@serve.zone/dcrouter 11.0.37 → 11.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_serve/bundle.js +1 -1
- package/dist_ts/cache/classes.cache.cleaner.d.ts +47 -0
- package/dist_ts/cache/classes.cache.cleaner.js +130 -0
- package/dist_ts/cache/documents/classes.cached.email.d.ts +125 -0
- package/dist_ts/cache/documents/classes.cached.email.js +337 -0
- package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +119 -0
- package/dist_ts/cache/documents/classes.cached.ip.reputation.js +323 -0
- package/dist_ts/cache/documents/index.d.ts +2 -0
- package/dist_ts/cache/documents/index.js +3 -0
- package/dist_ts/cache/index.d.ts +4 -0
- package/dist_ts/cache/index.js +7 -0
- package/dist_ts/classes.cert-provision-scheduler.d.ts +53 -0
- package/dist_ts/classes.cert-provision-scheduler.js +110 -0
- package/dist_ts/classes.storage-cert-manager.d.ts +18 -0
- package/dist_ts/classes.storage-cert-manager.js +43 -0
- package/dist_ts/errors/base.errors.js +320 -0
- package/dist_ts/errors/error.codes.d.ts +115 -0
- package/dist_ts/errors/error.codes.js +136 -0
- package/dist_ts/monitoring/classes.metricscache.d.ts +32 -0
- package/dist_ts/monitoring/classes.metricscache.js +63 -0
- package/dist_ts/monitoring/classes.metricsmanager.d.ts +178 -0
- package/dist_ts/monitoring/classes.metricsmanager.js +642 -0
- package/dist_ts/monitoring/index.d.ts +1 -0
- package/dist_ts/monitoring/index.js +2 -0
- package/dist_ts/opsserver/classes.opsserver.d.ts +37 -0
- package/dist_ts/opsserver/classes.opsserver.js +85 -0
- package/dist_ts/opsserver/handlers/admin.handler.d.ts +31 -0
- package/dist_ts/opsserver/handlers/admin.handler.js +180 -0
- package/dist_ts/opsserver/handlers/api-token.handler.d.ts +6 -0
- package/dist_ts/opsserver/handlers/api-token.handler.js +62 -0
- package/dist_ts/opsserver/handlers/certificate.handler.d.ts +32 -0
- package/dist_ts/opsserver/handlers/certificate.handler.js +421 -0
- package/dist_ts/opsserver/handlers/config.handler.d.ts +7 -0
- package/dist_ts/opsserver/handlers/config.handler.js +192 -0
- package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +30 -0
- package/dist_ts/opsserver/handlers/email-ops.handler.js +227 -0
- package/dist_ts/opsserver/handlers/index.d.ts +11 -0
- package/dist_ts/opsserver/handlers/index.js +12 -0
- package/dist_ts/opsserver/handlers/logs.handler.d.ts +25 -0
- package/dist_ts/opsserver/handlers/logs.handler.js +256 -0
- package/dist_ts/opsserver/handlers/radius.handler.d.ts +6 -0
- package/dist_ts/opsserver/handlers/radius.handler.js +295 -0
- package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +6 -0
- package/dist_ts/opsserver/handlers/remoteingress.handler.js +156 -0
- package/dist_ts/opsserver/handlers/route-management.handler.d.ts +14 -0
- package/dist_ts/opsserver/handlers/route-management.handler.js +117 -0
- package/dist_ts/opsserver/handlers/security.handler.d.ts +9 -0
- package/dist_ts/opsserver/handlers/security.handler.js +231 -0
- package/dist_ts/opsserver/handlers/stats.handler.d.ts +11 -0
- package/dist_ts/opsserver/handlers/stats.handler.js +399 -0
- package/dist_ts/opsserver/helpers/guards.d.ts +27 -0
- package/dist_ts/opsserver/helpers/guards.js +43 -0
- package/dist_ts/opsserver/index.d.ts +1 -0
- package/dist_ts/opsserver/index.js +2 -0
- package/dist_ts/radius/classes.accounting.manager.d.ts +218 -0
- package/dist_ts/radius/classes.accounting.manager.js +417 -0
- package/dist_ts/radius/classes.radius.server.d.ts +171 -0
- package/dist_ts/radius/classes.radius.server.js +385 -0
- package/dist_ts/radius/classes.vlan.manager.d.ts +128 -0
- package/dist_ts/radius/classes.vlan.manager.js +279 -0
- package/dist_ts/radius/index.d.ts +13 -0
- package/dist_ts/radius/index.js +14 -0
- package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +82 -0
- package/dist_ts/remoteingress/classes.remoteingress-manager.js +227 -0
- package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +59 -0
- package/dist_ts/remoteingress/classes.tunnel-manager.js +165 -0
- package/dist_ts/remoteingress/index.d.ts +2 -0
- package/dist_ts/remoteingress/index.js +3 -0
- package/dist_ts/security/classes.securitylogger.d.ts +144 -0
- package/dist_ts/security/classes.securitylogger.js +233 -0
- package/dist_ts/storage/classes.storagemanager.d.ts +83 -0
- package/dist_ts/storage/classes.storagemanager.js +350 -0
- package/dist_ts/storage/index.d.ts +1 -0
- package/dist_ts/storage/index.js +3 -0
- package/dist_ts_web/00_commitinfo_data.js +1 -1
- package/package.json +2 -2
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts_web/00_commitinfo_data.ts +1 -1
|
@@ -0,0 +1,295 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
+
export class RadiusHandler {
|
|
4
|
+
opsServerRef;
|
|
5
|
+
constructor(opsServerRef) {
|
|
6
|
+
this.opsServerRef = opsServerRef;
|
|
7
|
+
this.registerHandlers();
|
|
8
|
+
}
|
|
9
|
+
registerHandlers() {
|
|
10
|
+
const viewRouter = this.opsServerRef.viewRouter;
|
|
11
|
+
const adminRouter = this.opsServerRef.adminRouter;
|
|
12
|
+
// ========================================================================
|
|
13
|
+
// RADIUS Client Management
|
|
14
|
+
// ========================================================================
|
|
15
|
+
// Get all RADIUS clients (read)
|
|
16
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusClients', async (dataArg, toolsArg) => {
|
|
17
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
18
|
+
if (!radiusServer) {
|
|
19
|
+
return { clients: [] };
|
|
20
|
+
}
|
|
21
|
+
const clients = radiusServer.getClients();
|
|
22
|
+
return {
|
|
23
|
+
clients: clients.map(c => ({
|
|
24
|
+
name: c.name,
|
|
25
|
+
ipRange: c.ipRange,
|
|
26
|
+
description: c.description,
|
|
27
|
+
enabled: c.enabled,
|
|
28
|
+
})),
|
|
29
|
+
};
|
|
30
|
+
}));
|
|
31
|
+
// Add or update a RADIUS client (write)
|
|
32
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setRadiusClient', async (dataArg, toolsArg) => {
|
|
33
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
34
|
+
if (!radiusServer) {
|
|
35
|
+
return { success: false, message: 'RADIUS server not configured' };
|
|
36
|
+
}
|
|
37
|
+
try {
|
|
38
|
+
await radiusServer.addClient(dataArg.client);
|
|
39
|
+
return { success: true };
|
|
40
|
+
}
|
|
41
|
+
catch (error) {
|
|
42
|
+
return { success: false, message: error.message };
|
|
43
|
+
}
|
|
44
|
+
}));
|
|
45
|
+
// Remove a RADIUS client (write)
|
|
46
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeRadiusClient', async (dataArg, toolsArg) => {
|
|
47
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
48
|
+
if (!radiusServer) {
|
|
49
|
+
return { success: false, message: 'RADIUS server not configured' };
|
|
50
|
+
}
|
|
51
|
+
const removed = radiusServer.removeClient(dataArg.name);
|
|
52
|
+
return {
|
|
53
|
+
success: removed,
|
|
54
|
+
message: removed ? undefined : 'Client not found',
|
|
55
|
+
};
|
|
56
|
+
}));
|
|
57
|
+
// ========================================================================
|
|
58
|
+
// VLAN Mapping Management
|
|
59
|
+
// ========================================================================
|
|
60
|
+
// Get all VLAN mappings (read)
|
|
61
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getVlanMappings', async (dataArg, toolsArg) => {
|
|
62
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
63
|
+
if (!radiusServer) {
|
|
64
|
+
return {
|
|
65
|
+
mappings: [],
|
|
66
|
+
config: { defaultVlan: 1, allowUnknownMacs: true },
|
|
67
|
+
};
|
|
68
|
+
}
|
|
69
|
+
const vlanManager = radiusServer.getVlanManager();
|
|
70
|
+
const mappings = vlanManager.getAllMappings();
|
|
71
|
+
const config = vlanManager.getConfig();
|
|
72
|
+
return {
|
|
73
|
+
mappings: mappings.map(m => ({
|
|
74
|
+
mac: m.mac,
|
|
75
|
+
vlan: m.vlan,
|
|
76
|
+
description: m.description,
|
|
77
|
+
enabled: m.enabled,
|
|
78
|
+
createdAt: m.createdAt,
|
|
79
|
+
updatedAt: m.updatedAt,
|
|
80
|
+
})),
|
|
81
|
+
config: {
|
|
82
|
+
defaultVlan: config.defaultVlan,
|
|
83
|
+
allowUnknownMacs: config.allowUnknownMacs,
|
|
84
|
+
},
|
|
85
|
+
};
|
|
86
|
+
}));
|
|
87
|
+
// Add or update a VLAN mapping (write)
|
|
88
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setVlanMapping', async (dataArg, toolsArg) => {
|
|
89
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
90
|
+
if (!radiusServer) {
|
|
91
|
+
return { success: false, message: 'RADIUS server not configured' };
|
|
92
|
+
}
|
|
93
|
+
try {
|
|
94
|
+
const vlanManager = radiusServer.getVlanManager();
|
|
95
|
+
const mapping = await vlanManager.addMapping(dataArg.mapping);
|
|
96
|
+
return {
|
|
97
|
+
success: true,
|
|
98
|
+
mapping: {
|
|
99
|
+
mac: mapping.mac,
|
|
100
|
+
vlan: mapping.vlan,
|
|
101
|
+
description: mapping.description,
|
|
102
|
+
enabled: mapping.enabled,
|
|
103
|
+
createdAt: mapping.createdAt,
|
|
104
|
+
updatedAt: mapping.updatedAt,
|
|
105
|
+
},
|
|
106
|
+
};
|
|
107
|
+
}
|
|
108
|
+
catch (error) {
|
|
109
|
+
return { success: false, message: error.message };
|
|
110
|
+
}
|
|
111
|
+
}));
|
|
112
|
+
// Remove a VLAN mapping (write)
|
|
113
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeVlanMapping', async (dataArg, toolsArg) => {
|
|
114
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
115
|
+
if (!radiusServer) {
|
|
116
|
+
return { success: false, message: 'RADIUS server not configured' };
|
|
117
|
+
}
|
|
118
|
+
const vlanManager = radiusServer.getVlanManager();
|
|
119
|
+
const removed = await vlanManager.removeMapping(dataArg.mac);
|
|
120
|
+
return {
|
|
121
|
+
success: removed,
|
|
122
|
+
message: removed ? undefined : 'Mapping not found',
|
|
123
|
+
};
|
|
124
|
+
}));
|
|
125
|
+
// Update VLAN configuration (write)
|
|
126
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateVlanConfig', async (dataArg, toolsArg) => {
|
|
127
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
128
|
+
if (!radiusServer) {
|
|
129
|
+
return {
|
|
130
|
+
success: false,
|
|
131
|
+
config: { defaultVlan: 1, allowUnknownMacs: true },
|
|
132
|
+
};
|
|
133
|
+
}
|
|
134
|
+
const vlanManager = radiusServer.getVlanManager();
|
|
135
|
+
vlanManager.updateConfig({
|
|
136
|
+
defaultVlan: dataArg.defaultVlan,
|
|
137
|
+
allowUnknownMacs: dataArg.allowUnknownMacs,
|
|
138
|
+
});
|
|
139
|
+
const config = vlanManager.getConfig();
|
|
140
|
+
return {
|
|
141
|
+
success: true,
|
|
142
|
+
config: {
|
|
143
|
+
defaultVlan: config.defaultVlan,
|
|
144
|
+
allowUnknownMacs: config.allowUnknownMacs,
|
|
145
|
+
},
|
|
146
|
+
};
|
|
147
|
+
}));
|
|
148
|
+
// Test VLAN assignment (read)
|
|
149
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('testVlanAssignment', async (dataArg, toolsArg) => {
|
|
150
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
151
|
+
if (!radiusServer) {
|
|
152
|
+
return { assigned: false, vlan: 0, isDefault: false };
|
|
153
|
+
}
|
|
154
|
+
const vlanManager = radiusServer.getVlanManager();
|
|
155
|
+
const result = vlanManager.assignVlan(dataArg.mac);
|
|
156
|
+
return {
|
|
157
|
+
assigned: result.assigned,
|
|
158
|
+
vlan: result.vlan,
|
|
159
|
+
isDefault: result.isDefault,
|
|
160
|
+
matchedRule: result.matchedRule
|
|
161
|
+
? {
|
|
162
|
+
mac: result.matchedRule.mac,
|
|
163
|
+
vlan: result.matchedRule.vlan,
|
|
164
|
+
description: result.matchedRule.description,
|
|
165
|
+
}
|
|
166
|
+
: undefined,
|
|
167
|
+
};
|
|
168
|
+
}));
|
|
169
|
+
// ========================================================================
|
|
170
|
+
// Accounting / Session Management
|
|
171
|
+
// ========================================================================
|
|
172
|
+
// Get active sessions (read)
|
|
173
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusSessions', async (dataArg, toolsArg) => {
|
|
174
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
175
|
+
if (!radiusServer) {
|
|
176
|
+
return { sessions: [], totalCount: 0 };
|
|
177
|
+
}
|
|
178
|
+
const accountingManager = radiusServer.getAccountingManager();
|
|
179
|
+
let sessions = accountingManager.getActiveSessions();
|
|
180
|
+
// Apply filters
|
|
181
|
+
if (dataArg.filter) {
|
|
182
|
+
if (dataArg.filter.username) {
|
|
183
|
+
sessions = sessions.filter(s => s.username === dataArg.filter.username);
|
|
184
|
+
}
|
|
185
|
+
if (dataArg.filter.nasIpAddress) {
|
|
186
|
+
sessions = sessions.filter(s => s.nasIpAddress === dataArg.filter.nasIpAddress);
|
|
187
|
+
}
|
|
188
|
+
if (dataArg.filter.vlanId !== undefined) {
|
|
189
|
+
sessions = sessions.filter(s => s.vlanId === dataArg.filter.vlanId);
|
|
190
|
+
}
|
|
191
|
+
}
|
|
192
|
+
return {
|
|
193
|
+
sessions: sessions.map(s => ({
|
|
194
|
+
sessionId: s.sessionId,
|
|
195
|
+
username: s.username,
|
|
196
|
+
macAddress: s.macAddress,
|
|
197
|
+
nasIpAddress: s.nasIpAddress,
|
|
198
|
+
nasIdentifier: s.nasIdentifier,
|
|
199
|
+
vlanId: s.vlanId,
|
|
200
|
+
framedIpAddress: s.framedIpAddress,
|
|
201
|
+
startTime: s.startTime,
|
|
202
|
+
lastUpdateTime: s.lastUpdateTime,
|
|
203
|
+
status: s.status,
|
|
204
|
+
inputOctets: s.inputOctets,
|
|
205
|
+
outputOctets: s.outputOctets,
|
|
206
|
+
sessionTime: s.sessionTime,
|
|
207
|
+
})),
|
|
208
|
+
totalCount: sessions.length,
|
|
209
|
+
};
|
|
210
|
+
}));
|
|
211
|
+
// Disconnect a session (write)
|
|
212
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('disconnectRadiusSession', async (dataArg, toolsArg) => {
|
|
213
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
214
|
+
if (!radiusServer) {
|
|
215
|
+
return { success: false, message: 'RADIUS server not configured' };
|
|
216
|
+
}
|
|
217
|
+
const accountingManager = radiusServer.getAccountingManager();
|
|
218
|
+
const disconnected = await accountingManager.disconnectSession(dataArg.sessionId, dataArg.reason || 'AdminReset');
|
|
219
|
+
return {
|
|
220
|
+
success: disconnected,
|
|
221
|
+
message: disconnected ? undefined : 'Session not found',
|
|
222
|
+
};
|
|
223
|
+
}));
|
|
224
|
+
// Get accounting summary (read)
|
|
225
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusAccountingSummary', async (dataArg, toolsArg) => {
|
|
226
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
227
|
+
if (!radiusServer) {
|
|
228
|
+
return {
|
|
229
|
+
summary: {
|
|
230
|
+
periodStart: dataArg.startTime,
|
|
231
|
+
periodEnd: dataArg.endTime,
|
|
232
|
+
totalSessions: 0,
|
|
233
|
+
activeSessions: 0,
|
|
234
|
+
totalInputBytes: 0,
|
|
235
|
+
totalOutputBytes: 0,
|
|
236
|
+
totalSessionTime: 0,
|
|
237
|
+
averageSessionDuration: 0,
|
|
238
|
+
uniqueUsers: 0,
|
|
239
|
+
sessionsByVlan: {},
|
|
240
|
+
topUsersByTraffic: [],
|
|
241
|
+
},
|
|
242
|
+
};
|
|
243
|
+
}
|
|
244
|
+
const accountingManager = radiusServer.getAccountingManager();
|
|
245
|
+
const summary = await accountingManager.getSummary(dataArg.startTime, dataArg.endTime);
|
|
246
|
+
return { summary };
|
|
247
|
+
}));
|
|
248
|
+
// ========================================================================
|
|
249
|
+
// Statistics
|
|
250
|
+
// ========================================================================
|
|
251
|
+
// Get RADIUS statistics (read)
|
|
252
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusStatistics', async (dataArg, toolsArg) => {
|
|
253
|
+
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
254
|
+
if (!radiusServer) {
|
|
255
|
+
return {
|
|
256
|
+
stats: {
|
|
257
|
+
running: false,
|
|
258
|
+
uptime: 0,
|
|
259
|
+
authRequests: 0,
|
|
260
|
+
authAccepts: 0,
|
|
261
|
+
authRejects: 0,
|
|
262
|
+
accountingRequests: 0,
|
|
263
|
+
activeSessions: 0,
|
|
264
|
+
vlanMappings: 0,
|
|
265
|
+
clients: 0,
|
|
266
|
+
},
|
|
267
|
+
vlanStats: {
|
|
268
|
+
totalMappings: 0,
|
|
269
|
+
enabledMappings: 0,
|
|
270
|
+
exactMatches: 0,
|
|
271
|
+
ouiPatterns: 0,
|
|
272
|
+
wildcardPatterns: 0,
|
|
273
|
+
},
|
|
274
|
+
accountingStats: {
|
|
275
|
+
activeSessions: 0,
|
|
276
|
+
totalSessionsStarted: 0,
|
|
277
|
+
totalSessionsStopped: 0,
|
|
278
|
+
totalInputBytes: 0,
|
|
279
|
+
totalOutputBytes: 0,
|
|
280
|
+
interimUpdatesReceived: 0,
|
|
281
|
+
},
|
|
282
|
+
};
|
|
283
|
+
}
|
|
284
|
+
const stats = radiusServer.getStats();
|
|
285
|
+
const vlanStats = radiusServer.getVlanManager().getStats();
|
|
286
|
+
const accountingStats = radiusServer.getAccountingManager().getStats();
|
|
287
|
+
return {
|
|
288
|
+
stats,
|
|
289
|
+
vlanStats,
|
|
290
|
+
accountingStats,
|
|
291
|
+
};
|
|
292
|
+
}));
|
|
293
|
+
}
|
|
294
|
+
}
|
|
295
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"radius.handler.js","sourceRoot":"","sources":["../../../../ts/opsserver/handlers/radius.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,KAAK,UAAU,MAAM,iCAAiC,CAAC;AAE9D,MAAM,OAAO,aAAa;IACJ;IAApB,YAAoB,YAAuB;QAAvB,iBAAY,GAAZ,YAAY,CAAW;QACzC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAEO,gBAAgB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC;QAChD,MAAM,WAAW,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAClD,2EAA2E;QAC3E,2BAA2B;QAC3B,2EAA2E;QAE3E,gCAAgC;QAChC,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,kBAAkB,EAClB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,EAAE,EAAE,CAAC;YACzB,CAAC;YAED,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,EAAE,CAAC;YAC1C,OAAO;gBACL,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBACzB,IAAI,EAAE,CAAC,CAAC,IAAI;oBACZ,OAAO,EAAE,CAAC,CAAC,OAAO;oBAClB,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,OAAO,EAAE,CAAC,CAAC,OAAO;iBACnB,CAAC,CAAC;aACJ,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,wCAAwC;QACxC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,iBAAiB,EACjB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,YAAY,CAAC,SAAS,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;gBAC7C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;YAC3B,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,EAAE,CAAC;YACpD,CAAC;QACH,CAAC,CACF,CACF,CAAC;QAEF,iCAAiC;QACjC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,oBAAoB,EACpB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,OAAO,GAAG,YAAY,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YACxD,OAAO;gBACL,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,kBAAkB;aAClD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,0BAA0B;QAC1B,2EAA2E;QAE3E,+BAA+B;QAC/B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,iBAAiB,EACjB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE,WAAW,EAAE,CAAC,EAAE,gBAAgB,EAAE,IAAI,EAAE;iBACnD,CAAC;YACJ,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,QAAQ,GAAG,WAAW,CAAC,cAAc,EAAE,CAAC;YAC9C,MAAM,MAAM,GAAG,WAAW,CAAC,SAAS,EAAE,CAAC;YAEvC,OAAO;gBACL,QAAQ,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBAC3B,GAAG,EAAE,CAAC,CAAC,GAAG;oBACV,IAAI,EAAE,CAAC,CAAC,IAAI;oBACZ,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,OAAO,EAAE,CAAC,CAAC,OAAO;oBAClB,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,SAAS,EAAE,CAAC,CAAC,SAAS;iBACvB,CAAC,CAAC;gBACH,MAAM,EAAE;oBACN,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC/B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;iBAC1C;aACF,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,uCAAuC;QACvC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,gBAAgB,EAChB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;gBAClD,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;gBAC9D,OAAO;oBACL,OAAO,EAAE,IAAI;oBACb,OAAO,EAAE;wBACP,GAAG,EAAE,OAAO,CAAC,GAAG;wBAChB,IAAI,EAAE,OAAO,CAAC,IAAI;wBAClB,WAAW,EAAE,OAAO,CAAC,WAAW;wBAChC,OAAO,EAAE,OAAO,CAAC,OAAO;wBACxB,SAAS,EAAE,OAAO,CAAC,SAAS;wBAC5B,SAAS,EAAE,OAAO,CAAC,SAAS;qBAC7B;iBACF,CAAC;YACJ,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,EAAE,CAAC;YACpD,CAAC;QACH,CAAC,CACF,CACF,CAAC;QAEF,gCAAgC;QAChC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,aAAa,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAC7D,OAAO;gBACL,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB;aACnD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,oCAAoC;QACpC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,kBAAkB,EAClB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,OAAO,EAAE,KAAK;oBACd,MAAM,EAAE,EAAE,WAAW,EAAE,CAAC,EAAE,gBAAgB,EAAE,IAAI,EAAE;iBACnD,CAAC;YACJ,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,WAAW,CAAC,YAAY,CAAC;gBACvB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,gBAAgB,EAAE,OAAO,CAAC,gBAAgB;aAC3C,CAAC,CAAC;YAEH,MAAM,MAAM,GAAG,WAAW,CAAC,SAAS,EAAE,CAAC;YACvC,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,MAAM,EAAE;oBACN,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC/B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;iBAC1C;aACF,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,8BAA8B;QAC9B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,oBAAoB,EACpB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,EAAE,SAAS,EAAE,KAAK,EAAE,CAAC;YACxD,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,MAAM,GAAG,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAEnD,OAAO;gBACL,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,SAAS,EAAE,MAAM,CAAC,SAAS;gBAC3B,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC7B,CAAC,CAAC;wBACE,GAAG,EAAE,MAAM,CAAC,WAAW,CAAC,GAAG;wBAC3B,IAAI,EAAE,MAAM,CAAC,WAAW,CAAC,IAAI;wBAC7B,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,WAAW;qBAC5C;oBACH,CAAC,CAAC,SAAS;aACd,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,kCAAkC;QAClC,2EAA2E;QAE3E,6BAA6B;QAC7B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,UAAU,EAAE,CAAC,EAAE,CAAC;YACzC,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,IAAI,QAAQ,GAAG,iBAAiB,CAAC,iBAAiB,EAAE,CAAC;YAErD,gBAAgB;YAChB,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;gBACnB,IAAI,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC;oBAC5B,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,OAAO,CAAC,MAAO,CAAC,QAAQ,CAAC,CAAC;gBAC3E,CAAC;gBACD,IAAI,OAAO,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;oBAChC,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,YAAY,KAAK,OAAO,CAAC,MAAO,CAAC,YAAY,CAAC,CAAC;gBACnF,CAAC;gBACD,IAAI,OAAO,CAAC,MAAM,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;oBACxC,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,OAAO,CAAC,MAAO,CAAC,MAAM,CAAC,CAAC;gBACvE,CAAC;YACH,CAAC;YAED,OAAO;gBACL,QAAQ,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBAC3B,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,QAAQ,EAAE,CAAC,CAAC,QAAQ;oBACpB,UAAU,EAAE,CAAC,CAAC,UAAU;oBACxB,YAAY,EAAE,CAAC,CAAC,YAAY;oBAC5B,aAAa,EAAE,CAAC,CAAC,aAAa;oBAC9B,MAAM,EAAE,CAAC,CAAC,MAAM;oBAChB,eAAe,EAAE,CAAC,CAAC,eAAe;oBAClC,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,cAAc,EAAE,CAAC,CAAC,cAAc;oBAChC,MAAM,EAAE,CAAC,CAAC,MAAM;oBAChB,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,YAAY,EAAE,CAAC,CAAC,YAAY;oBAC5B,WAAW,EAAE,CAAC,CAAC,WAAW;iBAC3B,CAAC,CAAC;gBACH,UAAU,EAAE,QAAQ,CAAC,MAAM;aAC5B,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,+BAA+B;QAC/B,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,yBAAyB,EACzB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,MAAM,YAAY,GAAG,MAAM,iBAAiB,CAAC,iBAAiB,CAC5D,OAAO,CAAC,SAAS,EACjB,OAAO,CAAC,MAAM,IAAI,YAAY,CAC/B,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,YAAY;gBACrB,OAAO,EAAE,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB;aACxD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,gCAAgC;QAChC,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,4BAA4B,EAC5B,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,OAAO,EAAE;wBACP,WAAW,EAAE,OAAO,CAAC,SAAS;wBAC9B,SAAS,EAAE,OAAO,CAAC,OAAO;wBAC1B,aAAa,EAAE,CAAC;wBAChB,cAAc,EAAE,CAAC;wBACjB,eAAe,EAAE,CAAC;wBAClB,gBAAgB,EAAE,CAAC;wBACnB,gBAAgB,EAAE,CAAC;wBACnB,sBAAsB,EAAE,CAAC;wBACzB,WAAW,EAAE,CAAC;wBACd,cAAc,EAAE,EAAE;wBAClB,iBAAiB,EAAE,EAAE;qBACtB;iBACF,CAAC;YACJ,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;YAEvF,OAAO,EAAE,OAAO,EAAE,CAAC;QACrB,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,aAAa;QACb,2EAA2E;QAE3E,+BAA+B;QAC/B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,qBAAqB,EACrB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,KAAK,EAAE;wBACL,OAAO,EAAE,KAAK;wBACd,MAAM,EAAE,CAAC;wBACT,YAAY,EAAE,CAAC;wBACf,WAAW,EAAE,CAAC;wBACd,WAAW,EAAE,CAAC;wBACd,kBAAkB,EAAE,CAAC;wBACrB,cAAc,EAAE,CAAC;wBACjB,YAAY,EAAE,CAAC;wBACf,OAAO,EAAE,CAAC;qBACX;oBACD,SAAS,EAAE;wBACT,aAAa,EAAE,CAAC;wBAChB,eAAe,EAAE,CAAC;wBAClB,YAAY,EAAE,CAAC;wBACf,WAAW,EAAE,CAAC;wBACd,gBAAgB,EAAE,CAAC;qBACpB;oBACD,eAAe,EAAE;wBACf,cAAc,EAAE,CAAC;wBACjB,oBAAoB,EAAE,CAAC;wBACvB,oBAAoB,EAAE,CAAC;wBACvB,eAAe,EAAE,CAAC;wBAClB,gBAAgB,EAAE,CAAC;wBACnB,sBAAsB,EAAE,CAAC;qBAC1B;iBACF,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,YAAY,CAAC,QAAQ,EAAE,CAAC;YACtC,MAAM,SAAS,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC,QAAQ,EAAE,CAAC;YAC3D,MAAM,eAAe,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE,CAAC;YAEvE,OAAO;gBACL,KAAK;gBACL,SAAS;gBACT,eAAe;aAChB,CAAC;QACJ,CAAC,CACF,CACF,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -0,0 +1,156 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
+
export class RemoteIngressHandler {
|
|
4
|
+
opsServerRef;
|
|
5
|
+
constructor(opsServerRef) {
|
|
6
|
+
this.opsServerRef = opsServerRef;
|
|
7
|
+
this.registerHandlers();
|
|
8
|
+
}
|
|
9
|
+
registerHandlers() {
|
|
10
|
+
const viewRouter = this.opsServerRef.viewRouter;
|
|
11
|
+
const adminRouter = this.opsServerRef.adminRouter;
|
|
12
|
+
// ---- Read endpoints (viewRouter — valid identity required via middleware) ----
|
|
13
|
+
// Get all remote ingress edges
|
|
14
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngresses', async (dataArg, toolsArg) => {
|
|
15
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
16
|
+
if (!manager) {
|
|
17
|
+
return { edges: [] };
|
|
18
|
+
}
|
|
19
|
+
// Return edges without secrets, enriched with effective listen ports and breakdown
|
|
20
|
+
const edges = manager.getAllEdges().map((e) => {
|
|
21
|
+
const breakdown = manager.getPortBreakdown(e);
|
|
22
|
+
return {
|
|
23
|
+
...e,
|
|
24
|
+
secret: '********', // Never expose secrets via API
|
|
25
|
+
effectiveListenPorts: manager.getEffectiveListenPorts(e),
|
|
26
|
+
manualPorts: breakdown.manual,
|
|
27
|
+
derivedPorts: breakdown.derived,
|
|
28
|
+
};
|
|
29
|
+
});
|
|
30
|
+
return { edges };
|
|
31
|
+
}));
|
|
32
|
+
// ---- Write endpoints (adminRouter) ----
|
|
33
|
+
// Create a new remote ingress edge
|
|
34
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('createRemoteIngress', async (dataArg, toolsArg) => {
|
|
35
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
36
|
+
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
37
|
+
if (!manager) {
|
|
38
|
+
return {
|
|
39
|
+
success: false,
|
|
40
|
+
edge: null,
|
|
41
|
+
};
|
|
42
|
+
}
|
|
43
|
+
const edge = await manager.createEdge(dataArg.name, dataArg.listenPorts || [], dataArg.tags, dataArg.autoDerivePorts ?? true);
|
|
44
|
+
// Sync allowed edges with the hub
|
|
45
|
+
if (tunnelManager) {
|
|
46
|
+
await tunnelManager.syncAllowedEdges();
|
|
47
|
+
}
|
|
48
|
+
return { success: true, edge };
|
|
49
|
+
}));
|
|
50
|
+
// Delete a remote ingress edge
|
|
51
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('deleteRemoteIngress', async (dataArg, toolsArg) => {
|
|
52
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
53
|
+
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
54
|
+
if (!manager) {
|
|
55
|
+
return { success: false, message: 'RemoteIngress not configured' };
|
|
56
|
+
}
|
|
57
|
+
const deleted = await manager.deleteEdge(dataArg.id);
|
|
58
|
+
if (deleted && tunnelManager) {
|
|
59
|
+
await tunnelManager.syncAllowedEdges();
|
|
60
|
+
}
|
|
61
|
+
return {
|
|
62
|
+
success: deleted,
|
|
63
|
+
message: deleted ? undefined : 'Edge not found',
|
|
64
|
+
};
|
|
65
|
+
}));
|
|
66
|
+
// Update a remote ingress edge
|
|
67
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateRemoteIngress', async (dataArg, toolsArg) => {
|
|
68
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
69
|
+
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
70
|
+
if (!manager) {
|
|
71
|
+
return { success: false, edge: null };
|
|
72
|
+
}
|
|
73
|
+
const edge = await manager.updateEdge(dataArg.id, {
|
|
74
|
+
name: dataArg.name,
|
|
75
|
+
listenPorts: dataArg.listenPorts,
|
|
76
|
+
autoDerivePorts: dataArg.autoDerivePorts,
|
|
77
|
+
enabled: dataArg.enabled,
|
|
78
|
+
tags: dataArg.tags,
|
|
79
|
+
});
|
|
80
|
+
if (!edge) {
|
|
81
|
+
return { success: false, edge: null };
|
|
82
|
+
}
|
|
83
|
+
// Sync allowed edges — ports, tags, or enabled may have changed
|
|
84
|
+
if (tunnelManager) {
|
|
85
|
+
await tunnelManager.syncAllowedEdges();
|
|
86
|
+
}
|
|
87
|
+
const breakdown = manager.getPortBreakdown(edge);
|
|
88
|
+
return {
|
|
89
|
+
success: true,
|
|
90
|
+
edge: {
|
|
91
|
+
...edge,
|
|
92
|
+
secret: '********',
|
|
93
|
+
effectiveListenPorts: manager.getEffectiveListenPorts(edge),
|
|
94
|
+
manualPorts: breakdown.manual,
|
|
95
|
+
derivedPorts: breakdown.derived,
|
|
96
|
+
},
|
|
97
|
+
};
|
|
98
|
+
}));
|
|
99
|
+
// Regenerate secret for an edge
|
|
100
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('regenerateRemoteIngressSecret', async (dataArg, toolsArg) => {
|
|
101
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
102
|
+
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
103
|
+
if (!manager) {
|
|
104
|
+
return { success: false, secret: '' };
|
|
105
|
+
}
|
|
106
|
+
const secret = await manager.regenerateSecret(dataArg.id);
|
|
107
|
+
if (!secret) {
|
|
108
|
+
return { success: false, secret: '' };
|
|
109
|
+
}
|
|
110
|
+
// Sync allowed edges since secret changed
|
|
111
|
+
if (tunnelManager) {
|
|
112
|
+
await tunnelManager.syncAllowedEdges();
|
|
113
|
+
}
|
|
114
|
+
return { success: true, secret };
|
|
115
|
+
}));
|
|
116
|
+
// Get runtime status of all edges (read)
|
|
117
|
+
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngressStatus', async (dataArg, toolsArg) => {
|
|
118
|
+
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
119
|
+
if (!tunnelManager) {
|
|
120
|
+
return { statuses: [] };
|
|
121
|
+
}
|
|
122
|
+
return { statuses: tunnelManager.getEdgeStatuses() };
|
|
123
|
+
}));
|
|
124
|
+
// Get a connection token for an edge (write — exposes secret)
|
|
125
|
+
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngressConnectionToken', async (dataArg, toolsArg) => {
|
|
126
|
+
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
127
|
+
if (!manager) {
|
|
128
|
+
return { success: false, message: 'RemoteIngress not configured' };
|
|
129
|
+
}
|
|
130
|
+
const edge = manager.getEdge(dataArg.edgeId);
|
|
131
|
+
if (!edge) {
|
|
132
|
+
return { success: false, message: 'Edge not found' };
|
|
133
|
+
}
|
|
134
|
+
if (!edge.enabled) {
|
|
135
|
+
return { success: false, message: 'Edge is disabled' };
|
|
136
|
+
}
|
|
137
|
+
const hubHost = dataArg.hubHost
|
|
138
|
+
|| this.opsServerRef.dcRouterRef.options.remoteIngressConfig?.hubDomain;
|
|
139
|
+
if (!hubHost) {
|
|
140
|
+
return {
|
|
141
|
+
success: false,
|
|
142
|
+
message: 'No hub hostname configured. Set hubDomain in remoteIngressConfig or provide hubHost.',
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
const hubPort = this.opsServerRef.dcRouterRef.options.remoteIngressConfig?.tunnelPort ?? 8443;
|
|
146
|
+
const token = plugins.remoteingress.encodeConnectionToken({
|
|
147
|
+
hubHost,
|
|
148
|
+
hubPort,
|
|
149
|
+
edgeId: edge.id,
|
|
150
|
+
secret: edge.secret,
|
|
151
|
+
});
|
|
152
|
+
return { success: true, token };
|
|
153
|
+
}));
|
|
154
|
+
}
|
|
155
|
+
}
|
|
156
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import type { OpsServer } from '../classes.opsserver.js';
|
|
3
|
+
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
4
|
+
export declare class RouteManagementHandler {
|
|
5
|
+
private opsServerRef;
|
|
6
|
+
typedrouter: plugins.typedrequest.TypedRouter<interfaces.typedrequestInterfaces.ITypedRequest>;
|
|
7
|
+
constructor(opsServerRef: OpsServer);
|
|
8
|
+
/**
|
|
9
|
+
* Validate auth: JWT identity OR API token with required scope.
|
|
10
|
+
* Returns a userId string on success, throws on failure.
|
|
11
|
+
*/
|
|
12
|
+
private requireAuth;
|
|
13
|
+
private registerHandlers;
|
|
14
|
+
}
|
|
@@ -0,0 +1,117 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
+
export class RouteManagementHandler {
|
|
4
|
+
opsServerRef;
|
|
5
|
+
typedrouter = new plugins.typedrequest.TypedRouter();
|
|
6
|
+
constructor(opsServerRef) {
|
|
7
|
+
this.opsServerRef = opsServerRef;
|
|
8
|
+
this.opsServerRef.typedrouter.addTypedRouter(this.typedrouter);
|
|
9
|
+
this.registerHandlers();
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Validate auth: JWT identity OR API token with required scope.
|
|
13
|
+
* Returns a userId string on success, throws on failure.
|
|
14
|
+
*/
|
|
15
|
+
async requireAuth(request, requiredScope) {
|
|
16
|
+
// Try JWT identity first
|
|
17
|
+
if (request.identity?.jwt) {
|
|
18
|
+
try {
|
|
19
|
+
const isAdmin = await this.opsServerRef.adminHandler.adminIdentityGuard.exec({
|
|
20
|
+
identity: request.identity,
|
|
21
|
+
});
|
|
22
|
+
if (isAdmin)
|
|
23
|
+
return request.identity.userId;
|
|
24
|
+
}
|
|
25
|
+
catch { /* fall through */ }
|
|
26
|
+
}
|
|
27
|
+
// Try API token
|
|
28
|
+
if (request.apiToken) {
|
|
29
|
+
const tokenManager = this.opsServerRef.dcRouterRef.apiTokenManager;
|
|
30
|
+
if (tokenManager) {
|
|
31
|
+
const token = await tokenManager.validateToken(request.apiToken);
|
|
32
|
+
if (token) {
|
|
33
|
+
if (!requiredScope || tokenManager.hasScope(token, requiredScope)) {
|
|
34
|
+
return token.createdBy;
|
|
35
|
+
}
|
|
36
|
+
throw new plugins.typedrequest.TypedResponseError('insufficient scope');
|
|
37
|
+
}
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
throw new plugins.typedrequest.TypedResponseError('unauthorized');
|
|
41
|
+
}
|
|
42
|
+
registerHandlers() {
|
|
43
|
+
// Get merged routes
|
|
44
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getMergedRoutes', async (dataArg) => {
|
|
45
|
+
await this.requireAuth(dataArg, 'routes:read');
|
|
46
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
47
|
+
if (!manager) {
|
|
48
|
+
return { routes: [], warnings: [] };
|
|
49
|
+
}
|
|
50
|
+
return manager.getMergedRoutes();
|
|
51
|
+
}));
|
|
52
|
+
// Create route
|
|
53
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('createRoute', async (dataArg) => {
|
|
54
|
+
const userId = await this.requireAuth(dataArg, 'routes:write');
|
|
55
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
56
|
+
if (!manager) {
|
|
57
|
+
return { success: false, message: 'Route management not initialized' };
|
|
58
|
+
}
|
|
59
|
+
const id = await manager.createRoute(dataArg.route, userId, dataArg.enabled ?? true);
|
|
60
|
+
return { success: true, storedRouteId: id };
|
|
61
|
+
}));
|
|
62
|
+
// Update route
|
|
63
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateRoute', async (dataArg) => {
|
|
64
|
+
await this.requireAuth(dataArg, 'routes:write');
|
|
65
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
66
|
+
if (!manager) {
|
|
67
|
+
return { success: false, message: 'Route management not initialized' };
|
|
68
|
+
}
|
|
69
|
+
const ok = await manager.updateRoute(dataArg.id, {
|
|
70
|
+
route: dataArg.route,
|
|
71
|
+
enabled: dataArg.enabled,
|
|
72
|
+
});
|
|
73
|
+
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
74
|
+
}));
|
|
75
|
+
// Delete route
|
|
76
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('deleteRoute', async (dataArg) => {
|
|
77
|
+
await this.requireAuth(dataArg, 'routes:write');
|
|
78
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
79
|
+
if (!manager) {
|
|
80
|
+
return { success: false, message: 'Route management not initialized' };
|
|
81
|
+
}
|
|
82
|
+
const ok = await manager.deleteRoute(dataArg.id);
|
|
83
|
+
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
84
|
+
}));
|
|
85
|
+
// Set override on a hardcoded route
|
|
86
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setRouteOverride', async (dataArg) => {
|
|
87
|
+
const userId = await this.requireAuth(dataArg, 'routes:write');
|
|
88
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
89
|
+
if (!manager) {
|
|
90
|
+
return { success: false, message: 'Route management not initialized' };
|
|
91
|
+
}
|
|
92
|
+
await manager.setOverride(dataArg.routeName, dataArg.enabled, userId);
|
|
93
|
+
return { success: true };
|
|
94
|
+
}));
|
|
95
|
+
// Remove override from a hardcoded route
|
|
96
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeRouteOverride', async (dataArg) => {
|
|
97
|
+
await this.requireAuth(dataArg, 'routes:write');
|
|
98
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
99
|
+
if (!manager) {
|
|
100
|
+
return { success: false, message: 'Route management not initialized' };
|
|
101
|
+
}
|
|
102
|
+
const ok = await manager.removeOverride(dataArg.routeName);
|
|
103
|
+
return { success: ok, message: ok ? undefined : 'Override not found' };
|
|
104
|
+
}));
|
|
105
|
+
// Toggle programmatic route
|
|
106
|
+
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('toggleRoute', async (dataArg) => {
|
|
107
|
+
await this.requireAuth(dataArg, 'routes:write');
|
|
108
|
+
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
109
|
+
if (!manager) {
|
|
110
|
+
return { success: false, message: 'Route management not initialized' };
|
|
111
|
+
}
|
|
112
|
+
const ok = await manager.toggleRoute(dataArg.id, dataArg.enabled);
|
|
113
|
+
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
114
|
+
}));
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import type { OpsServer } from '../classes.opsserver.js';
|
|
2
|
+
export declare class SecurityHandler {
|
|
3
|
+
private opsServerRef;
|
|
4
|
+
constructor(opsServerRef: OpsServer);
|
|
5
|
+
private registerHandlers;
|
|
6
|
+
private collectSecurityMetrics;
|
|
7
|
+
private getActiveConnections;
|
|
8
|
+
private getRateLimitStatus;
|
|
9
|
+
}
|