", | ||||||
|  | 				"pattern": "^[^&| @!#%^();:/\\\\}{=+?<>,~`'\"]+$" | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
|  | 		"expires_on": { | ||||||
|  | 			"description": "Date and time of expiration", | ||||||
|  | 			"readOnly": true, | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"owner": { | ||||||
|  | 			"$ref": "./user-object.json" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object", | ||||||
|  | 			"additionalProperties": false, | ||||||
|  | 			"properties": { | ||||||
|  | 				"certificate": { | ||||||
|  | 					"type": "string", | ||||||
|  | 					"minLength": 1 | ||||||
|  | 				}, | ||||||
|  | 				"certificate_key": { | ||||||
|  | 					"type": "string", | ||||||
|  | 					"minLength": 1 | ||||||
|  | 				}, | ||||||
|  | 				"dns_challenge": { | ||||||
|  | 					"type": "boolean" | ||||||
|  | 				}, | ||||||
|  | 				"dns_provider": { | ||||||
|  | 					"type": "string" | ||||||
|  | 				}, | ||||||
|  | 				"dns_provider_credentials": { | ||||||
|  | 					"type": "string" | ||||||
|  | 				}, | ||||||
|  | 				"letsencrypt_agree": { | ||||||
|  | 					"type": "boolean" | ||||||
|  | 				}, | ||||||
|  | 				"letsencrypt_certificate": { | ||||||
|  | 					"type": "object" | ||||||
|  | 				}, | ||||||
|  | 				"letsencrypt_email": { | ||||||
|  | 					"type": "string" | ||||||
|  | 				}, | ||||||
|  | 				"propagation_seconds": { | ||||||
|  | 					"type": "integer", | ||||||
|  | 					"minimum": 0 | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/dead-host-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/dead-host-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "404 Hosts list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./dead-host-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										47
									
								
								backend/schema/components/dead-host-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										47
									
								
								backend/schema/components/dead-host-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,47 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "404 Host object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "advanced_config", "enabled", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"domain_names": { | ||||||
|  | 			"$ref": "../common.json#/properties/domain_names" | ||||||
|  | 		}, | ||||||
|  | 		"certificate_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/certificate_id" | ||||||
|  | 		}, | ||||||
|  | 		"ssl_forced": { | ||||||
|  | 			"$ref": "../common.json#/properties/ssl_forced" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_enabled" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_subdomains": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||||
|  | 		}, | ||||||
|  | 		"http2_support": { | ||||||
|  | 			"$ref": "../common.json#/properties/http2_support" | ||||||
|  | 		}, | ||||||
|  | 		"advanced_config": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/enabled" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										14
									
								
								backend/schema/components/error-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								backend/schema/components/error-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,14 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Error object", | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"required": ["code", "message"], | ||||||
|  | 	"properties": { | ||||||
|  | 		"code": { | ||||||
|  | 			"type": "integer" | ||||||
|  | 		}, | ||||||
|  | 		"message": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										9
									
								
								backend/schema/components/error.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								backend/schema/components/error.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,9 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Error", | ||||||
|  | 	"properties": { | ||||||
|  | 		"error": { | ||||||
|  | 			"$ref": "./error-object.json" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										38
									
								
								backend/schema/components/health-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										38
									
								
								backend/schema/components/health-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,38 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Health object", | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"required": ["status", "version"], | ||||||
|  | 	"properties": { | ||||||
|  | 		"status": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Healthy", | ||||||
|  | 			"example": "OK" | ||||||
|  | 		}, | ||||||
|  | 		"version": { | ||||||
|  | 			"type": "object", | ||||||
|  | 			"description": "The version object", | ||||||
|  | 			"example": { | ||||||
|  | 				"major": 2, | ||||||
|  | 				"minor": 0, | ||||||
|  | 				"revision": 0 | ||||||
|  | 			}, | ||||||
|  | 			"additionalProperties": false, | ||||||
|  | 			"required": ["major", "minor", "revision"], | ||||||
|  | 			"properties": { | ||||||
|  | 				"major": { | ||||||
|  | 					"type": "integer", | ||||||
|  | 					"minimum": 0 | ||||||
|  | 				}, | ||||||
|  | 				"minor": { | ||||||
|  | 					"type": "integer", | ||||||
|  | 					"minimum": 0 | ||||||
|  | 				}, | ||||||
|  | 				"revision": { | ||||||
|  | 					"type": "integer", | ||||||
|  | 					"minimum": 0 | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										41
									
								
								backend/schema/components/permission-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								backend/schema/components/permission-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,41 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"minProperties": 1, | ||||||
|  | 	"properties": { | ||||||
|  | 		"visibility": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Visibility Type", | ||||||
|  | 			"enum": ["all", "user"] | ||||||
|  | 		}, | ||||||
|  | 		"access_lists": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Access Lists Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		}, | ||||||
|  | 		"dead_hosts": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "404 Hosts Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		}, | ||||||
|  | 		"proxy_hosts": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Proxy Hosts Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		}, | ||||||
|  | 		"redirection_hosts": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Redirection Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		}, | ||||||
|  | 		"streams": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Streams Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		}, | ||||||
|  | 		"certificates": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Certificates Permissions", | ||||||
|  | 			"enum": ["hidden", "view", "manage"] | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/proxy-host-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/proxy-host-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "Proxy Hosts list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./proxy-host-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										160
									
								
								backend/schema/components/proxy-host-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										160
									
								
								backend/schema/components/proxy-host-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,160 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Proxy Host object", | ||||||
|  | 	"required": [ | ||||||
|  | 		"id", | ||||||
|  | 		"created_on", | ||||||
|  | 		"modified_on", | ||||||
|  | 		"owner_user_id", | ||||||
|  | 		"domain_names", | ||||||
|  | 		"forward_host", | ||||||
|  | 		"forward_port", | ||||||
|  | 		"access_list_id", | ||||||
|  | 		"certificate_id", | ||||||
|  | 		"ssl_forced", | ||||||
|  | 		"caching_enabled", | ||||||
|  | 		"block_exploits", | ||||||
|  | 		"advanced_config", | ||||||
|  | 		"meta", | ||||||
|  | 		"allow_websocket_upgrade", | ||||||
|  | 		"http2_support", | ||||||
|  | 		"forward_scheme", | ||||||
|  | 		"enabled", | ||||||
|  | 		"locations", | ||||||
|  | 		"hsts_enabled", | ||||||
|  | 		"hsts_subdomains", | ||||||
|  | 		"ssl_key_type", | ||||||
|  | 		"certificate" | ||||||
|  | 	], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"domain_names": { | ||||||
|  | 			"$ref": "../common.json#/properties/domain_names" | ||||||
|  | 		}, | ||||||
|  | 		"forward_host": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"minLength": 1, | ||||||
|  | 			"maxLength": 255 | ||||||
|  | 		}, | ||||||
|  | 		"forward_port": { | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 1, | ||||||
|  | 			"maximum": 65535 | ||||||
|  | 		}, | ||||||
|  | 		"access_list_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/access_list_id" | ||||||
|  | 		}, | ||||||
|  | 		"certificate_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/certificate_id" | ||||||
|  | 		}, | ||||||
|  | 		"ssl_forced": { | ||||||
|  | 			"$ref": "../common.json#/properties/ssl_forced" | ||||||
|  | 		}, | ||||||
|  | 		"caching_enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/caching_enabled" | ||||||
|  | 		}, | ||||||
|  | 		"block_exploits": { | ||||||
|  | 			"$ref": "../common.json#/properties/block_exploits" | ||||||
|  | 		}, | ||||||
|  | 		"advanced_config": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		}, | ||||||
|  | 		"allow_websocket_upgrade": { | ||||||
|  | 			"description": "Allow Websocket Upgrade for all paths", | ||||||
|  | 			"example": true, | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"http2_support": { | ||||||
|  | 			"$ref": "../common.json#/properties/http2_support" | ||||||
|  | 		}, | ||||||
|  | 		"forward_scheme": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"enum": ["http", "https"] | ||||||
|  | 		}, | ||||||
|  | 		"enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/enabled" | ||||||
|  | 		}, | ||||||
|  | 		"locations": { | ||||||
|  | 			"type": "array", | ||||||
|  | 			"minItems": 0, | ||||||
|  | 			"items": { | ||||||
|  | 				"type": "object", | ||||||
|  | 				"required": ["forward_scheme", "forward_host", "forward_port", "path"], | ||||||
|  | 				"additionalProperties": false, | ||||||
|  | 				"properties": { | ||||||
|  | 					"id": { | ||||||
|  | 						"type": ["integer", "null"] | ||||||
|  | 					}, | ||||||
|  | 					"path": { | ||||||
|  | 						"type": "string", | ||||||
|  | 						"minLength": 1 | ||||||
|  | 					}, | ||||||
|  | 					"forward_scheme": { | ||||||
|  | 						"$ref": "#/properties/forward_scheme" | ||||||
|  | 					}, | ||||||
|  | 					"forward_host": { | ||||||
|  | 						"$ref": "#/properties/forward_host" | ||||||
|  | 					}, | ||||||
|  | 					"forward_port": { | ||||||
|  | 						"$ref": "#/properties/forward_port" | ||||||
|  | 					}, | ||||||
|  | 					"forward_path": { | ||||||
|  | 						"type": "string" | ||||||
|  | 					}, | ||||||
|  | 					"advanced_config": { | ||||||
|  | 						"type": "string" | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		}, | ||||||
|  | 		"hsts_enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_enabled" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_subdomains": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||||
|  | 		}, | ||||||
|  | 		"certificate": { | ||||||
|  | 			"oneOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "null" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"$ref": "./certificate-object.json" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"owner": { | ||||||
|  | 			"$ref": "./user-object.json" | ||||||
|  | 		}, | ||||||
|  | 		"access_list": { | ||||||
|  | 			"oneOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "null" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"$ref": "./access-list-object.json" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"ssl_key_type": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"enum": ["ecdsa", "rsa"], | ||||||
|  | 			"description": "Type of SSL key (either ecdsa or rsa)" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/redirection-host-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/redirection-host-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "Redirection Hosts list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./redirection-host-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										72
									
								
								backend/schema/components/redirection-host-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										72
									
								
								backend/schema/components/redirection-host-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,72 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Redirection Host object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "owner_user_id", "domain_names", "forward_http_code", "forward_scheme", "forward_domain_name", "preserve_path", "certificate_id", "ssl_forced", "hsts_enabled", "hsts_subdomains", "http2_support", "block_exploits", "advanced_config", "enabled", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"domain_names": { | ||||||
|  | 			"$ref": "../common.json#/properties/domain_names" | ||||||
|  | 		}, | ||||||
|  | 		"forward_http_code": { | ||||||
|  | 			"description": "Redirect HTTP Status Code", | ||||||
|  | 			"example": 302, | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 300, | ||||||
|  | 			"maximum": 308 | ||||||
|  | 		}, | ||||||
|  | 		"forward_scheme": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"enum": ["auto", "http", "https"] | ||||||
|  | 		}, | ||||||
|  | 		"forward_domain_name": { | ||||||
|  | 			"description": "Domain Name", | ||||||
|  | 			"example": "jc21.com", | ||||||
|  | 			"type": "string", | ||||||
|  | 			"pattern": "^(?:[^.*]+\\.?)+[^.]$" | ||||||
|  | 		}, | ||||||
|  | 		"preserve_path": { | ||||||
|  | 			"description": "Should the path be preserved", | ||||||
|  | 			"example": true, | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"certificate_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/certificate_id" | ||||||
|  | 		}, | ||||||
|  | 		"ssl_forced": { | ||||||
|  | 			"$ref": "../common.json#/properties/ssl_forced" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_enabled" | ||||||
|  | 		}, | ||||||
|  | 		"hsts_subdomains": { | ||||||
|  | 			"$ref": "../common.json#/properties/hsts_subdomains" | ||||||
|  | 		}, | ||||||
|  | 		"http2_support": { | ||||||
|  | 			"$ref": "../common.json#/properties/http2_support" | ||||||
|  | 		}, | ||||||
|  | 		"block_exploits": { | ||||||
|  | 			"$ref": "../common.json#/properties/block_exploits" | ||||||
|  | 		}, | ||||||
|  | 		"advanced_config": { | ||||||
|  | 			"type": "string" | ||||||
|  | 		}, | ||||||
|  | 		"enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/enabled" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										6
									
								
								backend/schema/components/security-schemes.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								backend/schema/components/security-schemes.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,6 @@ | |||||||
|  | { | ||||||
|  | 	"BearerAuth": { | ||||||
|  | 		"type": "http", | ||||||
|  | 		"scheme": "bearer" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/setting-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/setting-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "Setting list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./setting-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										56
									
								
								backend/schema/components/setting-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								backend/schema/components/setting-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,56 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Setting object", | ||||||
|  | 	"required": ["id", "name", "description", "value", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Setting ID", | ||||||
|  | 			"minLength": 1, | ||||||
|  | 			"example": "default-site" | ||||||
|  | 		}, | ||||||
|  | 		"name": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Setting Display Name", | ||||||
|  | 			"minLength": 1, | ||||||
|  | 			"example": "Default Site" | ||||||
|  | 		}, | ||||||
|  | 		"description": { | ||||||
|  | 			"type": "string", | ||||||
|  | 			"description": "Meaningful description", | ||||||
|  | 			"minLength": 1, | ||||||
|  | 			"example": "What to show when Nginx is hit with an unknown Host" | ||||||
|  | 		}, | ||||||
|  | 		"value": { | ||||||
|  | 			"description": "Value in almost any form", | ||||||
|  | 			"example": "congratulations", | ||||||
|  | 			"anyOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"minLength": 1 | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "integer" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "object" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "number" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "array" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"description": "Extra metadata", | ||||||
|  | 			"example": { | ||||||
|  | 				"redirect": "http://example.com", | ||||||
|  | 				"html": "<h1>404</h1>" | ||||||
|  | 			}, | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										7
									
								
								backend/schema/components/stream-list.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								backend/schema/components/stream-list.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | |||||||
|  | { | ||||||
|  | 	"type": "array", | ||||||
|  | 	"description": "Proxy Hosts list", | ||||||
|  | 	"items": { | ||||||
|  | 		"$ref": "./proxy-host-object.json" | ||||||
|  | 	} | ||||||
|  | } | ||||||
							
								
								
									
										62
									
								
								backend/schema/components/stream-object.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								backend/schema/components/stream-object.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,62 @@ | |||||||
|  | { | ||||||
|  | 	"type": "object", | ||||||
|  | 	"description": "Stream object", | ||||||
|  | 	"required": ["id", "created_on", "modified_on", "owner_user_id", "incoming_port", "forwarding_host", "forwarding_port", "tcp_forwarding", "udp_forwarding", "enabled", "meta"], | ||||||
|  | 	"additionalProperties": false, | ||||||
|  | 	"properties": { | ||||||
|  | 		"id": { | ||||||
|  | 			"$ref": "../common.json#/properties/id" | ||||||
|  | 		}, | ||||||
|  | 		"created_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/created_on" | ||||||
|  | 		}, | ||||||
|  | 		"modified_on": { | ||||||
|  | 			"$ref": "../common.json#/properties/modified_on" | ||||||
|  | 		}, | ||||||
|  | 		"owner_user_id": { | ||||||
|  | 			"$ref": "../common.json#/properties/user_id" | ||||||
|  | 		}, | ||||||
|  | 		"incoming_port": { | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 1, | ||||||
|  | 			"maximum": 65535, | ||||||
|  | 			"if": {"properties": {"tcp_forwarding": {"const": true}}}, | ||||||
|  | 			"then": {"not": {"oneOf": [{"const": 80}, {"const": 443}]}} | ||||||
|  | 		}, | ||||||
|  | 		"forwarding_host": { | ||||||
|  | 			"anyOf": [ | ||||||
|  | 				{ | ||||||
|  | 					"description": "Domain Name", | ||||||
|  | 					"example": "jc21.com", | ||||||
|  | 					"type": "string", | ||||||
|  | 					"pattern": "^(?:[^.*]+\\.?)+[^.]$" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"format": "ipv4" | ||||||
|  | 				}, | ||||||
|  | 				{ | ||||||
|  | 					"type": "string", | ||||||
|  | 					"format": "ipv6" | ||||||
|  | 				} | ||||||
|  | 			] | ||||||
|  | 		}, | ||||||
|  | 		"forwarding_port": { | ||||||
|  | 			"type": "integer", | ||||||
|  | 			"minimum": 1, | ||||||
|  | 			"maximum": 65535 | ||||||
|  | 		}, | ||||||
|  | 		"tcp_forwarding": { | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"udp_forwarding": { | ||||||
|  | 			"type": "boolean" | ||||||
|  | 		}, | ||||||
|  | 		"enabled": { | ||||||
|  | 			"$ref": "../common.json#/properties/enabled" | ||||||
|  | 		}, | ||||||
|  | 		"meta": { | ||||||
|  | 			"type": "object" | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user