AdminSamlSecurityContainer.js 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189
  1. import { Container } from 'unstated';
  2. import loggerFactory from '@alias/logger';
  3. import { pathUtils } from 'growi-commons';
  4. import urljoin from 'url-join';
  5. // eslint-disable-next-line no-unused-vars
  6. const logger = loggerFactory('growi:security:AdminSamlSecurityContainer');
  7. /**
  8. * Service container for admin security page (SecuritySamlSetting.jsx)
  9. * @extends {Container} unstated Container
  10. */
  11. export default class AdminSamlSecurityContainer extends Container {
  12. constructor(appContainer) {
  13. super();
  14. this.appContainer = appContainer;
  15. this.state = {
  16. // TODO GW-583 set value
  17. useOnlyEnvVars: false,
  18. callbackUrl: urljoin(pathUtils.removeTrailingSlash(appContainer.config.crowi.url), '/passport/saml/callback'),
  19. missingMandatoryConfigKeys: [],
  20. samlDbEntryPoint: '',
  21. samlEnvVarEntryPoint: '',
  22. samlDbIssuer: '',
  23. samlEnvVarIssuer: '',
  24. samlDbCert: '',
  25. samlEnvVarCert: '',
  26. samlDbAttrMapId: '',
  27. samlEnvVarAttrMapId: '',
  28. samlDbAttrMapUserName: '',
  29. samlEnvVarAttrMapUserName: '',
  30. samlDbAttrMapMail: '',
  31. samlEnvVarAttrMapMail: '',
  32. samlDbAttrMapFirstName: '',
  33. samlEnvVarAttrMapFirstName: '',
  34. samlDbAttrMapLastName: '',
  35. samlEnvVarAttrMapLastName: '',
  36. isSameUsernameTreatedAsIdenticalUser: false,
  37. isSameEmailTreatedAsIdenticalUser: false,
  38. };
  39. }
  40. /**
  41. * retrieve security data
  42. */
  43. async retrieveSecurityData() {
  44. const response = await this.appContainer.apiv3.get('/security-setting/');
  45. const { samlAuth } = response.data.securityParams;
  46. this.setState({
  47. samlDbEntryPoint: samlAuth.samlDbEntryPoint || '',
  48. samlEnvVarEntryPoint: samlAuth.samlEnvVarEntryPoint || '',
  49. samlDbIssuer: samlAuth.samlDbIssuer || '',
  50. samlEnvVarIssuer: samlAuth.samlEnvVarIssuer || '',
  51. samlDbCert: samlAuth.samlDbCert || '',
  52. samlEnvVarCert: samlAuth.samlEnvVarCert || '',
  53. samlDbAttrMapId: samlAuth.samlDbAttrMapId || '',
  54. samlEnvVarAttrMapId: samlAuth.samlEnvVarAttrMapId || '',
  55. samlDbAttrMapUserName: samlAuth.samlDbAttrMapUserName || '',
  56. samlEnvVarAttrMapUserName: samlAuth.samlEnvVarAttrMapUserName || '',
  57. samlDbAttrMapMail: samlAuth.samlDbAttrMapMail || '',
  58. samlEnvVarAttrMapMail: samlAuth.samlEnvVarAttrMapMail || '',
  59. samlDbAttrMapFirstName: samlAuth.samlDbAttrMapFirstName || '',
  60. samlEnvVarAttrMapFirstName: samlAuth.samlEnvVarAttrMapFirstName || '',
  61. samlDbAttrMapLastName: samlAuth.samlDbAttrMapLastName || '',
  62. samlEnvVarAttrMapLastName: samlAuth.samlEnvVarAttrMapLastName || '',
  63. isSameUsernameTreatedAsIdenticalUser: samlAuth.isSameUsernameTreatedAsIdenticalUser || false,
  64. isSameEmailTreatedAsIdenticalUser: samlAuth.isSameEmailTreatedAsIdenticalUser || false,
  65. });
  66. }
  67. /**
  68. * Workaround for the mangling in production build to break constructor.name
  69. */
  70. static getClassName() {
  71. return 'AdminSamlSecurityContainer';
  72. }
  73. /**
  74. * Change samlDbEntryPoint
  75. */
  76. changeSamlDbEntryPoint(inputValue) {
  77. this.setState({ samlDbEntryPoint: inputValue });
  78. }
  79. /**
  80. * Change samlDbIssuer
  81. */
  82. changeSamlDbIssuer(inputValue) {
  83. this.setState({ samlDbIssuer: inputValue });
  84. }
  85. /**
  86. * Change samlDbCert
  87. */
  88. changeSamlDbCert(inputValue) {
  89. this.setState({ samlDbCert: inputValue });
  90. }
  91. /**
  92. * Change samlDbAttrMapId
  93. */
  94. changeSamlDbAttrMapId(inputValue) {
  95. this.setState({ samlDbAttrMapId: inputValue });
  96. }
  97. /**
  98. * Change samlDbAttrMapUserName
  99. */
  100. changeSamlDbAttrMapUserName(inputValue) {
  101. this.setState({ samlDbAttrMapUserName: inputValue });
  102. }
  103. /**
  104. * Change samlDbAttrMapMail
  105. */
  106. changeSamlDbAttrMapMail(inputValue) {
  107. this.setState({ samlDbAttrMapMail: inputValue });
  108. }
  109. /**
  110. * Change samlDbAttrMapFirstName
  111. */
  112. changeSamlDbAttrMapFirstName(inputValue) {
  113. this.setState({ samlDbAttrMapFirstName: inputValue });
  114. }
  115. /**
  116. * Change samlDbAttrMapLastName
  117. */
  118. changeSamlDbAttrMapLastName(inputValue) {
  119. this.setState({ samlDbAttrMapLastName: inputValue });
  120. }
  121. /**
  122. * Switch isSameUsernameTreatedAsIdenticalUser
  123. */
  124. switchIsSameUsernameTreatedAsIdenticalUser() {
  125. this.setState({ isSameUsernameTreatedAsIdenticalUser: !this.state.isSameUsernameTreatedAsIdenticalUser });
  126. }
  127. /**
  128. * Switch isSameEmailTreatedAsIdenticalUser
  129. */
  130. switchIsSameEmailTreatedAsIdenticalUser() {
  131. this.setState({ isSameEmailTreatedAsIdenticalUser: !this.state.isSameEmailTreatedAsIdenticalUser });
  132. }
  133. /**
  134. * Update saml option
  135. */
  136. async updateSamlSetting() {
  137. const response = await this.appContainer.apiv3.put('/security-setting/saml', {
  138. samlEntryPoint: this.state.samlDbEntryPoint,
  139. samlIssuer: this.state.samlDbIssuer,
  140. samlCert: this.state.samlDbCert,
  141. samlAttrMapId: this.state.samlDbAttrMapId,
  142. samlAttrMapUserName: this.state.samlDbAttrMapUserName,
  143. samlAttrMapMail: this.state.samlDbAttrMapMail,
  144. samlAttrMapFirstName: this.state.samlDbAttrMapFirstName,
  145. samlAttrMapLastName: this.state.samlDbAttrMapLastName,
  146. isSameUsernameTreatedAsIdenticalUser: this.state.isSameUsernameTreatedAsIdenticalUser,
  147. isSameEmailTreatedAsIdenticalUser: this.state.isSameEmailTreatedAsIdenticalUser,
  148. });
  149. const { securitySettingParams } = response.data;
  150. this.setState({
  151. samlDbEntryPoint: securitySettingParams.samlDbEntryPoint || '',
  152. samlDbIssuer: securitySettingParams.samlDbIssuer || '',
  153. samlDbCert: securitySettingParams.samlDbCert || '',
  154. samlDbAttrMapId: securitySettingParams.samlDbAttrMapId || '',
  155. samlDbAttrMapUserName: securitySettingParams.samlDbAttrMapUserName || '',
  156. samlDbAttrMapMail: securitySettingParams.samlDbAttrMapMail || '',
  157. samlDbAttrMapFirstName: securitySettingParams.samlDbAttrMapFirstName || '',
  158. samlDbAttrMapLastName: securitySettingParams.samlDbAttrMapLastName || '',
  159. isSameUsernameTreatedAsIdenticalUser: securitySettingParams.isSameUsernameTreatedAsIdenticalUser || false,
  160. isSameEmailTreatedAsIdenticalUser: securitySettingParams.isSameEmailTreatedAsIdenticalUser || false,
  161. });
  162. return response;
  163. }
  164. }