|
|
@@ -1,10 +1,16 @@
|
|
|
'use strict';
|
|
|
|
|
|
const _ = require('lodash');
|
|
|
+const fs = require('fs');
|
|
|
+const batchflow = require('batchflow');
|
|
|
+const logger = require('../logger').access;
|
|
|
const error = require('../lib/error');
|
|
|
const accessListModel = require('../models/access_list');
|
|
|
const accessListAuthModel = require('../models/access_list_auth');
|
|
|
+const proxyHostModel = require('../models/proxy_host');
|
|
|
const internalAuditLog = require('./audit-log');
|
|
|
+const internalNginx = require('./nginx');
|
|
|
+const utils = require('../lib/utils');
|
|
|
|
|
|
function omissions () {
|
|
|
return ['is_deleted'];
|
|
|
@@ -29,6 +35,8 @@ const internalAccessList = {
|
|
|
});
|
|
|
})
|
|
|
.then(row => {
|
|
|
+ data.id = row.id;
|
|
|
+
|
|
|
// Now add the items
|
|
|
let promises = [];
|
|
|
data.items.map(function (item) {
|
|
|
@@ -44,26 +52,34 @@ const internalAccessList = {
|
|
|
|
|
|
return Promise.all(promises);
|
|
|
})
|
|
|
- .then(row => {
|
|
|
- // re-fetch with cert
|
|
|
+ .then(() => {
|
|
|
+ // re-fetch with expansions
|
|
|
return internalAccessList.get(access, {
|
|
|
- id: row.id,
|
|
|
+ id: data.id,
|
|
|
expand: ['owner', 'items']
|
|
|
- });
|
|
|
+ }, true /* <- skip masking */);
|
|
|
})
|
|
|
.then(row => {
|
|
|
// Audit log
|
|
|
data.meta = _.assign({}, data.meta || {}, row.meta);
|
|
|
|
|
|
- // Add to audit log
|
|
|
- return internalAuditLog.add(access, {
|
|
|
- action: 'created',
|
|
|
- object_type: 'access-list',
|
|
|
- object_id: row.id,
|
|
|
- meta: data
|
|
|
- })
|
|
|
+ return internalAccessList.build(row)
|
|
|
+ .then(() => {
|
|
|
+ if (row.proxy_host_count) {
|
|
|
+ return internalNginx.reload();
|
|
|
+ }
|
|
|
+ })
|
|
|
.then(() => {
|
|
|
- return row;
|
|
|
+ // Add to audit log
|
|
|
+ return internalAuditLog.add(access, {
|
|
|
+ action: 'created',
|
|
|
+ object_type: 'access-list',
|
|
|
+ object_id: row.id,
|
|
|
+ meta: internalAccessList.maskItems(data)
|
|
|
+ });
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ return internalAccessList.maskItems(row);
|
|
|
});
|
|
|
});
|
|
|
},
|
|
|
@@ -72,15 +88,99 @@ const internalAccessList = {
|
|
|
* @param {Access} access
|
|
|
* @param {Object} data
|
|
|
* @param {Integer} data.id
|
|
|
- * @param {String} [data.email]
|
|
|
* @param {String} [data.name]
|
|
|
+ * @param {String} [data.items]
|
|
|
* @return {Promise}
|
|
|
*/
|
|
|
update: (access, data) => {
|
|
|
return access.can('access_lists:update', data.id)
|
|
|
.then(access_data => {
|
|
|
- // TODO
|
|
|
- return {};
|
|
|
+ return internalAccessList.get(access, {id: data.id});
|
|
|
+ })
|
|
|
+ .then(row => {
|
|
|
+ if (row.id !== data.id) {
|
|
|
+ // Sanity check that something crazy hasn't happened
|
|
|
+ throw new error.InternalValidationError('Access List could not be updated, IDs do not match: ' + row.id + ' !== ' + data.id);
|
|
|
+ }
|
|
|
+
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // patch name if specified
|
|
|
+ if (typeof data.name !== 'undefined' && data.name) {
|
|
|
+ return accessListModel
|
|
|
+ .query()
|
|
|
+ .where({id: data.id})
|
|
|
+ .patch({
|
|
|
+ name: data.name
|
|
|
+ });
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // Check for items and add/update/remove them
|
|
|
+ if (typeof data.items !== 'undefined' && data.items) {
|
|
|
+ let promises = [];
|
|
|
+ let items_to_keep = [];
|
|
|
+
|
|
|
+ data.items.map(function (item) {
|
|
|
+ if (item.password) {
|
|
|
+ promises.push(accessListAuthModel
|
|
|
+ .query()
|
|
|
+ .insert({
|
|
|
+ access_list_id: data.id,
|
|
|
+ username: item.username,
|
|
|
+ password: item.password
|
|
|
+ })
|
|
|
+ );
|
|
|
+ } else {
|
|
|
+ // This was supplied with an empty password, which means keep it but don't change the password
|
|
|
+ items_to_keep.push(item.username);
|
|
|
+ }
|
|
|
+ });
|
|
|
+
|
|
|
+ let query = accessListAuthModel
|
|
|
+ .query()
|
|
|
+ .delete()
|
|
|
+ .where('access_list_id', data.id);
|
|
|
+
|
|
|
+ if (items_to_keep.length) {
|
|
|
+ query.andWhere('username', 'NOT IN', items_to_keep);
|
|
|
+ }
|
|
|
+
|
|
|
+ return query
|
|
|
+ .then(() => {
|
|
|
+ // Add new items
|
|
|
+ if (promises.length) {
|
|
|
+ return Promise.all(promises);
|
|
|
+ }
|
|
|
+ });
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // Add to audit log
|
|
|
+ return internalAuditLog.add(access, {
|
|
|
+ action: 'updated',
|
|
|
+ object_type: 'access-list',
|
|
|
+ object_id: data.id,
|
|
|
+ meta: internalAccessList.maskItems(data)
|
|
|
+ });
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // re-fetch with expansions
|
|
|
+ return internalAccessList.get(access, {
|
|
|
+ id: data.id,
|
|
|
+ expand: ['owner', 'items']
|
|
|
+ }, true /* <- skip masking */);
|
|
|
+ })
|
|
|
+ .then(row => {
|
|
|
+ return internalAccessList.build(row)
|
|
|
+ .then(() => {
|
|
|
+ if (row.proxy_host_count) {
|
|
|
+ return internalNginx.reload();
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ return internalAccessList.maskItems(row);
|
|
|
+ });
|
|
|
});
|
|
|
},
|
|
|
|
|
|
@@ -90,9 +190,10 @@ const internalAccessList = {
|
|
|
* @param {Integer} data.id
|
|
|
* @param {Array} [data.expand]
|
|
|
* @param {Array} [data.omit]
|
|
|
+ * @param {Boolean} [skip_masking]
|
|
|
* @return {Promise}
|
|
|
*/
|
|
|
- get: (access, data) => {
|
|
|
+ get: (access, data, skip_masking) => {
|
|
|
if (typeof data === 'undefined') {
|
|
|
data = {};
|
|
|
}
|
|
|
@@ -105,9 +206,12 @@ const internalAccessList = {
|
|
|
.then(access_data => {
|
|
|
let query = accessListModel
|
|
|
.query()
|
|
|
- .where('is_deleted', 0)
|
|
|
- .andWhere('id', data.id)
|
|
|
- .allowEager('[owner,items]')
|
|
|
+ .select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
|
|
+ .joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
|
|
|
+ .where('access_list.is_deleted', 0)
|
|
|
+ .andWhere('access_list.id', data.id)
|
|
|
+ .allowEager('[owner,items,proxy_hosts]')
|
|
|
+ .omit(['access_list.is_deleted'])
|
|
|
.first();
|
|
|
|
|
|
if (access_data.permission_visibility !== 'all') {
|
|
|
@@ -127,7 +231,7 @@ const internalAccessList = {
|
|
|
})
|
|
|
.then(row => {
|
|
|
if (row) {
|
|
|
- if (typeof row.items !== 'undefined' && row.items) {
|
|
|
+ if (!skip_masking && typeof row.items !== 'undefined' && row.items) {
|
|
|
row = internalAccessList.maskItems(row);
|
|
|
}
|
|
|
|
|
|
@@ -148,19 +252,66 @@ const internalAccessList = {
|
|
|
delete: (access, data) => {
|
|
|
return access.can('access_lists:delete', data.id)
|
|
|
.then(() => {
|
|
|
- return internalAccessList.get(access, {id: data.id});
|
|
|
+ return internalAccessList.get(access, {id: data.id, expand: ['proxy_hosts', 'items']});
|
|
|
})
|
|
|
.then(row => {
|
|
|
if (!row) {
|
|
|
throw new error.ItemNotFoundError(data.id);
|
|
|
}
|
|
|
|
|
|
+ // 1. update row to be deleted
|
|
|
+ // 2. update any proxy hosts that were using it (ignoring permissions)
|
|
|
+ // 3. reconfigure those hosts
|
|
|
+ // 4. audit log
|
|
|
+
|
|
|
+ // 1. update row to be deleted
|
|
|
return accessListModel
|
|
|
.query()
|
|
|
.where('id', row.id)
|
|
|
.patch({
|
|
|
is_deleted: 1
|
|
|
- });
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // 2. update any proxy hosts that were using it (ignoring permissions)
|
|
|
+ if (row.proxy_hosts) {
|
|
|
+ return proxyHostModel
|
|
|
+ .query()
|
|
|
+ .where('access_list_id', '=', row.id)
|
|
|
+ .patch({access_list_id: 0})
|
|
|
+ .then(() => {
|
|
|
+ // 3. reconfigure those hosts, then reload nginx
|
|
|
+
|
|
|
+ // set the access_list_id to zero for these items
|
|
|
+ row.proxy_hosts.map(function (val, idx) {
|
|
|
+ row.proxy_hosts[idx].access_list_id = 0;
|
|
|
+ });
|
|
|
+
|
|
|
+ return internalNginx.bulkGenerateConfigs('proxy_host', row.proxy_hosts);
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ return internalNginx.reload();
|
|
|
+ });
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // delete the htpasswd file
|
|
|
+ let htpasswd_file = internalAccessList.getFilename(row);
|
|
|
+
|
|
|
+ try {
|
|
|
+ fs.unlinkSync(htpasswd_file);
|
|
|
+ } catch (err) {
|
|
|
+ // do nothing
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(() => {
|
|
|
+ // 4. audit log
|
|
|
+ return internalAuditLog.add(access, {
|
|
|
+ action: 'deleted',
|
|
|
+ object_type: 'access-list',
|
|
|
+ object_id: row.id,
|
|
|
+ meta: _.omit(internalAccessList.maskItems(row), ['is_deleted', 'proxy_hosts'])
|
|
|
+ });
|
|
|
+ })
|
|
|
})
|
|
|
.then(() => {
|
|
|
return true;
|
|
|
@@ -180,9 +331,8 @@ const internalAccessList = {
|
|
|
.then(access_data => {
|
|
|
let query = accessListModel
|
|
|
.query()
|
|
|
- .select('access_list.*', accessListModel.raw('COUNT(proxy_hosts.id) as proxy_host_count'), accessListModel.raw('COUNT(items.id) as item_count'))
|
|
|
- .leftJoinRelation('proxy_hosts')
|
|
|
- .leftJoinRelation('items')
|
|
|
+ .select('access_list.*', accessListModel.raw('COUNT(proxy_host.id) as proxy_host_count'))
|
|
|
+ .joinRaw('LEFT JOIN `proxy_host` ON `proxy_host`.`access_list_id` = `access_list`.`id` AND `proxy_host`.`is_deleted` = 0')
|
|
|
.where('access_list.is_deleted', 0)
|
|
|
.groupBy('access_list.id')
|
|
|
.omit(['access_list.is_deleted'])
|
|
|
@@ -249,12 +399,89 @@ const internalAccessList = {
|
|
|
maskItems: list => {
|
|
|
if (list && typeof list.items !== 'undefined') {
|
|
|
list.items.map(function (val, idx) {
|
|
|
- list.items[idx].hint = val.password.charAt(0) + ('*').repeat(val.password.length - 1);
|
|
|
+ let repeat_for = 8;
|
|
|
+ let first_char = '*';
|
|
|
+
|
|
|
+ if (typeof val.password !== 'undefined' && val.password) {
|
|
|
+ repeat_for = val.password.length - 1;
|
|
|
+ first_char = val.password.charAt(0);
|
|
|
+ }
|
|
|
+
|
|
|
+ list.items[idx].hint = first_char + ('*').repeat(repeat_for);
|
|
|
list.items[idx].password = '';
|
|
|
});
|
|
|
}
|
|
|
|
|
|
return list;
|
|
|
+ },
|
|
|
+
|
|
|
+ /**
|
|
|
+ * @param {Object} list
|
|
|
+ * @param {Integer} list.id
|
|
|
+ * @returns {String}
|
|
|
+ */
|
|
|
+ getFilename: list => {
|
|
|
+ return '/data/access/' + list.id;
|
|
|
+ },
|
|
|
+
|
|
|
+ /**
|
|
|
+ * @param {Object} list
|
|
|
+ * @param {Integer} list.id
|
|
|
+ * @param {String} list.name
|
|
|
+ * @param {Array} list.items
|
|
|
+ * @returns {Promise}
|
|
|
+ */
|
|
|
+ build: list => {
|
|
|
+ logger.info('Building Access file #' + list.id + ' for: ' + list.name);
|
|
|
+
|
|
|
+ return new Promise((resolve, reject) => {
|
|
|
+ let htpasswd_file = internalAccessList.getFilename(list);
|
|
|
+
|
|
|
+ // 1. remove any existing access file
|
|
|
+ try {
|
|
|
+ fs.unlinkSync(htpasswd_file);
|
|
|
+ } catch (err) {
|
|
|
+ // do nothing
|
|
|
+ }
|
|
|
+
|
|
|
+ // 2. create empty access file
|
|
|
+ try {
|
|
|
+ fs.writeFileSync(htpasswd_file, '', {encoding: 'utf8'});
|
|
|
+ resolve(htpasswd_file);
|
|
|
+ } catch (err) {
|
|
|
+ reject(err);
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .then(htpasswd_file => {
|
|
|
+ // 3. generate password for each user
|
|
|
+ if (list.items.length) {
|
|
|
+ return new Promise((resolve, reject) => {
|
|
|
+ batchflow(list.items).sequential()
|
|
|
+ .each((i, item, next) => {
|
|
|
+ if (typeof item.password !== 'undefined' && item.password.length) {
|
|
|
+ logger.info('Adding: ' + item.username);
|
|
|
+
|
|
|
+ utils.exec('/usr/bin/htpasswd -b "' + htpasswd_file + '" "' + item.username + '" "' + item.password + '"')
|
|
|
+ .then((/*result*/) => {
|
|
|
+ next();
|
|
|
+ })
|
|
|
+ .catch(err => {
|
|
|
+ logger.error(err);
|
|
|
+ next(err);
|
|
|
+ });
|
|
|
+ }
|
|
|
+ })
|
|
|
+ .error(err => {
|
|
|
+ logger.error(err);
|
|
|
+ reject(err);
|
|
|
+ })
|
|
|
+ .end(results => {
|
|
|
+ logger.success('Built Access file #' + list.id + ' for: ' + list.name);
|
|
|
+ resolve(results);
|
|
|
+ });
|
|
|
+ });
|
|
|
+ }
|
|
|
+ });
|
|
|
}
|
|
|
};
|
|
|
|