Files
cloudron-box/src/settings.js

812 lines
27 KiB
JavaScript
Raw Normal View History

'use strict';
exports = module.exports = {
getAutoupdatePattern,
setAutoupdatePattern,
2020-08-15 18:19:01 -07:00
getTimeZone,
setTimeZone,
2020-08-15 18:19:01 -07:00
getCloudronName,
setCloudronName,
2020-08-15 18:19:01 -07:00
getCloudronAvatar,
setCloudronAvatar,
2020-08-15 18:19:01 -07:00
getDynamicDnsConfig,
setDynamicDnsConfig,
2017-01-02 13:05:48 +01:00
getReverseProxyConfig, // no setter yet since we have no UI for this
2020-08-15 18:19:01 -07:00
getUnstableAppsConfig,
setUnstableAppsConfig,
2019-04-27 22:30:32 +02:00
2020-08-15 18:19:01 -07:00
getBackupConfig,
setBackupConfig,
setBackupCredentials,
2015-11-07 18:02:45 -08:00
getServicesConfig,
setServicesConfig,
2020-08-15 18:19:01 -07:00
getExternalLdapConfig,
setExternalLdapConfig,
2021-11-23 18:00:07 +01:00
getExposedLdapConfig,
setExposedLdapConfig,
2020-08-15 18:19:01 -07:00
getRegistryConfig,
setRegistryConfig,
2019-10-22 22:07:44 -07:00
2020-08-15 18:19:01 -07:00
getLicenseKey,
setLicenseKey,
2020-11-17 18:58:43 +01:00
getLanguage,
setLanguage,
2020-08-15 18:19:01 -07:00
getCloudronId,
setCloudronId,
2020-08-15 18:19:01 -07:00
getCloudronToken,
setCloudronToken,
2019-04-30 22:57:43 -07:00
2020-08-15 18:19:01 -07:00
getSysinfoConfig,
setSysinfoConfig,
2019-10-29 15:46:33 -07:00
2020-08-15 18:19:01 -07:00
getFooter,
setFooter,
2020-08-15 18:19:01 -07:00
getDirectoryConfig,
setDirectoryConfig,
2020-08-15 18:19:01 -07:00
getAppstoreListingConfig,
setAppstoreListingConfig,
2020-03-15 17:07:07 -07:00
getFirewallBlocklist,
setFirewallBlocklist,
2021-09-20 13:05:42 +02:00
getGhosts,
setGhosts,
2020-08-15 18:19:01 -07:00
getSupportConfig,
provider,
list,
2020-08-15 18:19:01 -07:00
initCache,
// these values come from the cache
2020-08-15 18:19:01 -07:00
apiServerOrigin,
webServerOrigin,
2021-05-05 12:29:04 -07:00
dashboardDomain,
setDashboardLocation,
setMailLocation,
mailFqdn,
mailDomain,
2021-05-05 12:29:04 -07:00
dashboardOrigin,
dashboardFqdn,
2020-08-15 18:19:01 -07:00
isDemo,
2021-09-20 18:04:01 +02:00
// booleans. if you add an entry here, be sure to fix list()
2017-01-02 13:05:48 +01:00
DYNAMIC_DNS_KEY: 'dynamic_dns',
2019-04-27 22:30:32 +02:00
UNSTABLE_APPS_KEY: 'unstable_apps',
2019-07-25 11:16:52 -07:00
DEMO_KEY: 'demo',
2021-09-20 18:04:01 +02:00
// json. if you add an entry here, be sure to fix list()
2015-11-07 18:02:45 -08:00
BACKUP_CONFIG_KEY: 'backup_config',
SERVICES_CONFIG_KEY: 'services_config',
EXTERNAL_LDAP_KEY: 'external_ldap_config',
2021-11-23 18:00:07 +01:00
EXPOSED_LDAP_KEY: 'exposed_ldap_config',
2019-10-22 22:07:44 -07:00
REGISTRY_CONFIG_KEY: 'registry_config',
2019-10-29 15:46:33 -07:00
SYSINFO_CONFIG_KEY: 'sysinfo_config',
2020-02-05 11:58:10 -08:00
APPSTORE_LISTING_CONFIG_KEY: 'appstore_listing_config',
2020-02-05 14:30:56 -08:00
SUPPORT_CONFIG_KEY: 'support_config',
DIRECTORY_CONFIG_KEY: 'directory_config',
2021-09-20 13:05:42 +02:00
GHOSTS_CONFIG_KEY: 'ghosts_config',
REVERSE_PROXY_CONFIG_KEY: 'reverseproxy_config',
// strings
AUTOUPDATE_PATTERN_KEY: 'autoupdate_pattern',
TIME_ZONE_KEY: 'time_zone',
CLOUDRON_NAME_KEY: 'cloudron_name',
2019-04-30 22:57:43 -07:00
LICENSE_KEY: 'license_key',
2020-11-17 18:58:43 +01:00
LANGUAGE_KEY: 'language',
2019-04-30 22:57:43 -07:00
CLOUDRON_ID_KEY: 'cloudron_id',
2021-06-03 12:20:44 -07:00
CLOUDRON_TOKEN_KEY: 'cloudron_token', // apstore token
FIREWALL_BLOCKLIST_KEY: 'firewall_blocklist',
2019-07-25 11:16:52 -07:00
API_SERVER_ORIGIN_KEY: 'api_server_origin',
WEB_SERVER_ORIGIN_KEY: 'web_server_origin',
2021-05-05 12:29:04 -07:00
DASHBOARD_DOMAIN_KEY: 'admin_domain',
DASHBOARD_FQDN_KEY: 'admin_fqdn',
MAIL_DOMAIN_KEY: 'mail_domain',
MAIL_FQDN_KEY: 'mail_fqdn',
2019-07-25 11:16:52 -07:00
PROVIDER_KEY: 'provider',
FOOTER_KEY: 'footer',
// blobs
CLOUDRON_AVATAR_KEY: 'cloudron_avatar',
// testing
_setApiServerOrigin: setApiServerOrigin,
2021-08-19 13:24:38 -07:00
_clear: clear,
_set: set
};
const assert = require('assert'),
backups = require('./backups.js'),
2019-10-22 11:03:56 -07:00
BoxError = require('./boxerror.js'),
2016-12-14 14:54:17 +01:00
constants = require('./constants.js'),
cron = require('./cron.js'),
CronJob = require('cron').CronJob,
database = require('./database.js'),
debug = require('debug')('box:settings'),
2019-10-22 22:07:44 -07:00
docker = require('./docker.js'),
2019-10-25 15:58:11 -07:00
externalLdap = require('./externalldap.js'),
2016-06-02 13:36:47 -07:00
moment = require('moment-timezone'),
2021-05-14 15:07:29 -07:00
mounts = require('./mounts.js'),
2021-12-10 16:20:58 +01:00
path = require('path'),
paths = require('./paths.js'),
safe = require('safetydance'),
2021-12-10 16:20:58 +01:00
shell = require('./shell.js'),
2019-10-29 20:08:45 -07:00
sysinfo = require('./sysinfo.js'),
tokens = require('./tokens.js'),
2020-11-19 23:38:59 +01:00
translation = require('./translation.js'),
users = require('./users.js'),
validator = require('validator'),
_ = require('underscore');
const SETTINGS_FIELDS = [ 'name', 'value' ].join(',');
const SETTINGS_BLOB_FIELDS = [ 'name', 'valueBlob' ].join(',');
2021-12-10 16:20:58 +01:00
const SET_LDAP_ALLOWLIST_CMD = path.join(__dirname, 'scripts/setldapallowlist.sh');
2021-08-19 13:24:38 -07:00
const gDefaults = (function () {
2021-08-31 08:47:01 -07:00
const result = { };
result[exports.AUTOUPDATE_PATTERN_KEY] = cron.DEFAULT_AUTOUPDATE_PATTERN;
result[exports.TIME_ZONE_KEY] = 'America/Los_Angeles';
result[exports.CLOUDRON_NAME_KEY] = 'Cloudron';
2017-01-02 13:05:48 +01:00
result[exports.DYNAMIC_DNS_KEY] = false;
2019-11-11 08:42:00 -08:00
result[exports.UNSTABLE_APPS_KEY] = true;
2019-04-30 22:57:43 -07:00
result[exports.LICENSE_KEY] = '';
2020-11-17 18:58:43 +01:00
result[exports.LANGUAGE_KEY] = 'en';
2019-04-30 22:57:43 -07:00
result[exports.CLOUDRON_ID_KEY] = '';
result[exports.CLOUDRON_TOKEN_KEY] = '';
2016-10-21 12:48:48 +02:00
result[exports.BACKUP_CONFIG_KEY] = {
provider: 'filesystem',
backupFolder: '/var/backups',
format: 'tgz',
encryption: null,
retentionPolicy: { keepWithinSecs: 2 * 24 * 60 * 60 }, // 2 days
2020-07-29 09:34:23 -07:00
schedulePattern: '00 00 23 * * *' // every day at 11pm
2016-10-21 12:48:48 +02:00
};
result[exports.REVERSE_PROXY_CONFIG_KEY] = {
ocsp: true
};
result[exports.SERVICES_CONFIG_KEY] = {};
2019-10-25 15:40:22 -07:00
result[exports.EXTERNAL_LDAP_KEY] = {
provider: 'noop',
autoCreate: false
2019-10-25 15:40:22 -07:00
};
2021-11-23 18:00:07 +01:00
result[exports.EXPOSED_LDAP_KEY] = {
enabled: false,
allowlist: '' // empty means allow all
2021-11-23 18:00:07 +01:00
};
result[exports.REGISTRY_CONFIG_KEY] = {
provider: 'noop'
};
2019-10-29 15:46:33 -07:00
result[exports.SYSINFO_CONFIG_KEY] = {
provider: 'generic'
};
result[exports.DIRECTORY_CONFIG_KEY] = {
2020-07-10 10:00:03 -07:00
lockUserProfiles: false,
mandatory2FA: false
};
2021-05-05 12:29:04 -07:00
result[exports.DASHBOARD_DOMAIN_KEY] = '';
result[exports.DASHBOARD_FQDN_KEY] = '';
result[exports.MAIL_DOMAIN_KEY] = '';
result[exports.MAIL_FQDN_KEY] = '';
result[exports.FIREWALL_BLOCKLIST_KEY] = '';
result[exports.API_SERVER_ORIGIN_KEY] = 'https://api.cloudron.io';
result[exports.WEB_SERVER_ORIGIN_KEY] = 'https://cloudron.io';
result[exports.DEMO_KEY] = false;
2020-02-05 11:58:10 -08:00
result[exports.APPSTORE_LISTING_CONFIG_KEY] = {
blacklist: [],
2020-02-26 09:01:22 -08:00
whitelist: null // null imples nothing is whitelisted. this is an array
2020-02-05 11:58:10 -08:00
};
2021-09-20 13:05:42 +02:00
result[exports.GHOSTS_CONFIG_KEY] = {};
2020-02-05 14:30:56 -08:00
result[exports.SUPPORT_CONFIG_KEY] = {
email: 'support@cloudron.io',
remoteSupport: true,
ticketFormBody:
'Use this form to open support tickets. You can also write directly to [support@cloudron.io](mailto:support@cloudron.io).\n\n'
2020-09-15 14:46:22 -07:00
+ '* [Knowledge Base & App Docs](https://docs.cloudron.io/apps/?support_view)\n'
+ '* [Custom App Packaging & API](https://docs.cloudron.io/custom-apps/tutorial/?support_view)\n'
2020-02-05 14:30:56 -08:00
+ '* [Forum](https://forum.cloudron.io/)\n\n',
submitTickets: true
};
2021-08-31 08:47:01 -07:00
result[exports.FOOTER_KEY] = constants.FOOTER;
return result;
})();
let gCache = {};
function notifyChange(key, value) {
2019-03-04 15:45:04 -08:00
assert.strictEqual(typeof key, 'string');
// value is a variant
cron.handleSettingsChanged(key, value);
}
async function get(key) {
assert.strictEqual(typeof key, 'string');
const result = await database.query(`SELECT ${SETTINGS_FIELDS} FROM settings WHERE name = ?`, [ key ]);
if (result.length === 0) return null; // can't return the default value here because we might need to massage/json parse the result
return result[0].value;
}
async function set(key, value) {
assert.strictEqual(typeof key, 'string');
assert(value === null || typeof value === 'string');
await database.query('INSERT INTO settings (name, value) VALUES (?, ?) ON DUPLICATE KEY UPDATE value=VALUES(value)', [ key, value ]); // don't rely on affectedRows here since it gives 2
}
async function getBlob(key) {
assert.strictEqual(typeof key, 'string');
const result = await database.query(`SELECT ${SETTINGS_BLOB_FIELDS} FROM settings WHERE name = ?`, [ key ]);
if (result.length === 0) return null;
return result[0].valueBlob;
}
async function setBlob(key, value) {
assert.strictEqual(typeof key, 'string');
assert(value === null || Buffer.isBuffer(value));
await database.query('INSERT INTO settings (name, valueBlob) VALUES (?, ?) ON DUPLICATE KEY UPDATE valueBlob=VALUES(valueBlob)', [ key, value ]); // don't rely on affectedRows here since it gives 2
}
async function clear() {
await database.query('DELETE FROM settings');
}
2021-08-19 13:24:38 -07:00
async function setAutoupdatePattern(pattern) {
assert.strictEqual(typeof pattern, 'string');
if (pattern !== constants.AUTOUPDATE_PATTERN_NEVER) { // check if pattern is valid
2021-08-19 13:24:38 -07:00
const job = safe.safeCall(function () { return new CronJob(pattern); });
if (!job) throw new BoxError(BoxError.BAD_FIELD, 'Invalid pattern', { field: 'pattern' });
}
2021-08-19 13:24:38 -07:00
await set(exports.AUTOUPDATE_PATTERN_KEY, pattern);
notifyChange(exports.AUTOUPDATE_PATTERN_KEY, pattern);
}
2021-08-19 13:24:38 -07:00
async function getAutoupdatePattern() {
const pattern = await get(exports.AUTOUPDATE_PATTERN_KEY);
if (pattern === null) return gDefaults[exports.AUTOUPDATE_PATTERN_KEY];
return pattern;
}
2021-08-19 13:24:38 -07:00
async function setTimeZone(tz) {
assert.strictEqual(typeof tz, 'string');
2016-06-02 13:36:47 -07:00
2021-08-19 13:24:38 -07:00
if (moment.tz.names().indexOf(tz) === -1) throw new BoxError(BoxError.BAD_FIELD, 'Bad timeZone', { field: 'timezone' });
2021-08-19 13:24:38 -07:00
await set(exports.TIME_ZONE_KEY, tz);
notifyChange(exports.TIME_ZONE_KEY, tz);
}
2021-08-19 13:24:38 -07:00
async function getTimeZone() {
const tz = await get(exports.TIME_ZONE_KEY);
if (tz === null) return gDefaults[exports.TIME_ZONE_KEY];
return tz;
}
async function getCloudronName() {
const name = await get(exports.CLOUDRON_NAME_KEY);
if (name === null) return gDefaults[exports.CLOUDRON_NAME_KEY];
return name;
}
async function setCloudronName(name) {
assert.strictEqual(typeof name, 'string');
if (!name) throw new BoxError(BoxError.BAD_FIELD, 'name is empty', { field: 'name' });
2016-06-02 12:51:39 -07:00
// some arbitrary restrictions (for sake of ui layout)
2021-01-07 22:49:52 +01:00
// if this is changed, adjust dashboard/branding.html
if (name.length > 64) throw new BoxError(BoxError.BAD_FIELD, 'name cannot exceed 64 characters', { field: 'name' });
await set(exports.CLOUDRON_NAME_KEY, name);
notifyChange(exports.CLOUDRON_NAME_KEY, name);
}
async function getCloudronAvatar() {
let avatar = await getBlob(exports.CLOUDRON_AVATAR_KEY);
if (avatar) return avatar;
// try default fallback
avatar = safe.fs.readFileSync(paths.CLOUDRON_DEFAULT_AVATAR_FILE);
if (avatar) return avatar;
throw new BoxError(BoxError.FS_ERROR, `Could not read avatar: ${safe.error.message}`);
}
async function setCloudronAvatar(avatar) {
2021-04-29 15:37:32 -07:00
assert(Buffer.isBuffer(avatar));
await setBlob(exports.CLOUDRON_AVATAR_KEY, avatar);
}
2021-08-19 13:24:38 -07:00
async function getDynamicDnsConfig() {
const enabled = await get(exports.DYNAMIC_DNS_KEY);
if (enabled === null) return gDefaults[exports.DYNAMIC_DNS_KEY];
return !!enabled; // db holds string values only
2017-01-02 13:05:48 +01:00
}
2021-08-19 13:24:38 -07:00
async function setDynamicDnsConfig(enabled) {
2017-01-02 13:05:48 +01:00
assert.strictEqual(typeof enabled, 'boolean');
2021-08-19 13:24:38 -07:00
await set(exports.DYNAMIC_DNS_KEY, enabled ? 'enabled' : ''); // db holds string values only
notifyChange(exports.DYNAMIC_DNS_KEY, enabled);
2017-01-02 13:05:48 +01:00
}
async function getUnstableAppsConfig() {
const result = await get(exports.UNSTABLE_APPS_KEY);
2021-08-18 15:54:53 -07:00
if (result === null) return gDefaults[exports.UNSTABLE_APPS_KEY];
return !!result; // db holds string values only
2019-04-27 22:30:32 +02:00
}
async function setUnstableAppsConfig(enabled) {
2019-04-27 22:30:32 +02:00
assert.strictEqual(typeof enabled, 'boolean');
await set(exports.UNSTABLE_APPS_KEY, enabled ? 'enabled' : ''); // db holds string values only
notifyChange(exports.UNSTABLE_APPS_KEY, enabled);
2019-04-27 22:30:32 +02:00
}
2021-08-19 13:24:38 -07:00
async function getBackupConfig() {
const value = await get(exports.BACKUP_CONFIG_KEY);
if (value === null) return gDefaults[exports.BACKUP_CONFIG_KEY];
2015-11-07 18:02:45 -08:00
2021-08-19 13:24:38 -07:00
const backupConfig = JSON.parse(value); // provider, token, password, region, prefix, bucket
2015-11-07 18:02:45 -08:00
2021-08-19 13:24:38 -07:00
if (backupConfig.provider === 'sshfs' || backupConfig.provider === 'cifs' || backupConfig.provider === 'nfs' || backupConfig.provider === 'ext4' || backupConfig.provider === 'mountpoint') {
backupConfig.mountStatus = await mounts.getStatus(backupConfig.provider, backupConfig.mountPoint); // { state, message }
}
2021-05-14 15:07:29 -07:00
2021-08-19 13:24:38 -07:00
return backupConfig;
2015-11-07 18:02:45 -08:00
}
function mountOptionsChanged(currentConfig, backupConfig) {
return currentConfig.provider !== backupConfig.provider
|| currentConfig.mountPoint !== backupConfig.mountPoint
|| !_.isEqual(currentConfig.mountOptions, backupConfig.mountOptions);
}
2021-08-19 13:24:38 -07:00
async function setBackupConfig(backupConfig) {
2015-11-07 18:02:45 -08:00
assert.strictEqual(typeof backupConfig, 'object');
2021-08-19 13:24:38 -07:00
const oldConfig = await getBackupConfig();
2021-08-19 13:24:38 -07:00
backups.injectPrivateFields(backupConfig, oldConfig);
2021-08-19 13:24:38 -07:00
if (mounts.isMountProvider(backupConfig.provider) && (!mounts.isMountProvider(oldConfig.provider) || mountOptionsChanged(oldConfig, backupConfig))) {
backupConfig.mountPoint = '/mnt/cloudronbackup'; // hardcode the mountPoint for built-in mounts
2021-08-19 13:24:38 -07:00
let error = mounts.validateMountOptions(backupConfig.provider, backupConfig.mountOptions);
if (error) throw error;
2021-06-21 22:37:32 -07:00
[error] = await safe(mounts.tryAddMount(mounts.mountObjectFromBackupConfig(backupConfig), { timeout: 10 })); // 10 seconds
2021-06-21 22:37:32 -07:00
2021-08-19 13:24:38 -07:00
if (error) {
if (mounts.isMountProvider(oldConfig.provider)) { // put back the old mount configuration
debug('setBackupConfig: rolling back to previous mount configuration');
2021-06-21 22:37:32 -07:00
await safe(mounts.tryAddMount(mounts.mountObjectFromBackupConfig(oldConfig), { timeout: 10 }));
2021-06-21 22:37:32 -07:00
}
2021-08-19 13:24:38 -07:00
throw error;
}
2021-08-19 13:24:38 -07:00
}
const error = await backups.testConfig(backupConfig);
if (error) throw error;
2021-08-19 13:24:38 -07:00
if ('password' in backupConfig) { // user set password
backupConfig.encryption = backups.generateEncryptionKeysSync(backupConfig.password);
delete backupConfig.password;
}
// if any of these changes, we have to clear the cache
if ([ 'format', 'provider', 'prefix', 'bucket', 'region', 'endpoint', 'backupFolder', 'mountPoint', 'encryption' ].some(p => backupConfig[p] !== oldConfig[p])) {
debug('setBackupConfig: clearing backup cache');
backups.cleanupCacheFilesSync();
}
2021-08-19 13:24:38 -07:00
await set(exports.BACKUP_CONFIG_KEY, JSON.stringify(backupConfig));
2021-05-14 15:07:29 -07:00
2021-08-19 13:24:38 -07:00
if (mounts.isMountProvider(oldConfig.provider) && !mounts.isMountProvider(backupConfig.provider)) {
debug('setBackupConfig: removing old backup mount point');
await safe(mounts.removeMount(mounts.mountObjectFromBackupConfig(oldConfig)));
2021-08-19 13:24:38 -07:00
}
2021-08-19 13:24:38 -07:00
notifyChange(exports.BACKUP_CONFIG_KEY, backupConfig);
2016-10-11 15:56:07 +02:00
2021-08-19 13:24:38 -07:00
await backups.configureCollectd(backupConfig);
2015-11-07 18:02:45 -08:00
}
2021-08-19 13:24:38 -07:00
async function setBackupCredentials(credentials) {
assert.strictEqual(typeof credentials, 'object');
2021-08-19 13:24:38 -07:00
const currentConfig = await getBackupConfig();
2021-08-19 13:24:38 -07:00
// preserve these fields
const extra = _.pick(currentConfig, 'retentionPolicy', 'schedulePattern', 'copyConcurrency', 'syncConcurrency', 'memoryLimit', 'downloadConcurrency', 'deleteConcurrency', 'uploadPartSize');
2021-08-19 13:24:38 -07:00
const backupConfig = _.extend({}, credentials, extra);
2021-08-19 13:24:38 -07:00
backups.cleanupCacheFilesSync();
2021-08-19 13:24:38 -07:00
await set(exports.BACKUP_CONFIG_KEY, JSON.stringify(backupConfig));
2021-08-19 13:24:38 -07:00
notifyChange(exports.BACKUP_CONFIG_KEY, backupConfig);
2021-08-19 13:24:38 -07:00
await backups.configureCollectd(backupConfig);
}
2021-08-19 13:24:38 -07:00
async function getServicesConfig() {
const value = await get(exports.SERVICES_CONFIG_KEY);
if (value === null) return gDefaults[exports.SERVICES_CONFIG_KEY];
return JSON.parse(value);
}
2021-08-19 13:24:38 -07:00
async function setServicesConfig(platformConfig) {
await set(exports.SERVICES_CONFIG_KEY, JSON.stringify(platformConfig));
notifyChange(exports.SERVICES_CONFIG_KEY, platformConfig);
}
2021-08-19 13:24:38 -07:00
async function getExternalLdapConfig() {
const value = await get(exports.EXTERNAL_LDAP_KEY);
if (value === null) return gDefaults[exports.EXTERNAL_LDAP_KEY];
2021-08-19 13:24:38 -07:00
const config = JSON.parse(value);
if (!config.autoCreate) config.autoCreate = false; // ensure new keys
return config;
}
2021-08-19 13:24:38 -07:00
async function setExternalLdapConfig(externalLdapConfig) {
assert.strictEqual(typeof externalLdapConfig, 'object');
2021-08-19 13:24:38 -07:00
if (isDemo()) throw new BoxError(BoxError.BAD_FIELD, 'Not allowed in demo mode');
2021-08-19 13:24:38 -07:00
const currentConfig = await getExternalLdapConfig();
2019-10-25 15:58:11 -07:00
2021-08-19 13:24:38 -07:00
externalLdap.injectPrivateFields(externalLdapConfig, currentConfig);
const error = await externalLdap.testConfig(externalLdapConfig);
if (error) throw error;
2019-10-25 15:58:11 -07:00
2021-08-19 13:24:38 -07:00
await set(exports.EXTERNAL_LDAP_KEY, JSON.stringify(externalLdapConfig));
2021-08-19 13:24:38 -07:00
notifyChange(exports.EXTERNAL_LDAP_KEY, externalLdapConfig);
}
2021-11-23 18:00:07 +01:00
async function getExposedLdapConfig() {
const value = await get(exports.EXPOSED_LDAP_KEY);
if (value === null) return gDefaults[exports.EXPOSED_LDAP_KEY];
return JSON.parse(value);
}
async function setExposedLdapConfig(exposedLdapConfig) {
assert.strictEqual(typeof exposedLdapConfig, 'object');
if (isDemo()) throw new BoxError(BoxError.BAD_FIELD, 'Not allowed in demo mode');
const config = {
enabled: exposedLdapConfig.enabled,
2021-12-10 16:20:58 +01:00
// if list is empty, we allow all IPs
allowlist: exposedLdapConfig.allowlist || '0.0.0.0/0'
2021-11-23 18:00:07 +01:00
};
2021-12-10 16:20:58 +01:00
if (config.enabled) {
for (const line of exposedLdapConfig.allowlist.split('\n')) {
if (!line || line.startsWith('#')) continue;
const rangeOrIP = line.trim();
if (!validator.isIP(rangeOrIP) && !validator.isIPRange(rangeOrIP)) throw new BoxError(BoxError.BAD_FIELD, `${rangeOrIP} is not a valid IP or range`);
}
}
2021-11-23 18:00:07 +01:00
await set(exports.EXPOSED_LDAP_KEY, JSON.stringify(config));
2021-12-10 16:20:58 +01:00
// this is done only because it's easier for the shell script and the firewall service to get the value
if (config.enabled) {
if (!safe.fs.writeFileSync(paths.LDAP_ALLOWLIST_FILE, exposedLdapConfig.allowlist + '\n', 'utf8')) throw new BoxError(BoxError.FS_ERROR, safe.error.message);
} else {
safe.fs.unlinkSync(paths.LDAP_ALLOWLIST_FILE);
}
const [error] = await safe(shell.promises.sudo('setLdapAllowlist', [ SET_LDAP_ALLOWLIST_CMD ], {}));
if (error) throw new BoxError(BoxError.IPTABLES_ERROR, `Error setting ldap allowlist: ${error.message}`);
2021-11-23 18:00:07 +01:00
notifyChange(exports.EXPOSED_LDAP_KEY, config);
}
2021-08-19 13:24:38 -07:00
async function getRegistryConfig() {
const value = await get(exports.REGISTRY_CONFIG_KEY);
if (value === null) return gDefaults[exports.REGISTRY_CONFIG_KEY];
return JSON.parse(value);
2019-10-22 22:07:44 -07:00
}
2021-08-19 13:24:38 -07:00
async function setRegistryConfig(registryConfig) {
2019-10-22 22:07:44 -07:00
assert.strictEqual(typeof registryConfig, 'object');
2021-08-19 13:24:38 -07:00
const currentConfig = await getRegistryConfig();
2019-10-22 22:07:44 -07:00
2021-08-19 13:24:38 -07:00
docker.injectPrivateFields(registryConfig, currentConfig);
2019-10-22 22:07:44 -07:00
2021-08-25 19:41:46 -07:00
await docker.testRegistryConfig(registryConfig);
2019-10-22 22:07:44 -07:00
2021-08-19 13:24:38 -07:00
await set(exports.REGISTRY_CONFIG_KEY, JSON.stringify(registryConfig));
2019-10-22 22:07:44 -07:00
2021-08-19 13:24:38 -07:00
notifyChange(exports.REGISTRY_CONFIG_KEY, registryConfig);
2019-10-22 22:07:44 -07:00
}
2021-08-19 13:24:38 -07:00
async function getSysinfoConfig() {
const value = await get(exports.SYSINFO_CONFIG_KEY);
if (value === null) return gDefaults[exports.SYSINFO_CONFIG_KEY];
return JSON.parse(value);
2019-10-29 15:46:33 -07:00
}
2021-08-19 13:24:38 -07:00
async function setSysinfoConfig(sysinfoConfig) {
2019-10-29 15:46:33 -07:00
assert.strictEqual(typeof sysinfoConfig, 'object');
2021-08-19 13:24:38 -07:00
if (isDemo()) throw new BoxError(BoxError.BAD_FIELD, 'Not allowed in demo mode');
const error = await sysinfo.testConfig(sysinfoConfig);
if (error) throw error;
2019-10-29 20:08:45 -07:00
2021-08-19 13:24:38 -07:00
await set(exports.SYSINFO_CONFIG_KEY, JSON.stringify(sysinfoConfig));
2019-10-29 15:46:33 -07:00
2021-08-19 13:24:38 -07:00
notifyChange(exports.SYSINFO_CONFIG_KEY, sysinfoConfig);
2019-10-29 15:46:33 -07:00
}
async function getDirectoryConfig() {
const value = await get(exports.DIRECTORY_CONFIG_KEY);
if (value === null) return gDefaults[exports.DIRECTORY_CONFIG_KEY];
return JSON.parse(value);
}
async function setDirectoryConfig(directoryConfig) {
assert.strictEqual(typeof directoryConfig, 'object');
if (isDemo()) throw new BoxError(BoxError.BAD_FIELD, 'Not allowed in demo mode');
const oldConfig = await getDirectoryConfig();
await set(exports.DIRECTORY_CONFIG_KEY, JSON.stringify(directoryConfig));
if (directoryConfig.mandatory2FA && !oldConfig.mandatory2FA) {
debug('setDirectoryConfig: logging out non-2FA users to enforce 2FA');
const allUsers = await users.list();
for (const user of allUsers) {
if (!user.twoFactorAuthenticationEnabled) await tokens.delByUserIdAndType(user.id, tokens.ID_WEBADMIN);
}
}
notifyChange(exports.DIRECTORY_CONFIG_KEY, directoryConfig);
}
async function getReverseProxyConfig() {
const value = await get(exports.REVERSE_PROXY_CONFIG_KEY);
if (value === null) return gDefaults[exports.REVERSE_PROXY_CONFIG_KEY];
return JSON.parse(value);
}
2021-08-18 15:54:53 -07:00
async function getAppstoreListingConfig() {
const value = await get(exports.APPSTORE_LISTING_CONFIG_KEY);
if (value === null) return gDefaults[exports.APPSTORE_LISTING_CONFIG_KEY];
2020-02-05 11:58:10 -08:00
2021-08-18 15:54:53 -07:00
return JSON.parse(value);
2020-02-05 11:58:10 -08:00
}
2021-08-18 15:54:53 -07:00
async function setAppstoreListingConfig(listingConfig) {
2020-03-15 17:07:07 -07:00
assert.strictEqual(typeof listingConfig, 'object');
2021-08-18 15:54:53 -07:00
await set(exports.APPSTORE_LISTING_CONFIG_KEY, JSON.stringify(listingConfig));
notifyChange(exports.APPSTORE_LISTING_CONFIG_KEY, listingConfig);
2020-03-15 17:07:07 -07:00
}
async function getFirewallBlocklist() {
const value = await getBlob(exports.FIREWALL_BLOCKLIST_KEY);
if (value === null) return gDefaults[exports.FIREWALL_BLOCKLIST_KEY];
return value.toString('utf8');
}
async function setFirewallBlocklist(blocklist) {
assert.strictEqual(typeof blocklist, 'string');
// store in blob since the value field is TEXT and has 16kb size limit
await setBlob(exports.FIREWALL_BLOCKLIST_KEY, Buffer.from(blocklist));
}
2020-03-15 17:07:07 -07:00
2021-09-20 13:05:42 +02:00
async function getGhosts() {
const value = await get(exports.GHOSTS_CONFIG_KEY);
if (value === null) return gDefaults[exports.GHOSTS_CONFIG_KEY];
return JSON.parse(value);
}
async function setGhosts(ghosts) {
assert.strictEqual(typeof ghosts, 'object');
await set(exports.GHOSTS_CONFIG_KEY, JSON.stringify(ghosts));
notifyChange(exports.GHOSTS_CONFIG_KEY, ghosts);
}
2021-08-18 15:54:53 -07:00
async function getSupportConfig() {
const value = await get(exports.SUPPORT_CONFIG_KEY);
if (value === null) return gDefaults[exports.SUPPORT_CONFIG_KEY];
2020-02-05 14:30:56 -08:00
2021-08-18 15:54:53 -07:00
return JSON.parse(value);
2020-02-05 14:30:56 -08:00
}
2021-08-18 15:54:53 -07:00
async function getLicenseKey() {
const value = get(exports.LICENSE_KEY);
if (value === null) return gDefaults[exports.LICENSE_KEY];
return value;
2019-04-30 22:57:43 -07:00
}
2021-08-18 15:54:53 -07:00
async function setLicenseKey(licenseKey) {
assert.strictEqual(typeof licenseKey, 'string');
2021-08-18 15:54:53 -07:00
await set(exports.LICENSE_KEY, licenseKey);
notifyChange(exports.LICENSE_KEY, licenseKey);
}
2021-08-19 11:00:35 -07:00
async function getLanguage() {
const value = await get(exports.LANGUAGE_KEY);
if (value === null) return gDefaults[exports.LANGUAGE_KEY];
return value;
2020-11-17 18:58:43 +01:00
}
2021-08-19 11:00:35 -07:00
async function setLanguage(language) {
2020-11-17 18:58:43 +01:00
assert.strictEqual(typeof language, 'string');
2021-08-19 11:00:35 -07:00
const languages = await translation.getLanguages();
2020-11-18 00:10:06 +01:00
2021-08-19 11:00:35 -07:00
if (languages.indexOf(language) === -1) throw new BoxError(BoxError.NOT_FOUND, 'Language not found');
2020-11-18 00:10:06 +01:00
2021-08-19 11:00:35 -07:00
await set(exports.LANGUAGE_KEY, language);
notifyChange(exports.LANGUAGE_KEY, language);
2020-11-17 18:58:43 +01:00
}
2021-08-18 15:54:53 -07:00
async function getCloudronId() {
const value = await get(exports.CLOUDRON_ID_KEY);
if (value === null) return gDefaults[exports.CLOUDRON_ID_KEY];
return value;
2019-04-30 22:57:43 -07:00
}
2021-08-18 15:54:53 -07:00
async function setCloudronId(cid) {
assert.strictEqual(typeof cid, 'string');
2021-08-18 15:54:53 -07:00
await set(exports.CLOUDRON_ID_KEY, cid);
notifyChange(exports.CLOUDRON_ID_KEY, cid);
}
2021-08-18 15:54:53 -07:00
async function getCloudronToken() {
const value = await get(exports.CLOUDRON_TOKEN_KEY);
if (value === null) return gDefaults[exports.CLOUDRON_TOKEN_KEY];
return value;
2019-04-30 22:57:43 -07:00
}
2021-08-18 15:54:53 -07:00
async function setCloudronToken(token) {
assert.strictEqual(typeof token, 'string');
2018-11-05 17:12:04 -08:00
2021-08-18 15:54:53 -07:00
await set(exports.CLOUDRON_TOKEN_KEY, token);
notifyChange(exports.CLOUDRON_TOKEN_KEY, token);
2016-07-26 14:31:07 +02:00
}
async function list() {
const settings = await database.query(`SELECT ${SETTINGS_FIELDS} FROM settings WHERE value IS NOT NULL ORDER BY name`);
const result = _.extend({ }, gDefaults);
settings.forEach(function (setting) { result[setting.name] = setting.value; });
// convert booleans
result[exports.DYNAMIC_DNS_KEY] = !!result[exports.DYNAMIC_DNS_KEY];
result[exports.UNSTABLE_APPS_KEY] = !!result[exports.UNSTABLE_APPS_KEY];
result[exports.DEMO_KEY] = !!result[exports.DEMO_KEY];
// convert JSON objects
[exports.BACKUP_CONFIG_KEY, exports.DIRECTORY_CONFIG_KEY, exports.SERVICES_CONFIG_KEY, exports.EXTERNAL_LDAP_KEY, exports.REGISTRY_CONFIG_KEY, exports.SYSINFO_CONFIG_KEY, exports.REVERSE_PROXY_CONFIG_KEY ].forEach(function (key) {
result[key] = typeof result[key] === 'object' ? result[key] : safe.JSON.parse(result[key]);
});
return result;
}
async function initCache() {
debug('initCache: pre-load settings');
const allSettings = await list();
const provider = safe.fs.readFileSync(paths.PROVIDER_FILE, 'utf8');
gCache = {
apiServerOrigin: allSettings[exports.API_SERVER_ORIGIN_KEY],
webServerOrigin: allSettings[exports.WEB_SERVER_ORIGIN_KEY],
dashboardDomain: allSettings[exports.DASHBOARD_DOMAIN_KEY],
dashboardFqdn: allSettings[exports.DASHBOARD_FQDN_KEY],
mailDomain: allSettings[exports.MAIL_DOMAIN_KEY],
mailFqdn: allSettings[exports.MAIL_FQDN_KEY],
isDemo: allSettings[exports.DEMO_KEY],
provider: provider ? provider.trim() : 'generic'
};
}
// this is together so we can do this in a transaction later
2021-08-19 13:24:38 -07:00
async function setDashboardLocation(dashboardDomain, dashboardFqdn) {
assert.strictEqual(typeof dashboardDomain, 'string');
2021-05-05 12:29:04 -07:00
assert.strictEqual(typeof dashboardFqdn, 'string');
2021-08-19 13:24:38 -07:00
await set(exports.DASHBOARD_DOMAIN_KEY, dashboardDomain);
await set(exports.DASHBOARD_FQDN_KEY, dashboardFqdn);
2021-08-19 13:24:38 -07:00
gCache.dashboardDomain = dashboardDomain;
gCache.dashboardFqdn = dashboardFqdn;
}
2021-08-19 13:24:38 -07:00
async function setMailLocation(mailDomain, mailFqdn) {
assert.strictEqual(typeof mailDomain, 'string');
assert.strictEqual(typeof mailFqdn, 'string');
2021-08-19 13:24:38 -07:00
await set(exports.MAIL_DOMAIN_KEY, mailDomain);
await set(exports.MAIL_FQDN_KEY, mailFqdn);
2021-08-19 13:24:38 -07:00
gCache.mailDomain = mailDomain;
gCache.mailFqdn = mailFqdn;
}
2021-08-19 13:24:38 -07:00
async function setApiServerOrigin(origin) {
assert.strictEqual(typeof origin, 'string');
2021-08-19 13:24:38 -07:00
await set(exports.API_SERVER_ORIGIN_KEY, origin);
2021-08-19 13:24:38 -07:00
gCache.apiServerOrigin = origin;
notifyChange(exports.API_SERVER_ORIGIN_KEY, origin);
}
async function getFooter() {
const value = await get(exports.FOOTER_KEY);
if (value === null) return gDefaults[exports.FOOTER_KEY];
return value;
}
async function setFooter(footer) {
assert.strictEqual(typeof footer, 'string');
await set(exports.FOOTER_KEY, footer);
notifyChange(exports.FOOTER_KEY, footer);
}
2019-10-29 15:46:33 -07:00
function provider() { return gCache.provider; }
function apiServerOrigin() { return gCache.apiServerOrigin; }
function webServerOrigin() { return gCache.webServerOrigin; }
2021-05-05 12:29:04 -07:00
function dashboardDomain() { return gCache.dashboardDomain; }
function dashboardFqdn() { return gCache.dashboardFqdn; }
function isDemo() { return gCache.isDemo; }
function mailDomain() { return gCache.mailDomain; }
function mailFqdn() { return gCache.mailFqdn; }
2021-05-05 12:29:04 -07:00
function dashboardOrigin() { return 'https://' + dashboardFqdn(); }