mirror of
https://github.com/Dokploy/dokploy
synced 2025-06-26 18:27:59 +00:00
refactor: update user and authentication schema with two-factor support
This commit is contained in:
parent
90156da570
commit
e1632cbdb3
@ -52,7 +52,7 @@ interface Props {
|
|||||||
export const AddUserPermissions = ({ userId }: Props) => {
|
export const AddUserPermissions = ({ userId }: Props) => {
|
||||||
const { data: projects } = api.project.all.useQuery();
|
const { data: projects } = api.project.all.useQuery();
|
||||||
|
|
||||||
const { data, refetch } = api.user.byUserId.useQuery(
|
const { data, refetch } = api.auth.one.useQuery(
|
||||||
{
|
{
|
||||||
userId,
|
userId,
|
||||||
},
|
},
|
||||||
@ -92,7 +92,7 @@ export const AddUserPermissions = ({ userId }: Props) => {
|
|||||||
|
|
||||||
const onSubmit = async (data: AddPermissions) => {
|
const onSubmit = async (data: AddPermissions) => {
|
||||||
await mutateAsync({
|
await mutateAsync({
|
||||||
userId,
|
id: userId,
|
||||||
canCreateServices: data.canCreateServices,
|
canCreateServices: data.canCreateServices,
|
||||||
canCreateProjects: data.canCreateProjects,
|
canCreateProjects: data.canCreateProjects,
|
||||||
canDeleteServices: data.canDeleteServices,
|
canDeleteServices: data.canDeleteServices,
|
||||||
|
@ -104,9 +104,9 @@ export const ShowUsers = () => {
|
|||||||
</Badge>
|
</Badge>
|
||||||
</TableCell>
|
</TableCell>
|
||||||
<TableCell className="text-center">
|
<TableCell className="text-center">
|
||||||
{user.user.is2FAEnabled
|
{/* {user.user.is2FAEnabled
|
||||||
? "2FA Enabled"
|
? "2FA Enabled"
|
||||||
: "2FA Not Enabled"}
|
: "2FA Not Enabled"} */}
|
||||||
</TableCell>
|
</TableCell>
|
||||||
{/* <TableCell className="text-right">
|
{/* <TableCell className="text-right">
|
||||||
<span className="text-sm text-muted-foreground">
|
<span className="text-sm text-muted-foreground">
|
||||||
@ -156,7 +156,7 @@ export const ShowUsers = () => {
|
|||||||
/>
|
/>
|
||||||
)} */}
|
)} */}
|
||||||
|
|
||||||
{user.role !== "owner" && (
|
{/* {user.role !== "owner" && (
|
||||||
<DialogAction
|
<DialogAction
|
||||||
title="Delete User"
|
title="Delete User"
|
||||||
description="Are you sure you want to delete this user?"
|
description="Are you sure you want to delete this user?"
|
||||||
@ -185,7 +185,7 @@ export const ShowUsers = () => {
|
|||||||
Delete User
|
Delete User
|
||||||
</DropdownMenuItem>
|
</DropdownMenuItem>
|
||||||
</DialogAction>
|
</DialogAction>
|
||||||
)}
|
)} */}
|
||||||
</DropdownMenuContent>
|
</DropdownMenuContent>
|
||||||
</DropdownMenu>
|
</DropdownMenu>
|
||||||
</TableCell>
|
</TableCell>
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
import { AlertBlock } from "@/components/shared/alert-block";
|
import { AlertBlock } from "@/components/shared/alert-block";
|
||||||
import { CodeEditor } from "@/components/shared/code-editor";
|
|
||||||
import { Button } from "@/components/ui/button";
|
import { Button } from "@/components/ui/button";
|
||||||
import {
|
import {
|
||||||
Dialog,
|
Dialog,
|
||||||
@ -47,11 +46,11 @@ interface Props {
|
|||||||
export const UpdateServerIp = ({ children, serverId }: Props) => {
|
export const UpdateServerIp = ({ children, serverId }: Props) => {
|
||||||
const [isOpen, setIsOpen] = useState(false);
|
const [isOpen, setIsOpen] = useState(false);
|
||||||
|
|
||||||
const { data } = api.admin.one.useQuery();
|
const { data } = api.user.get.useQuery();
|
||||||
const { data: ip } = api.server.publicIp.useQuery();
|
const { data: ip } = api.server.publicIp.useQuery();
|
||||||
|
|
||||||
const { mutateAsync, isLoading, error, isError } =
|
const { mutateAsync, isLoading, error, isError } =
|
||||||
api.admin.update.useMutation();
|
api.user.update.useMutation();
|
||||||
|
|
||||||
const form = useForm<Schema>({
|
const form = useForm<Schema>({
|
||||||
defaultValues: {
|
defaultValues: {
|
||||||
|
@ -16,6 +16,7 @@ CREATE TABLE "user_temp" (
|
|||||||
"canAccessToTraefikFiles" boolean DEFAULT false NOT NULL,
|
"canAccessToTraefikFiles" boolean DEFAULT false NOT NULL,
|
||||||
"accesedProjects" text[] DEFAULT ARRAY[]::text[] NOT NULL,
|
"accesedProjects" text[] DEFAULT ARRAY[]::text[] NOT NULL,
|
||||||
"accesedServices" text[] DEFAULT ARRAY[]::text[] NOT NULL,
|
"accesedServices" text[] DEFAULT ARRAY[]::text[] NOT NULL,
|
||||||
|
"two_factor_enabled" boolean DEFAULT false NOT NULL,
|
||||||
"email" text NOT NULL,
|
"email" text NOT NULL,
|
||||||
"email_verified" boolean NOT NULL,
|
"email_verified" boolean NOT NULL,
|
||||||
"image" text,
|
"image" text,
|
||||||
@ -113,6 +114,13 @@ CREATE TABLE "verification" (
|
|||||||
"created_at" timestamp,
|
"created_at" timestamp,
|
||||||
"updated_at" timestamp
|
"updated_at" timestamp
|
||||||
);
|
);
|
||||||
|
|
||||||
|
CREATE TABLE "two_factor" (
|
||||||
|
"id" text PRIMARY KEY NOT NULL,
|
||||||
|
"secret" text NOT NULL,
|
||||||
|
"backup_codes" text NOT NULL,
|
||||||
|
"user_id" text NOT NULL
|
||||||
|
);
|
||||||
--> statement-breakpoint
|
--> statement-breakpoint
|
||||||
ALTER TABLE "certificate" ALTER COLUMN "adminId" SET NOT NULL;--> statement-breakpoint
|
ALTER TABLE "certificate" ALTER COLUMN "adminId" SET NOT NULL;--> statement-breakpoint
|
||||||
ALTER TABLE "notification" ALTER COLUMN "adminId" SET NOT NULL;--> statement-breakpoint
|
ALTER TABLE "notification" ALTER COLUMN "adminId" SET NOT NULL;--> statement-breakpoint
|
||||||
@ -124,4 +132,5 @@ ALTER TABLE "invitation" ADD CONSTRAINT "invitation_organization_id_organization
|
|||||||
ALTER TABLE "invitation" ADD CONSTRAINT "invitation_inviter_id_user_temp_id_fk" FOREIGN KEY ("inviter_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
ALTER TABLE "invitation" ADD CONSTRAINT "invitation_inviter_id_user_temp_id_fk" FOREIGN KEY ("inviter_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
||||||
ALTER TABLE "member" ADD CONSTRAINT "member_organization_id_organization_id_fk" FOREIGN KEY ("organization_id") REFERENCES "public"."organization"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
ALTER TABLE "member" ADD CONSTRAINT "member_organization_id_organization_id_fk" FOREIGN KEY ("organization_id") REFERENCES "public"."organization"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
||||||
ALTER TABLE "member" ADD CONSTRAINT "member_user_id_user_temp_id_fk" FOREIGN KEY ("user_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
ALTER TABLE "member" ADD CONSTRAINT "member_user_id_user_temp_id_fk" FOREIGN KEY ("user_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;--> statement-breakpoint
|
||||||
ALTER TABLE "organization" ADD CONSTRAINT "organization_owner_id_user_temp_id_fk" FOREIGN KEY ("owner_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;
|
ALTER TABLE "organization" ADD CONSTRAINT "organization_owner_id_user_temp_id_fk" FOREIGN KEY ("owner_id") REFERENCES "public"."user_temp"("id") ON DELETE no action ON UPDATE no action;
|
||||||
|
ALTER TABLE "two_factor" ADD CONSTRAINT "two_factor_user_id_user_temp_id_fk" FOREIGN KEY ("user_id") REFERENCES "public"."user_temp"("id") ON DELETE cascade ON UPDATE no action;--> statement-breakpoint
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
|
--> statement-breakpoint
|
||||||
DROP TABLE "user" CASCADE;--> statement-breakpoint
|
DROP TABLE "user" CASCADE;--> statement-breakpoint
|
||||||
DROP TABLE "admin" CASCADE;--> statement-breakpoint
|
DROP TABLE "admin" CASCADE;--> statement-breakpoint
|
||||||
DROP TABLE "auth" CASCADE;--> statement-breakpoint
|
DROP TABLE "auth" CASCADE;--> statement-breakpoint
|
@ -1010,6 +1010,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5045,6 +5051,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1010,6 +1010,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5045,6 +5051,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1010,6 +1010,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5045,6 +5051,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1018,6 +1018,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5053,6 +5059,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1018,6 +1018,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5205,6 +5211,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1018,6 +1018,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5205,6 +5211,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1018,6 +1018,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -5053,6 +5059,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"id": "07170d9f-4d67-48f5-890f-393043396973",
|
"id": "e357a19a-dd1e-4843-b567-0c0243ade7a8",
|
||||||
"prevId": "4eb71c0e-5bdb-427b-b198-39b1059dcd16",
|
"prevId": "4eb71c0e-5bdb-427b-b198-39b1059dcd16",
|
||||||
"version": "7",
|
"version": "7",
|
||||||
"dialect": "postgresql",
|
"dialect": "postgresql",
|
||||||
@ -858,6 +858,12 @@
|
|||||||
"notNull": true,
|
"notNull": true,
|
||||||
"default": "ARRAY[]::text[]"
|
"default": "ARRAY[]::text[]"
|
||||||
},
|
},
|
||||||
|
"two_factor_enabled": {
|
||||||
|
"name": "two_factor_enabled",
|
||||||
|
"type": "boolean",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": false
|
||||||
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"name": "email",
|
"name": "email",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
@ -4602,6 +4608,57 @@
|
|||||||
"checkConstraints": {},
|
"checkConstraints": {},
|
||||||
"isRLSEnabled": false
|
"isRLSEnabled": false
|
||||||
},
|
},
|
||||||
|
"public.two_factor": {
|
||||||
|
"name": "two_factor",
|
||||||
|
"schema": "",
|
||||||
|
"columns": {
|
||||||
|
"id": {
|
||||||
|
"name": "id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": true,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"secret": {
|
||||||
|
"name": "secret",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"backup_codes": {
|
||||||
|
"name": "backup_codes",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
},
|
||||||
|
"user_id": {
|
||||||
|
"name": "user_id",
|
||||||
|
"type": "text",
|
||||||
|
"primaryKey": false,
|
||||||
|
"notNull": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"indexes": {},
|
||||||
|
"foreignKeys": {
|
||||||
|
"two_factor_user_id_user_temp_id_fk": {
|
||||||
|
"name": "two_factor_user_id_user_temp_id_fk",
|
||||||
|
"tableFrom": "two_factor",
|
||||||
|
"tableTo": "user_temp",
|
||||||
|
"columnsFrom": [
|
||||||
|
"user_id"
|
||||||
|
],
|
||||||
|
"columnsTo": [
|
||||||
|
"id"
|
||||||
|
],
|
||||||
|
"onDelete": "cascade",
|
||||||
|
"onUpdate": "no action"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"compositePrimaryKeys": {},
|
||||||
|
"uniqueConstraints": {},
|
||||||
|
"policies": {},
|
||||||
|
"checkConstraints": {},
|
||||||
|
"isRLSEnabled": false
|
||||||
|
},
|
||||||
"public.verification": {
|
"public.verification": {
|
||||||
"name": "verification",
|
"name": "verification",
|
||||||
"schema": "",
|
"schema": "",
|
||||||
|
@ -516,8 +516,8 @@
|
|||||||
{
|
{
|
||||||
"idx": 73,
|
"idx": 73,
|
||||||
"version": "7",
|
"version": "7",
|
||||||
"when": 1739735739336,
|
"when": 1739740193879,
|
||||||
"tag": "0073_brave_wolfpack",
|
"tag": "0073_polite_miss_america",
|
||||||
"breakpoints": true
|
"breakpoints": true
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,7 +54,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.project.all.prefetch();
|
await helpers.project.all.prefetch();
|
||||||
|
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const userR = await helpers.user.get.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
userId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.project.all.prefetch();
|
await helpers.project.all.prefetch();
|
||||||
await helpers.settings.isCloud.prefetch();
|
await helpers.settings.isCloud.prefetch();
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const userR = await helpers.user.get.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
userId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -57,7 +57,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.settings.isCloud.prefetch();
|
await helpers.settings.isCloud.prefetch();
|
||||||
await helpers.auth.get.prefetch();
|
await helpers.auth.get.prefetch();
|
||||||
if (user?.role === "member") {
|
if (user?.role === "member") {
|
||||||
// const userR = await helpers.user.get.fetch({
|
// const userR = await helpers.user.one.fetch({
|
||||||
// userId: user.id,
|
// userId: user.id,
|
||||||
// });
|
// });
|
||||||
// await helpers.user.byAuthId.prefetch({
|
// await helpers.user.byAuthId.prefetch({
|
||||||
|
@ -51,7 +51,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.settings.isCloud.prefetch();
|
await helpers.settings.isCloud.prefetch();
|
||||||
|
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const userR = await helpers.user.get.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
userId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.project.all.prefetch();
|
await helpers.project.all.prefetch();
|
||||||
|
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const userR = await helpers.user.get.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
userId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ export async function getServerSideProps(
|
|||||||
await helpers.project.all.prefetch();
|
await helpers.project.all.prefetch();
|
||||||
|
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const userR = await helpers.user.get.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
userId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ const Home: NextPage = () => {
|
|||||||
export default Home;
|
export default Home;
|
||||||
export async function getServerSideProps(context: GetServerSidePropsContext) {
|
export async function getServerSideProps(context: GetServerSidePropsContext) {
|
||||||
const { req, res } = context;
|
const { req, res } = context;
|
||||||
const { user, session } = await validateRequest(context.req, context.res);
|
const { user, session } = await validateRequest(context.req);
|
||||||
if (!user) {
|
if (!user) {
|
||||||
return {
|
return {
|
||||||
redirect: {
|
redirect: {
|
||||||
@ -53,17 +53,17 @@ export async function getServerSideProps(context: GetServerSidePropsContext) {
|
|||||||
req: req as any,
|
req: req as any,
|
||||||
res: res as any,
|
res: res as any,
|
||||||
db: null as any,
|
db: null as any,
|
||||||
session: session,
|
session: session as any,
|
||||||
user: user,
|
user: user as any,
|
||||||
},
|
},
|
||||||
transformer: superjson,
|
transformer: superjson,
|
||||||
});
|
});
|
||||||
if (user.role === "member") {
|
if (user.role === "member") {
|
||||||
const result = await helpers.user.byAuthId.fetch({
|
const userR = await helpers.user.one.fetch({
|
||||||
authId: user.id,
|
userId: user.id,
|
||||||
});
|
});
|
||||||
|
|
||||||
if (!result.canAccessToAPI) {
|
if (!userR.canAccessToAPI) {
|
||||||
return {
|
return {
|
||||||
redirect: {
|
redirect: {
|
||||||
permanent: true,
|
permanent: true,
|
||||||
|
@ -35,17 +35,22 @@ export const adminRouter = createTRPCRouter({
|
|||||||
...rest,
|
...rest,
|
||||||
};
|
};
|
||||||
}),
|
}),
|
||||||
update: adminProcedure.mutation(async ({ input, ctx }) => {
|
update: adminProcedure
|
||||||
if (ctx.user.rol === "member") {
|
.input(
|
||||||
throw new TRPCError({
|
z.object({
|
||||||
code: "UNAUTHORIZED",
|
enableDockerCleanup: z.boolean(),
|
||||||
message: "You are not allowed to update this admin",
|
}),
|
||||||
});
|
)
|
||||||
}
|
.mutation(async ({ input, ctx }) => {
|
||||||
const { id } = await findUserById(ctx.user.id);
|
if (ctx.user.rol === "member") {
|
||||||
// @ts-ignore
|
throw new TRPCError({
|
||||||
return updateAdmin(id, input);
|
code: "UNAUTHORIZED",
|
||||||
}),
|
message: "You are not allowed to update this admin",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
const user = await findUserById(ctx.user.ownerId);
|
||||||
|
return updateUser(user.id, {});
|
||||||
|
}),
|
||||||
createUserInvitation: adminProcedure
|
createUserInvitation: adminProcedure
|
||||||
.input(apiCreateUserInvitation)
|
.input(apiCreateUserInvitation)
|
||||||
.mutation(async ({ input, ctx }) => {
|
.mutation(async ({ input, ctx }) => {
|
||||||
|
@ -266,10 +266,13 @@ export const authRouter = createTRPCRouter({
|
|||||||
verifyToken: protectedProcedure.mutation(async () => {
|
verifyToken: protectedProcedure.mutation(async () => {
|
||||||
return true;
|
return true;
|
||||||
}),
|
}),
|
||||||
one: adminProcedure.query(async ({ input }) => {
|
one: adminProcedure
|
||||||
const auth = await findAuthById(input.id);
|
.input(z.object({ userId: z.string().min(1) }))
|
||||||
return auth;
|
.query(async ({ input }) => {
|
||||||
}),
|
// TODO: Check if the user is admin or member
|
||||||
|
const user = await findUserById(input.userId);
|
||||||
|
return user;
|
||||||
|
}),
|
||||||
|
|
||||||
generate2FASecret: protectedProcedure.query(async ({ ctx }) => {
|
generate2FASecret: protectedProcedure.query(async ({ ctx }) => {
|
||||||
return await generate2FASecret(ctx.user.id);
|
return await generate2FASecret(ctx.user.id);
|
||||||
|
@ -22,9 +22,8 @@ import {
|
|||||||
cleanUpUnusedVolumes,
|
cleanUpUnusedVolumes,
|
||||||
execAsync,
|
execAsync,
|
||||||
execAsyncRemote,
|
execAsyncRemote,
|
||||||
findAdmin,
|
|
||||||
findAdminById,
|
|
||||||
findServerById,
|
findServerById,
|
||||||
|
findUserById,
|
||||||
getDokployImage,
|
getDokployImage,
|
||||||
getDokployImageTag,
|
getDokployImageTag,
|
||||||
getUpdateData,
|
getUpdateData,
|
||||||
@ -50,6 +49,7 @@ import {
|
|||||||
updateLetsEncryptEmail,
|
updateLetsEncryptEmail,
|
||||||
updateServerById,
|
updateServerById,
|
||||||
updateServerTraefik,
|
updateServerTraefik,
|
||||||
|
updateUser,
|
||||||
writeConfig,
|
writeConfig,
|
||||||
writeMainConfig,
|
writeMainConfig,
|
||||||
writeTraefikConfigInPath,
|
writeTraefikConfigInPath,
|
||||||
@ -163,7 +163,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
if (IS_CLOUD) {
|
if (IS_CLOUD) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
await updateAdmin(ctx.user.authId, {
|
await updateUser(ctx.user.id, {
|
||||||
sshPrivateKey: input.sshPrivateKey,
|
sshPrivateKey: input.sshPrivateKey,
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -175,7 +175,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
if (IS_CLOUD) {
|
if (IS_CLOUD) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
const admin = await updateAdmin(ctx.user.authId, {
|
const user = await updateUser(ctx.user.id, {
|
||||||
host: input.host,
|
host: input.host,
|
||||||
...(input.letsEncryptEmail && {
|
...(input.letsEncryptEmail && {
|
||||||
letsEncryptEmail: input.letsEncryptEmail,
|
letsEncryptEmail: input.letsEncryptEmail,
|
||||||
@ -183,25 +183,25 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
certificateType: input.certificateType,
|
certificateType: input.certificateType,
|
||||||
});
|
});
|
||||||
|
|
||||||
if (!admin) {
|
if (!user) {
|
||||||
throw new TRPCError({
|
throw new TRPCError({
|
||||||
code: "NOT_FOUND",
|
code: "NOT_FOUND",
|
||||||
message: "Admin not found",
|
message: "User not found",
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
updateServerTraefik(admin, input.host);
|
updateServerTraefik(user, input.host);
|
||||||
if (input.letsEncryptEmail) {
|
if (input.letsEncryptEmail) {
|
||||||
updateLetsEncryptEmail(input.letsEncryptEmail);
|
updateLetsEncryptEmail(input.letsEncryptEmail);
|
||||||
}
|
}
|
||||||
|
|
||||||
return admin;
|
return user;
|
||||||
}),
|
}),
|
||||||
cleanSSHPrivateKey: adminProcedure.mutation(async ({ ctx }) => {
|
cleanSSHPrivateKey: adminProcedure.mutation(async ({ ctx }) => {
|
||||||
if (IS_CLOUD) {
|
if (IS_CLOUD) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
await updateAdmin(ctx.user.authId, {
|
await updateUser(ctx.user.id, {
|
||||||
sshPrivateKey: null,
|
sshPrivateKey: null,
|
||||||
});
|
});
|
||||||
return true;
|
return true;
|
||||||
@ -216,7 +216,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
|
|
||||||
const server = await findServerById(input.serverId);
|
const server = await findServerById(input.serverId);
|
||||||
|
|
||||||
if (server.adminId !== ctx.user.adminId) {
|
if (server.organizationId !== ctx.session?.activeOrganizationId) {
|
||||||
throw new TRPCError({
|
throw new TRPCError({
|
||||||
code: "UNAUTHORIZED",
|
code: "UNAUTHORIZED",
|
||||||
message: "You are not authorized to access this server",
|
message: "You are not authorized to access this server",
|
||||||
@ -245,7 +245,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
await cleanUpUnusedImages(server.serverId);
|
await cleanUpUnusedImages(server.serverId);
|
||||||
await cleanUpDockerBuilder(server.serverId);
|
await cleanUpDockerBuilder(server.serverId);
|
||||||
await cleanUpSystemPrune(server.serverId);
|
await cleanUpSystemPrune(server.serverId);
|
||||||
await sendDockerCleanupNotifications(server.adminId);
|
await sendDockerCleanupNotifications(server.organizationId);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@ -261,19 +261,11 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else if (!IS_CLOUD) {
|
} else if (!IS_CLOUD) {
|
||||||
const admin = await findAdminById(ctx.user.adminId);
|
const userUpdated = await updateUser(ctx.user.id, {
|
||||||
|
|
||||||
if (admin.adminId !== ctx.user.adminId) {
|
|
||||||
throw new TRPCError({
|
|
||||||
code: "UNAUTHORIZED",
|
|
||||||
message: "You are not authorized to access this admin",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
const adminUpdated = await updateAdmin(ctx.user.authId, {
|
|
||||||
enableDockerCleanup: input.enableDockerCleanup,
|
enableDockerCleanup: input.enableDockerCleanup,
|
||||||
});
|
});
|
||||||
|
|
||||||
if (adminUpdated?.enableDockerCleanup) {
|
if (userUpdated?.enableDockerCleanup) {
|
||||||
scheduleJob("docker-cleanup", "0 0 * * *", async () => {
|
scheduleJob("docker-cleanup", "0 0 * * *", async () => {
|
||||||
console.log(
|
console.log(
|
||||||
`Docker Cleanup ${new Date().toLocaleString()}] Running...`,
|
`Docker Cleanup ${new Date().toLocaleString()}] Running...`,
|
||||||
@ -281,7 +273,9 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
await cleanUpUnusedImages();
|
await cleanUpUnusedImages();
|
||||||
await cleanUpDockerBuilder();
|
await cleanUpDockerBuilder();
|
||||||
await cleanUpSystemPrune();
|
await cleanUpSystemPrune();
|
||||||
await sendDockerCleanupNotifications(admin.adminId);
|
await sendDockerCleanupNotifications(
|
||||||
|
ctx.session.activeOrganizationId,
|
||||||
|
);
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
const currentJob = scheduledJobs["docker-cleanup"];
|
const currentJob = scheduledJobs["docker-cleanup"];
|
||||||
@ -383,7 +377,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
.query(async ({ ctx, input }) => {
|
.query(async ({ ctx, input }) => {
|
||||||
try {
|
try {
|
||||||
if (ctx.user.rol === "member") {
|
if (ctx.user.rol === "member") {
|
||||||
const canAccess = await canAccessToTraefikFiles(ctx.user.authId);
|
const canAccess = await canAccessToTraefikFiles(ctx.user.id);
|
||||||
|
|
||||||
if (!canAccess) {
|
if (!canAccess) {
|
||||||
throw new TRPCError({ code: "UNAUTHORIZED" });
|
throw new TRPCError({ code: "UNAUTHORIZED" });
|
||||||
@ -401,7 +395,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
.input(apiModifyTraefikConfig)
|
.input(apiModifyTraefikConfig)
|
||||||
.mutation(async ({ input, ctx }) => {
|
.mutation(async ({ input, ctx }) => {
|
||||||
if (ctx.user.rol === "member") {
|
if (ctx.user.rol === "member") {
|
||||||
const canAccess = await canAccessToTraefikFiles(ctx.user.authId);
|
const canAccess = await canAccessToTraefikFiles(ctx.user.id);
|
||||||
|
|
||||||
if (!canAccess) {
|
if (!canAccess) {
|
||||||
throw new TRPCError({ code: "UNAUTHORIZED" });
|
throw new TRPCError({ code: "UNAUTHORIZED" });
|
||||||
@ -419,7 +413,7 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
.input(apiReadTraefikConfig)
|
.input(apiReadTraefikConfig)
|
||||||
.query(async ({ input, ctx }) => {
|
.query(async ({ input, ctx }) => {
|
||||||
if (ctx.user.rol === "member") {
|
if (ctx.user.rol === "member") {
|
||||||
const canAccess = await canAccessToTraefikFiles(ctx.user.authId);
|
const canAccess = await canAccessToTraefikFiles(ctx.user.id);
|
||||||
|
|
||||||
if (!canAccess) {
|
if (!canAccess) {
|
||||||
throw new TRPCError({ code: "UNAUTHORIZED" });
|
throw new TRPCError({ code: "UNAUTHORIZED" });
|
||||||
@ -427,12 +421,12 @@ export const settingsRouter = createTRPCRouter({
|
|||||||
}
|
}
|
||||||
return readConfigInPath(input.path, input.serverId);
|
return readConfigInPath(input.path, input.serverId);
|
||||||
}),
|
}),
|
||||||
getIp: protectedProcedure.query(async () => {
|
getIp: protectedProcedure.query(async ({ ctx }) => {
|
||||||
if (IS_CLOUD) {
|
if (IS_CLOUD) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
const admin = await findAdmin();
|
const user = await findUserById(ctx.user.ownerId);
|
||||||
return admin.serverIp;
|
return user.serverIp;
|
||||||
}),
|
}),
|
||||||
|
|
||||||
getOpenApiDocument: protectedProcedure.query(
|
getOpenApiDocument: protectedProcedure.query(
|
||||||
|
@ -1,7 +1,12 @@
|
|||||||
import { apiFindOneUser, apiFindOneUserByAuth } from "@/server/db/schema";
|
import { apiFindOneUser, apiFindOneUserByAuth } from "@/server/db/schema";
|
||||||
import { findUserByAuthId, findUserById } from "@dokploy/server";
|
import {
|
||||||
|
findUserByAuthId,
|
||||||
|
findUserById,
|
||||||
|
updateUser,
|
||||||
|
verify2FA,
|
||||||
|
} from "@dokploy/server";
|
||||||
import { db } from "@dokploy/server/db";
|
import { db } from "@dokploy/server/db";
|
||||||
import { member } from "@dokploy/server/db/schema";
|
import { apiUpdateUser, member } from "@dokploy/server/db/schema";
|
||||||
import { TRPCError } from "@trpc/server";
|
import { TRPCError } from "@trpc/server";
|
||||||
import { eq } from "drizzle-orm";
|
import { eq } from "drizzle-orm";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
@ -15,7 +20,7 @@ export const userRouter = createTRPCRouter({
|
|||||||
},
|
},
|
||||||
});
|
});
|
||||||
}),
|
}),
|
||||||
get: protectedProcedure
|
one: protectedProcedure
|
||||||
.input(
|
.input(
|
||||||
z.object({
|
z.object({
|
||||||
userId: z.string(),
|
userId: z.string(),
|
||||||
@ -31,16 +36,27 @@ export const userRouter = createTRPCRouter({
|
|||||||
// }
|
// }
|
||||||
return user;
|
return user;
|
||||||
}),
|
}),
|
||||||
// byUserId: protectedProcedure
|
get: protectedProcedure.query(async ({ ctx }) => {
|
||||||
// .input(apiFindOneUser)
|
return await findUserById(ctx.user.id);
|
||||||
// .query(async ({ input, ctx }) => {
|
}),
|
||||||
// const user = await findUserById(input.userId);
|
update: protectedProcedure
|
||||||
// if (user.adminId !== ctx.user.adminId) {
|
.input(apiUpdateUser)
|
||||||
// throw new TRPCError({
|
.mutation(async ({ input, ctx }) => {
|
||||||
// code: "UNAUTHORIZED",
|
return await updateUser(ctx.user.id, input);
|
||||||
// message: "You are not allowed to access this user",
|
}),
|
||||||
// });
|
verify2FASetup: protectedProcedure
|
||||||
// }
|
.input(
|
||||||
// return user;
|
z.object({
|
||||||
// }),
|
secret: z.string(),
|
||||||
|
pin: z.string(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const user = await findUserById(ctx.user.id);
|
||||||
|
await verify2FA(user, input.secret, input.pin);
|
||||||
|
await updateUser(user.id, {
|
||||||
|
secret: input.secret,
|
||||||
|
});
|
||||||
|
return user;
|
||||||
|
}),
|
||||||
});
|
});
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
import {
|
import {
|
||||||
boolean,
|
|
||||||
integer,
|
|
||||||
pgTable,
|
pgTable,
|
||||||
text,
|
text,
|
||||||
|
integer,
|
||||||
timestamp,
|
timestamp,
|
||||||
|
boolean,
|
||||||
} from "drizzle-orm/pg-core";
|
} from "drizzle-orm/pg-core";
|
||||||
|
|
||||||
export const users_temp = pgTable("users_temp", {
|
export const users_temp = pgTable("users_temp", {
|
||||||
@ -14,6 +14,7 @@ export const users_temp = pgTable("users_temp", {
|
|||||||
image: text("image"),
|
image: text("image"),
|
||||||
createdAt: timestamp("created_at").notNull(),
|
createdAt: timestamp("created_at").notNull(),
|
||||||
updatedAt: timestamp("updated_at").notNull(),
|
updatedAt: timestamp("updated_at").notNull(),
|
||||||
|
twoFactorEnabled: boolean("two_factor_enabled"),
|
||||||
role: text("role").notNull(),
|
role: text("role").notNull(),
|
||||||
ownerId: text("owner_id").notNull(),
|
ownerId: text("owner_id").notNull(),
|
||||||
});
|
});
|
||||||
@ -59,6 +60,15 @@ export const verification = pgTable("verification", {
|
|||||||
updatedAt: timestamp("updated_at"),
|
updatedAt: timestamp("updated_at"),
|
||||||
});
|
});
|
||||||
|
|
||||||
|
export const twoFactor = pgTable("two_factor", {
|
||||||
|
id: text("id").primaryKey(),
|
||||||
|
secret: text("secret").notNull(),
|
||||||
|
backupCodes: text("backup_codes").notNull(),
|
||||||
|
userId: text("user_id")
|
||||||
|
.notNull()
|
||||||
|
.references(() => users_temp.id, { onDelete: "cascade" }),
|
||||||
|
});
|
||||||
|
|
||||||
export const organization = pgTable("organization", {
|
export const organization = pgTable("organization", {
|
||||||
id: text("id").primaryKey(),
|
id: text("id").primaryKey(),
|
||||||
name: text("name").notNull(),
|
name: text("name").notNull(),
|
||||||
|
@ -119,3 +119,12 @@ export const invitationRelations = relations(invitation, ({ one }) => ({
|
|||||||
references: [organization.id],
|
references: [organization.id],
|
||||||
}),
|
}),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
export const twoFactor = pgTable("two_factor", {
|
||||||
|
id: text("id").primaryKey(),
|
||||||
|
secret: text("secret").notNull(),
|
||||||
|
backupCodes: text("backup_codes").notNull(),
|
||||||
|
userId: text("user_id")
|
||||||
|
.notNull()
|
||||||
|
.references(() => users_temp.id, { onDelete: "cascade" }),
|
||||||
|
});
|
||||||
|
@ -59,10 +59,12 @@ export const users_temp = pgTable("user_temp", {
|
|||||||
.array()
|
.array()
|
||||||
.notNull()
|
.notNull()
|
||||||
.default(sql`ARRAY[]::text[]`),
|
.default(sql`ARRAY[]::text[]`),
|
||||||
|
|
||||||
// authId: text("authId")
|
// authId: text("authId")
|
||||||
// .notNull()
|
// .notNull()
|
||||||
// .references(() => auth.id, { onDelete: "cascade" }),
|
// .references(() => auth.id, { onDelete: "cascade" }),
|
||||||
// Auth
|
// Auth
|
||||||
|
twoFactorEnabled: boolean("two_factor_enabled"),
|
||||||
email: text("email").notNull().unique(),
|
email: text("email").notNull().unique(),
|
||||||
emailVerified: boolean("email_verified").notNull(),
|
emailVerified: boolean("email_verified").notNull(),
|
||||||
image: text("image"),
|
image: text("image"),
|
||||||
@ -151,10 +153,8 @@ export const usersRelations = relations(users_temp, ({ one, many }) => ({
|
|||||||
|
|
||||||
const createSchema = createInsertSchema(users_temp, {
|
const createSchema = createInsertSchema(users_temp, {
|
||||||
id: z.string().min(1),
|
id: z.string().min(1),
|
||||||
// authId: z.string().min(1),
|
|
||||||
token: z.string().min(1),
|
token: z.string().min(1),
|
||||||
isRegistered: z.boolean().optional(),
|
isRegistered: z.boolean().optional(),
|
||||||
// adminId: z.string(),
|
|
||||||
accessedProjects: z.array(z.string()).optional(),
|
accessedProjects: z.array(z.string()).optional(),
|
||||||
accessedServices: z.array(z.string()).optional(),
|
accessedServices: z.array(z.string()).optional(),
|
||||||
canCreateProjects: z.boolean().optional(),
|
canCreateProjects: z.boolean().optional(),
|
||||||
@ -297,3 +297,30 @@ export const apiUpdateWebServerMonitoring = z.object({
|
|||||||
})
|
})
|
||||||
.required(),
|
.required(),
|
||||||
});
|
});
|
||||||
|
|
||||||
|
export const apiUpdateUser = createSchema.partial().extend({
|
||||||
|
metricsConfig: z
|
||||||
|
.object({
|
||||||
|
server: z.object({
|
||||||
|
type: z.enum(["Dokploy", "Remote"]),
|
||||||
|
refreshRate: z.number(),
|
||||||
|
port: z.number(),
|
||||||
|
token: z.string(),
|
||||||
|
urlCallback: z.string(),
|
||||||
|
retentionDays: z.number(),
|
||||||
|
cronJob: z.string(),
|
||||||
|
thresholds: z.object({
|
||||||
|
cpu: z.number(),
|
||||||
|
memory: z.number(),
|
||||||
|
}),
|
||||||
|
}),
|
||||||
|
containers: z.object({
|
||||||
|
refreshRate: z.number(),
|
||||||
|
services: z.object({
|
||||||
|
include: z.array(z.string()),
|
||||||
|
exclude: z.array(z.string()),
|
||||||
|
}),
|
||||||
|
}),
|
||||||
|
})
|
||||||
|
.optional(),
|
||||||
|
});
|
||||||
|
@ -2,7 +2,11 @@ import type { IncomingMessage } from "node:http";
|
|||||||
import * as bcrypt from "bcrypt";
|
import * as bcrypt from "bcrypt";
|
||||||
import { betterAuth } from "better-auth";
|
import { betterAuth } from "better-auth";
|
||||||
import { drizzleAdapter } from "better-auth/adapters/drizzle";
|
import { drizzleAdapter } from "better-auth/adapters/drizzle";
|
||||||
import { createAuthMiddleware, organization } from "better-auth/plugins";
|
import {
|
||||||
|
createAuthMiddleware,
|
||||||
|
organization,
|
||||||
|
twoFactor,
|
||||||
|
} from "better-auth/plugins";
|
||||||
import { desc, eq } from "drizzle-orm";
|
import { desc, eq } from "drizzle-orm";
|
||||||
import { db } from "../db";
|
import { db } from "../db";
|
||||||
import * as schema from "../db/schema";
|
import * as schema from "../db/schema";
|
||||||
@ -85,6 +89,7 @@ export const auth = betterAuth({
|
|||||||
},
|
},
|
||||||
|
|
||||||
plugins: [
|
plugins: [
|
||||||
|
twoFactor(),
|
||||||
organization({
|
organization({
|
||||||
async sendInvitationEmail(data, request) {
|
async sendInvitationEmail(data, request) {
|
||||||
const inviteLink = `https://example.com/accept-invitation/${data.id}`;
|
const inviteLink = `https://example.com/accept-invitation/${data.id}`;
|
||||||
|
@ -12,41 +12,40 @@ import * as bcrypt from "bcrypt";
|
|||||||
import { eq } from "drizzle-orm";
|
import { eq } from "drizzle-orm";
|
||||||
import { IS_CLOUD } from "../constants";
|
import { IS_CLOUD } from "../constants";
|
||||||
|
|
||||||
export type Admin = typeof users_temp.$inferSelect;
|
export type User = typeof users_temp.$inferSelect;
|
||||||
export const createInvitation = async (
|
export const createInvitation = async (
|
||||||
input: typeof apiCreateUserInvitation._type,
|
input: typeof apiCreateUserInvitation._type,
|
||||||
adminId: string,
|
adminId: string,
|
||||||
) => {
|
) => {
|
||||||
await db.transaction(async (tx) => {
|
// await db.transaction(async (tx) => {
|
||||||
const result = await tx
|
// const result = await tx
|
||||||
.insert(auth)
|
// .insert(auth)
|
||||||
.values({
|
// .values({
|
||||||
email: input.email.toLowerCase(),
|
// email: input.email.toLowerCase(),
|
||||||
rol: "user",
|
// rol: "user",
|
||||||
password: bcrypt.hashSync("01231203012312", 10),
|
// password: bcrypt.hashSync("01231203012312", 10),
|
||||||
})
|
// })
|
||||||
.returning()
|
// .returning()
|
||||||
.then((res) => res[0]);
|
// .then((res) => res[0]);
|
||||||
|
// if (!result) {
|
||||||
if (!result) {
|
// throw new TRPCError({
|
||||||
throw new TRPCError({
|
// code: "BAD_REQUEST",
|
||||||
code: "BAD_REQUEST",
|
// message: "Error creating the user",
|
||||||
message: "Error creating the user",
|
// });
|
||||||
});
|
// }
|
||||||
}
|
// const expiresIn24Hours = new Date();
|
||||||
const expiresIn24Hours = new Date();
|
// expiresIn24Hours.setDate(expiresIn24Hours.getDate() + 1);
|
||||||
expiresIn24Hours.setDate(expiresIn24Hours.getDate() + 1);
|
// const token = randomBytes(32).toString("hex");
|
||||||
const token = randomBytes(32).toString("hex");
|
// await tx
|
||||||
// await tx
|
// .insert(users)
|
||||||
// .insert(users)
|
// .values({
|
||||||
// .values({
|
// adminId: adminId,
|
||||||
// adminId: adminId,
|
// authId: result.id,
|
||||||
// authId: result.id,
|
// token,
|
||||||
// token,
|
// expirationDate: expiresIn24Hours.toISOString(),
|
||||||
// expirationDate: expiresIn24Hours.toISOString(),
|
// })
|
||||||
// })
|
// .returning();
|
||||||
// .returning();
|
// });
|
||||||
});
|
|
||||||
};
|
};
|
||||||
|
|
||||||
export const findUserById = async (userId: string) => {
|
export const findUserById = async (userId: string) => {
|
||||||
@ -65,7 +64,7 @@ export const findUserById = async (userId: string) => {
|
|||||||
return user;
|
return user;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const updateUser = async (userId: string, userData: Partial<Admin>) => {
|
export const updateUser = async (userId: string, userData: Partial<User>) => {
|
||||||
const user = await db
|
const user = await db
|
||||||
.update(users_temp)
|
.update(users_temp)
|
||||||
.set({
|
.set({
|
||||||
@ -80,7 +79,7 @@ export const updateUser = async (userId: string, userData: Partial<Admin>) => {
|
|||||||
|
|
||||||
export const updateAdminById = async (
|
export const updateAdminById = async (
|
||||||
adminId: string,
|
adminId: string,
|
||||||
adminData: Partial<Admin>,
|
adminData: Partial<User>,
|
||||||
) => {
|
) => {
|
||||||
// const admin = await db
|
// const admin = await db
|
||||||
// .update(admins)
|
// .update(admins)
|
||||||
@ -93,13 +92,6 @@ export const updateAdminById = async (
|
|||||||
// return admin;
|
// return admin;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const findAdminById = async (userId: string) => {
|
|
||||||
const admin = await db.query.admins.findFirst({
|
|
||||||
// where: eq(admins.userId, userId),
|
|
||||||
});
|
|
||||||
return admin;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const isAdminPresent = async () => {
|
export const isAdminPresent = async () => {
|
||||||
const admin = await db.query.member.findFirst({
|
const admin = await db.query.member.findFirst({
|
||||||
where: eq(member.role, "owner"),
|
where: eq(member.role, "owner"),
|
||||||
@ -113,33 +105,6 @@ export const isAdminPresent = async () => {
|
|||||||
return true;
|
return true;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const findAdminByAuthId = async (authId: string) => {
|
|
||||||
const admin = await db.query.admins.findFirst({
|
|
||||||
where: eq(admins.authId, authId),
|
|
||||||
with: {
|
|
||||||
users: true,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
if (!admin) {
|
|
||||||
throw new TRPCError({
|
|
||||||
code: "NOT_FOUND",
|
|
||||||
message: "Admin not found",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
return admin;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const findAdmin = async () => {
|
|
||||||
const admin = await db.query.admins.findFirst({});
|
|
||||||
if (!admin) {
|
|
||||||
throw new TRPCError({
|
|
||||||
code: "NOT_FOUND",
|
|
||||||
message: "Admin not found",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
return admin;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getUserByToken = async (token: string) => {
|
export const getUserByToken = async (token: string) => {
|
||||||
// const user = await db.query.users.findFirst({
|
// const user = await db.query.users.findFirst({
|
||||||
// where: eq(users.token, token),
|
// where: eq(users.token, token),
|
||||||
@ -171,24 +136,6 @@ export const removeUserById = async (userId: string) => {
|
|||||||
.then((res) => res[0]);
|
.then((res) => res[0]);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const removeAdminByAuthId = async (authId: string) => {
|
|
||||||
const admin = await findAdminByAuthId(authId);
|
|
||||||
if (!admin) return null;
|
|
||||||
|
|
||||||
// First delete all associated users
|
|
||||||
const users = admin.users;
|
|
||||||
|
|
||||||
// for (const user of users) {
|
|
||||||
// await removeUserById(user.id);
|
|
||||||
// }
|
|
||||||
// Then delete the auth record which will cascade delete the admin
|
|
||||||
return await db
|
|
||||||
.delete(auth)
|
|
||||||
.where(eq(auth.id, authId))
|
|
||||||
.returning()
|
|
||||||
.then((res) => res[0]);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getDokployUrl = async () => {
|
export const getDokployUrl = async () => {
|
||||||
if (IS_CLOUD) {
|
if (IS_CLOUD) {
|
||||||
return "https://app.dokploy.com";
|
return "https://app.dokploy.com";
|
||||||
|
@ -10,6 +10,7 @@ import { TOTP } from "otpauth";
|
|||||||
import QRCode from "qrcode";
|
import QRCode from "qrcode";
|
||||||
import { IS_CLOUD } from "../constants";
|
import { IS_CLOUD } from "../constants";
|
||||||
import { findUserById } from "./admin";
|
import { findUserById } from "./admin";
|
||||||
|
import type { User } from "./user";
|
||||||
|
|
||||||
export const findAuthById = async (authId: string) => {
|
export const findAuthById = async (authId: string) => {
|
||||||
const result = await db.query.users_temp.findFirst({
|
const result = await db.query.users_temp.findFirst({
|
||||||
@ -51,11 +52,7 @@ export const generate2FASecret = async (userId: string) => {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
export const verify2FA = async (
|
export const verify2FA = async (auth: User, secret: string, pin: string) => {
|
||||||
auth: Omit<Auth, "password">,
|
|
||||||
secret: string,
|
|
||||||
pin: string,
|
|
||||||
) => {
|
|
||||||
const totp = new TOTP({
|
const totp = new TOTP({
|
||||||
issuer: "Dokploy",
|
issuer: "Dokploy",
|
||||||
label: `${auth?.email}`,
|
label: `${auth?.email}`,
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
import { findAdmin } from "@dokploy/server/services/admin";
|
|
||||||
import { getAllServers } from "@dokploy/server/services/server";
|
import { getAllServers } from "@dokploy/server/services/server";
|
||||||
import { scheduleJob } from "node-schedule";
|
import { scheduleJob } from "node-schedule";
|
||||||
import { db } from "../../db/index";
|
import { db } from "../../db/index";
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
import { existsSync, readFileSync, writeFileSync } from "node:fs";
|
import { existsSync, readFileSync, writeFileSync } from "node:fs";
|
||||||
import { join } from "node:path";
|
import { join } from "node:path";
|
||||||
import { paths } from "@dokploy/server/constants";
|
import { paths } from "@dokploy/server/constants";
|
||||||
|
import type { User } from "@dokploy/server/services/user";
|
||||||
import { dump, load } from "js-yaml";
|
import { dump, load } from "js-yaml";
|
||||||
import { loadOrCreateConfig, writeTraefikConfig } from "./application";
|
import { loadOrCreateConfig, writeTraefikConfig } from "./application";
|
||||||
import type { FileConfig } from "./file-types";
|
import type { FileConfig } from "./file-types";
|
||||||
import type { MainTraefikConfig } from "./types";
|
import type { MainTraefikConfig } from "./types";
|
||||||
import type { User } from "@dokploy/server/services/user";
|
|
||||||
|
|
||||||
export const updateServerTraefik = (
|
export const updateServerTraefik = (
|
||||||
user: User | null,
|
user: User | null,
|
||||||
|
Loading…
Reference in New Issue
Block a user