Files
cloudron-box/src/routes/provision.js
T

131 lines
6.3 KiB
JavaScript
Raw Normal View History

2018-01-29 15:47:26 -08:00
'use strict';
exports = module.exports = {
providerTokenAuth,
setup,
activate,
restore,
getStatus,
setupTokenAuth
2018-01-29 15:47:26 -08:00
};
2021-06-29 14:26:34 -07:00
const assert = require('assert'),
2021-09-30 09:50:30 -07:00
AuditSource = require('../auditsource.js'),
2019-10-23 15:45:09 -07:00
BoxError = require('../boxerror.js'),
2018-01-29 15:47:26 -08:00
HttpError = require('connect-lastmile').HttpError,
HttpSuccess = require('connect-lastmile').HttpSuccess,
paths = require('../paths.js'),
2018-12-11 15:29:47 -08:00
provision = require('../provision.js'),
safe = require('safetydance'),
2021-08-25 19:41:46 -07:00
settings = require('../settings.js'),
superagent = require('superagent');
2018-01-29 15:47:26 -08:00
function setupTokenAuth(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
const setupToken = safe.fs.readFileSync(paths.SETUP_TOKEN_FILE, 'utf8');
if (!setupToken) return next();
if (!req.body.setupToken) return next(new HttpError(400, 'setup token required'));
if (setupToken.trim() !== req.body.setupToken) return next(new HttpError(422, 'setup token does not match'));
return next();
}
2021-08-25 19:41:46 -07:00
async function providerTokenAuth(req, res, next) {
2018-01-29 15:47:26 -08:00
assert.strictEqual(typeof req.body, 'object');
2019-10-29 15:46:33 -07:00
if (settings.provider() === 'ami') {
2018-01-29 15:47:26 -08:00
if (typeof req.body.providerToken !== 'string' || !req.body.providerToken) return next(new HttpError(400, 'providerToken must be a non empty string'));
2021-11-17 19:05:26 -08:00
const [error, response] = await safe(superagent.get('http://169.254.169.254/latest/meta-data/instance-id').timeout(30 * 1000).ok(() => true));
2021-08-25 19:41:46 -07:00
if (error) return next(new HttpError(422, `Network error getting EC2 metadata: ${error.message}`));
2021-11-17 19:05:26 -08:00
if (response.status !== 200) return next(new HttpError(422, `Unable to get EC2 meta data. statusCode: ${response.status}`));
if (response.text !== req.body.providerToken) return next(new HttpError(422, 'Instance ID does not match'));
2018-01-29 15:47:26 -08:00
2021-08-25 19:41:46 -07:00
next();
2018-01-29 15:47:26 -08:00
} else {
next();
}
}
2021-08-27 09:52:24 -07:00
async function setup(req, res, next) {
2018-01-29 15:47:26 -08:00
assert.strictEqual(typeof req.body, 'object');
2022-01-05 22:41:41 -08:00
if (!req.body.domainConfig || typeof req.body.domainConfig !== 'object') return next(new HttpError(400, 'domainConfig is required'));
2018-01-29 15:47:26 -08:00
2022-01-05 22:41:41 -08:00
const domainConfig = req.body.domainConfig;
2018-01-29 15:47:26 -08:00
2022-01-05 22:41:41 -08:00
if (typeof domainConfig.provider !== 'string' || !domainConfig.provider) return next(new HttpError(400, 'provider is required'));
if (typeof domainConfig.domain !== 'string' || !domainConfig.domain) return next(new HttpError(400, 'domain is required'));
2022-01-05 22:41:41 -08:00
if ('zoneName' in domainConfig && typeof domainConfig.zoneName !== 'string') return next(new HttpError(400, 'zoneName must be a string'));
if (!domainConfig.config || typeof domainConfig.config !== 'object') return next(new HttpError(400, 'config must be an object'));
2018-10-30 13:36:00 -07:00
2022-01-05 22:41:41 -08:00
if ('tlsConfig' in domainConfig && typeof domainConfig.tlsConfig !== 'object') return next(new HttpError(400, 'tlsConfig must be an object'));
if (domainConfig.tlsConfig && (!domainConfig.tlsConfig.provider || typeof domainConfig.tlsConfig.provider !== 'string')) return next(new HttpError(400, 'tlsConfig.provider must be a string'));
2018-10-30 13:36:00 -07:00
if ('sysinfoConfig' in req.body && typeof req.body.sysinfoConfig !== 'object') return next(new HttpError(400, 'sysinfoConfig must be an object'));
2018-10-30 18:43:52 -07:00
2018-11-02 17:24:38 -07:00
// it can take sometime to setup DNS, register cloudron
req.clearTimeout();
2022-01-05 22:41:41 -08:00
const [error] = await safe(provision.setup(domainConfig, req.body.sysinfoConfig || { provider: 'generic' }, AuditSource.fromRequest(req)));
2021-08-27 09:52:24 -07:00
if (error) return next(BoxError.toHttpError(error));
2018-01-29 15:47:26 -08:00
2021-08-27 09:52:24 -07:00
next(new HttpSuccess(200, {}));
2018-01-29 15:47:26 -08:00
}
2021-07-15 09:50:11 -07:00
async function activate(req, res, next) {
2018-01-29 15:47:26 -08:00
assert.strictEqual(typeof req.body, 'object');
if (typeof req.body.username !== 'string') return next(new HttpError(400, 'username must be string'));
if (typeof req.body.password !== 'string') return next(new HttpError(400, 'password must be string'));
if (typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be string'));
if ('displayName' in req.body && typeof req.body.displayName !== 'string') return next(new HttpError(400, 'displayName must be string'));
2021-07-15 09:50:11 -07:00
const { username, password, email } = req.body;
const displayName = req.body.displayName || '';
2018-01-29 15:47:26 -08:00
2021-07-15 09:50:11 -07:00
const ip = req.headers['x-forwarded-for'] || req.connection.remoteAddress;
2018-01-29 15:47:26 -08:00
2021-09-30 09:50:30 -07:00
const [error, info] = await safe(provision.activate(username, password, email, displayName, ip, AuditSource.fromRequest(req)));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
2018-01-29 15:47:26 -08:00
2021-07-15 09:50:11 -07:00
next(new HttpSuccess(201, info));
2018-01-29 15:47:26 -08:00
}
2021-08-27 09:52:24 -07:00
async function restore(req, res, next) {
2018-01-29 15:47:26 -08:00
assert.strictEqual(typeof req.body, 'object');
if (!req.body.backupConfig || typeof req.body.backupConfig !== 'object') return next(new HttpError(400, 'backupConfig is required'));
2021-02-24 14:56:09 -08:00
const backupConfig = req.body.backupConfig;
2018-01-29 15:47:26 -08:00
if (typeof backupConfig.provider !== 'string') return next(new HttpError(400, 'provider is required'));
2020-05-12 10:31:51 -07:00
if ('password' in backupConfig && typeof backupConfig.password !== 'string') return next(new HttpError(400, 'password must be a string'));
2018-01-29 15:47:26 -08:00
if (typeof backupConfig.format !== 'string') return next(new HttpError(400, 'format must be a string'));
if ('acceptSelfSignedCerts' in backupConfig && typeof backupConfig.acceptSelfSignedCerts !== 'boolean') return next(new HttpError(400, 'format must be a boolean'));
if (typeof req.body.remotePath !== 'string') return next(new HttpError(400, 'remotePath must be a string'));
2018-01-29 15:47:26 -08:00
if (typeof req.body.version !== 'string') return next(new HttpError(400, 'version must be a string'));
2019-11-11 09:49:18 -08:00
if ('sysinfoConfig' in req.body && typeof req.body.sysinfoConfig !== 'object') return next(new HttpError(400, 'sysinfoConfig must be an object'));
2021-02-24 14:56:09 -08:00
if ('skipDnsSetup' in req.body && typeof req.body.skipDnsSetup !== 'boolean') return next(new HttpError(400, 'skipDnsSetup must be a boolean'));
2019-11-11 09:49:18 -08:00
2021-02-24 14:56:09 -08:00
const options = {
skipDnsSetup: req.body.skipDnsSetup || false
};
const [error] = await safe(provision.restore(backupConfig, req.body.remotePath, req.body.version, req.body.sysinfoConfig || { provider: 'generic' }, options, AuditSource.fromRequest(req)));
2021-08-27 09:52:24 -07:00
if (error) return next(BoxError.toHttpError(error));
2018-01-29 15:47:26 -08:00
2021-08-27 09:52:24 -07:00
next(new HttpSuccess(200, {}));
2018-01-29 15:47:26 -08:00
}
2021-08-18 13:25:42 -07:00
async function getStatus(req, res, next) {
const [error, status] = await safe(provision.getStatus());
if (error) return next(BoxError.toHttpError(error));
2021-08-18 13:25:42 -07:00
next(new HttpSuccess(200, status));
}