security-setting.js 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772
  1. /* eslint-disable max-len */
  2. /* eslint-disable no-unused-vars */
  3. const loggerFactory = require('@alias/logger');
  4. const logger = loggerFactory('growi:routes:apiv3:security-setting');
  5. const express = require('express');
  6. const router = express.Router();
  7. const { body } = require('express-validator/check');
  8. const ErrorV3 = require('../../models/vo/error-apiv3');
  9. const validator = {
  10. // TODO correct validator
  11. generalSetting: [
  12. body('restrictGuestMode').isString(),
  13. body('pageCompleteDeletionAuthority').isString(),
  14. body('hideRestrictedByOwner').isBoolean(),
  15. body('hideRestrictedByGroup').isBoolean(),
  16. ],
  17. ldapAuth: [
  18. body('serverUrl').isString(),
  19. body('isUserBind').isBoolean(),
  20. body('ldapBindDN').isString(),
  21. body('ldapBindDNPassword').isString(),
  22. body('ldapSearchFilter').isString(),
  23. body('ldapAttrMapUsername').isString(),
  24. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  25. body('ldapAttrMapMail').isString(),
  26. body('ldapAttrMapName').isString(),
  27. body('ldapGroupSearchBase').isString(),
  28. body('ldapGroupSearchFilter').isString(),
  29. body('ldapGroupDnProperty').isString(),
  30. ],
  31. samlAuth: [
  32. body('samlEntryPoint').isString(),
  33. body('samlIssuer').isString(),
  34. body('samlCert').isString(),
  35. body('samlAttrMapId').isString(),
  36. body('samlAttrMapUserName').isString(),
  37. body('samlAttrMapMail').isString(),
  38. body('samlAttrMapFirstName').isString(),
  39. body('samlAttrMapLastName').isString(),
  40. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  41. body('isSameEmailTreatedAsIdenticalUser').isBoolean(),
  42. ],
  43. oidcAuth: [
  44. body('oidcProviderName').isString(),
  45. body('oidcIssuerHost').isString(),
  46. body('oidcClientId').isString(),
  47. body('oidcClientSecret').isString(),
  48. body('oidcAttrMapId').isString(),
  49. body('oidcAttrMapUserName').isString(),
  50. body('oidcAttrMapEmail').isString(),
  51. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  52. body('isSameEmailTreatedAsIdenticalUser').isBoolean(),
  53. ],
  54. basicAuth: [
  55. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  56. ],
  57. googleOAuth: [
  58. body('googleClientId').isString(),
  59. body('googleClientSecret').isString(),
  60. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  61. ],
  62. githubOAuth: [
  63. body('githubClientId').isString(),
  64. body('githubClientSecret').isString(),
  65. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  66. ],
  67. twitterOAuth: [
  68. body('twitterConsumerKey').isString(),
  69. body('twitterConsumerSecret').isString(),
  70. body('isSameUsernameTreatedAsIdenticalUser').isBoolean(),
  71. ],
  72. };
  73. /**
  74. * @swagger
  75. * tags:
  76. * name: SecuritySetting
  77. */
  78. /**
  79. * @swagger
  80. *
  81. * components:
  82. * schemas:
  83. * GeneralSetting:
  84. * type:object
  85. * GuestModeParams:
  86. * type: object
  87. * properties:
  88. * restrictGuestMode:
  89. * type: string
  90. * description: type of restrictGuestMode
  91. * PageDeletionParams:
  92. * type: object
  93. * properties:
  94. * pageCompleteDeletionAuthority:
  95. * type: string
  96. * description: type of pageDeletionAuthority
  97. * Function:
  98. * type: object
  99. * properties:
  100. * hideRestrictedByOwner:
  101. * type: boolean
  102. * description: enable hide by owner
  103. * hideRestrictedByGroup:
  104. * type: boolean
  105. * description: enable hide by group
  106. * LdapAuthSetting:
  107. * type:object
  108. * serverUrl:
  109. * type: string
  110. * description: server url for ldap
  111. * isUserBind:
  112. * type: boolean
  113. * description: enable user bind
  114. * ldapBindDN:
  115. * type: string
  116. * description: the query used to bind with the directory service
  117. * ldapBindDNPassword:
  118. * type: string
  119. * description: the password that is entered in the login page will be used to bind
  120. * ldapSearchFilter:
  121. * type: string
  122. * description: the query used to locate the authenticated user
  123. * ldapAttrMapUsername:
  124. * type: string
  125. * description: specification of mappings for username when creating new users
  126. * isSameUsernameTreatedAsIdenticalUser:
  127. * type: boolean
  128. * description: local account automatically linked the user name matched
  129. * ldapAttrMapMail:
  130. * type: string
  131. * description: specification of mappings for mail address when creating new users
  132. * ldapAttrMapName:
  133. * type: string
  134. * description: Specification of mappings for full name address when creating new users
  135. * ldapGroupSearchBase:
  136. * type: string
  137. * description: the base DN from which to search for groups.
  138. * ldapGroupSearchFilter:
  139. * type: string
  140. * description: the query used to filter for groups
  141. * ldapGroupDnProperty:
  142. * type: string
  143. * description: The property of user object to use in dn interpolation of Group Search Filter
  144. * SamlAuthSetting:
  145. * type:object
  146. * samlEntryPoint:
  147. * type: string
  148. * description: entry point for saml
  149. * samlIssuer:
  150. * type: string
  151. * description: issuer for saml
  152. * samlCert:
  153. * type: string
  154. * description: certificate for saml
  155. * samlAttrMapId:
  156. * type: string
  157. * description: attribute mapping id for saml
  158. * samlAttrMapUserName:
  159. * type: string
  160. * description: attribute mapping user name for saml
  161. * samlAttrMapMail:
  162. * type: string
  163. * description: attribute mapping mail for saml
  164. * samlAttrMapFirstName:
  165. * type: string
  166. * description: attribute mapping first name for saml
  167. * samlAttrMapLastName:
  168. * type: string
  169. * description: attribute mapping last name for saml
  170. * isSameUsernameTreatedAsIdenticalUser
  171. * type: boolean
  172. * description: local account automatically linked the user name matched
  173. * isSameEmailTreatedAsIdenticalUser
  174. * type: boolean
  175. * description: local account automatically linked the email matched
  176. * OidcAuthSetting:
  177. * type:object
  178. * oidcProviderName:
  179. * type: string
  180. * description: provider name for oidc
  181. * oidcIssuerHost:
  182. * type: string
  183. * description: issuer host for oidc
  184. * oidcClientId:
  185. * type: string
  186. * description: client id for oidc
  187. * oidcClientSecret:
  188. * type: string
  189. * description: client secret for oidc
  190. * oidcAttrMapId:
  191. * type: string
  192. * description: attr map id for oidc
  193. * oidcAttrMapUserName:
  194. * type: string
  195. * description: attr map username for oidc
  196. * oidcAttrMapName:
  197. * type: string
  198. * description: attr map name for oidc
  199. * oidcAttrMapMail:
  200. * type: string
  201. * description: attr map mail for oidc
  202. * isSameUsernameTreatedAsIdenticalUser
  203. * type: boolean
  204. * description: local account automatically linked the user name matched
  205. * isSameEmailTreatedAsIdenticalUser
  206. * type: boolean
  207. * description: local account automatically linked the email matched
  208. * BasicAuthSetting:
  209. * type:object
  210. * isSameUsernameTreatedAsIdenticalUser
  211. * type: boolean
  212. * description: local account automatically linked the email matched
  213. * GitHubOAuthSetting:
  214. * type:object
  215. * githubClientId:
  216. * type: string
  217. * description: key of comsumer
  218. * githubClientSecret:
  219. * type: string
  220. * description: password of comsumer
  221. * isSameUsernameTreatedAsIdenticalUser
  222. * type: boolean
  223. * description: local account automatically linked the email matched
  224. * GoogleOAuthSetting:
  225. * type:object
  226. * googleClientId:
  227. * type: string
  228. * description: key of comsumer
  229. * googleClientSecret:
  230. * type: string
  231. * description: password of comsumer
  232. * isSameUsernameTreatedAsIdenticalUser
  233. * type: boolean
  234. * description: local account automatically linked the email matched
  235. * TwitterOAuthSetting:
  236. * type:object
  237. * twitterConsumerKey:
  238. * type: string
  239. * description: key of comsumer
  240. * twitterConsumerSecret:
  241. * type: string
  242. * description: password of comsumer
  243. * isSameUsernameTreatedAsIdenticalUser
  244. * type: boolean
  245. * description: local account automatically linked the email matched
  246. */
  247. module.exports = (crowi) => {
  248. const loginRequiredStrictly = require('../../middleware/login-required')(crowi);
  249. const adminRequired = require('../../middleware/admin-required')(crowi);
  250. const csrf = require('../../middleware/csrf')(crowi);
  251. const { ApiV3FormValidator } = crowi.middlewares;
  252. /**
  253. * @swagger
  254. *
  255. * /security-setting/:
  256. * get:
  257. * tags: [SecuritySetting]
  258. * description: Get security paramators
  259. * responses:
  260. * 200:
  261. * description: params of security
  262. * content:
  263. * application/json:
  264. * schema:
  265. * $ref: '#/components/schemas/GeneralSetting'
  266. * $ref: '#/components/schemas/LdapAuthSetting'
  267. * $ref: '#/components/schemas/SamlAuthSetting'
  268. * $ref: '#/components/schemas/OidcAuthSetting'
  269. * $ref: '#/components/schemas/BasicAuthSetting'
  270. * $ref: '#/components/schemas/GitHubOAuthSetting'
  271. * $ref: '#/components/schemas/GoogleOAuthSetting'
  272. * $ref: '#/components/schemas/TwitterOAuthSetting'
  273. */
  274. router.get('/', loginRequiredStrictly, adminRequired, async(req, res) => {
  275. const securityParams = {
  276. generalAuth: {
  277. isLdapEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:isEnabled'),
  278. isSamlEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-saml:isEnabled'),
  279. isOidcEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:isEnabled'),
  280. isBasicEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-basic:isEnabled'),
  281. isGoogleOAuthEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-google:isEnabled'),
  282. isGithubOAuthEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-github:isEnabled'),
  283. isTwitterOAuthEnabled: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:isEnabled'),
  284. },
  285. ldapAuth: {
  286. serverUrl: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:serverUrl'),
  287. isUserBind: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:isUserBind'),
  288. ldapBindDN: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:bindDN'),
  289. ldapBindDNPassword: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:bindDNPassword'),
  290. ldapSearchFilter: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:searchFilter'),
  291. ldapAttrMapUsername: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapUsername'),
  292. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:isSameUsernameTreatedAsIdenticalUser'),
  293. ldapAttrMapMail: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapMail'),
  294. ldapAttrMapName: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapName'),
  295. ldapGroupSearchBase: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupSearchBase'),
  296. ldapGroupSearchFilter: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupSearchFilter'),
  297. ldapGroupDnProperty: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupDnProperty'),
  298. },
  299. samlAuth: {
  300. missingMandatoryConfigKeys: await crowi.passportService.getSamlMissingMandatoryConfigKeys(),
  301. samlEntryPoint: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:entryPoint'),
  302. samlEnvVarEntryPoint: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:entryPoint'),
  303. samlIssuer: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:issuer'),
  304. samlEnvVarIssuer: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:issuer'),
  305. samlCert: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:cert'),
  306. samlEnvVarCert: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:cert'),
  307. samlAttrMapId: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapId'),
  308. samlEnvVarAttrMapId: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:attrMapId'),
  309. samlAttrMapUserName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapUsername'),
  310. samlEnvVarAttrMapUserName: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:attrMapUsername'),
  311. samlAttrMapMail: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapMail'),
  312. samlEnvVarAttrMapMail: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:attrMapMail'),
  313. samlAttrMapFirstName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapFirstName'),
  314. samlEnvVarAttrMapFirstName: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:attrMapFirstName'),
  315. samlAttrMapLastName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapLastName'),
  316. samlEnvVarAttrMapLastName: await crowi.configManager.getConfigFromEnvVars('crowi', 'security:passport-saml:attrMapLastName'),
  317. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-saml:isSameUsernameTreatedAsIdenticalUser'),
  318. isSameEmailTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-saml:isSameEmailTreatedAsIdenticalUser'),
  319. },
  320. oidcAuth: {
  321. oidcProviderName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:providerName'),
  322. oidcIssuerHost: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:issuerHost'),
  323. oidcClientId: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:clientId'),
  324. oidcClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:clientSecret'),
  325. oidcAttrMapId: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapId'),
  326. oidcAttrMapUserName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapUserName'),
  327. oidcAttrMapName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapName'),
  328. oidcAttrMapEmail: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapMail'),
  329. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:isSameUsernameTreatedAsIdenticalUser'),
  330. isSameEmailTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:isSameEmailTreatedAsIdenticalUser'),
  331. },
  332. basicAuth: {
  333. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-basic:isSameUsernameTreatedAsIdenticalUser'),
  334. },
  335. googleOAuth: {
  336. googleClientId: await crowi.configManager.getConfig('crowi', 'security:passport-google:clientId'),
  337. googleClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-google:clientSecret'),
  338. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-google:isSameUsernameTreatedAsIdenticalUser'),
  339. },
  340. githubOAuth: {
  341. githubClientId: await crowi.configManager.getConfig('crowi', 'security:passport-github:clientId'),
  342. githubClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-github:clientSecret'),
  343. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-github:isSameUsernameTreatedAsIdenticalUser'),
  344. },
  345. twitterOAuth: {
  346. twitterConsumerKey: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:consumerKey'),
  347. twitterConsumerSecret: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:consumerSecret'),
  348. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:isSameUsernameTreatedAsIdenticalUser'),
  349. },
  350. };
  351. return res.apiv3({ securityParams });
  352. });
  353. /**
  354. * @swagger
  355. *
  356. * /security-setting/general-setting:
  357. * put:
  358. * tags: [SecuritySetting]
  359. * description: Update GeneralSetting
  360. * requestBody:
  361. * required: true
  362. * content:
  363. * application/json:
  364. * schema:
  365. * $ref: '#/components/schemas/GeneralSetting'
  366. * responses:
  367. * 200:
  368. * description: Succeeded to update general Setting
  369. * content:
  370. * application/json:
  371. * schema:
  372. * $ref: '#/components/schemas/GeneralSetting'
  373. */
  374. router.put('/general-setting', loginRequiredStrictly, adminRequired, csrf, validator.generalSetting, ApiV3FormValidator, async(req, res) => {
  375. const requestParams = {
  376. 'security:restrictGuestMode': req.body.restrictGuestMode,
  377. 'security:pageCompleteDeletionAuthority': req.body.pageCompleteDeletionAuthority,
  378. 'security:list-policy:hideRestrictedByOwner': req.body.hideRestrictedByOwner,
  379. 'security:list-policy:hideRestrictedByGroup': req.body.hideRestrictedByGroup,
  380. };
  381. try {
  382. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  383. const securitySettingParams = {
  384. restrictGuestMode: await crowi.configManager.getConfig('crowi', 'security:restrictGuestMode'),
  385. pageCompleteDeletionAuthority: await crowi.configManager.getConfig('crowi', 'security:pageCompleteDeletionAuthority'),
  386. hideRestrictedByOwner: await crowi.configManager.getConfig('crowi', 'security:list-policy:hideRestrictedByOwner'),
  387. hideRestrictedByGroup: await crowi.configManager.getConfig('crowi', 'security:list-policy:hideRestrictedByGroup'),
  388. };
  389. return res.apiv3({ securitySettingParams });
  390. }
  391. catch (err) {
  392. const msg = 'Error occurred in updating security setting';
  393. logger.error('Error', err);
  394. return res.apiv3Err(new ErrorV3(msg, 'update-secuirty-setting failed'));
  395. }
  396. });
  397. /**
  398. * @swagger
  399. *
  400. * /security-setting/ldap:
  401. * put:
  402. * tags: [SecuritySetting]
  403. * description: Update LDAP setting
  404. * requestBody:
  405. * required: true
  406. * content:
  407. * application/json:
  408. * schema:
  409. * $ref: '#/components/schemas/LdapAuthSetting'
  410. * responses:
  411. * 200:
  412. * description: Succeeded to update LDAP setting
  413. * content:
  414. * application/json:
  415. * schema:
  416. * $ref: '#/components/schemas/LdapAuthSetting'
  417. */
  418. router.put('/ldap', loginRequiredStrictly, adminRequired, csrf, validator.ldapAuth, ApiV3FormValidator, async(req, res) => {
  419. const requestParams = {
  420. 'security:passport-ldap:serverUrl': req.body.serverUrl,
  421. 'security:passport-ldap:isUserBind': req.body.isUserBind,
  422. 'security:passport-ldap:bindDN': req.body.ldapBindDN,
  423. 'security:passport-ldap:bindDNPassword': req.body.ldapBindDNPassword,
  424. 'security:passport-ldap:searchFilter': req.body.ldapSearchFilter,
  425. 'security:passport-ldap:attrMapUsername': req.body.ldapAttrMapUserName,
  426. 'security:passport-ldap:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  427. 'security:passport-ldap:attrMapMail': req.body.ldapAttrMapMail,
  428. 'security:passport-ldap:attrMapName': req.body.ldapAttrMapName,
  429. 'security:passport-ldap:groupSearchBase': req.body.ldapGroupSearchBase,
  430. 'security:passport-ldap:groupSearchFilter': req.body.ldapGroupSearchFilter,
  431. 'security:passport-ldap:groupDnProperty': req.body.ldapGroupDnProperty,
  432. };
  433. try {
  434. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  435. const securitySettingParams = {
  436. serverUrl: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:serverUrl'),
  437. isUserBind: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:isUserBind'),
  438. ldapBindDN: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:bindDN'),
  439. ldapBindDNPassword: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:bindDNPassword'),
  440. ldapSearchFilter: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:searchFilter'),
  441. ldapAttrMapUsername: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapUsername'),
  442. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:isSameUsernameTreatedAsIdenticalUser'),
  443. ldapAttrMapMail: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapMail'),
  444. ldapAttrMapName: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:attrMapName'),
  445. ldapGroupSearchBase: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupSearchBase'),
  446. ldapGroupSearchFilter: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupSearchFilter'),
  447. ldapGroupDnProperty: await crowi.configManager.getConfig('crowi', 'security:passport-ldap:groupDnProperty'),
  448. };
  449. return res.apiv3({ securitySettingParams });
  450. }
  451. catch (err) {
  452. const msg = 'Error occurred in updating SAML setting';
  453. logger.error('Error', err);
  454. return res.apiv3Err(new ErrorV3(msg, 'update-SAML-failed'));
  455. }
  456. });
  457. /**
  458. * @swagger
  459. *
  460. * /security-setting/saml:
  461. * put:
  462. * tags: [SecuritySetting]
  463. * description: Update SAML setting
  464. * requestBody:
  465. * required: true
  466. * content:
  467. * application/json:
  468. * schema:
  469. * $ref: '#/components/schemas/SamlAuthSetting'
  470. * responses:
  471. * 200:
  472. * description: Succeeded to update SAML setting
  473. * content:
  474. * application/json:
  475. * schema:
  476. * $ref: '#/components/schemas/SamlAuthSetting'
  477. */
  478. router.put('/saml', loginRequiredStrictly, adminRequired, csrf, validator.samlAuth, ApiV3FormValidator, async(req, res) => {
  479. const requestParams = {
  480. 'security:passport-saml:entryPoint': req.body.samlEntryPoint,
  481. 'security:passport-saml:issuer': req.body.samlIssuer,
  482. 'security:passport-saml:cert': req.body.samlCert,
  483. 'security:passport-saml:attrMapId': req.body.samlAttrMapId,
  484. 'security:passport-saml:attrMapUsername': req.body.samlAttrMapUserName,
  485. 'security:passport-saml:attrMapMail': req.body.samlAttrMapMail,
  486. 'security:passport-saml:attrMapFirstName': req.body.samlAttrMapFirstName,
  487. 'security:passport-saml:attrMapLastName': req.body.samlAttrMapLastName,
  488. 'security:passport-saml:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  489. 'security:passport-saml:isSameEmailTreatedAsIdenticalUser': req.body.isSameEmailTreatedAsIdenticalUser,
  490. };
  491. try {
  492. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  493. const securitySettingParams = {
  494. missingMandatoryConfigKeys: await crowi.passportService.getSamlMissingMandatoryConfigKeys(),
  495. samlEntryPoint: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:entryPoint'),
  496. samlIssuer: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:issuer'),
  497. samlCert: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:cert'),
  498. samlAttrMapId: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapId'),
  499. samlAttrMapUserName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapUsername'),
  500. samlAttrMapMail: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapMail'),
  501. samlAttrMapFirstName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapFirstName'),
  502. samlAttrMapLastName: await crowi.configManager.getConfigFromDB('crowi', 'security:passport-saml:attrMapLastName'),
  503. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-saml:isSameUsernameTreatedAsIdenticalUser'),
  504. isSameEmailTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-saml:isSameEmailTreatedAsIdenticalUser'),
  505. };
  506. return res.apiv3({ securitySettingParams });
  507. }
  508. catch (err) {
  509. const msg = 'Error occurred in updating SAML setting';
  510. logger.error('Error', err);
  511. return res.apiv3Err(new ErrorV3(msg, 'update-SAML-failed'));
  512. }
  513. });
  514. /**
  515. * @swagger
  516. *
  517. * /security-setting/oidc:
  518. * put:
  519. * tags: [SecuritySetting]
  520. * description: Update OpenID Connect setting
  521. * requestBody:
  522. * required: true
  523. * content:
  524. * application/json:
  525. * schema:
  526. * $ref: '#/components/schemas/OidcAuthSetting'
  527. * responses:
  528. * 200:
  529. * description: Succeeded to update OpenID Connect setting
  530. * content:
  531. * application/json:
  532. * schema:
  533. * $ref: '#/components/schemas/OidcAuthSetting'
  534. */
  535. router.put('/oidc', loginRequiredStrictly, adminRequired, csrf, validator.oidcAuth, ApiV3FormValidator, async(req, res) => {
  536. const requestParams = {
  537. 'security:passport-oidc:providerName': req.body.oidcProviderName,
  538. 'security:passport-oidc:issuerHost': req.body.oidcIssuerHost,
  539. 'security:passport-oidc:clientId': req.body.oidcClientId,
  540. 'security:passport-oidc:clientSecret': req.body.oidcClientSecret,
  541. 'security:passport-oidc:attrMapId': req.body.oidcAttrMapId,
  542. 'security:passport-oidc:attrMapUserName': req.body.oidcAttrMapUserName,
  543. 'security:passport-oidc:attrMapName': req.body.oidcAttrMapName,
  544. 'security:passport-oidc:attrMapMail': req.body.oidcAttrMapEmail,
  545. 'security:passport-oidc:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  546. 'security:passport-oidc:isSameEmailTreatedAsIdenticalUser': req.body.isSameEmailTreatedAsIdenticalUser,
  547. };
  548. try {
  549. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  550. const securitySettingParams = {
  551. oidcProviderName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:providerName'),
  552. oidcIssuerHost: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:issuerHost'),
  553. oidcClientId: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:clientId'),
  554. oidcClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:clientSecret'),
  555. oidcAttrMapId: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapId'),
  556. oidcAttrMapUserName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapUserName'),
  557. oidcAttrMapName: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapName'),
  558. oidcAttrMapEmail: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:attrMapMail'),
  559. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:isSameUsernameTreatedAsIdenticalUser'),
  560. isSameEmailTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-oidc:isSameEmailTreatedAsIdenticalUser'),
  561. };
  562. return res.apiv3({ securitySettingParams });
  563. }
  564. catch (err) {
  565. const msg = 'Error occurred in updating OpenIDConnect';
  566. logger.error('Error', err);
  567. return res.apiv3Err(new ErrorV3(msg, 'update-OpenIDConnect-failed'));
  568. }
  569. });
  570. /**
  571. * @swagger
  572. *
  573. * /security-setting/basic:
  574. * put:
  575. * tags: [SecuritySetting]
  576. * description: Update basic
  577. * requestBody:
  578. * required: true
  579. * content:
  580. * application/json:
  581. * schema:
  582. * $ref: '#/components/schemas/BasicAuthSetting'
  583. * responses:
  584. * 200:
  585. * description: Succeeded to update basic
  586. * content:
  587. * application/json:
  588. * schema:
  589. * $ref: '#/components/schemas/BasicAuthSetting'
  590. */
  591. router.put('/basic', loginRequiredStrictly, adminRequired, csrf, validator.basicAuth, ApiV3FormValidator, async(req, res) => {
  592. const requestParams = {
  593. 'security:passport-basic:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  594. };
  595. try {
  596. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  597. const securitySettingParams = {
  598. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-basic:isSameUsernameTreatedAsIdenticalUser'),
  599. };
  600. return res.apiv3({ securitySettingParams });
  601. }
  602. catch (err) {
  603. const msg = 'Error occurred in updating basicAuth';
  604. logger.error('Error', err);
  605. return res.apiv3Err(new ErrorV3(msg, 'update-basicOAuth-failed'));
  606. }
  607. });
  608. /**
  609. * @swagger
  610. *
  611. * /security-setting/google-oauth:
  612. * put:
  613. * tags: [SecuritySetting]
  614. * description: Update google OAuth
  615. * requestBody:
  616. * required: true
  617. * content:
  618. * application/json:
  619. * schema:
  620. * $ref: '#/components/schemas/GoogleOAuthSetting'
  621. * responses:
  622. * 200:
  623. * description: Succeeded to google OAuth
  624. * content:
  625. * application/json:
  626. * schema:
  627. * $ref: '#/components/schemas/GoogleOAuthSetting'
  628. */
  629. router.put('/google-oauth', loginRequiredStrictly, adminRequired, csrf, validator.googleOAuth, ApiV3FormValidator, async(req, res) => {
  630. const requestParams = {
  631. 'security:passport-google:clientId': req.body.googleClientId,
  632. 'security:passport-google:clientSecret': req.body.googleClientSecret,
  633. 'security:passport-google:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  634. };
  635. try {
  636. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  637. const securitySettingParams = {
  638. googleClientId: await crowi.configManager.getConfig('crowi', 'security:passport-google:clientId'),
  639. googleClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-google:clientSecret'),
  640. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-google:isSameUsernameTreatedAsIdenticalUser'),
  641. };
  642. return res.apiv3({ securitySettingParams });
  643. }
  644. catch (err) {
  645. const msg = 'Error occurred in updating googleOAuth';
  646. logger.error('Error', err);
  647. return res.apiv3Err(new ErrorV3(msg, 'update-googleOAuth-failed'));
  648. }
  649. });
  650. /**
  651. * @swagger
  652. *
  653. * /security-setting/github-oauth:
  654. * put:
  655. * tags: [SecuritySetting]
  656. * description: Update github OAuth
  657. * requestBody:
  658. * required: true
  659. * content:
  660. * application/json:
  661. * schema:
  662. * $ref: '#/components/schemas/GitHubOAuthSetting'
  663. * responses:
  664. * 200:
  665. * description: Succeeded to github OAuth
  666. * content:
  667. * application/json:
  668. * schema:
  669. * $ref: '#/components/schemas/GitHubOAuthSetting'
  670. */
  671. router.put('/github-oauth', loginRequiredStrictly, adminRequired, csrf, validator.githubOAuth, ApiV3FormValidator, async(req, res) => {
  672. const requestParams = {
  673. 'security:passport-github:clientId': req.body.githubClientId,
  674. 'security:passport-github:clientSecret': req.body.githubClientSecret,
  675. 'security:passport-github:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  676. };
  677. try {
  678. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  679. const securitySettingParams = {
  680. githubClientId: await crowi.configManager.getConfig('crowi', 'security:passport-github:clientId'),
  681. githubClientSecret: await crowi.configManager.getConfig('crowi', 'security:passport-github:clientSecret'),
  682. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-github:isSameUsernameTreatedAsIdenticalUser'),
  683. };
  684. return res.apiv3({ securitySettingParams });
  685. }
  686. catch (err) {
  687. const msg = 'Error occurred in updating githubOAuth';
  688. logger.error('Error', err);
  689. return res.apiv3Err(new ErrorV3(msg, 'update-githubOAuth-failed'));
  690. }
  691. });
  692. /**
  693. * @swagger
  694. *
  695. * /security-setting/twitter-oauth:
  696. * put:
  697. * tags: [SecuritySetting]
  698. * description: Update twitter OAuth
  699. * requestBody:
  700. * required: true
  701. * content:
  702. * application/json:
  703. * schema:
  704. * $ref: '#/components/schemas/TwitterOAuthSetting'
  705. * responses:
  706. * 200:
  707. * description: Succeeded to update twitter OAuth
  708. * content:
  709. * application/json:
  710. * schema:
  711. * $ref: '#/components/schemas/TwitterOAuthSetting'
  712. */
  713. router.put('/twitter-oauth', loginRequiredStrictly, adminRequired, csrf, validator.twitterOAuth, ApiV3FormValidator, async(req, res) => {
  714. const requestParams = {
  715. 'security:passport-twitter:consumerKey': req.body.twitterConsumerKey,
  716. 'security:passport-twitter:consumerSecret': req.body.twitterConsumerSecret,
  717. 'security:passport-twitter:isSameUsernameTreatedAsIdenticalUser': req.body.isSameUsernameTreatedAsIdenticalUser,
  718. };
  719. try {
  720. await crowi.configManager.updateConfigsInTheSameNamespace('crowi', requestParams);
  721. const securitySettingParams = {
  722. twitterConsumerId: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:consumerKey'),
  723. twitterConsumerSecret: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:consumerSecret'),
  724. isSameUsernameTreatedAsIdenticalUser: await crowi.configManager.getConfig('crowi', 'security:passport-twitter:isSameUsernameTreatedAsIdenticalUser'),
  725. };
  726. // reset strategy
  727. await crowi.passportService.resetTwitterStrategy();
  728. // setup strategy
  729. if (crowi.configManager.getConfig('crowi', 'security:passport-twitter:isEnabled')) {
  730. await crowi.passportService.setupTwitterStrzwategy(true);
  731. }
  732. return res.apiv3({ securitySettingParams });
  733. }
  734. catch (err) {
  735. // reset strategy
  736. await crowi.passportService.resetTwitterStrategy();
  737. const msg = 'Error occurred in updating twitterOAuth';
  738. logger.error('Error', err);
  739. return res.apiv3Err(new ErrorV3(msg, 'update-twitterOAuth-failed'));
  740. }
  741. });
  742. return router;
  743. };