174 lines
5.7 KiB
JavaScript
174 lines
5.7 KiB
JavaScript
'use strict';
|
|
|
|
exports = module.exports = {
|
|
testIPv4Config,
|
|
testIPv6Config,
|
|
|
|
getBlocklist,
|
|
setBlocklist,
|
|
|
|
getDynamicDns,
|
|
setDynamicDns,
|
|
|
|
getIPv4Config,
|
|
setIPv4Config,
|
|
|
|
getIPv6Config,
|
|
setIPv6Config,
|
|
|
|
getIPv4,
|
|
hasIPv6,
|
|
getIPv6,
|
|
detectIP
|
|
};
|
|
|
|
const assert = require('node:assert'),
|
|
BoxError = require('./boxerror.js'),
|
|
constants = require('./constants.js'),
|
|
cron = require('./cron.js'),
|
|
fs = require('node:fs'),
|
|
ipaddr = require('./ipaddr.js'),
|
|
path = require('node:path'),
|
|
paths = require('./paths.js'),
|
|
safe = require('safetydance'),
|
|
settings = require('./settings.js'),
|
|
shell = require('./shell.js')('network');
|
|
|
|
const SET_BLOCKLIST_CMD = path.join(__dirname, 'scripts/setblocklist.sh');
|
|
|
|
function api(provider) {
|
|
assert.strictEqual(typeof provider, 'string');
|
|
|
|
switch (provider) {
|
|
case 'noop': return require('./network/noop.js');
|
|
case 'fixed': return require('./network/fixed.js');
|
|
case 'network-interface': return require('./network/network-interface.js');
|
|
default: return require('./network/generic.js');
|
|
}
|
|
}
|
|
|
|
function hasIPv6() {
|
|
const IPV6_PROC_FILE = '/proc/net/if_inet6';
|
|
// on contabo, /proc/net/if_inet6 is an empty file. so just exists is not enough
|
|
return fs.existsSync(IPV6_PROC_FILE) && fs.readFileSync(IPV6_PROC_FILE, 'utf8').trim().length !== 0;
|
|
}
|
|
|
|
async function testIPv4Config(config) {
|
|
assert.strictEqual(typeof config, 'object');
|
|
|
|
return await api(config.provider).testIPv4Config(config);
|
|
}
|
|
|
|
async function testIPv6Config(config) {
|
|
assert.strictEqual(typeof config, 'object');
|
|
|
|
return await api(config.provider).testIPv6Config(config);
|
|
}
|
|
|
|
async function getBlocklist() {
|
|
const value = await settings.getBlob(settings.FIREWALL_BLOCKLIST_KEY);
|
|
return value ? value.toString('utf8') : '';
|
|
}
|
|
|
|
async function setBlocklist(blocklist, auditSource) {
|
|
assert.strictEqual(typeof blocklist, 'string');
|
|
assert.strictEqual(typeof auditSource, 'object');
|
|
|
|
let count = 0;
|
|
for (const line of blocklist.split('\n')) {
|
|
if (!line || line.startsWith('#')) continue;
|
|
const rangeOrIP = line.trim();
|
|
if (!ipaddr.isValid(rangeOrIP) && !ipaddr.isValidCIDR(rangeOrIP)) throw new BoxError(BoxError.BAD_FIELD, `'${rangeOrIP}' is not a valid IP or range`);
|
|
|
|
if (rangeOrIP.indexOf('/') === -1) {
|
|
if (ipaddr.isEqual(rangeOrIP, auditSource.ip)) throw new BoxError(BoxError.BAD_FIELD, `IP '${rangeOrIP}' is the client IP. Cannot block yourself`);
|
|
} else {
|
|
if (ipaddr.includes(rangeOrIP, auditSource.ip)) throw new BoxError(BoxError.BAD_FIELD, `range '${rangeOrIP}' includes client IP. Cannot block yourself`);
|
|
}
|
|
|
|
// this won't work in cases where it's a bigger subnet
|
|
if (rangeOrIP.startsWith('172.18.') || rangeOrIP.toLowerCase().startsWith('fd00:c107:d509:')) throw new BoxError(BoxError.BAD_FIELD, `${rangeOrIP} includes internal docker network. This cannot be blocked`);
|
|
|
|
++count;
|
|
}
|
|
|
|
if (count >= 262144) throw new BoxError(BoxError.CONFLICT, 'Blocklist is too large. Max 262144 entries are allowed'); // see the cloudron-firewall.sh
|
|
if (constants.DEMO) throw new BoxError(BoxError.BAD_STATE, 'Not allowed in demo mode');
|
|
|
|
// store in blob since the value field is TEXT and has 16kb size limit
|
|
await settings.setBlob(settings.FIREWALL_BLOCKLIST_KEY, Buffer.from(blocklist));
|
|
|
|
// this is done only because it's easier for the shell script and the firewall service to get the value
|
|
if (!safe.fs.writeFileSync(paths.FIREWALL_BLOCKLIST_FILE, blocklist + '\n', 'utf8')) throw new BoxError(BoxError.FS_ERROR, safe.error.message);
|
|
|
|
const [error] = await safe(shell.sudo([ SET_BLOCKLIST_CMD ], {}));
|
|
if (error) throw new BoxError(BoxError.IPTABLES_ERROR, `Error setting blocklist: ${error.message}`);
|
|
}
|
|
|
|
async function getDynamicDns() {
|
|
const enabled = await settings.get(settings.DYNAMIC_DNS_KEY);
|
|
return enabled ? !!enabled : false; // db holds string values only
|
|
}
|
|
|
|
async function setDynamicDns(enabled) {
|
|
assert.strictEqual(typeof enabled, 'boolean');
|
|
|
|
await settings.set(settings.DYNAMIC_DNS_KEY, enabled ? 'enabled' : ''); // db holds string values only
|
|
await cron.handleDynamicDnsChanged(enabled);
|
|
}
|
|
|
|
async function getIPv4Config() {
|
|
const value = await settings.getJson(settings.IPV4_CONFIG_KEY);
|
|
return value || { provider: 'generic' };
|
|
}
|
|
|
|
async function setIPv4Config(ipv4Config) {
|
|
assert.strictEqual(typeof ipv4Config, 'object');
|
|
|
|
if (constants.DEMO) throw new BoxError(BoxError.BAD_STATE, 'Not allowed in demo mode');
|
|
|
|
const error = await testIPv4Config(ipv4Config);
|
|
if (error) throw error;
|
|
|
|
await settings.setJson(settings.IPV4_CONFIG_KEY, ipv4Config);
|
|
}
|
|
|
|
async function getIPv6Config() {
|
|
const value = await settings.getJson(settings.IPV6_CONFIG_KEY);
|
|
return value || { provider: 'noop' };
|
|
}
|
|
|
|
async function setIPv6Config(ipv6Config) {
|
|
assert.strictEqual(typeof ipv6Config, 'object');
|
|
|
|
if (constants.DEMO) throw new BoxError(BoxError.BAD_STATE, 'Not allowed in demo mode');
|
|
|
|
const error = await testIPv6Config(ipv6Config);
|
|
if (error) throw error;
|
|
|
|
await settings.setJson(settings.IPV6_CONFIG_KEY, ipv6Config);
|
|
}
|
|
|
|
async function getIPv4() {
|
|
const config = await getIPv4Config();
|
|
|
|
return await api(config.provider).getIPv4(config);
|
|
}
|
|
|
|
async function getIPv6() {
|
|
const config = await getIPv6Config();
|
|
return await api(config.provider).getIPv6(config);
|
|
}
|
|
|
|
async function detectIP() {
|
|
const genericProvider = require('./network/generic.js');
|
|
|
|
const [error4, ipv4] = await safe(genericProvider.getIPv4({}));
|
|
const [error6, ipv6] = await safe(genericProvider.getIPv6({}));
|
|
|
|
return {
|
|
ipv4: error4 ? null : ipv4,
|
|
ipv6: error6 ? null : ipv6
|
|
};
|
|
}
|