bb0f4bfa62
* Fix wrapping when too many hosts are shown (#207) * Update npm packages, fixes CVE-2019-10757 * Revert some breaking packages * Major overhaul - Docker buildx support in CI - Cypress API Testing in CI - Restructured folder layout (insert clean face meme) - Added Swagger documentation and validate API against that (to be completed) - Use common base image for all supported archs, which includes updated nginx with ipv6 support - Updated certbot and changes required for it - Large amount of Hosts names will wrap in UI - Updated packages for frontend - Version bump 2.1.0 * Updated documentation * Fix JWT expire time going crazy. Now set to 1day * Backend JS formatting rules * Remove v1 importer, I doubt anyone is using v1 anymore * Added backend formatting rules and enforce them in Jenkins builds * Fix CI, doesn't need a tty * Thanks bcrypt. Why can't you just be normal. * Cleanup after syntax check Co-authored-by: Marcelo Castagna <margaale@users.noreply.github.com>
116 lines
3.2 KiB
JavaScript
116 lines
3.2 KiB
JavaScript
const fs = require('fs');
|
|
const NodeRSA = require('node-rsa');
|
|
const config = require('config');
|
|
const logger = require('./logger').setup;
|
|
const userModel = require('./models/user');
|
|
const userPermissionModel = require('./models/user_permission');
|
|
const authModel = require('./models/auth');
|
|
const debug_mode = process.env.NODE_ENV !== 'production' || !!process.env.DEBUG;
|
|
|
|
module.exports = function () {
|
|
return new Promise((resolve, reject) => {
|
|
// Now go and check if the jwt gpg keys have been created and if not, create them
|
|
if (!config.has('jwt') || !config.has('jwt.key') || !config.has('jwt.pub')) {
|
|
logger.info('Creating a new JWT key pair...');
|
|
|
|
// jwt keys are not configured properly
|
|
const filename = config.util.getEnv('NODE_CONFIG_DIR') + '/' + (config.util.getEnv('NODE_ENV') || 'default') + '.json';
|
|
let config_data = {};
|
|
|
|
try {
|
|
config_data = require(filename);
|
|
} catch (err) {
|
|
// do nothing
|
|
if (debug_mode) {
|
|
logger.debug(filename + ' config file could not be required');
|
|
}
|
|
}
|
|
|
|
// Now create the keys and save them in the config.
|
|
let key = new NodeRSA({b: 2048});
|
|
key.generateKeyPair();
|
|
|
|
config_data.jwt = {
|
|
key: key.exportKey('private').toString(),
|
|
pub: key.exportKey('public').toString()
|
|
};
|
|
|
|
// Write config
|
|
fs.writeFile(filename, JSON.stringify(config_data, null, 2), (err) => {
|
|
if (err) {
|
|
logger.error('Could not write JWT key pair to config file: ' + filename);
|
|
reject(err);
|
|
} else {
|
|
logger.info('Wrote JWT key pair to config file: ' + filename);
|
|
|
|
logger.warn('Restarting interface to apply new configuration');
|
|
process.exit(0);
|
|
}
|
|
});
|
|
|
|
} else {
|
|
// JWT key pair exists
|
|
if (debug_mode) {
|
|
logger.debug('JWT Keypair already exists');
|
|
}
|
|
|
|
resolve();
|
|
}
|
|
})
|
|
.then(() => {
|
|
return userModel
|
|
.query()
|
|
.select(userModel.raw('COUNT(`id`) as `count`'))
|
|
.where('is_deleted', 0)
|
|
.first();
|
|
})
|
|
.then((row) => {
|
|
if (!row.count) {
|
|
// Create a new user and set password
|
|
logger.info('Creating a new user: admin@example.com with password: changeme');
|
|
|
|
let data = {
|
|
is_deleted: 0,
|
|
email: 'admin@example.com',
|
|
name: 'Administrator',
|
|
nickname: 'Admin',
|
|
avatar: '',
|
|
roles: ['admin']
|
|
};
|
|
|
|
return userModel
|
|
.query()
|
|
.insertAndFetch(data)
|
|
.then((user) => {
|
|
return authModel
|
|
.query()
|
|
.insert({
|
|
user_id: user.id,
|
|
type: 'password',
|
|
secret: 'changeme',
|
|
meta: {}
|
|
})
|
|
.then(() => {
|
|
return userPermissionModel
|
|
.query()
|
|
.insert({
|
|
user_id: user.id,
|
|
visibility: 'all',
|
|
proxy_hosts: 'manage',
|
|
redirection_hosts: 'manage',
|
|
dead_hosts: 'manage',
|
|
streams: 'manage',
|
|
access_lists: 'manage',
|
|
certificates: 'manage'
|
|
});
|
|
});
|
|
})
|
|
.then(() => {
|
|
logger.info('Initial setup completed');
|
|
});
|
|
} else if (debug_mode) {
|
|
logger.debug('Admin user setup not required');
|
|
}
|
|
});
|
|
};
|