|
|
@@ -70,7 +70,6 @@ const validator = {
|
|
|
body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
|
|
|
],
|
|
|
twitterOAuth: [
|
|
|
- body('isTwitterOAuthEnabled').isBoolean(),
|
|
|
body('twitterConsumerKey').isString(),
|
|
|
body('twitterConsumerSecret').isString(),
|
|
|
body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
|
|
|
@@ -309,6 +308,7 @@ module.exports = (crowi) => {
|
|
|
ldapGroupDnProperty: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupDnProperty'),
|
|
|
},
|
|
|
samlAuth: {
|
|
|
+ missingMandatoryConfigKeys: await crowi.passportService.getSamlMissingMandatoryConfigKeys(),
|
|
|
samlEntryPoint: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:entryPoint'),
|
|
|
samlEnvVarEntryPoint: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:entryPoint'),
|
|
|
samlIssuer: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:issuer'),
|
|
|
@@ -509,6 +509,7 @@ module.exports = (crowi) => {
|
|
|
try {
|
|
|
await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
|
|
|
const securitySettingParams = {
|
|
|
+ missingMandatoryConfigKeys: await crowi.passportService.getSamlMissingMandatoryConfigKeys(),
|
|
|
samlEntryPoint: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:entryPoint'),
|
|
|
samlIssuer: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:issuer'),
|
|
|
samlCert: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:cert'),
|
|
|
@@ -738,7 +739,6 @@ module.exports = (crowi) => {
|
|
|
*/
|
|
|
router.put('/twitter-oauth', loginRequiredStrictly, adminRequired, csrf, validator.twitterOAuth, ApiV3FormValidator, async(req, res) => {
|
|
|
const requestParams = {
|
|
|
- 'security:passport-twitter:isEnabled': req.body.isTwitterOAuthEnabled,
|
|
|
'security:passport-twitter:consumerKey': req.body.twitterConsumerKey,
|
|
|
'security:passport-twitter:consumerSecret': req.body.twitterConsumerSecret,
|
|
|
'security:passport-twitter:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
|
|
|
@@ -751,17 +751,18 @@ module.exports = (crowi) => {
|
|
|
twitterConsumerSecret: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:consumerSecret'),
|
|
|
isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:isSameUsernameTreatedAsIdenticalUser'),
|
|
|
};
|
|
|
+<<<<<<< HEAD
|
|
|
// reset strategy
|
|
|
await crowi.passportService.resetTwitterStrategy();
|
|
|
// setup strategy
|
|
|
if (crowi.configManager.getConfig('crowi', 'security:passport-twitter:isEnabled')) {
|
|
|
await crowi.passportService.setupTwitterStrategy(true);
|
|
|
}
|
|
|
+=======
|
|
|
+>>>>>>> reactify-admin/security
|
|
|
return res.apiv3({ securitySettingParams });
|
|
|
}
|
|
|
catch (err) {
|
|
|
- // reset
|
|
|
- await crowi.passportService.resetTwitterStrategy();
|
|
|
const msg = 'Error occurred in updating twitterOAuth';
|
|
|
logger.error('Error', err);
|
|
|
return res.apiv3Err(new ErrorV3(msg, 'update-twitterOAuth-failed'));
|