123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231 |
- const fs = require('fs');
- const NodeRSA = require('node-rsa');
- const config = require('config');
- const logger = require('./logger').setup;
- const certificateModel = require('./models/certificate');
- const userModel = require('./models/user');
- const userPermissionModel = require('./models/user_permission');
- const utils = require('./lib/utils');
- const authModel = require('./models/auth');
- const settingModel = require('./models/setting');
- const dns_plugins = require('./global/certbot-dns-plugins');
- const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG;
- /**
- * Creates a new JWT RSA Keypair if not alread set on the config
- *
- * @returns {Promise}
- */
- const setupJwt = () => {
- return new Promise((resolve, reject) => {
- // Now go and check if the jwt gpg keys have been created and if not, create them
- if (!config.has('jwt') || !config.has('jwt.key') || !config.has('jwt.pub')) {
- logger.info('Creating a new JWT key pair...');
- // jwt keys are not configured properly
- const filename = config.util.getEnv('NODE_CONFIG_DIR') + '/' + (config.util.getEnv('NODE_ENV') || 'default') + '.json';
- let config_data = {};
- try {
- config_data = require(filename);
- } catch (err) {
- // do nothing
- if (debug_mode) {
- logger.debug(filename + ' config file could not be required');
- }
- }
- // Now create the keys and save them in the config.
- let key = new NodeRSA({ b: 2048 });
- key.generateKeyPair();
- config_data.jwt = {
- key: key.exportKey('private').toString(),
- pub: key.exportKey('public').toString(),
- };
- // Write config
- fs.writeFile(filename, JSON.stringify(config_data, null, 2), (err) => {
- if (err) {
- logger.error('Could not write JWT key pair to config file: ' + filename);
- reject(err);
- } else {
- logger.info('Wrote JWT key pair to config file: ' + filename);
- delete require.cache[require.resolve('config')];
- resolve();
- }
- });
- } else {
- // JWT key pair exists
- if (debug_mode) {
- logger.debug('JWT Keypair already exists');
- }
- resolve();
- }
- });
- };
- /**
- * Creates a default admin users if one doesn't already exist in the database
- *
- * @returns {Promise}
- */
- const setupDefaultUser = () => {
- return userModel
- .query()
- .select(userModel.raw('COUNT(`id`) as `count`'))
- .where('is_deleted', 0)
- .first()
- .then((row) => {
- if (!row.count) {
- // Create a new user and set password
- logger.info('Creating a new user: [email protected] with password: changeme');
- let data = {
- is_deleted: 0,
- email: '[email protected]',
- name: 'Administrator',
- nickname: 'Admin',
- avatar: '',
- roles: ['admin'],
- };
- return userModel
- .query()
- .insertAndFetch(data)
- .then((user) => {
- return authModel
- .query()
- .insert({
- user_id: user.id,
- type: 'password',
- secret: 'changeme',
- meta: {},
- })
- .then(() => {
- return userPermissionModel.query().insert({
- user_id: user.id,
- visibility: 'all',
- proxy_hosts: 'manage',
- redirection_hosts: 'manage',
- dead_hosts: 'manage',
- streams: 'manage',
- access_lists: 'manage',
- certificates: 'manage',
- });
- });
- })
- .then(() => {
- logger.info('Initial admin setup completed');
- });
- } else if (debug_mode) {
- logger.debug('Admin user setup not required');
- }
- });
- };
- /**
- * Creates default settings if they don't already exist in the database
- *
- * @returns {Promise}
- */
- const setupDefaultSettings = () => {
- return settingModel
- .query()
- .select(settingModel.raw('COUNT(`id`) as `count`'))
- .where({id: 'default-site'})
- .first()
- .then((row) => {
- if (!row.count) {
- settingModel
- .query()
- .insert({
- id: 'default-site',
- name: 'Default Site',
- description: 'What to show when Nginx is hit with an unknown Host',
- value: 'congratulations',
- meta: {},
- })
- .then(() => {
- logger.info('Default settings added');
- });
- }
- if (debug_mode) {
- logger.debug('Default setting setup not required');
- }
- });
- };
- /**
- * Installs all Certbot plugins which are required for an installed certificate
- *
- * @returns {Promise}
- */
- const setupCertbotPlugins = () => {
- return certificateModel
- .query()
- .where('is_deleted', 0)
- .andWhere('provider', 'letsencrypt')
- .then((certificates) => {
- if (certificates && certificates.length) {
- let plugins = [];
- let promises = [];
- certificates.map(function (certificate) {
- if (certificate.meta && certificate.meta.dns_challenge === true) {
- const dns_plugin = dns_plugins[certificate.meta.dns_provider];
- const packages_to_install = `${dns_plugin.package_name}${dns_plugin.version_requirement || ''} ${dns_plugin.dependencies}`;
- if (plugins.indexOf(packages_to_install) === -1) plugins.push(packages_to_install);
- // Make sure credentials file exists
- const credentials_loc = '/etc/letsencrypt/credentials/credentials-' + certificate.id;
- const credentials_cmd = '[ -f \'' + credentials_loc + '\' ] || { mkdir -p /etc/letsencrypt/credentials 2> /dev/null; echo \'' + certificate.meta.dns_provider_credentials.replace('\'', '\\\'') + '\' > \'' + credentials_loc + '\' && chmod 600 \'' + credentials_loc + '\'; }';
- promises.push(utils.exec(credentials_cmd));
- }
- });
- if (plugins.length) {
- const install_cmd = 'pip install ' + plugins.join(' ');
- promises.push(utils.exec(install_cmd));
- }
- if (promises.length) {
- return Promise.all(promises)
- .then(() => {
- logger.info('Added Certbot plugins ' + plugins.join(', '));
- });
- }
- }
- });
- };
- /**
- * Starts a timer to call run the logrotation binary every two days
- * @returns {Promise}
- */
- const setupLogrotation = () => {
- const intervalTimeout = 1000 * 60 * 60 * 24 * 2; // 2 days
- const runLogrotate = async () => {
- try {
- await utils.exec('logrotate /etc/logrotate.d/nginx-proxy-manager');
- logger.info('Logrotate completed.');
- } catch (e) { logger.warn(e); }
- };
- logger.info('Logrotate Timer initialized');
- setInterval(runLogrotate, intervalTimeout);
- // And do this now as well
- return runLogrotate();
- };
- module.exports = function () {
- return setupJwt()
- .then(setupDefaultUser)
- .then(setupDefaultSettings)
- .then(setupCertbotPlugins)
- .then(setupLogrotation);
- };
|