Merge in DNS/adguard-home from ADG-8368-typescript-node-18 to master Squashed commit of the following: commit daa288ae0d76178af24595cc807055902e6f09ab Merge:4c89cf7201085d59a6Author: Igor Lobanov <bniwredyc@gmail.com> Date: Mon Jun 10 17:22:20 2024 +0200 merge commit4c89cf7209Author: Ildar Kamalov <ik@adguard.com> Date: Thu Jun 6 13:27:18 2024 +0300 remove install from initial state commitb943f2011fAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 23:10:55 2024 +0200 frontend production build fix commitcd1be2d66dAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 20:23:14 2024 +0200 production build quickfix commit7b8ac01fc2Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Wed Jun 5 19:57:31 2024 +0300 all: upd node docker commit02afed66d5Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 18:23:12 2024 +0200 changelog fixes commit9c0f736f0cMerge:62c4fbf1ee04775c4fAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 18:18:29 2024 +0200 merge commit62c4fbf1e3Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 16:22:22 2024 +0200 empty line in changelog commit76b1e44a93Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 16:20:37 2024 +0200 changelog commitf783e90040Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 16:19:13 2024 +0200 filters.js -> filters.ts commit3d4ce6554cAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 16:18:03 2024 +0200 generated file removed commite35ba58f2aAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 15:45:21 2024 +0200 rollback unwanted changes commit1f30d4216dAuthor: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 15:27:36 2024 +0200 review fix commit6cd4e44f07Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 11:55:39 2024 +0200 missing generated file restoresd commit2ab738b303Author: Igor Lobanov <bniwredyc@gmail.com> Date: Wed Jun 5 11:40:32 2024 +0200 Frontend rewritten in TypeScript, added Node 18 support
90 lines
3.7 KiB
TypeScript
90 lines
3.7 KiB
TypeScript
import { createAction } from 'redux-actions';
|
|
import apiClient from '../api/Api';
|
|
|
|
import { redirectToCurrentProtocol } from '../helpers/helpers';
|
|
import { addErrorToast, addSuccessToast } from './toasts';
|
|
|
|
export const getTlsStatusRequest = createAction('GET_TLS_STATUS_REQUEST');
|
|
export const getTlsStatusFailure = createAction('GET_TLS_STATUS_FAILURE');
|
|
export const getTlsStatusSuccess = createAction('GET_TLS_STATUS_SUCCESS');
|
|
|
|
export const getTlsStatus = () => async (dispatch: any) => {
|
|
dispatch(getTlsStatusRequest());
|
|
try {
|
|
const status = await apiClient.getTlsStatus();
|
|
status.certificate_chain = atob(status.certificate_chain);
|
|
status.private_key = atob(status.private_key);
|
|
|
|
dispatch(getTlsStatusSuccess(status));
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(getTlsStatusFailure());
|
|
}
|
|
};
|
|
|
|
export const setTlsConfigRequest = createAction('SET_TLS_CONFIG_REQUEST');
|
|
export const setTlsConfigFailure = createAction('SET_TLS_CONFIG_FAILURE');
|
|
export const setTlsConfigSuccess = createAction('SET_TLS_CONFIG_SUCCESS');
|
|
export const dnsStatusSuccess = createAction('DNS_STATUS_SUCCESS');
|
|
|
|
export const setTlsConfig = (config: any) => async (dispatch: any, getState: any) => {
|
|
dispatch(setTlsConfigRequest());
|
|
try {
|
|
const { httpPort } = getState().dashboard;
|
|
const values = { ...config };
|
|
values.certificate_chain = btoa(values.certificate_chain);
|
|
values.private_key = btoa(values.private_key);
|
|
values.port_https = values.port_https || 0;
|
|
values.port_dns_over_tls = values.port_dns_over_tls || 0;
|
|
values.port_dns_over_quic = values.port_dns_over_quic || 0;
|
|
|
|
const response = await apiClient.setTlsConfig(values);
|
|
response.certificate_chain = atob(response.certificate_chain);
|
|
response.private_key = atob(response.private_key);
|
|
|
|
if (values.enabled && values.force_https && window.location.protocol === 'http:') {
|
|
window.location.reload();
|
|
return;
|
|
}
|
|
redirectToCurrentProtocol(response, httpPort);
|
|
|
|
const dnsStatus = await apiClient.getGlobalStatus();
|
|
if (dnsStatus) {
|
|
if (dnsStatus.protection_disabled_duration === 0) {
|
|
dnsStatus.protection_disabled_duration = null;
|
|
}
|
|
dispatch(dnsStatusSuccess(dnsStatus));
|
|
}
|
|
|
|
dispatch(setTlsConfigSuccess(response));
|
|
dispatch(addSuccessToast('encryption_config_saved'));
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(setTlsConfigFailure());
|
|
}
|
|
};
|
|
|
|
export const validateTlsConfigRequest = createAction('VALIDATE_TLS_CONFIG_REQUEST');
|
|
export const validateTlsConfigFailure = createAction('VALIDATE_TLS_CONFIG_FAILURE');
|
|
export const validateTlsConfigSuccess = createAction('VALIDATE_TLS_CONFIG_SUCCESS');
|
|
|
|
export const validateTlsConfig = (config: any) => async (dispatch: any) => {
|
|
dispatch(validateTlsConfigRequest());
|
|
try {
|
|
const values = { ...config };
|
|
values.certificate_chain = btoa(values.certificate_chain);
|
|
values.private_key = btoa(values.private_key);
|
|
values.port_https = values.port_https || 0;
|
|
values.port_dns_over_tls = values.port_dns_over_tls || 0;
|
|
values.port_dns_over_quic = values.port_dns_over_quic || 0;
|
|
|
|
const response = await apiClient.validateTlsConfig(values);
|
|
response.certificate_chain = atob(response.certificate_chain);
|
|
response.private_key = atob(response.private_key);
|
|
dispatch(validateTlsConfigSuccess(response));
|
|
} catch (error) {
|
|
dispatch(addErrorToast({ error }));
|
|
dispatch(validateTlsConfigFailure());
|
|
}
|
|
};
|