|
|
@@ -287,11 +287,10 @@ const validator = {
|
|
|
* description: local account automatically linked the email matched
|
|
|
*/
|
|
|
module.exports = (crowi) => {
|
|
|
- const loginRequiredStrictly = require('../../middleware/login-required')(crowi);
|
|
|
- const adminRequired = require('../../middleware/admin-required')(crowi);
|
|
|
- const csrf = require('../../middleware/csrf')(crowi);
|
|
|
-
|
|
|
- const { ApiV3FormValidator } = crowi.middlewares;
|
|
|
+ const loginRequiredStrictly = require('../../middlewares/login-required')(crowi);
|
|
|
+ const adminRequired = require('../../middlewares/admin-required')(crowi);
|
|
|
+ const csrf = require('../../middlewares/csrf')(crowi);
|
|
|
+ const apiV3FormValidator = require('../../middlewares/apiv3-form-validator')(crowi);
|
|
|
|
|
|
/**
|
|
|
* @swagger
|
|
|
@@ -435,7 +434,7 @@ module.exports = (crowi) => {
|
|
|
* type: object
|
|
|
* description: updated param
|
|
|
*/
|
|
|
- router.put('/authentication/enabled', loginRequiredStrictly, adminRequired, csrf, validator.authenticationSetting, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/authentication/enabled', loginRequiredStrictly, adminRequired, csrf, validator.authenticationSetting, apiV3FormValidator, async(req, res) => {
|
|
|
const { isEnabled, authId } = req.body;
|
|
|
|
|
|
let setupStrategies = await crowi.passportService.getSetupStrategies();
|
|
|
@@ -518,7 +517,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/GeneralSetting'
|
|
|
*/
|
|
|
- router.put('/general-setting', loginRequiredStrictly, adminRequired, csrf, validator.generalSetting, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/general-setting', loginRequiredStrictly, adminRequired, csrf, validator.generalSetting, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:restrictGuestMode': req.body.restrictGuestMode,
|
|
|
'security:pageCompleteDeletionAuthority': req.body.pageCompleteDeletionAuthority,
|
|
|
@@ -568,7 +567,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/LocalSetting'
|
|
|
*/
|
|
|
- router.put('/local-setting', loginRequiredStrictly, adminRequired, csrf, validator.localSetting, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/local-setting', loginRequiredStrictly, adminRequired, csrf, validator.localSetting, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:registrationMode': req.body.registrationMode,
|
|
|
'security:registrationWhiteList': req.body.registrationWhiteList,
|
|
|
@@ -610,7 +609,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/LdapAuthSetting'
|
|
|
*/
|
|
|
- router.put('/ldap', loginRequiredStrictly, adminRequired, csrf, validator.ldapAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/ldap', loginRequiredStrictly, adminRequired, csrf, validator.ldapAuth, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:passport-ldap:serverUrl': req.body.serverUrl,
|
|
|
'security:passport-ldap:isUserBind': req.body.isUserBind,
|
|
|
@@ -673,7 +672,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/SamlAuthSetting'
|
|
|
*/
|
|
|
- router.put('/saml', loginRequiredStrictly, adminRequired, csrf, validator.samlAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/saml', loginRequiredStrictly, adminRequired, csrf, validator.samlAuth, apiV3FormValidator, async(req, res) => {
|
|
|
|
|
|
// For the value of each mandatory items,
|
|
|
// check whether it from the environment variables is empty and form value to update it is empty
|
|
|
@@ -764,7 +763,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/OidcAuthSetting'
|
|
|
*/
|
|
|
- router.put('/oidc', loginRequiredStrictly, adminRequired, csrf, validator.oidcAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/oidc', loginRequiredStrictly, adminRequired, csrf, validator.oidcAuth, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:passport-oidc:providerName': req.body.oidcProviderName,
|
|
|
'security:passport-oidc:issuerHost': req.body.oidcIssuerHost,
|
|
|
@@ -823,7 +822,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/BasicAuthSetting'
|
|
|
*/
|
|
|
- router.put('/basic', loginRequiredStrictly, adminRequired, csrf, validator.basicAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/basic', loginRequiredStrictly, adminRequired, csrf, validator.basicAuth, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:passport-basic:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
|
|
|
};
|
|
|
@@ -864,7 +863,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/GoogleOAuthSetting'
|
|
|
*/
|
|
|
- router.put('/google-oauth', loginRequiredStrictly, adminRequired, csrf, validator.googleOAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/google-oauth', loginRequiredStrictly, adminRequired, csrf, validator.googleOAuth, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:passport-google:clientId': req.body.googleClientId,
|
|
|
'security:passport-google:clientSecret': req.body.googleClientSecret,
|
|
|
@@ -909,7 +908,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/GitHubOAuthSetting'
|
|
|
*/
|
|
|
- router.put('/github-oauth', loginRequiredStrictly, adminRequired, csrf, validator.githubOAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/github-oauth', loginRequiredStrictly, adminRequired, csrf, validator.githubOAuth, apiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
'security:passport-github:clientId': req.body.githubClientId,
|
|
|
'security:passport-github:clientSecret': req.body.githubClientSecret,
|
|
|
@@ -956,7 +955,7 @@ module.exports = (crowi) => {
|
|
|
* schema:
|
|
|
* $ref: '#/components/schemas/TwitterOAuthSetting'
|
|
|
*/
|
|
|
- router.put('/twitter-oauth', loginRequiredStrictly, adminRequired, csrf, validator.twitterOAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
+ router.put('/twitter-oauth', loginRequiredStrictly, adminRequired, csrf, validator.twitterOAuth, apiV3FormValidator, async(req, res) => {
|
|
|
|
|
|
let requestParams = {
|
|
|
'security:passport-twitter:consumerKey': req.body.twitterConsumerKey,
|