mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-10-31 15:53:33 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			329 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			329 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| import express from "express";
 | |
| import internalUser from "../internal/user.js";
 | |
| import Access from "../lib/access.js";
 | |
| import { isCI } from "../lib/config.js";
 | |
| import errs from "../lib/error.js";
 | |
| import jwtdecode from "../lib/express/jwt-decode.js";
 | |
| import userIdFromMe from "../lib/express/user-id-from-me.js";
 | |
| import apiValidator from "../lib/validator/api.js";
 | |
| import validator from "../lib/validator/index.js";
 | |
| import { express as logger } from "../logger.js";
 | |
| import { getValidationSchema } from "../schema/index.js";
 | |
| import { isSetup } from "../setup.js";
 | |
| 
 | |
| const router = express.Router({
 | |
| 	caseSensitive: true,
 | |
| 	strict: true,
 | |
| 	mergeParams: true,
 | |
| });
 | |
| 
 | |
| /**
 | |
|  * /api/users
 | |
|  */
 | |
| router
 | |
| 	.route("/")
 | |
| 	.options((_, res) => {
 | |
| 		res.sendStatus(204);
 | |
| 	})
 | |
| 	.all(jwtdecode())
 | |
| 
 | |
| 	/**
 | |
| 	 * GET /api/users
 | |
| 	 *
 | |
| 	 * Retrieve all users
 | |
| 	 */
 | |
| 	.get(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const data = await validator(
 | |
| 				{
 | |
| 					additionalProperties: false,
 | |
| 					properties: {
 | |
| 						expand: {
 | |
| 							$ref: "common#/properties/expand",
 | |
| 						},
 | |
| 						query: {
 | |
| 							$ref: "common#/properties/query",
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 				{
 | |
| 					expand:
 | |
| 						typeof req.query.expand === "string"
 | |
| 							? req.query.expand.split(",")
 | |
| 							: null,
 | |
| 					query: typeof req.query.query === "string" ? req.query.query : null,
 | |
| 				},
 | |
| 			);
 | |
| 			const users = await internalUser.getAll(
 | |
| 				res.locals.access,
 | |
| 				data.expand,
 | |
| 				data.query,
 | |
| 			);
 | |
| 			res.status(200).send(users);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	/**
 | |
| 	 * POST /api/users
 | |
| 	 *
 | |
| 	 * Create a new User
 | |
| 	 */
 | |
| 	.post(async (req, res, next) => {
 | |
| 		const body = req.body;
 | |
| 
 | |
| 		try {
 | |
| 			// If we are in setup mode, we don't check access for current user
 | |
| 			const setup = await isSetup();
 | |
| 			if (!setup) {
 | |
| 				logger.info("Creating a new user in setup mode");
 | |
| 				const access = new Access(null);
 | |
| 				await access.load(true);
 | |
| 				res.locals.access = access;
 | |
| 
 | |
| 				// We are in setup mode, set some defaults for this first new user, such as making
 | |
| 				// them an admin.
 | |
| 				body.is_disabled = false;
 | |
| 				if (typeof body.roles !== "object" || body.roles === null) {
 | |
| 					body.roles = [];
 | |
| 				}
 | |
| 				if (body.roles.indexOf("admin") === -1) {
 | |
| 					body.roles.push("admin");
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			const payload = await apiValidator(
 | |
| 				getValidationSchema("/users", "post"),
 | |
| 				body,
 | |
| 			);
 | |
| 			const user = await internalUser.create(res.locals.access, payload);
 | |
| 			res.status(201).send(user);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	/**
 | |
| 	 * DELETE /api/users
 | |
| 	 *
 | |
| 	 * Deletes ALL users. This is NOT GENERALLY AVAILABLE!
 | |
| 	 * (!) It is NOT an authenticated endpoint.
 | |
| 	 * (!) Only CI should be able to call this endpoint. As a result,
 | |
| 	 *
 | |
| 	 * it will only work when the env vars DEBUG=true and CI=true
 | |
| 	 *
 | |
| 	 * Do NOT set those env vars in a production environment!
 | |
| 	 */
 | |
| 	.delete(async (_, res, next) => {
 | |
| 		if (isCI()) {
 | |
| 			try {
 | |
| 				logger.warn("Deleting all users - CI environment detected, allowing this operation");
 | |
| 				await internalUser.deleteAll();
 | |
| 				res.status(200).send(true);
 | |
| 			} catch (err) {
 | |
| 				logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 				next(err);
 | |
| 			}
 | |
| 			return;
 | |
| 		}
 | |
| 
 | |
| 		next(new errs.ItemNotFoundError());
 | |
| 	});
 | |
| 
 | |
| /**
 | |
|  * Specific user
 | |
|  *
 | |
|  * /api/users/123
 | |
|  */
 | |
| router
 | |
| 	.route("/:user_id")
 | |
| 	.options((_, res) => {
 | |
| 		res.sendStatus(204);
 | |
| 	})
 | |
| 	.all(jwtdecode())
 | |
| 	.all(userIdFromMe)
 | |
| 
 | |
| 	/**
 | |
| 	 * GET /users/123 or /users/me
 | |
| 	 *
 | |
| 	 * Retrieve a specific user
 | |
| 	 */
 | |
| 	.get(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const data = await validator(
 | |
| 				{
 | |
| 					required: ["user_id"],
 | |
| 					additionalProperties: false,
 | |
| 					properties: {
 | |
| 						user_id: {
 | |
| 							$ref: "common#/properties/id",
 | |
| 						},
 | |
| 						expand: {
 | |
| 							$ref: "common#/properties/expand",
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 				{
 | |
| 					user_id: req.params.user_id,
 | |
| 					expand:
 | |
| 						typeof req.query.expand === "string"
 | |
| 							? req.query.expand.split(",")
 | |
| 							: null,
 | |
| 				},
 | |
| 			);
 | |
| 
 | |
| 			const user = await internalUser.get(res.locals.access, {
 | |
| 				id: data.user_id,
 | |
| 				expand: data.expand,
 | |
| 				omit: internalUser.getUserOmisionsByAccess(
 | |
| 					res.locals.access,
 | |
| 					data.user_id,
 | |
| 				),
 | |
| 			});
 | |
| 			res.status(200).send(user);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	/**
 | |
| 	 * PUT /api/users/123
 | |
| 	 *
 | |
| 	 * Update and existing user
 | |
| 	 */
 | |
| 	.put(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const payload = await apiValidator(
 | |
| 				getValidationSchema("/users/{userID}", "put"),
 | |
| 				req.body,
 | |
| 			);
 | |
| 			payload.id = req.params.user_id;
 | |
| 			const result = await internalUser.update(res.locals.access, payload);
 | |
| 			res.status(200).send(result);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	/**
 | |
| 	 * DELETE /api/users/123
 | |
| 	 *
 | |
| 	 * Update and existing user
 | |
| 	 */
 | |
| 	.delete(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const result = await internalUser.delete(res.locals.access, {
 | |
| 				id: req.params.user_id,
 | |
| 			});
 | |
| 			res.status(200).send(result);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	});
 | |
| 
 | |
| /**
 | |
|  * Specific user auth
 | |
|  *
 | |
|  * /api/users/123/auth
 | |
|  */
 | |
| router
 | |
| 	.route("/:user_id/auth")
 | |
| 	.options((_, res) => {
 | |
| 		res.sendStatus(204);
 | |
| 	})
 | |
| 	.all(jwtdecode())
 | |
| 	.all(userIdFromMe)
 | |
| 
 | |
| 	/**
 | |
| 	 * PUT /api/users/123/auth
 | |
| 	 *
 | |
| 	 * Update password for a user
 | |
| 	 */
 | |
| 	.put(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const payload = await apiValidator(
 | |
| 				getValidationSchema("/users/{userID}/auth", "put"),
 | |
| 				req.body,
 | |
| 			);
 | |
| 			payload.id = req.params.user_id;
 | |
| 			const result = await internalUser.setPassword(res.locals.access, payload);
 | |
| 			res.status(200).send(result);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	});
 | |
| 
 | |
| /**
 | |
|  * Specific user permissions
 | |
|  *
 | |
|  * /api/users/123/permissions
 | |
|  */
 | |
| router
 | |
| 	.route("/:user_id/permissions")
 | |
| 	.options((_, res) => {
 | |
| 		res.sendStatus(204);
 | |
| 	})
 | |
| 	.all(jwtdecode())
 | |
| 	.all(userIdFromMe)
 | |
| 
 | |
| 	/**
 | |
| 	 * PUT /api/users/123/permissions
 | |
| 	 *
 | |
| 	 * Set some or all permissions for a user
 | |
| 	 */
 | |
| 	.put(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const payload = await apiValidator(
 | |
| 				getValidationSchema("/users/{userID}/permissions", "put"),
 | |
| 				req.body,
 | |
| 			);
 | |
| 			payload.id = req.params.user_id;
 | |
| 			const result = await internalUser.setPermissions(
 | |
| 				res.locals.access,
 | |
| 				payload,
 | |
| 			);
 | |
| 			res.status(200).send(result);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	});
 | |
| 
 | |
| /**
 | |
|  * Specific user login as
 | |
|  *
 | |
|  * /api/users/123/login
 | |
|  */
 | |
| router
 | |
| 	.route("/:user_id/login")
 | |
| 	.options((_, res) => {
 | |
| 		res.sendStatus(204);
 | |
| 	})
 | |
| 	.all(jwtdecode())
 | |
| 
 | |
| 	/**
 | |
| 	 * POST /api/users/123/login
 | |
| 	 *
 | |
| 	 * Log in as a user
 | |
| 	 */
 | |
| 	.post(async (req, res, next) => {
 | |
| 		try {
 | |
| 			const result = await internalUser.loginAs(res.locals.access, {
 | |
| 				id: Number.parseInt(req.params.user_id, 10),
 | |
| 			});
 | |
| 			res.status(200).send(result);
 | |
| 		} catch (err) {
 | |
| 			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | |
| 			next(err);
 | |
| 		}
 | |
| 	});
 | |
| 
 | |
| export default router;
 |