dead-host.js 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. import _ from "lodash";
  2. import errs from "../lib/error.js";
  3. import { castJsonIfNeed } from "../lib/helpers.js";
  4. import utils from "../lib/utils.js";
  5. import deadHostModel from "../models/dead_host.js";
  6. import internalAuditLog from "./audit-log.js";
  7. import internalCertificate from "./certificate.js";
  8. import internalHost from "./host.js";
  9. import internalNginx from "./nginx.js";
  10. const omissions = () => {
  11. return ["is_deleted"];
  12. };
  13. const internalDeadHost = {
  14. /**
  15. * @param {Access} access
  16. * @param {Object} data
  17. * @returns {Promise}
  18. */
  19. create: async (access, data) => {
  20. const createCertificate = data.certificate_id === "new";
  21. if (createCertificate) {
  22. delete data.certificate_id;
  23. }
  24. await access.can("dead_hosts:create", data);
  25. // Get a list of the domain names and check each of them against existing records
  26. const domainNameCheckPromises = [];
  27. data.domain_names.map((domain_name) => {
  28. domainNameCheckPromises.push(internalHost.isHostnameTaken(domain_name));
  29. return true;
  30. });
  31. await Promise.all(domainNameCheckPromises).then((check_results) => {
  32. check_results.map((result) => {
  33. if (result.is_taken) {
  34. throw new errs.ValidationError(`${result.hostname} is already in use`);
  35. }
  36. return true;
  37. });
  38. });
  39. // At this point the domains should have been checked
  40. data.owner_user_id = access.token.getUserId(1);
  41. const thisData = internalHost.cleanSslHstsData(data);
  42. // Fix for db field not having a default value
  43. // for this optional field.
  44. if (typeof data.advanced_config === "undefined") {
  45. thisData.advanced_config = "";
  46. }
  47. const row = await deadHostModel.query().insertAndFetch(thisData).then(utils.omitRow(omissions()));
  48. if (createCertificate) {
  49. const cert = await internalCertificate.createQuickCertificate(access, data);
  50. // update host with cert id
  51. await internalDeadHost.update(access, {
  52. id: row.id,
  53. certificate_id: cert.id,
  54. });
  55. }
  56. // re-fetch with cert
  57. const freshRow = await internalDeadHost.get(access, {
  58. id: row.id,
  59. expand: ["certificate", "owner"],
  60. });
  61. // Configure nginx
  62. await internalNginx.configure(deadHostModel, "dead_host", freshRow);
  63. data.meta = _.assign({}, data.meta || {}, freshRow.meta);
  64. // Add to audit log
  65. await internalAuditLog.add(access, {
  66. action: "created",
  67. object_type: "dead-host",
  68. object_id: freshRow.id,
  69. meta: data,
  70. });
  71. return freshRow;
  72. },
  73. /**
  74. * @param {Access} access
  75. * @param {Object} data
  76. * @param {Number} data.id
  77. * @return {Promise}
  78. */
  79. update: async (access, data) => {
  80. const createCertificate = data.certificate_id === "new";
  81. if (createCertificate) {
  82. delete data.certificate_id;
  83. }
  84. await access.can("dead_hosts:update", data.id);
  85. // Get a list of the domain names and check each of them against existing records
  86. const domainNameCheckPromises = [];
  87. if (typeof data.domain_names !== "undefined") {
  88. data.domain_names.map((domainName) => {
  89. domainNameCheckPromises.push(internalHost.isHostnameTaken(domainName, "dead", data.id));
  90. return true;
  91. });
  92. const checkResults = await Promise.all(domainNameCheckPromises);
  93. checkResults.map((result) => {
  94. if (result.is_taken) {
  95. throw new errs.ValidationError(`${result.hostname} is already in use`);
  96. }
  97. return true;
  98. });
  99. }
  100. const row = await internalDeadHost.get(access, { id: data.id });
  101. if (row.id !== data.id) {
  102. // Sanity check that something crazy hasn't happened
  103. throw new errs.InternalValidationError(
  104. `404 Host could not be updated, IDs do not match: ${row.id} !== ${data.id}`,
  105. );
  106. }
  107. if (createCertificate) {
  108. const cert = await internalCertificate.createQuickCertificate(access, {
  109. domain_names: data.domain_names || row.domain_names,
  110. meta: _.assign({}, row.meta, data.meta),
  111. });
  112. // update host with cert id
  113. data.certificate_id = cert.id;
  114. }
  115. // Add domain_names to the data in case it isn't there, so that the audit log renders correctly. The order is important here.
  116. let thisData = _.assign(
  117. {},
  118. {
  119. domain_names: row.domain_names,
  120. },
  121. data,
  122. );
  123. thisData = internalHost.cleanSslHstsData(thisData, row);
  124. // Add to audit log
  125. await internalAuditLog.add(access, {
  126. action: "updated",
  127. object_type: "dead-host",
  128. object_id: row.id,
  129. meta: thisData,
  130. });
  131. const thisRow = await internalDeadHost
  132. .get(access, {
  133. id: thisData.id,
  134. expand: ["owner", "certificate"],
  135. });
  136. // Configure nginx
  137. const newMeta = await internalNginx.configure(deadHostModel, "dead_host", row);
  138. row.meta = newMeta;
  139. return _.omit(internalHost.cleanRowCertificateMeta(thisRow), omissions());
  140. },
  141. /**
  142. * @param {Access} access
  143. * @param {Object} data
  144. * @param {Number} data.id
  145. * @param {Array} [data.expand]
  146. * @param {Array} [data.omit]
  147. * @return {Promise}
  148. */
  149. get: async (access, data) => {
  150. const accessData = await access.can("dead_hosts:get", data.id);
  151. const query = deadHostModel
  152. .query()
  153. .where("is_deleted", 0)
  154. .andWhere("id", data.id)
  155. .allowGraph("[owner,certificate]")
  156. .first();
  157. if (accessData.permission_visibility !== "all") {
  158. query.andWhere("owner_user_id", access.token.getUserId(1));
  159. }
  160. if (typeof data.expand !== "undefined" && data.expand !== null) {
  161. query.withGraphFetched(`[${data.expand.join(", ")}]`);
  162. }
  163. const row = await query.then(utils.omitRow(omissions()));
  164. if (!row || !row.id) {
  165. throw new errs.ItemNotFoundError(data.id);
  166. }
  167. // Custom omissions
  168. if (typeof data.omit !== "undefined" && data.omit !== null) {
  169. return _.omit(row, data.omit);
  170. }
  171. return row;
  172. },
  173. /**
  174. * @param {Access} access
  175. * @param {Object} data
  176. * @param {Number} data.id
  177. * @param {String} [data.reason]
  178. * @returns {Promise}
  179. */
  180. delete: async (access, data) => {
  181. await access.can("dead_hosts:delete", data.id)
  182. const row = await internalDeadHost.get(access, { id: data.id });
  183. if (!row || !row.id) {
  184. throw new errs.ItemNotFoundError(data.id);
  185. }
  186. await deadHostModel
  187. .query()
  188. .where("id", row.id)
  189. .patch({
  190. is_deleted: 1,
  191. });
  192. // Delete Nginx Config
  193. await internalNginx.deleteConfig("dead_host", row);
  194. await internalNginx.reload();
  195. // Add to audit log
  196. await internalAuditLog.add(access, {
  197. action: "deleted",
  198. object_type: "dead-host",
  199. object_id: row.id,
  200. meta: _.omit(row, omissions()),
  201. });
  202. },
  203. /**
  204. * @param {Access} access
  205. * @param {Object} data
  206. * @param {Number} data.id
  207. * @param {String} [data.reason]
  208. * @returns {Promise}
  209. */
  210. enable: async (access, data) => {
  211. await access.can("dead_hosts:update", data.id)
  212. const row = await internalDeadHost.get(access, {
  213. id: data.id,
  214. expand: ["certificate", "owner"],
  215. });
  216. if (!row || !row.id) {
  217. throw new errs.ItemNotFoundError(data.id);
  218. }
  219. if (row.enabled) {
  220. throw new errs.ValidationError("Host is already enabled");
  221. }
  222. row.enabled = 1;
  223. await deadHostModel
  224. .query()
  225. .where("id", row.id)
  226. .patch({
  227. enabled: 1,
  228. });
  229. // Configure nginx
  230. await internalNginx.configure(deadHostModel, "dead_host", row);
  231. // Add to audit log
  232. await internalAuditLog.add(access, {
  233. action: "enabled",
  234. object_type: "dead-host",
  235. object_id: row.id,
  236. meta: _.omit(row, omissions()),
  237. });
  238. return true;
  239. },
  240. /**
  241. * @param {Access} access
  242. * @param {Object} data
  243. * @param {Number} data.id
  244. * @param {String} [data.reason]
  245. * @returns {Promise}
  246. */
  247. disable: async (access, data) => {
  248. await access.can("dead_hosts:update", data.id)
  249. const row = await internalDeadHost.get(access, { id: data.id });
  250. if (!row || !row.id) {
  251. throw new errs.ItemNotFoundError(data.id);
  252. }
  253. if (!row.enabled) {
  254. throw new errs.ValidationError("Host is already disabled");
  255. }
  256. row.enabled = 0;
  257. await deadHostModel
  258. .query()
  259. .where("id", row.id)
  260. .patch({
  261. enabled: 0,
  262. });
  263. // Delete Nginx Config
  264. await internalNginx.deleteConfig("dead_host", row);
  265. await internalNginx.reload();
  266. // Add to audit log
  267. await internalAuditLog.add(access, {
  268. action: "disabled",
  269. object_type: "dead-host",
  270. object_id: row.id,
  271. meta: _.omit(row, omissions()),
  272. });
  273. return true;
  274. },
  275. /**
  276. * All Hosts
  277. *
  278. * @param {Access} access
  279. * @param {Array} [expand]
  280. * @param {String} [searchQuery]
  281. * @returns {Promise}
  282. */
  283. getAll: async (access, expand, searchQuery) => {
  284. const accessData = await access.can("dead_hosts:list")
  285. const query = deadHostModel
  286. .query()
  287. .where("is_deleted", 0)
  288. .groupBy("id")
  289. .allowGraph("[owner,certificate]")
  290. .orderBy(castJsonIfNeed("domain_names"), "ASC");
  291. if (accessData.permission_visibility !== "all") {
  292. query.andWhere("owner_user_id", access.token.getUserId(1));
  293. }
  294. // Query is used for searching
  295. if (typeof searchQuery === "string" && searchQuery.length > 0) {
  296. query.where(function () {
  297. this.where(castJsonIfNeed("domain_names"), "like", `%${searchQuery}%`);
  298. });
  299. }
  300. if (typeof expand !== "undefined" && expand !== null) {
  301. query.withGraphFetched(`[${expand.join(", ")}]`);
  302. }
  303. const rows = await query.then(utils.omitRows(omissions()));
  304. if (typeof expand !== "undefined" && expand !== null && expand.indexOf("certificate") !== -1) {
  305. internalHost.cleanAllRowsCertificateMeta(rows);
  306. }
  307. return rows;
  308. },
  309. /**
  310. * Report use
  311. *
  312. * @param {Number} user_id
  313. * @param {String} visibility
  314. * @returns {Promise}
  315. */
  316. getCount: async (user_id, visibility) => {
  317. const query = deadHostModel.query().count("id as count").where("is_deleted", 0);
  318. if (visibility !== "all") {
  319. query.andWhere("owner_user_id", user_id);
  320. }
  321. const row = await query.first();
  322. return Number.parseInt(row.count, 10);
  323. },
  324. };
  325. export default internalDeadHost;