Updates #4642
Squashed commit of the following:
commit 75729120d3532dc2bd12b6c9e724a691043a1870
Merge: 5b681867 1c1ca1c6
Author: Ildar Kamalov <ik@adguard.com>
Date: Thu Jun 9 11:58:13 2022 +0300
Merge branch 'master' into 4642-dns-privacy
commit 5b68186705c3a9287a44e33c8cf7ab79060f35a4
Author: Ildar Kamalov <ik@adguard.com>
Date: Tue Jun 7 18:39:02 2022 +0300
fix
commit 46a9346154d33206e829a97021f3ef47ac2a5611
Author: Ildar Kamalov <ik@adguard.com>
Date: Tue Jun 7 18:18:18 2022 +0300
client: update dns addresses on encryption update
81 lines
3.3 KiB
JavaScript
81 lines
3.3 KiB
JavaScript
import { createAction } from 'redux-actions';
|
|
import apiClient from '../api/Api';
|
|
import { redirectToCurrentProtocol } from '../helpers/helpers';
|
|
import { addErrorToast, addSuccessToast } from './toasts';
|
|
|
|
export const getTlsStatusRequest = createAction('GET_TLS_STATUS_REQUEST');
|
|
export const getTlsStatusFailure = createAction('GET_TLS_STATUS_FAILURE');
|
|
export const getTlsStatusSuccess = createAction('GET_TLS_STATUS_SUCCESS');
|
|
|
|
export const getTlsStatus = () => async (dispatch) => {
|
|
dispatch(getTlsStatusRequest());
|
|
try {
|
|
const status = await apiClient.getTlsStatus();
|
|
status.certificate_chain = atob(status.certificate_chain);
|
|
status.private_key = atob(status.private_key);
|
|
|
|
dispatch(getTlsStatusSuccess(status));
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(getTlsStatusFailure());
|
|
}
|
|
};
|
|
|
|
export const setTlsConfigRequest = createAction('SET_TLS_CONFIG_REQUEST');
|
|
export const setTlsConfigFailure = createAction('SET_TLS_CONFIG_FAILURE');
|
|
export const setTlsConfigSuccess = createAction('SET_TLS_CONFIG_SUCCESS');
|
|
export const dnsStatusSuccess = createAction('DNS_STATUS_SUCCESS');
|
|
|
|
export const setTlsConfig = (config) => async (dispatch, getState) => {
|
|
dispatch(setTlsConfigRequest());
|
|
try {
|
|
const { httpPort } = getState().dashboard;
|
|
const values = { ...config };
|
|
values.certificate_chain = btoa(values.certificate_chain);
|
|
values.private_key = btoa(values.private_key);
|
|
values.port_https = values.port_https || 0;
|
|
values.port_dns_over_tls = values.port_dns_over_tls || 0;
|
|
values.port_dns_over_quic = values.port_dns_over_quic || 0;
|
|
|
|
const response = await apiClient.setTlsConfig(values);
|
|
response.certificate_chain = atob(response.certificate_chain);
|
|
response.private_key = atob(response.private_key);
|
|
|
|
const dnsStatus = await apiClient.getGlobalStatus();
|
|
if (dnsStatus) {
|
|
dispatch(dnsStatusSuccess(dnsStatus));
|
|
}
|
|
|
|
dispatch(setTlsConfigSuccess(response));
|
|
dispatch(addSuccessToast('encryption_config_saved'));
|
|
redirectToCurrentProtocol(response, httpPort);
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(setTlsConfigFailure());
|
|
}
|
|
};
|
|
|
|
export const validateTlsConfigRequest = createAction('VALIDATE_TLS_CONFIG_REQUEST');
|
|
export const validateTlsConfigFailure = createAction('VALIDATE_TLS_CONFIG_FAILURE');
|
|
export const validateTlsConfigSuccess = createAction('VALIDATE_TLS_CONFIG_SUCCESS');
|
|
|
|
export const validateTlsConfig = (config) => async (dispatch) => {
|
|
dispatch(validateTlsConfigRequest());
|
|
try {
|
|
const values = { ...config };
|
|
values.certificate_chain = btoa(values.certificate_chain);
|
|
values.private_key = btoa(values.private_key);
|
|
values.port_https = values.port_https || 0;
|
|
values.port_dns_over_tls = values.port_dns_over_tls || 0;
|
|
values.port_dns_over_quic = values.port_dns_over_quic || 0;
|
|
|
|
const response = await apiClient.validateTlsConfig(values);
|
|
response.certificate_chain = atob(response.certificate_chain);
|
|
response.private_key = atob(response.private_key);
|
|
dispatch(validateTlsConfigSuccess(response));
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(validateTlsConfigFailure());
|
|
}
|
|
};
|