diff --git a/.version b/.version
index 9183195..fad066f 100644
--- a/.version
+++ b/.version
@@ -1 +1 @@
-2.4.0
\ No newline at end of file
+2.5.0
\ No newline at end of file
diff --git a/README.md b/README.md
index 62bf6af..b82e515 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,7 @@
diff --git a/frontend/js/app/nginx/certificates/form.js b/frontend/js/app/nginx/certificates/form.js
index b2631df..53a6e14 100644
--- a/frontend/js/app/nginx/certificates/form.js
+++ b/frontend/js/app/nginx/certificates/form.js
@@ -13,25 +13,39 @@ module.exports = Mn.View.extend({
max_file_size: 102400,
ui: {
- form: 'form',
- domain_names: 'input[name="domain_names"]',
- buttons: '.modal-footer button',
- cancel: 'button.cancel',
- save: 'button.save',
- other_certificate: '#other_certificate',
- other_certificate_label: '#other_certificate_label',
- other_certificate_key: '#other_certificate_key',
- other_certificate_key_label: '#other_certificate_key_label',
- other_intermediate_certificate: '#other_intermediate_certificate',
+ form: 'form',
+ domain_names: 'input[name="domain_names"]',
+ buttons: '.modal-footer button',
+ cancel: 'button.cancel',
+ save: 'button.save',
+ other_certificate: '#other_certificate',
+ other_certificate_label: '#other_certificate_label',
+ other_certificate_key: '#other_certificate_key',
+ cloudflare_switch: 'input[name="meta[cloudflare_use]"]',
+ cloudflare_token: 'input[name="meta[cloudflare_token]"',
+ cloudflare: '.cloudflare',
+ other_certificate_key_label: '#other_certificate_key_label',
+ other_intermediate_certificate: '#other_intermediate_certificate',
other_intermediate_certificate_label: '#other_intermediate_certificate_label'
},
events: {
+ 'change @ui.cloudflare_switch': function() {
+ let checked = this.ui.cloudflare_switch.prop('checked');
+ if (checked) {
+ this.ui.cloudflare_token.prop('required', 'required');
+ this.ui.cloudflare.show();
+ } else {
+ this.ui.cloudflare_token.prop('required', false);
+ this.ui.cloudflare.hide();
+ }
+ },
'click @ui.save': function (e) {
e.preventDefault();
if (!this.ui.form[0].checkValidity()) {
$(' ').hide().appendTo(this.ui.form).click().remove();
+ $(this).removeClass('btn-loading');
return;
}
@@ -39,10 +53,29 @@ module.exports = Mn.View.extend({
let data = this.ui.form.serializeJSON();
data.provider = this.model.get('provider');
+
+
+ let domain_err = false;
+ if (!data.meta.cloudflare_use) {
+ data.domain_names.split(',').map(function (name) {
+ if (name.match(/\*/im)) {
+ domain_err = true;
+ }
+ });
+ }
+
+ if (domain_err) {
+ alert('Cannot request Let\'s Encrypt Certificate for wildcard domains when not using CloudFlare DNS');
+ return;
+ }
+
// Manipulate
if (typeof data.meta !== 'undefined' && typeof data.meta.letsencrypt_agree !== 'undefined') {
data.meta.letsencrypt_agree = !!data.meta.letsencrypt_agree;
}
+ if (typeof data.meta !== 'undefined' && typeof data.meta.cloudflare_use !== 'undefined') {
+ data.meta.cloudflare_use = !!data.meta.cloudflare_use;
+ }
if (typeof data.domain_names === 'string' && data.domain_names) {
data.domain_names = data.domain_names.split(',');
@@ -84,6 +117,7 @@ module.exports = Mn.View.extend({
}
this.ui.buttons.prop('disabled', true).addClass('btn-disabled');
+ this.ui.save.addClass('btn-loading');
// compile file data
let form_data = new FormData();
@@ -122,6 +156,7 @@ module.exports = Mn.View.extend({
.catch(err => {
alert(err.message);
this.ui.buttons.prop('disabled', false).removeClass('btn-disabled');
+ this.ui.save.removeClass('btn-loading');
});
},
'change @ui.other_certificate_key': function(e){
@@ -144,6 +179,10 @@ module.exports = Mn.View.extend({
getLetsencryptAgree: function () {
return typeof this.meta.letsencrypt_agree !== 'undefined' ? this.meta.letsencrypt_agree : false;
+ },
+
+ getCloudflareUse: function () {
+ return typeof this.meta.cloudflare_use !== 'undefined' ? this.meta.cloudflare_use : false;
}
},
@@ -158,8 +197,9 @@ module.exports = Mn.View.extend({
text: input
};
},
- createFilter: /^(?:[^.*]+\.?)+[^.]$/
+ createFilter: /^(?:[^.]+\.?)+[^.]$/
});
+ this.ui.cloudflare.hide();
},
initialize: function (options) {
diff --git a/frontend/js/app/nginx/certificates/list/item.ejs b/frontend/js/app/nginx/certificates/list/item.ejs
index e7ee216..857a08b 100644
--- a/frontend/js/app/nginx/certificates/list/item.ejs
+++ b/frontend/js/app/nginx/certificates/list/item.ejs
@@ -28,7 +28,7 @@
- <%- i18n('ssl', provider) %>
+ <%- i18n('ssl', provider) %><% if (meta.cloudflare_use) { %> - CloudFlare DNS<% } %>
<%- formatDbDate(expires_on, 'Do MMMM YYYY, h:mm a') %>
diff --git a/frontend/js/app/nginx/dead/form.ejs b/frontend/js/app/nginx/dead/form.ejs
index f94d2cc..d48820f 100644
--- a/frontend/js/app/nginx/dead/form.ejs
+++ b/frontend/js/app/nginx/dead/form.ejs
@@ -73,6 +73,23 @@
+
+
+
+
+
+
+ <%= i18n('ssl', 'use-cloudflare') %>
+
+
+
+
+
+ CloudFlare DNS API Token *
+
+
+
+
diff --git a/frontend/js/app/nginx/dead/form.js b/frontend/js/app/nginx/dead/form.js
index 4d7ef6b..aca367a 100644
--- a/frontend/js/app/nginx/dead/form.js
+++ b/frontend/js/app/nginx/dead/form.js
@@ -23,6 +23,9 @@ module.exports = Mn.View.extend({
hsts_enabled: 'input[name="hsts_enabled"]',
hsts_subdomains: 'input[name="hsts_subdomains"]',
http2_support: 'input[name="http2_support"]',
+ cloudflare_switch: 'input[name="meta[cloudflare_use]"]',
+ cloudflare_token: 'input[name="meta[cloudflare_token]"',
+ cloudflare: '.cloudflare',
letsencrypt: '.letsencrypt'
},
@@ -31,10 +34,12 @@ module.exports = Mn.View.extend({
let id = this.ui.certificate_select.val();
if (id === 'new') {
this.ui.letsencrypt.show().find('input').prop('disabled', false);
+ this.ui.cloudflare.hide();
} else {
this.ui.letsencrypt.hide().find('input').prop('disabled', true);
}
+
let enabled = id === 'new' || parseInt(id, 10) > 0;
let inputs = this.ui.ssl_forced.add(this.ui.http2_support);
@@ -76,6 +81,17 @@ module.exports = Mn.View.extend({
}
},
+ 'change @ui.cloudflare_switch': function() {
+ let checked = this.ui.cloudflare_switch.prop('checked');
+ if (checked) {
+ this.ui.cloudflare_token.prop('required', 'required');
+ this.ui.cloudflare.show();
+ } else {
+ this.ui.cloudflare_token.prop('required', false);
+ this.ui.cloudflare.hide();
+ }
+ },
+
'click @ui.save': function (e) {
e.preventDefault();
@@ -98,20 +114,23 @@ module.exports = Mn.View.extend({
}
// Check for any domain names containing wildcards, which are not allowed with letsencrypt
- if (data.certificate_id === 'new') {
+ if (data.certificate_id === 'new') {
let domain_err = false;
- data.domain_names.map(function (name) {
- if (name.match(/\*/im)) {
- domain_err = true;
- }
- });
+ if (!data.meta.cloudflare_use) {
+ data.domain_names.map(function (name) {
+ if (name.match(/\*/im)) {
+ domain_err = true;
+ }
+ });
+ }
if (domain_err) {
- alert('Cannot request Let\'s Encrypt Certificate for wildcard domains');
+ alert('Cannot request Let\'s Encrypt Certificate for wildcard domains without CloudFlare DNS.');
return;
}
- data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
+ data.meta.cloudflare_use = data.meta.cloudflare_use === '1';
+ data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
} else {
data.certificate_id = parseInt(data.certificate_id, 10);
}
@@ -127,6 +146,8 @@ module.exports = Mn.View.extend({
}
this.ui.buttons.prop('disabled', true).addClass('btn-disabled');
+ this.ui.save.addClass('btn-loading');
+
method(data)
.then(result => {
view.model.set(result);
@@ -140,6 +161,7 @@ module.exports = Mn.View.extend({
.catch(err => {
alert(err.message);
this.ui.buttons.prop('disabled', false).removeClass('btn-disabled');
+ this.ui.save.removeClass('btn-loading');
});
}
},
diff --git a/frontend/js/app/nginx/proxy/form.ejs b/frontend/js/app/nginx/proxy/form.ejs
index 0cc0d54..e003597 100644
--- a/frontend/js/app/nginx/proxy/form.ejs
+++ b/frontend/js/app/nginx/proxy/form.ejs
@@ -141,6 +141,23 @@
+
+
+
+
+
+
+ <%= i18n('ssl', 'use-cloudflare') %>
+
+
+
+
+
+ CloudFlare DNS API Token *
+
+
+
+
diff --git a/frontend/js/app/nginx/proxy/form.js b/frontend/js/app/nginx/proxy/form.js
index eb93bc8..0f64281 100644
--- a/frontend/js/app/nginx/proxy/form.js
+++ b/frontend/js/app/nginx/proxy/form.js
@@ -33,6 +33,9 @@ module.exports = Mn.View.extend({
hsts_enabled: 'input[name="hsts_enabled"]',
hsts_subdomains: 'input[name="hsts_subdomains"]',
http2_support: 'input[name="http2_support"]',
+ cloudflare_switch: 'input[name="meta[cloudflare_use]"]',
+ cloudflare_token: 'input[name="meta[cloudflare_token]"',
+ cloudflare: '.cloudflare',
forward_scheme: 'select[name="forward_scheme"]',
letsencrypt: '.letsencrypt'
},
@@ -46,6 +49,7 @@ module.exports = Mn.View.extend({
let id = this.ui.certificate_select.val();
if (id === 'new') {
this.ui.letsencrypt.show().find('input').prop('disabled', false);
+ this.ui.cloudflare.hide();
} else {
this.ui.letsencrypt.hide().find('input').prop('disabled', true);
}
@@ -91,6 +95,17 @@ module.exports = Mn.View.extend({
}
},
+ 'change @ui.cloudflare_switch': function() {
+ let checked = this.ui.cloudflare_switch.prop('checked');
+ if (checked) {
+ this.ui.cloudflare_token.prop('required', 'required');
+ this.ui.cloudflare.show();
+ } else {
+ this.ui.cloudflare_token.prop('required', false);
+ this.ui.cloudflare.hide();
+ }
+ },
+
'click @ui.add_location_btn': function (e) {
e.preventDefault();
@@ -134,20 +149,23 @@ module.exports = Mn.View.extend({
}
// Check for any domain names containing wildcards, which are not allowed with letsencrypt
- if (data.certificate_id === 'new') {
+ if (data.certificate_id === 'new') {
let domain_err = false;
- data.domain_names.map(function (name) {
- if (name.match(/\*/im)) {
- domain_err = true;
- }
- });
+ if (!data.meta.cloudflare_use) {
+ data.domain_names.map(function (name) {
+ if (name.match(/\*/im)) {
+ domain_err = true;
+ }
+ });
+ }
if (domain_err) {
- alert('Cannot request Let\'s Encrypt Certificate for wildcard domains');
+ alert('Cannot request Let\'s Encrypt Certificate for wildcard domains without CloudFlare DNS.');
return;
}
- data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
+ data.meta.cloudflare_use = data.meta.cloudflare_use === '1';
+ data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
} else {
data.certificate_id = parseInt(data.certificate_id, 10);
}
@@ -163,6 +181,8 @@ module.exports = Mn.View.extend({
}
this.ui.buttons.prop('disabled', true).addClass('btn-disabled');
+ this.ui.save.addClass('btn-loading');
+
method(data)
.then(result => {
view.model.set(result);
@@ -176,6 +196,7 @@ module.exports = Mn.View.extend({
.catch(err => {
alert(err.message);
this.ui.buttons.prop('disabled', false).removeClass('btn-disabled');
+ this.ui.save.removeClass('btn-loading');
});
}
},
@@ -203,7 +224,7 @@ module.exports = Mn.View.extend({
text: input
};
},
- createFilter: /^(?:\*\.)?(?:[^.*]+\.?)+[^.]$/
+ createFilter: /^(?:\.)?(?:[^.*]+\.?)+[^.]$/
});
// Access Lists
diff --git a/frontend/js/app/nginx/redirection/form.ejs b/frontend/js/app/nginx/redirection/form.ejs
index 7cdb8a3..7d49769 100644
--- a/frontend/js/app/nginx/redirection/form.ejs
+++ b/frontend/js/app/nginx/redirection/form.ejs
@@ -97,6 +97,23 @@
+
+
+
+
+
+
+ <%= i18n('ssl', 'use-cloudflare') %>
+
+
+
+
+
+ CloudFlare DNS API Token *
+
+
+
+
diff --git a/frontend/js/app/nginx/redirection/form.js b/frontend/js/app/nginx/redirection/form.js
index 0cef1a3..4e5b168 100644
--- a/frontend/js/app/nginx/redirection/form.js
+++ b/frontend/js/app/nginx/redirection/form.js
@@ -23,6 +23,9 @@ module.exports = Mn.View.extend({
hsts_enabled: 'input[name="hsts_enabled"]',
hsts_subdomains: 'input[name="hsts_subdomains"]',
http2_support: 'input[name="http2_support"]',
+ cloudflare_switch: 'input[name="meta[cloudflare_use]"]',
+ cloudflare_token: 'input[name="meta[cloudflare_token]"',
+ cloudflare: '.cloudflare',
letsencrypt: '.letsencrypt'
},
@@ -31,6 +34,7 @@ module.exports = Mn.View.extend({
let id = this.ui.certificate_select.val();
if (id === 'new') {
this.ui.letsencrypt.show().find('input').prop('disabled', false);
+ this.ui.cloudflare.hide();
} else {
this.ui.letsencrypt.hide().find('input').prop('disabled', true);
}
@@ -76,6 +80,17 @@ module.exports = Mn.View.extend({
}
},
+ 'change @ui.cloudflare_switch': function() {
+ let checked = this.ui.cloudflare_switch.prop('checked');
+ if (checked) {
+ this.ui.cloudflare_token.prop('required', 'required');
+ this.ui.cloudflare.show();
+ } else {
+ this.ui.cloudflare_token.prop('required', false);
+ this.ui.cloudflare.hide();
+ }
+ },
+
'click @ui.save': function (e) {
e.preventDefault();
@@ -100,20 +115,23 @@ module.exports = Mn.View.extend({
}
// Check for any domain names containing wildcards, which are not allowed with letsencrypt
- if (data.certificate_id === 'new') {
+ if (data.certificate_id === 'new') {
let domain_err = false;
- data.domain_names.map(function (name) {
- if (name.match(/\*/im)) {
- domain_err = true;
- }
- });
+ if (!data.meta.cloudflare_use) {
+ data.domain_names.map(function (name) {
+ if (name.match(/\*/im)) {
+ domain_err = true;
+ }
+ });
+ }
if (domain_err) {
- alert('Cannot request Let\'s Encrypt Certificate for wildcard domains');
+ alert('Cannot request Let\'s Encrypt Certificate for wildcard domains without CloudFlare DNS.');
return;
}
- data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
+ data.meta.cloudflare_use = data.meta.cloudflare_use === '1';
+ data.meta.letsencrypt_agree = data.meta.letsencrypt_agree === '1';
} else {
data.certificate_id = parseInt(data.certificate_id, 10);
}
@@ -129,6 +147,8 @@ module.exports = Mn.View.extend({
}
this.ui.buttons.prop('disabled', true).addClass('btn-disabled');
+ this.ui.save.addClass('btn-loading');
+
method(data)
.then(result => {
view.model.set(result);
@@ -142,6 +162,7 @@ module.exports = Mn.View.extend({
.catch(err => {
alert(err.message);
this.ui.buttons.prop('disabled', false).removeClass('btn-disabled');
+ this.ui.save.removeClass('btn-loading');
});
}
},
diff --git a/frontend/js/i18n/messages.json b/frontend/js/i18n/messages.json
index 7b5205a..d0c9d8e 100644
--- a/frontend/js/i18n/messages.json
+++ b/frontend/js/i18n/messages.json
@@ -101,7 +101,8 @@
"letsencrypt-email": "Email Address for Let's Encrypt",
"letsencrypt-agree": "I Agree to the
Let's Encrypt Terms of Service ",
"delete-ssl": "The SSL certificates attached will NOT be removed, they will need to be removed manually.",
- "hosts-warning": "These domains must be already configured to point to this installation"
+ "hosts-warning": "These domains must be already configured to point to this installation",
+ "use-cloudflare": "Use CloudFlare DNS verification"
},
"proxy-hosts": {
"title": "Proxy Hosts",