| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243 | const fs                   = require('fs');const NodeRSA              = require('node-rsa');const config               = require('config');const logger               = require('./logger').setup;const certificateModel     = require('./models/certificate');const userModel            = require('./models/user');const userPermissionModel  = require('./models/user_permission');const utils                = require('./lib/utils');const authModel            = require('./models/auth');const settingModel         = require('./models/setting');const passthroughHostModel = require('./models/ssl_passthrough_host');const dns_plugins          = require('./global/certbot-dns-plugins');const internalNginx        = require('./internal/nginx');const debug_mode           = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG;/** * Creates a new JWT RSA Keypair if not alread set on the config * * @returns {Promise} */const setupJwt = () => {	return new Promise((resolve, reject) => {		// Now go and check if the jwt gpg keys have been created and if not, create them		if (!config.has('jwt') || !config.has('jwt.key') || !config.has('jwt.pub')) {			logger.info('Creating a new JWT key pair...');			// jwt keys are not configured properly			const filename  = config.util.getEnv('NODE_CONFIG_DIR') + '/' + (config.util.getEnv('NODE_ENV') || 'default') + '.json';			let config_data = {};			try {				config_data = require(filename);			} catch (err) {				// do nothing				if (debug_mode) {					logger.debug(filename + ' config file could not be required');				}			}			// Now create the keys and save them in the config.			let key = new NodeRSA({ b: 2048 });			key.generateKeyPair();			config_data.jwt = {				key: key.exportKey('private').toString(),				pub: key.exportKey('public').toString(),			};			// Write config			fs.writeFile(filename, JSON.stringify(config_data, null, 2), (err) => {				if (err) {					logger.error('Could not write JWT key pair to config file: ' + filename);					reject(err);				} else {					logger.info('Wrote JWT key pair to config file: ' + filename);					delete require.cache[require.resolve('config')];					resolve();				}			});		} else {			// JWT key pair exists			if (debug_mode) {				logger.debug('JWT Keypair already exists');			}			resolve();		}	});};/** * Creates a default admin users if one doesn't already exist in the database * * @returns {Promise} */const setupDefaultUser = () => {	return userModel		.query()		.select(userModel.raw('COUNT(`id`) as `count`'))		.where('is_deleted', 0)		.first()		.then((row) => {			if (!row.count) {				// Create a new user and set password				logger.info('Creating a new user: [email protected] with password: changeme');				let data = {					is_deleted: 0,					email:      '[email protected]',					name:       'Administrator',					nickname:   'Admin',					avatar:     '',					roles:      ['admin'],				};				return userModel					.query()					.insertAndFetch(data)					.then((user) => {						return authModel							.query()							.insert({								user_id: user.id,								type:    'password',								secret:  'changeme',								meta:    {},							})							.then(() => {								return userPermissionModel.query().insert({									user_id:               user.id,									visibility:            'all',									proxy_hosts:           'manage',									redirection_hosts:     'manage',									dead_hosts:            'manage',									ssl_passthrough_hosts: 'manage',									streams:               'manage',									access_lists:          'manage',									certificates:          'manage',								});							});					})					.then(() => {						logger.info('Initial admin setup completed');					});			} else if (debug_mode) {				logger.debug('Admin user setup not required');			}		});};/** * Creates default settings if they don't already exist in the database * * @returns {Promise} */const setupDefaultSettings = () => {	return settingModel		.query()		.select(settingModel.raw('COUNT(`id`) as `count`'))		.where({id: 'default-site'})		.first()		.then((row) => {			if (!row.count) {				settingModel					.query()					.insert({						id:          'default-site',						name:        'Default Site',						description: 'What to show when Nginx is hit with an unknown Host',						value:       'congratulations',						meta:        {},					})					.then(() => {						logger.info('Default settings added');					});			}			if (debug_mode) {				logger.debug('Default setting setup not required');			}		});};/** * Installs all Certbot plugins which are required for an installed certificate * * @returns {Promise} */const setupCertbotPlugins = () => {	return certificateModel		.query()		.where('is_deleted', 0)		.andWhere('provider', 'letsencrypt')		.then((certificates) => {			if (certificates && certificates.length) {				let plugins  = [];				let promises = [];				certificates.map(function (certificate) {					if (certificate.meta && certificate.meta.dns_challenge === true) {						const dns_plugin          = dns_plugins[certificate.meta.dns_provider];						const packages_to_install = `${dns_plugin.package_name}==${dns_plugin.package_version} ${dns_plugin.dependencies}`;						if (plugins.indexOf(packages_to_install) === -1) plugins.push(packages_to_install);						// Make sure credentials file exists						const credentials_loc = '/etc/letsencrypt/credentials/credentials-' + certificate.id; 						const credentials_cmd = '[ -f \'' + credentials_loc + '\' ] || { mkdir -p /etc/letsencrypt/credentials 2> /dev/null; echo \'' + certificate.meta.dns_provider_credentials.replace('\'', '\\\'') + '\' > \'' + credentials_loc + '\' && chmod 600 \'' + credentials_loc + '\'; }';						promises.push(utils.exec(credentials_cmd));					}				});				if (plugins.length) {					const install_cmd = 'pip install ' + plugins.join(' ');					promises.push(utils.exec(install_cmd));				}				if (promises.length) {					return Promise.all(promises)						.then(() => { 							logger.info('Added Certbot plugins ' + plugins.join(', ')); 						});				}			}		});};/** * Starts a timer to call run the logrotation binary every two days * @returns {Promise} */const setupLogrotation = () => {	const intervalTimeout = 1000 * 60 * 60 * 24 * 2; // 2 days	const runLogrotate = async () => {		try {			await utils.exec('logrotate /etc/logrotate.d/nginx-proxy-manager');			logger.info('Logrotate completed.');		} catch (e) { logger.warn(e); }	};	logger.info('Logrotate Timer initialized');	setInterval(runLogrotate, intervalTimeout);	// And do this now as well	return runLogrotate();};/** * Makes sure the ssl passthrough option is reflected in the nginx config * @returns {Promise} */const setupSslPassthrough = () => {	return internalNginx.configure(passthroughHostModel, 'ssl_passthrough_host', {}).then(() => internalNginx.reload());};module.exports = function () {	return setupJwt()		.then(setupDefaultUser)		.then(setupDefaultSettings)		.then(setupCertbotPlugins)		.then(setupLogrotation)		.then(setupSslPassthrough);};
 |