@serve.zone/dcrouter 11.0.4 → 11.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_serve/bundle.js +1 -1
- package/package.json +1 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts_web/00_commitinfo_data.ts +1 -1
- package/dist_ts/00_commitinfo_data.d.ts +0 -8
- package/dist_ts/00_commitinfo_data.js +0 -9
- package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
- package/dist_ts/cache/classes.cache.cleaner.js +0 -130
- package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
- package/dist_ts/cache/documents/classes.cached.email.js +0 -337
- package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
- package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
- package/dist_ts/cache/documents/index.d.ts +0 -2
- package/dist_ts/cache/documents/index.js +0 -3
- package/dist_ts/cache/index.d.ts +0 -4
- package/dist_ts/cache/index.js +0 -7
- package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
- package/dist_ts/classes.cert-provision-scheduler.js +0 -110
- package/dist_ts/classes.dcrouter.d.ts +0 -337
- package/dist_ts/classes.dcrouter.js +0 -1405
- package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
- package/dist_ts/classes.storage-cert-manager.js +0 -43
- package/dist_ts/config/classes.api-token-manager.d.ts +0 -46
- package/dist_ts/config/classes.api-token-manager.js +0 -150
- package/dist_ts/config/classes.route-config-manager.d.ts +0 -35
- package/dist_ts/config/classes.route-config-manager.js +0 -231
- package/dist_ts/config/index.d.ts +0 -3
- package/dist_ts/config/index.js +0 -5
- package/dist_ts/config/validator.d.ts +0 -104
- package/dist_ts/config/validator.js +0 -152
- package/dist_ts/errors/base.errors.d.ts +0 -224
- package/dist_ts/errors/base.errors.js +0 -320
- package/dist_ts/errors/error-handler.d.ts +0 -98
- package/dist_ts/errors/error-handler.js +0 -282
- package/dist_ts/errors/error.codes.d.ts +0 -115
- package/dist_ts/errors/error.codes.js +0 -136
- package/dist_ts/errors/index.d.ts +0 -54
- package/dist_ts/errors/index.js +0 -136
- package/dist_ts/errors/reputation.errors.d.ts +0 -183
- package/dist_ts/errors/reputation.errors.js +0 -292
- package/dist_ts/index.d.ts +0 -7
- package/dist_ts/index.js +0 -11
- package/dist_ts/logger.d.ts +0 -21
- package/dist_ts/logger.js +0 -81
- package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
- package/dist_ts/monitoring/classes.metricscache.js +0 -63
- package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -178
- package/dist_ts/monitoring/classes.metricsmanager.js +0 -642
- package/dist_ts/monitoring/index.d.ts +0 -1
- package/dist_ts/monitoring/index.js +0 -2
- package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
- package/dist_ts/opsserver/classes.opsserver.js +0 -85
- package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
- package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
- package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
- package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
- package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
- package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
- package/dist_ts/opsserver/handlers/config.handler.js +0 -192
- package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
- package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
- package/dist_ts/opsserver/handlers/index.d.ts +0 -11
- package/dist_ts/opsserver/handlers/index.js +0 -12
- package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
- package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
- package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
- package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
- package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
- package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
- package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
- package/dist_ts/opsserver/handlers/security.handler.js +0 -231
- package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
- package/dist_ts/opsserver/handlers/stats.handler.js +0 -399
- package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
- package/dist_ts/opsserver/helpers/guards.js +0 -43
- package/dist_ts/opsserver/index.d.ts +0 -1
- package/dist_ts/opsserver/index.js +0 -2
- package/dist_ts/paths.d.ts +0 -26
- package/dist_ts/paths.js +0 -45
- package/dist_ts/plugins.d.ts +0 -79
- package/dist_ts/plugins.js +0 -113
- package/dist_ts/radius/classes.accounting.manager.d.ts +0 -218
- package/dist_ts/radius/classes.accounting.manager.js +0 -417
- package/dist_ts/radius/classes.radius.server.d.ts +0 -171
- package/dist_ts/radius/classes.radius.server.js +0 -385
- package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
- package/dist_ts/radius/classes.vlan.manager.js +0 -279
- package/dist_ts/radius/index.d.ts +0 -13
- package/dist_ts/radius/index.js +0 -14
- package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -82
- package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -227
- package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
- package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
- package/dist_ts/remoteingress/index.d.ts +0 -2
- package/dist_ts/remoteingress/index.js +0 -3
- package/dist_ts/security/classes.contentscanner.d.ts +0 -164
- package/dist_ts/security/classes.contentscanner.js +0 -642
- package/dist_ts/security/classes.ipreputationchecker.d.ts +0 -160
- package/dist_ts/security/classes.ipreputationchecker.js +0 -537
- package/dist_ts/security/classes.securitylogger.d.ts +0 -144
- package/dist_ts/security/classes.securitylogger.js +0 -233
- package/dist_ts/security/index.d.ts +0 -3
- package/dist_ts/security/index.js +0 -4
- package/dist_ts/sms/classes.smsservice.d.ts +0 -15
- package/dist_ts/sms/classes.smsservice.js +0 -72
- package/dist_ts/sms/config/sms.config.d.ts +0 -93
- package/dist_ts/sms/config/sms.config.js +0 -2
- package/dist_ts/sms/config/sms.schema.d.ts +0 -5
- package/dist_ts/sms/config/sms.schema.js +0 -121
- package/dist_ts/sms/index.d.ts +0 -1
- package/dist_ts/sms/index.js +0 -2
- package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
- package/dist_ts/storage/classes.storagemanager.js +0 -350
- package/dist_ts/storage/index.d.ts +0 -1
- package/dist_ts/storage/index.js +0 -3
|
@@ -1,295 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
-
export class RadiusHandler {
|
|
4
|
-
opsServerRef;
|
|
5
|
-
constructor(opsServerRef) {
|
|
6
|
-
this.opsServerRef = opsServerRef;
|
|
7
|
-
this.registerHandlers();
|
|
8
|
-
}
|
|
9
|
-
registerHandlers() {
|
|
10
|
-
const viewRouter = this.opsServerRef.viewRouter;
|
|
11
|
-
const adminRouter = this.opsServerRef.adminRouter;
|
|
12
|
-
// ========================================================================
|
|
13
|
-
// RADIUS Client Management
|
|
14
|
-
// ========================================================================
|
|
15
|
-
// Get all RADIUS clients (read)
|
|
16
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusClients', async (dataArg, toolsArg) => {
|
|
17
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
18
|
-
if (!radiusServer) {
|
|
19
|
-
return { clients: [] };
|
|
20
|
-
}
|
|
21
|
-
const clients = radiusServer.getClients();
|
|
22
|
-
return {
|
|
23
|
-
clients: clients.map(c => ({
|
|
24
|
-
name: c.name,
|
|
25
|
-
ipRange: c.ipRange,
|
|
26
|
-
description: c.description,
|
|
27
|
-
enabled: c.enabled,
|
|
28
|
-
})),
|
|
29
|
-
};
|
|
30
|
-
}));
|
|
31
|
-
// Add or update a RADIUS client (write)
|
|
32
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setRadiusClient', async (dataArg, toolsArg) => {
|
|
33
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
34
|
-
if (!radiusServer) {
|
|
35
|
-
return { success: false, message: 'RADIUS server not configured' };
|
|
36
|
-
}
|
|
37
|
-
try {
|
|
38
|
-
await radiusServer.addClient(dataArg.client);
|
|
39
|
-
return { success: true };
|
|
40
|
-
}
|
|
41
|
-
catch (error) {
|
|
42
|
-
return { success: false, message: error.message };
|
|
43
|
-
}
|
|
44
|
-
}));
|
|
45
|
-
// Remove a RADIUS client (write)
|
|
46
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeRadiusClient', async (dataArg, toolsArg) => {
|
|
47
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
48
|
-
if (!radiusServer) {
|
|
49
|
-
return { success: false, message: 'RADIUS server not configured' };
|
|
50
|
-
}
|
|
51
|
-
const removed = radiusServer.removeClient(dataArg.name);
|
|
52
|
-
return {
|
|
53
|
-
success: removed,
|
|
54
|
-
message: removed ? undefined : 'Client not found',
|
|
55
|
-
};
|
|
56
|
-
}));
|
|
57
|
-
// ========================================================================
|
|
58
|
-
// VLAN Mapping Management
|
|
59
|
-
// ========================================================================
|
|
60
|
-
// Get all VLAN mappings (read)
|
|
61
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getVlanMappings', async (dataArg, toolsArg) => {
|
|
62
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
63
|
-
if (!radiusServer) {
|
|
64
|
-
return {
|
|
65
|
-
mappings: [],
|
|
66
|
-
config: { defaultVlan: 1, allowUnknownMacs: true },
|
|
67
|
-
};
|
|
68
|
-
}
|
|
69
|
-
const vlanManager = radiusServer.getVlanManager();
|
|
70
|
-
const mappings = vlanManager.getAllMappings();
|
|
71
|
-
const config = vlanManager.getConfig();
|
|
72
|
-
return {
|
|
73
|
-
mappings: mappings.map(m => ({
|
|
74
|
-
mac: m.mac,
|
|
75
|
-
vlan: m.vlan,
|
|
76
|
-
description: m.description,
|
|
77
|
-
enabled: m.enabled,
|
|
78
|
-
createdAt: m.createdAt,
|
|
79
|
-
updatedAt: m.updatedAt,
|
|
80
|
-
})),
|
|
81
|
-
config: {
|
|
82
|
-
defaultVlan: config.defaultVlan,
|
|
83
|
-
allowUnknownMacs: config.allowUnknownMacs,
|
|
84
|
-
},
|
|
85
|
-
};
|
|
86
|
-
}));
|
|
87
|
-
// Add or update a VLAN mapping (write)
|
|
88
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setVlanMapping', async (dataArg, toolsArg) => {
|
|
89
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
90
|
-
if (!radiusServer) {
|
|
91
|
-
return { success: false, message: 'RADIUS server not configured' };
|
|
92
|
-
}
|
|
93
|
-
try {
|
|
94
|
-
const vlanManager = radiusServer.getVlanManager();
|
|
95
|
-
const mapping = await vlanManager.addMapping(dataArg.mapping);
|
|
96
|
-
return {
|
|
97
|
-
success: true,
|
|
98
|
-
mapping: {
|
|
99
|
-
mac: mapping.mac,
|
|
100
|
-
vlan: mapping.vlan,
|
|
101
|
-
description: mapping.description,
|
|
102
|
-
enabled: mapping.enabled,
|
|
103
|
-
createdAt: mapping.createdAt,
|
|
104
|
-
updatedAt: mapping.updatedAt,
|
|
105
|
-
},
|
|
106
|
-
};
|
|
107
|
-
}
|
|
108
|
-
catch (error) {
|
|
109
|
-
return { success: false, message: error.message };
|
|
110
|
-
}
|
|
111
|
-
}));
|
|
112
|
-
// Remove a VLAN mapping (write)
|
|
113
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeVlanMapping', async (dataArg, toolsArg) => {
|
|
114
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
115
|
-
if (!radiusServer) {
|
|
116
|
-
return { success: false, message: 'RADIUS server not configured' };
|
|
117
|
-
}
|
|
118
|
-
const vlanManager = radiusServer.getVlanManager();
|
|
119
|
-
const removed = await vlanManager.removeMapping(dataArg.mac);
|
|
120
|
-
return {
|
|
121
|
-
success: removed,
|
|
122
|
-
message: removed ? undefined : 'Mapping not found',
|
|
123
|
-
};
|
|
124
|
-
}));
|
|
125
|
-
// Update VLAN configuration (write)
|
|
126
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateVlanConfig', async (dataArg, toolsArg) => {
|
|
127
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
128
|
-
if (!radiusServer) {
|
|
129
|
-
return {
|
|
130
|
-
success: false,
|
|
131
|
-
config: { defaultVlan: 1, allowUnknownMacs: true },
|
|
132
|
-
};
|
|
133
|
-
}
|
|
134
|
-
const vlanManager = radiusServer.getVlanManager();
|
|
135
|
-
vlanManager.updateConfig({
|
|
136
|
-
defaultVlan: dataArg.defaultVlan,
|
|
137
|
-
allowUnknownMacs: dataArg.allowUnknownMacs,
|
|
138
|
-
});
|
|
139
|
-
const config = vlanManager.getConfig();
|
|
140
|
-
return {
|
|
141
|
-
success: true,
|
|
142
|
-
config: {
|
|
143
|
-
defaultVlan: config.defaultVlan,
|
|
144
|
-
allowUnknownMacs: config.allowUnknownMacs,
|
|
145
|
-
},
|
|
146
|
-
};
|
|
147
|
-
}));
|
|
148
|
-
// Test VLAN assignment (read)
|
|
149
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('testVlanAssignment', async (dataArg, toolsArg) => {
|
|
150
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
151
|
-
if (!radiusServer) {
|
|
152
|
-
return { assigned: false, vlan: 0, isDefault: false };
|
|
153
|
-
}
|
|
154
|
-
const vlanManager = radiusServer.getVlanManager();
|
|
155
|
-
const result = vlanManager.assignVlan(dataArg.mac);
|
|
156
|
-
return {
|
|
157
|
-
assigned: result.assigned,
|
|
158
|
-
vlan: result.vlan,
|
|
159
|
-
isDefault: result.isDefault,
|
|
160
|
-
matchedRule: result.matchedRule
|
|
161
|
-
? {
|
|
162
|
-
mac: result.matchedRule.mac,
|
|
163
|
-
vlan: result.matchedRule.vlan,
|
|
164
|
-
description: result.matchedRule.description,
|
|
165
|
-
}
|
|
166
|
-
: undefined,
|
|
167
|
-
};
|
|
168
|
-
}));
|
|
169
|
-
// ========================================================================
|
|
170
|
-
// Accounting / Session Management
|
|
171
|
-
// ========================================================================
|
|
172
|
-
// Get active sessions (read)
|
|
173
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusSessions', async (dataArg, toolsArg) => {
|
|
174
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
175
|
-
if (!radiusServer) {
|
|
176
|
-
return { sessions: [], totalCount: 0 };
|
|
177
|
-
}
|
|
178
|
-
const accountingManager = radiusServer.getAccountingManager();
|
|
179
|
-
let sessions = accountingManager.getActiveSessions();
|
|
180
|
-
// Apply filters
|
|
181
|
-
if (dataArg.filter) {
|
|
182
|
-
if (dataArg.filter.username) {
|
|
183
|
-
sessions = sessions.filter(s => s.username === dataArg.filter.username);
|
|
184
|
-
}
|
|
185
|
-
if (dataArg.filter.nasIpAddress) {
|
|
186
|
-
sessions = sessions.filter(s => s.nasIpAddress === dataArg.filter.nasIpAddress);
|
|
187
|
-
}
|
|
188
|
-
if (dataArg.filter.vlanId !== undefined) {
|
|
189
|
-
sessions = sessions.filter(s => s.vlanId === dataArg.filter.vlanId);
|
|
190
|
-
}
|
|
191
|
-
}
|
|
192
|
-
return {
|
|
193
|
-
sessions: sessions.map(s => ({
|
|
194
|
-
sessionId: s.sessionId,
|
|
195
|
-
username: s.username,
|
|
196
|
-
macAddress: s.macAddress,
|
|
197
|
-
nasIpAddress: s.nasIpAddress,
|
|
198
|
-
nasIdentifier: s.nasIdentifier,
|
|
199
|
-
vlanId: s.vlanId,
|
|
200
|
-
framedIpAddress: s.framedIpAddress,
|
|
201
|
-
startTime: s.startTime,
|
|
202
|
-
lastUpdateTime: s.lastUpdateTime,
|
|
203
|
-
status: s.status,
|
|
204
|
-
inputOctets: s.inputOctets,
|
|
205
|
-
outputOctets: s.outputOctets,
|
|
206
|
-
sessionTime: s.sessionTime,
|
|
207
|
-
})),
|
|
208
|
-
totalCount: sessions.length,
|
|
209
|
-
};
|
|
210
|
-
}));
|
|
211
|
-
// Disconnect a session (write)
|
|
212
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('disconnectRadiusSession', async (dataArg, toolsArg) => {
|
|
213
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
214
|
-
if (!radiusServer) {
|
|
215
|
-
return { success: false, message: 'RADIUS server not configured' };
|
|
216
|
-
}
|
|
217
|
-
const accountingManager = radiusServer.getAccountingManager();
|
|
218
|
-
const disconnected = await accountingManager.disconnectSession(dataArg.sessionId, dataArg.reason || 'AdminReset');
|
|
219
|
-
return {
|
|
220
|
-
success: disconnected,
|
|
221
|
-
message: disconnected ? undefined : 'Session not found',
|
|
222
|
-
};
|
|
223
|
-
}));
|
|
224
|
-
// Get accounting summary (read)
|
|
225
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusAccountingSummary', async (dataArg, toolsArg) => {
|
|
226
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
227
|
-
if (!radiusServer) {
|
|
228
|
-
return {
|
|
229
|
-
summary: {
|
|
230
|
-
periodStart: dataArg.startTime,
|
|
231
|
-
periodEnd: dataArg.endTime,
|
|
232
|
-
totalSessions: 0,
|
|
233
|
-
activeSessions: 0,
|
|
234
|
-
totalInputBytes: 0,
|
|
235
|
-
totalOutputBytes: 0,
|
|
236
|
-
totalSessionTime: 0,
|
|
237
|
-
averageSessionDuration: 0,
|
|
238
|
-
uniqueUsers: 0,
|
|
239
|
-
sessionsByVlan: {},
|
|
240
|
-
topUsersByTraffic: [],
|
|
241
|
-
},
|
|
242
|
-
};
|
|
243
|
-
}
|
|
244
|
-
const accountingManager = radiusServer.getAccountingManager();
|
|
245
|
-
const summary = await accountingManager.getSummary(dataArg.startTime, dataArg.endTime);
|
|
246
|
-
return { summary };
|
|
247
|
-
}));
|
|
248
|
-
// ========================================================================
|
|
249
|
-
// Statistics
|
|
250
|
-
// ========================================================================
|
|
251
|
-
// Get RADIUS statistics (read)
|
|
252
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRadiusStatistics', async (dataArg, toolsArg) => {
|
|
253
|
-
const radiusServer = this.opsServerRef.dcRouterRef.radiusServer;
|
|
254
|
-
if (!radiusServer) {
|
|
255
|
-
return {
|
|
256
|
-
stats: {
|
|
257
|
-
running: false,
|
|
258
|
-
uptime: 0,
|
|
259
|
-
authRequests: 0,
|
|
260
|
-
authAccepts: 0,
|
|
261
|
-
authRejects: 0,
|
|
262
|
-
accountingRequests: 0,
|
|
263
|
-
activeSessions: 0,
|
|
264
|
-
vlanMappings: 0,
|
|
265
|
-
clients: 0,
|
|
266
|
-
},
|
|
267
|
-
vlanStats: {
|
|
268
|
-
totalMappings: 0,
|
|
269
|
-
enabledMappings: 0,
|
|
270
|
-
exactMatches: 0,
|
|
271
|
-
ouiPatterns: 0,
|
|
272
|
-
wildcardPatterns: 0,
|
|
273
|
-
},
|
|
274
|
-
accountingStats: {
|
|
275
|
-
activeSessions: 0,
|
|
276
|
-
totalSessionsStarted: 0,
|
|
277
|
-
totalSessionsStopped: 0,
|
|
278
|
-
totalInputBytes: 0,
|
|
279
|
-
totalOutputBytes: 0,
|
|
280
|
-
interimUpdatesReceived: 0,
|
|
281
|
-
},
|
|
282
|
-
};
|
|
283
|
-
}
|
|
284
|
-
const stats = radiusServer.getStats();
|
|
285
|
-
const vlanStats = radiusServer.getVlanManager().getStats();
|
|
286
|
-
const accountingStats = radiusServer.getAccountingManager().getStats();
|
|
287
|
-
return {
|
|
288
|
-
stats,
|
|
289
|
-
vlanStats,
|
|
290
|
-
accountingStats,
|
|
291
|
-
};
|
|
292
|
-
}));
|
|
293
|
-
}
|
|
294
|
-
}
|
|
295
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"radius.handler.js","sourceRoot":"","sources":["../../../../ts/opsserver/handlers/radius.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,KAAK,UAAU,MAAM,iCAAiC,CAAC;AAE9D,MAAM,OAAO,aAAa;IACJ;IAApB,YAAoB,YAAuB;QAAvB,iBAAY,GAAZ,YAAY,CAAW;QACzC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAEO,gBAAgB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC;QAChD,MAAM,WAAW,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAClD,2EAA2E;QAC3E,2BAA2B;QAC3B,2EAA2E;QAE3E,gCAAgC;QAChC,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,kBAAkB,EAClB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,EAAE,EAAE,CAAC;YACzB,CAAC;YAED,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,EAAE,CAAC;YAC1C,OAAO;gBACL,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBACzB,IAAI,EAAE,CAAC,CAAC,IAAI;oBACZ,OAAO,EAAE,CAAC,CAAC,OAAO;oBAClB,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,OAAO,EAAE,CAAC,CAAC,OAAO;iBACnB,CAAC,CAAC;aACJ,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,wCAAwC;QACxC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,iBAAiB,EACjB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,YAAY,CAAC,SAAS,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;gBAC7C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;YAC3B,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,EAAE,CAAC;YACpD,CAAC;QACH,CAAC,CACF,CACF,CAAC;QAEF,iCAAiC;QACjC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,oBAAoB,EACpB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,OAAO,GAAG,YAAY,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YACxD,OAAO;gBACL,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,kBAAkB;aAClD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,0BAA0B;QAC1B,2EAA2E;QAE3E,+BAA+B;QAC/B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,iBAAiB,EACjB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE,WAAW,EAAE,CAAC,EAAE,gBAAgB,EAAE,IAAI,EAAE;iBACnD,CAAC;YACJ,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,QAAQ,GAAG,WAAW,CAAC,cAAc,EAAE,CAAC;YAC9C,MAAM,MAAM,GAAG,WAAW,CAAC,SAAS,EAAE,CAAC;YAEvC,OAAO;gBACL,QAAQ,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBAC3B,GAAG,EAAE,CAAC,CAAC,GAAG;oBACV,IAAI,EAAE,CAAC,CAAC,IAAI;oBACZ,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,OAAO,EAAE,CAAC,CAAC,OAAO;oBAClB,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,SAAS,EAAE,CAAC,CAAC,SAAS;iBACvB,CAAC,CAAC;gBACH,MAAM,EAAE;oBACN,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC/B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;iBAC1C;aACF,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,uCAAuC;QACvC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,gBAAgB,EAChB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;gBAClD,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;gBAC9D,OAAO;oBACL,OAAO,EAAE,IAAI;oBACb,OAAO,EAAE;wBACP,GAAG,EAAE,OAAO,CAAC,GAAG;wBAChB,IAAI,EAAE,OAAO,CAAC,IAAI;wBAClB,WAAW,EAAE,OAAO,CAAC,WAAW;wBAChC,OAAO,EAAE,OAAO,CAAC,OAAO;wBACxB,SAAS,EAAE,OAAO,CAAC,SAAS;wBAC5B,SAAS,EAAE,OAAO,CAAC,SAAS;qBAC7B;iBACF,CAAC;YACJ,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,EAAE,CAAC;YACpD,CAAC;QACH,CAAC,CACF,CACF,CAAC;QAEF,gCAAgC;QAChC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,aAAa,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAC7D,OAAO;gBACL,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB;aACnD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,oCAAoC;QACpC,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,kBAAkB,EAClB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,OAAO,EAAE,KAAK;oBACd,MAAM,EAAE,EAAE,WAAW,EAAE,CAAC,EAAE,gBAAgB,EAAE,IAAI,EAAE;iBACnD,CAAC;YACJ,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,WAAW,CAAC,YAAY,CAAC;gBACvB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,gBAAgB,EAAE,OAAO,CAAC,gBAAgB;aAC3C,CAAC,CAAC;YAEH,MAAM,MAAM,GAAG,WAAW,CAAC,SAAS,EAAE,CAAC;YACvC,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,MAAM,EAAE;oBACN,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC/B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;iBAC1C;aACF,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,8BAA8B;QAC9B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,oBAAoB,EACpB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,EAAE,SAAS,EAAE,KAAK,EAAE,CAAC;YACxD,CAAC;YAED,MAAM,WAAW,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC;YAClD,MAAM,MAAM,GAAG,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAEnD,OAAO;gBACL,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,SAAS,EAAE,MAAM,CAAC,SAAS;gBAC3B,WAAW,EAAE,MAAM,CAAC,WAAW;oBAC7B,CAAC,CAAC;wBACE,GAAG,EAAE,MAAM,CAAC,WAAW,CAAC,GAAG;wBAC3B,IAAI,EAAE,MAAM,CAAC,WAAW,CAAC,IAAI;wBAC7B,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,WAAW;qBAC5C;oBACH,CAAC,CAAC,SAAS;aACd,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,kCAAkC;QAClC,2EAA2E;QAE3E,6BAA6B;QAC7B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,EAAE,EAAE,UAAU,EAAE,CAAC,EAAE,CAAC;YACzC,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,IAAI,QAAQ,GAAG,iBAAiB,CAAC,iBAAiB,EAAE,CAAC;YAErD,gBAAgB;YAChB,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;gBACnB,IAAI,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC;oBAC5B,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,OAAO,CAAC,MAAO,CAAC,QAAQ,CAAC,CAAC;gBAC3E,CAAC;gBACD,IAAI,OAAO,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;oBAChC,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,YAAY,KAAK,OAAO,CAAC,MAAO,CAAC,YAAY,CAAC,CAAC;gBACnF,CAAC;gBACD,IAAI,OAAO,CAAC,MAAM,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;oBACxC,QAAQ,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,OAAO,CAAC,MAAO,CAAC,MAAM,CAAC,CAAC;gBACvE,CAAC;YACH,CAAC;YAED,OAAO;gBACL,QAAQ,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oBAC3B,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,QAAQ,EAAE,CAAC,CAAC,QAAQ;oBACpB,UAAU,EAAE,CAAC,CAAC,UAAU;oBACxB,YAAY,EAAE,CAAC,CAAC,YAAY;oBAC5B,aAAa,EAAE,CAAC,CAAC,aAAa;oBAC9B,MAAM,EAAE,CAAC,CAAC,MAAM;oBAChB,eAAe,EAAE,CAAC,CAAC,eAAe;oBAClC,SAAS,EAAE,CAAC,CAAC,SAAS;oBACtB,cAAc,EAAE,CAAC,CAAC,cAAc;oBAChC,MAAM,EAAE,CAAC,CAAC,MAAM;oBAChB,WAAW,EAAE,CAAC,CAAC,WAAW;oBAC1B,YAAY,EAAE,CAAC,CAAC,YAAY;oBAC5B,WAAW,EAAE,CAAC,CAAC,WAAW;iBAC3B,CAAC,CAAC;gBACH,UAAU,EAAE,QAAQ,CAAC,MAAM;aAC5B,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,+BAA+B;QAC/B,WAAW,CAAC,eAAe,CACzB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,yBAAyB,EACzB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;YACrE,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,MAAM,YAAY,GAAG,MAAM,iBAAiB,CAAC,iBAAiB,CAC5D,OAAO,CAAC,SAAS,EACjB,OAAO,CAAC,MAAM,IAAI,YAAY,CAC/B,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,YAAY;gBACrB,OAAO,EAAE,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB;aACxD,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,gCAAgC;QAChC,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,4BAA4B,EAC5B,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,OAAO,EAAE;wBACP,WAAW,EAAE,OAAO,CAAC,SAAS;wBAC9B,SAAS,EAAE,OAAO,CAAC,OAAO;wBAC1B,aAAa,EAAE,CAAC;wBAChB,cAAc,EAAE,CAAC;wBACjB,eAAe,EAAE,CAAC;wBAClB,gBAAgB,EAAE,CAAC;wBACnB,gBAAgB,EAAE,CAAC;wBACnB,sBAAsB,EAAE,CAAC;wBACzB,WAAW,EAAE,CAAC;wBACd,cAAc,EAAE,EAAE;wBAClB,iBAAiB,EAAE,EAAE;qBACtB;iBACF,CAAC;YACJ,CAAC;YAED,MAAM,iBAAiB,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC;YAC9D,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;YAEvF,OAAO,EAAE,OAAO,EAAE,CAAC;QACrB,CAAC,CACF,CACF,CAAC;QAEF,2EAA2E;QAC3E,aAAa;QACb,2EAA2E;QAE3E,+BAA+B;QAC/B,UAAU,CAAC,eAAe,CACxB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,qBAAqB,EACrB,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,YAAY,CAAC;YAEhE,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,OAAO;oBACL,KAAK,EAAE;wBACL,OAAO,EAAE,KAAK;wBACd,MAAM,EAAE,CAAC;wBACT,YAAY,EAAE,CAAC;wBACf,WAAW,EAAE,CAAC;wBACd,WAAW,EAAE,CAAC;wBACd,kBAAkB,EAAE,CAAC;wBACrB,cAAc,EAAE,CAAC;wBACjB,YAAY,EAAE,CAAC;wBACf,OAAO,EAAE,CAAC;qBACX;oBACD,SAAS,EAAE;wBACT,aAAa,EAAE,CAAC;wBAChB,eAAe,EAAE,CAAC;wBAClB,YAAY,EAAE,CAAC;wBACf,WAAW,EAAE,CAAC;wBACd,gBAAgB,EAAE,CAAC;qBACpB;oBACD,eAAe,EAAE;wBACf,cAAc,EAAE,CAAC;wBACjB,oBAAoB,EAAE,CAAC;wBACvB,oBAAoB,EAAE,CAAC;wBACvB,eAAe,EAAE,CAAC;wBAClB,gBAAgB,EAAE,CAAC;wBACnB,sBAAsB,EAAE,CAAC;qBAC1B;iBACF,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,YAAY,CAAC,QAAQ,EAAE,CAAC;YACtC,MAAM,SAAS,GAAG,YAAY,CAAC,cAAc,EAAE,CAAC,QAAQ,EAAE,CAAC;YAC3D,MAAM,eAAe,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE,CAAC;YAEvE,OAAO;gBACL,KAAK;gBACL,SAAS;gBACT,eAAe;aAChB,CAAC;QACJ,CAAC,CACF,CACF,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -1,156 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
-
export class RemoteIngressHandler {
|
|
4
|
-
opsServerRef;
|
|
5
|
-
constructor(opsServerRef) {
|
|
6
|
-
this.opsServerRef = opsServerRef;
|
|
7
|
-
this.registerHandlers();
|
|
8
|
-
}
|
|
9
|
-
registerHandlers() {
|
|
10
|
-
const viewRouter = this.opsServerRef.viewRouter;
|
|
11
|
-
const adminRouter = this.opsServerRef.adminRouter;
|
|
12
|
-
// ---- Read endpoints (viewRouter — valid identity required via middleware) ----
|
|
13
|
-
// Get all remote ingress edges
|
|
14
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngresses', async (dataArg, toolsArg) => {
|
|
15
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
16
|
-
if (!manager) {
|
|
17
|
-
return { edges: [] };
|
|
18
|
-
}
|
|
19
|
-
// Return edges without secrets, enriched with effective listen ports and breakdown
|
|
20
|
-
const edges = manager.getAllEdges().map((e) => {
|
|
21
|
-
const breakdown = manager.getPortBreakdown(e);
|
|
22
|
-
return {
|
|
23
|
-
...e,
|
|
24
|
-
secret: '********', // Never expose secrets via API
|
|
25
|
-
effectiveListenPorts: manager.getEffectiveListenPorts(e),
|
|
26
|
-
manualPorts: breakdown.manual,
|
|
27
|
-
derivedPorts: breakdown.derived,
|
|
28
|
-
};
|
|
29
|
-
});
|
|
30
|
-
return { edges };
|
|
31
|
-
}));
|
|
32
|
-
// ---- Write endpoints (adminRouter) ----
|
|
33
|
-
// Create a new remote ingress edge
|
|
34
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('createRemoteIngress', async (dataArg, toolsArg) => {
|
|
35
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
36
|
-
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
37
|
-
if (!manager) {
|
|
38
|
-
return {
|
|
39
|
-
success: false,
|
|
40
|
-
edge: null,
|
|
41
|
-
};
|
|
42
|
-
}
|
|
43
|
-
const edge = await manager.createEdge(dataArg.name, dataArg.listenPorts || [], dataArg.tags, dataArg.autoDerivePorts ?? true);
|
|
44
|
-
// Sync allowed edges with the hub
|
|
45
|
-
if (tunnelManager) {
|
|
46
|
-
await tunnelManager.syncAllowedEdges();
|
|
47
|
-
}
|
|
48
|
-
return { success: true, edge };
|
|
49
|
-
}));
|
|
50
|
-
// Delete a remote ingress edge
|
|
51
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('deleteRemoteIngress', async (dataArg, toolsArg) => {
|
|
52
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
53
|
-
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
54
|
-
if (!manager) {
|
|
55
|
-
return { success: false, message: 'RemoteIngress not configured' };
|
|
56
|
-
}
|
|
57
|
-
const deleted = await manager.deleteEdge(dataArg.id);
|
|
58
|
-
if (deleted && tunnelManager) {
|
|
59
|
-
await tunnelManager.syncAllowedEdges();
|
|
60
|
-
}
|
|
61
|
-
return {
|
|
62
|
-
success: deleted,
|
|
63
|
-
message: deleted ? undefined : 'Edge not found',
|
|
64
|
-
};
|
|
65
|
-
}));
|
|
66
|
-
// Update a remote ingress edge
|
|
67
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateRemoteIngress', async (dataArg, toolsArg) => {
|
|
68
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
69
|
-
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
70
|
-
if (!manager) {
|
|
71
|
-
return { success: false, edge: null };
|
|
72
|
-
}
|
|
73
|
-
const edge = await manager.updateEdge(dataArg.id, {
|
|
74
|
-
name: dataArg.name,
|
|
75
|
-
listenPorts: dataArg.listenPorts,
|
|
76
|
-
autoDerivePorts: dataArg.autoDerivePorts,
|
|
77
|
-
enabled: dataArg.enabled,
|
|
78
|
-
tags: dataArg.tags,
|
|
79
|
-
});
|
|
80
|
-
if (!edge) {
|
|
81
|
-
return { success: false, edge: null };
|
|
82
|
-
}
|
|
83
|
-
// Sync allowed edges — ports, tags, or enabled may have changed
|
|
84
|
-
if (tunnelManager) {
|
|
85
|
-
await tunnelManager.syncAllowedEdges();
|
|
86
|
-
}
|
|
87
|
-
const breakdown = manager.getPortBreakdown(edge);
|
|
88
|
-
return {
|
|
89
|
-
success: true,
|
|
90
|
-
edge: {
|
|
91
|
-
...edge,
|
|
92
|
-
secret: '********',
|
|
93
|
-
effectiveListenPorts: manager.getEffectiveListenPorts(edge),
|
|
94
|
-
manualPorts: breakdown.manual,
|
|
95
|
-
derivedPorts: breakdown.derived,
|
|
96
|
-
},
|
|
97
|
-
};
|
|
98
|
-
}));
|
|
99
|
-
// Regenerate secret for an edge
|
|
100
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('regenerateRemoteIngressSecret', async (dataArg, toolsArg) => {
|
|
101
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
102
|
-
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
103
|
-
if (!manager) {
|
|
104
|
-
return { success: false, secret: '' };
|
|
105
|
-
}
|
|
106
|
-
const secret = await manager.regenerateSecret(dataArg.id);
|
|
107
|
-
if (!secret) {
|
|
108
|
-
return { success: false, secret: '' };
|
|
109
|
-
}
|
|
110
|
-
// Sync allowed edges since secret changed
|
|
111
|
-
if (tunnelManager) {
|
|
112
|
-
await tunnelManager.syncAllowedEdges();
|
|
113
|
-
}
|
|
114
|
-
return { success: true, secret };
|
|
115
|
-
}));
|
|
116
|
-
// Get runtime status of all edges (read)
|
|
117
|
-
viewRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngressStatus', async (dataArg, toolsArg) => {
|
|
118
|
-
const tunnelManager = this.opsServerRef.dcRouterRef.tunnelManager;
|
|
119
|
-
if (!tunnelManager) {
|
|
120
|
-
return { statuses: [] };
|
|
121
|
-
}
|
|
122
|
-
return { statuses: tunnelManager.getEdgeStatuses() };
|
|
123
|
-
}));
|
|
124
|
-
// Get a connection token for an edge (write — exposes secret)
|
|
125
|
-
adminRouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getRemoteIngressConnectionToken', async (dataArg, toolsArg) => {
|
|
126
|
-
const manager = this.opsServerRef.dcRouterRef.remoteIngressManager;
|
|
127
|
-
if (!manager) {
|
|
128
|
-
return { success: false, message: 'RemoteIngress not configured' };
|
|
129
|
-
}
|
|
130
|
-
const edge = manager.getEdge(dataArg.edgeId);
|
|
131
|
-
if (!edge) {
|
|
132
|
-
return { success: false, message: 'Edge not found' };
|
|
133
|
-
}
|
|
134
|
-
if (!edge.enabled) {
|
|
135
|
-
return { success: false, message: 'Edge is disabled' };
|
|
136
|
-
}
|
|
137
|
-
const hubHost = dataArg.hubHost
|
|
138
|
-
|| this.opsServerRef.dcRouterRef.options.remoteIngressConfig?.hubDomain;
|
|
139
|
-
if (!hubHost) {
|
|
140
|
-
return {
|
|
141
|
-
success: false,
|
|
142
|
-
message: 'No hub hostname configured. Set hubDomain in remoteIngressConfig or provide hubHost.',
|
|
143
|
-
};
|
|
144
|
-
}
|
|
145
|
-
const hubPort = this.opsServerRef.dcRouterRef.options.remoteIngressConfig?.tunnelPort ?? 8443;
|
|
146
|
-
const token = plugins.remoteingress.encodeConnectionToken({
|
|
147
|
-
hubHost,
|
|
148
|
-
hubPort,
|
|
149
|
-
edgeId: edge.id,
|
|
150
|
-
secret: edge.secret,
|
|
151
|
-
});
|
|
152
|
-
return { success: true, token };
|
|
153
|
-
}));
|
|
154
|
-
}
|
|
155
|
-
}
|
|
156
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import type { OpsServer } from '../classes.opsserver.js';
|
|
3
|
-
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
4
|
-
export declare class RouteManagementHandler {
|
|
5
|
-
private opsServerRef;
|
|
6
|
-
typedrouter: plugins.typedrequest.TypedRouter<interfaces.typedrequestInterfaces.ITypedRequest>;
|
|
7
|
-
constructor(opsServerRef: OpsServer);
|
|
8
|
-
/**
|
|
9
|
-
* Validate auth: JWT identity OR API token with required scope.
|
|
10
|
-
* Returns a userId string on success, throws on failure.
|
|
11
|
-
*/
|
|
12
|
-
private requireAuth;
|
|
13
|
-
private registerHandlers;
|
|
14
|
-
}
|
|
@@ -1,117 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import * as interfaces from '../../../dist_ts_interfaces/index.js';
|
|
3
|
-
export class RouteManagementHandler {
|
|
4
|
-
opsServerRef;
|
|
5
|
-
typedrouter = new plugins.typedrequest.TypedRouter();
|
|
6
|
-
constructor(opsServerRef) {
|
|
7
|
-
this.opsServerRef = opsServerRef;
|
|
8
|
-
this.opsServerRef.typedrouter.addTypedRouter(this.typedrouter);
|
|
9
|
-
this.registerHandlers();
|
|
10
|
-
}
|
|
11
|
-
/**
|
|
12
|
-
* Validate auth: JWT identity OR API token with required scope.
|
|
13
|
-
* Returns a userId string on success, throws on failure.
|
|
14
|
-
*/
|
|
15
|
-
async requireAuth(request, requiredScope) {
|
|
16
|
-
// Try JWT identity first
|
|
17
|
-
if (request.identity?.jwt) {
|
|
18
|
-
try {
|
|
19
|
-
const isAdmin = await this.opsServerRef.adminHandler.adminIdentityGuard.exec({
|
|
20
|
-
identity: request.identity,
|
|
21
|
-
});
|
|
22
|
-
if (isAdmin)
|
|
23
|
-
return request.identity.userId;
|
|
24
|
-
}
|
|
25
|
-
catch { /* fall through */ }
|
|
26
|
-
}
|
|
27
|
-
// Try API token
|
|
28
|
-
if (request.apiToken) {
|
|
29
|
-
const tokenManager = this.opsServerRef.dcRouterRef.apiTokenManager;
|
|
30
|
-
if (tokenManager) {
|
|
31
|
-
const token = await tokenManager.validateToken(request.apiToken);
|
|
32
|
-
if (token) {
|
|
33
|
-
if (!requiredScope || tokenManager.hasScope(token, requiredScope)) {
|
|
34
|
-
return token.createdBy;
|
|
35
|
-
}
|
|
36
|
-
throw new plugins.typedrequest.TypedResponseError('insufficient scope');
|
|
37
|
-
}
|
|
38
|
-
}
|
|
39
|
-
}
|
|
40
|
-
throw new plugins.typedrequest.TypedResponseError('unauthorized');
|
|
41
|
-
}
|
|
42
|
-
registerHandlers() {
|
|
43
|
-
// Get merged routes
|
|
44
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getMergedRoutes', async (dataArg) => {
|
|
45
|
-
await this.requireAuth(dataArg, 'routes:read');
|
|
46
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
47
|
-
if (!manager) {
|
|
48
|
-
return { routes: [], warnings: [] };
|
|
49
|
-
}
|
|
50
|
-
return manager.getMergedRoutes();
|
|
51
|
-
}));
|
|
52
|
-
// Create route
|
|
53
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('createRoute', async (dataArg) => {
|
|
54
|
-
const userId = await this.requireAuth(dataArg, 'routes:write');
|
|
55
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
56
|
-
if (!manager) {
|
|
57
|
-
return { success: false, message: 'Route management not initialized' };
|
|
58
|
-
}
|
|
59
|
-
const id = await manager.createRoute(dataArg.route, userId, dataArg.enabled ?? true);
|
|
60
|
-
return { success: true, storedRouteId: id };
|
|
61
|
-
}));
|
|
62
|
-
// Update route
|
|
63
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('updateRoute', async (dataArg) => {
|
|
64
|
-
await this.requireAuth(dataArg, 'routes:write');
|
|
65
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
66
|
-
if (!manager) {
|
|
67
|
-
return { success: false, message: 'Route management not initialized' };
|
|
68
|
-
}
|
|
69
|
-
const ok = await manager.updateRoute(dataArg.id, {
|
|
70
|
-
route: dataArg.route,
|
|
71
|
-
enabled: dataArg.enabled,
|
|
72
|
-
});
|
|
73
|
-
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
74
|
-
}));
|
|
75
|
-
// Delete route
|
|
76
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('deleteRoute', async (dataArg) => {
|
|
77
|
-
await this.requireAuth(dataArg, 'routes:write');
|
|
78
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
79
|
-
if (!manager) {
|
|
80
|
-
return { success: false, message: 'Route management not initialized' };
|
|
81
|
-
}
|
|
82
|
-
const ok = await manager.deleteRoute(dataArg.id);
|
|
83
|
-
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
84
|
-
}));
|
|
85
|
-
// Set override on a hardcoded route
|
|
86
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('setRouteOverride', async (dataArg) => {
|
|
87
|
-
const userId = await this.requireAuth(dataArg, 'routes:write');
|
|
88
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
89
|
-
if (!manager) {
|
|
90
|
-
return { success: false, message: 'Route management not initialized' };
|
|
91
|
-
}
|
|
92
|
-
await manager.setOverride(dataArg.routeName, dataArg.enabled, userId);
|
|
93
|
-
return { success: true };
|
|
94
|
-
}));
|
|
95
|
-
// Remove override from a hardcoded route
|
|
96
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('removeRouteOverride', async (dataArg) => {
|
|
97
|
-
await this.requireAuth(dataArg, 'routes:write');
|
|
98
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
99
|
-
if (!manager) {
|
|
100
|
-
return { success: false, message: 'Route management not initialized' };
|
|
101
|
-
}
|
|
102
|
-
const ok = await manager.removeOverride(dataArg.routeName);
|
|
103
|
-
return { success: ok, message: ok ? undefined : 'Override not found' };
|
|
104
|
-
}));
|
|
105
|
-
// Toggle programmatic route
|
|
106
|
-
this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('toggleRoute', async (dataArg) => {
|
|
107
|
-
await this.requireAuth(dataArg, 'routes:write');
|
|
108
|
-
const manager = this.opsServerRef.dcRouterRef.routeConfigManager;
|
|
109
|
-
if (!manager) {
|
|
110
|
-
return { success: false, message: 'Route management not initialized' };
|
|
111
|
-
}
|
|
112
|
-
const ok = await manager.toggleRoute(dataArg.id, dataArg.enabled);
|
|
113
|
-
return { success: ok, message: ok ? undefined : 'Route not found' };
|
|
114
|
-
}));
|
|
115
|
-
}
|
|
116
|
-
}
|
|
117
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,9 +0,0 @@
|
|
|
1
|
-
import type { OpsServer } from '../classes.opsserver.js';
|
|
2
|
-
export declare class SecurityHandler {
|
|
3
|
-
private opsServerRef;
|
|
4
|
-
constructor(opsServerRef: OpsServer);
|
|
5
|
-
private registerHandlers;
|
|
6
|
-
private collectSecurityMetrics;
|
|
7
|
-
private getActiveConnections;
|
|
8
|
-
private getRateLimitStatus;
|
|
9
|
-
}
|