mirror of
				https://github.com/NginxProxyManager/nginx-proxy-manager.git
				synced 2025-11-04 09:25:15 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			329 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			329 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
import express from "express";
 | 
						|
import internalUser from "../internal/user.js";
 | 
						|
import Access from "../lib/access.js";
 | 
						|
import { isCI } from "../lib/config.js";
 | 
						|
import errs from "../lib/error.js";
 | 
						|
import jwtdecode from "../lib/express/jwt-decode.js";
 | 
						|
import userIdFromMe from "../lib/express/user-id-from-me.js";
 | 
						|
import apiValidator from "../lib/validator/api.js";
 | 
						|
import validator from "../lib/validator/index.js";
 | 
						|
import { express as logger } from "../logger.js";
 | 
						|
import { getValidationSchema } from "../schema/index.js";
 | 
						|
import { isSetup } from "../setup.js";
 | 
						|
 | 
						|
const router = express.Router({
 | 
						|
	caseSensitive: true,
 | 
						|
	strict: true,
 | 
						|
	mergeParams: true,
 | 
						|
});
 | 
						|
 | 
						|
/**
 | 
						|
 * /api/users
 | 
						|
 */
 | 
						|
router
 | 
						|
	.route("/")
 | 
						|
	.options((_, res) => {
 | 
						|
		res.sendStatus(204);
 | 
						|
	})
 | 
						|
	.all(jwtdecode())
 | 
						|
 | 
						|
	/**
 | 
						|
	 * GET /api/users
 | 
						|
	 *
 | 
						|
	 * Retrieve all users
 | 
						|
	 */
 | 
						|
	.get(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const data = await validator(
 | 
						|
				{
 | 
						|
					additionalProperties: false,
 | 
						|
					properties: {
 | 
						|
						expand: {
 | 
						|
							$ref: "common#/properties/expand",
 | 
						|
						},
 | 
						|
						query: {
 | 
						|
							$ref: "common#/properties/query",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					expand:
 | 
						|
						typeof req.query.expand === "string"
 | 
						|
							? req.query.expand.split(",")
 | 
						|
							: null,
 | 
						|
					query: typeof req.query.query === "string" ? req.query.query : null,
 | 
						|
				},
 | 
						|
			);
 | 
						|
			const users = await internalUser.getAll(
 | 
						|
				res.locals.access,
 | 
						|
				data.expand,
 | 
						|
				data.query,
 | 
						|
			);
 | 
						|
			res.status(200).send(users);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	})
 | 
						|
 | 
						|
	/**
 | 
						|
	 * POST /api/users
 | 
						|
	 *
 | 
						|
	 * Create a new User
 | 
						|
	 */
 | 
						|
	.post(async (req, res, next) => {
 | 
						|
		const body = req.body;
 | 
						|
 | 
						|
		try {
 | 
						|
			// If we are in setup mode, we don't check access for current user
 | 
						|
			const setup = await isSetup();
 | 
						|
			if (!setup) {
 | 
						|
				logger.info("Creating a new user in setup mode");
 | 
						|
				const access = new Access(null);
 | 
						|
				await access.load(true);
 | 
						|
				res.locals.access = access;
 | 
						|
 | 
						|
				// We are in setup mode, set some defaults for this first new user, such as making
 | 
						|
				// them an admin.
 | 
						|
				body.is_disabled = false;
 | 
						|
				if (typeof body.roles !== "object" || body.roles === null) {
 | 
						|
					body.roles = [];
 | 
						|
				}
 | 
						|
				if (body.roles.indexOf("admin") === -1) {
 | 
						|
					body.roles.push("admin");
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			const payload = await apiValidator(
 | 
						|
				getValidationSchema("/users", "post"),
 | 
						|
				body,
 | 
						|
			);
 | 
						|
			const user = await internalUser.create(res.locals.access, payload);
 | 
						|
			res.status(201).send(user);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	})
 | 
						|
 | 
						|
	/**
 | 
						|
	 * DELETE /api/users
 | 
						|
	 *
 | 
						|
	 * Deletes ALL users. This is NOT GENERALLY AVAILABLE!
 | 
						|
	 * (!) It is NOT an authenticated endpoint.
 | 
						|
	 * (!) Only CI should be able to call this endpoint. As a result,
 | 
						|
	 *
 | 
						|
	 * it will only work when the env vars DEBUG=true and CI=true
 | 
						|
	 *
 | 
						|
	 * Do NOT set those env vars in a production environment!
 | 
						|
	 */
 | 
						|
	.delete(async (_, res, next) => {
 | 
						|
		if (isCI()) {
 | 
						|
			try {
 | 
						|
				logger.warn("Deleting all users - CI environment detected, allowing this operation");
 | 
						|
				await internalUser.deleteAll();
 | 
						|
				res.status(200).send(true);
 | 
						|
			} catch (err) {
 | 
						|
				logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
				next(err);
 | 
						|
			}
 | 
						|
			return;
 | 
						|
		}
 | 
						|
 | 
						|
		next(new errs.ItemNotFoundError());
 | 
						|
	});
 | 
						|
 | 
						|
/**
 | 
						|
 * Specific user
 | 
						|
 *
 | 
						|
 * /api/users/123
 | 
						|
 */
 | 
						|
router
 | 
						|
	.route("/:user_id")
 | 
						|
	.options((_, res) => {
 | 
						|
		res.sendStatus(204);
 | 
						|
	})
 | 
						|
	.all(jwtdecode())
 | 
						|
	.all(userIdFromMe)
 | 
						|
 | 
						|
	/**
 | 
						|
	 * GET /users/123 or /users/me
 | 
						|
	 *
 | 
						|
	 * Retrieve a specific user
 | 
						|
	 */
 | 
						|
	.get(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const data = await validator(
 | 
						|
				{
 | 
						|
					required: ["user_id"],
 | 
						|
					additionalProperties: false,
 | 
						|
					properties: {
 | 
						|
						user_id: {
 | 
						|
							$ref: "common#/properties/id",
 | 
						|
						},
 | 
						|
						expand: {
 | 
						|
							$ref: "common#/properties/expand",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					user_id: req.params.user_id,
 | 
						|
					expand:
 | 
						|
						typeof req.query.expand === "string"
 | 
						|
							? req.query.expand.split(",")
 | 
						|
							: null,
 | 
						|
				},
 | 
						|
			);
 | 
						|
 | 
						|
			const user = await internalUser.get(res.locals.access, {
 | 
						|
				id: data.user_id,
 | 
						|
				expand: data.expand,
 | 
						|
				omit: internalUser.getUserOmisionsByAccess(
 | 
						|
					res.locals.access,
 | 
						|
					data.user_id,
 | 
						|
				),
 | 
						|
			});
 | 
						|
			res.status(200).send(user);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	})
 | 
						|
 | 
						|
	/**
 | 
						|
	 * PUT /api/users/123
 | 
						|
	 *
 | 
						|
	 * Update and existing user
 | 
						|
	 */
 | 
						|
	.put(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const payload = await apiValidator(
 | 
						|
				getValidationSchema("/users/{userID}", "put"),
 | 
						|
				req.body,
 | 
						|
			);
 | 
						|
			payload.id = req.params.user_id;
 | 
						|
			const result = await internalUser.update(res.locals.access, payload);
 | 
						|
			res.status(200).send(result);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	})
 | 
						|
 | 
						|
	/**
 | 
						|
	 * DELETE /api/users/123
 | 
						|
	 *
 | 
						|
	 * Update and existing user
 | 
						|
	 */
 | 
						|
	.delete(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const result = await internalUser.delete(res.locals.access, {
 | 
						|
				id: req.params.user_id,
 | 
						|
			});
 | 
						|
			res.status(200).send(result);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	});
 | 
						|
 | 
						|
/**
 | 
						|
 * Specific user auth
 | 
						|
 *
 | 
						|
 * /api/users/123/auth
 | 
						|
 */
 | 
						|
router
 | 
						|
	.route("/:user_id/auth")
 | 
						|
	.options((_, res) => {
 | 
						|
		res.sendStatus(204);
 | 
						|
	})
 | 
						|
	.all(jwtdecode())
 | 
						|
	.all(userIdFromMe)
 | 
						|
 | 
						|
	/**
 | 
						|
	 * PUT /api/users/123/auth
 | 
						|
	 *
 | 
						|
	 * Update password for a user
 | 
						|
	 */
 | 
						|
	.put(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const payload = await apiValidator(
 | 
						|
				getValidationSchema("/users/{userID}/auth", "put"),
 | 
						|
				req.body,
 | 
						|
			);
 | 
						|
			payload.id = req.params.user_id;
 | 
						|
			const result = await internalUser.setPassword(res.locals.access, payload);
 | 
						|
			res.status(200).send(result);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	});
 | 
						|
 | 
						|
/**
 | 
						|
 * Specific user permissions
 | 
						|
 *
 | 
						|
 * /api/users/123/permissions
 | 
						|
 */
 | 
						|
router
 | 
						|
	.route("/:user_id/permissions")
 | 
						|
	.options((_, res) => {
 | 
						|
		res.sendStatus(204);
 | 
						|
	})
 | 
						|
	.all(jwtdecode())
 | 
						|
	.all(userIdFromMe)
 | 
						|
 | 
						|
	/**
 | 
						|
	 * PUT /api/users/123/permissions
 | 
						|
	 *
 | 
						|
	 * Set some or all permissions for a user
 | 
						|
	 */
 | 
						|
	.put(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const payload = await apiValidator(
 | 
						|
				getValidationSchema("/users/{userID}/permissions", "put"),
 | 
						|
				req.body,
 | 
						|
			);
 | 
						|
			payload.id = req.params.user_id;
 | 
						|
			const result = await internalUser.setPermissions(
 | 
						|
				res.locals.access,
 | 
						|
				payload,
 | 
						|
			);
 | 
						|
			res.status(200).send(result);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	});
 | 
						|
 | 
						|
/**
 | 
						|
 * Specific user login as
 | 
						|
 *
 | 
						|
 * /api/users/123/login
 | 
						|
 */
 | 
						|
router
 | 
						|
	.route("/:user_id/login")
 | 
						|
	.options((_, res) => {
 | 
						|
		res.sendStatus(204);
 | 
						|
	})
 | 
						|
	.all(jwtdecode())
 | 
						|
 | 
						|
	/**
 | 
						|
	 * POST /api/users/123/login
 | 
						|
	 *
 | 
						|
	 * Log in as a user
 | 
						|
	 */
 | 
						|
	.post(async (req, res, next) => {
 | 
						|
		try {
 | 
						|
			const result = await internalUser.loginAs(res.locals.access, {
 | 
						|
				id: Number.parseInt(req.params.user_id, 10),
 | 
						|
			});
 | 
						|
			res.status(200).send(result);
 | 
						|
		} catch (err) {
 | 
						|
			logger.debug(`${req.method.toUpperCase()} ${req.path}: ${err}`);
 | 
						|
			next(err);
 | 
						|
		}
 | 
						|
	});
 | 
						|
 | 
						|
export default router;
 |