Add multi-provider DNS registry for ACME DNS-01 challenges

Replace hardcoded Cloudflare DNS-01 with a data-driven provider registry
supporting 11 providers (Cloudflare, Route 53, DigitalOcean, Duck DNS,
Hetzner, Vultr, Porkbun, GoDaddy, Namecheap, OVH, Linode). Users can
configure multiple providers with encrypted credentials and select a
default. Per-certificate provider override is supported via providerOptions.

- Add src/lib/dns-providers.ts with provider definitions, credential
  encrypt/decrypt, and Caddy config builder
- Change DnsProviderSettings to multi-provider format with default selection
- Auto-migrate legacy Cloudflare settings on startup (db.ts)
- Normalize old single-provider format on read (getDnsProviderSettings)
- Refactor buildTlsAutomation() to use provider registry
- Add GET /api/v1/dns-providers endpoint for provider discovery
- Add dns-provider settings group to REST API and instance sync
- Replace Cloudflare settings card with multi-provider UI (add/remove
  providers, set default, dynamic credential forms)
- Add 10 DNS provider modules to Caddy Dockerfile
- Update OpenAPI spec, E2E tests, and unit test mocks

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
fuomag9
2026-04-17 18:01:16 +02:00
parent 60633bf6c3
commit 2c70f2859a
15 changed files with 726 additions and 111 deletions
+50
View File
@@ -252,9 +252,59 @@ function runEnvProviderSync() {
}
}
/**
* One-time migration: convert legacy Cloudflare DNS settings to the new
* generic dns_provider format. Idempotent — skips if already run or if
* the new setting already exists.
*/
function runCloudflareToProviderMigration() {
if (sqlitePath === ":memory:") return;
const { settings: settingsTable } = schema;
// Skip if migration already ran
const flag = db.select().from(settingsTable).where(eq(settingsTable.key, "dns_provider_migrated")).get();
if (flag) return;
// Skip if new dns_provider setting already exists (user already configured it)
const existing = db.select().from(settingsTable).where(eq(settingsTable.key, "dns_provider")).get();
if (existing) {
const now = new Date().toISOString();
db.insert(settingsTable).values({ key: "dns_provider_migrated", value: "true", updatedAt: now }).run();
return;
}
// Check for legacy cloudflare setting
const cfRow = db.select().from(settingsTable).where(eq(settingsTable.key, "cloudflare")).get();
if (!cfRow) {
const now = new Date().toISOString();
db.insert(settingsTable).values({ key: "dns_provider_migrated", value: "true", updatedAt: now }).run();
return;
}
try {
const cf = JSON.parse(cfRow.value) as { apiToken?: string; zoneId?: string; accountId?: string };
if (cf.apiToken) {
const now = new Date().toISOString();
const newSetting = {
providers: { cloudflare: { api_token: cf.apiToken } },
default: "cloudflare",
};
db.insert(settingsTable).values({ key: "dns_provider", value: JSON.stringify(newSetting), updatedAt: now }).run();
console.log("Migrated legacy Cloudflare DNS settings to dns_provider format");
}
} catch (e) {
console.warn("Failed to parse legacy cloudflare setting during migration:", e);
}
const now = new Date().toISOString();
db.insert(settingsTable).values({ key: "dns_provider_migrated", value: "true", updatedAt: now }).run();
}
try {
runBetterAuthDataMigration();
runEnvProviderSync();
runCloudflareToProviderMigration();
} catch (error) {
console.warn("Better Auth data migration warning:", error);
}