n8n
Version:
n8n Workflow Automation Tool
218 lines • 10.9 kB
JavaScript
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.SamlController = void 0;
const express_1 = __importDefault(require("express"));
const class_validator_1 = require("class-validator");
const url_1 = __importDefault(require("url"));
const decorators_1 = require("../../../decorators");
const auth_service_1 = require("../../../auth/auth.service");
const InternalHooks_1 = require("../../../InternalHooks");
const querystring_1 = __importDefault(require("querystring"));
const bad_request_error_1 = require("../../../errors/response-errors/bad-request.error");
const auth_error_1 = require("../../../errors/response-errors/auth.error");
const url_service_1 = require("../../../services/url.service");
const serviceProvider_ee_1 = require("../serviceProvider.ee");
const samlConnectionTestSuccess_1 = require("../views/samlConnectionTestSuccess");
const samlConnectionTestFailed_1 = require("../views/samlConnectionTestFailed");
const samlHelpers_1 = require("../samlHelpers");
const samlEnabledMiddleware_1 = require("../middleware/samlEnabledMiddleware");
const saml_service_ee_1 = require("../saml.service.ee");
const initSsoPost_1 = require("../views/initSsoPost");
let SamlController = class SamlController {
constructor(authService, samlService, urlService, internalHooks) {
this.authService = authService;
this.samlService = samlService;
this.urlService = urlService;
this.internalHooks = internalHooks;
}
async getServiceProviderMetadata(_, res) {
return res
.header('Content-Type', 'text/xml')
.send(this.samlService.getServiceProviderInstance().getMetadata());
}
async configGet() {
const prefs = this.samlService.samlPreferences;
return {
...prefs,
entityID: (0, serviceProvider_ee_1.getServiceProviderEntityId)(),
returnUrl: (0, serviceProvider_ee_1.getServiceProviderReturnUrl)(),
};
}
async configPost(req) {
const validationResult = await (0, class_validator_1.validate)(req.body);
if (validationResult.length === 0) {
const result = await this.samlService.setSamlPreferences(req.body);
return result;
}
else {
throw new bad_request_error_1.BadRequestError('Body is not a valid SamlPreferences object: ' +
validationResult.map((e) => e.toString()).join(','));
}
}
async toggleEnabledPost(req, res) {
if (req.body.loginEnabled === undefined) {
throw new bad_request_error_1.BadRequestError('Body should contain a boolean "loginEnabled" property');
}
await this.samlService.setSamlPreferences({ loginEnabled: req.body.loginEnabled });
return res.sendStatus(200);
}
async acsGet(req, res) {
return await this.acsHandler(req, res, 'redirect');
}
async acsPost(req, res) {
return await this.acsHandler(req, res, 'post');
}
async acsHandler(req, res, binding) {
var _a, _b, _c;
try {
const loginResult = await this.samlService.handleSamlLogin(req, binding);
if ((0, samlHelpers_1.isConnectionTestRequest)(req)) {
if (loginResult.authenticatedUser) {
return res.send((0, samlConnectionTestSuccess_1.getSamlConnectionTestSuccessView)(loginResult.attributes));
}
else {
return res.send((0, samlConnectionTestFailed_1.getSamlConnectionTestFailedView)('', loginResult.attributes));
}
}
if (loginResult.authenticatedUser) {
void this.internalHooks.onUserLoginSuccess({
user: loginResult.authenticatedUser,
authenticationMethod: 'saml',
});
if ((0, samlHelpers_1.isSamlLicensedAndEnabled)()) {
this.authService.issueCookie(res, loginResult.authenticatedUser, req.browserId);
if (loginResult.onboardingRequired) {
return res.redirect(this.urlService.getInstanceBaseUrl() + '/saml/onboarding');
}
else {
const redirectUrl = (_b = (_a = req.body) === null || _a === void 0 ? void 0 : _a.RelayState) !== null && _b !== void 0 ? _b : '/';
return res.redirect(this.urlService.getInstanceBaseUrl() + redirectUrl);
}
}
else {
return res.status(202).send(loginResult.attributes);
}
}
void this.internalHooks.onUserLoginFailed({
user: (_c = loginResult.attributes.email) !== null && _c !== void 0 ? _c : 'unknown',
authenticationMethod: 'saml',
});
throw new auth_error_1.AuthError('SAML Authentication failed');
}
catch (error) {
if ((0, samlHelpers_1.isConnectionTestRequest)(req)) {
return res.send((0, samlConnectionTestFailed_1.getSamlConnectionTestFailedView)(error.message));
}
void this.internalHooks.onUserLoginFailed({
user: 'unknown',
authenticationMethod: 'saml',
});
throw new auth_error_1.AuthError('SAML Authentication failed: ' + error.message);
}
}
async initSsoGet(req, res) {
let redirectUrl = '';
try {
const refererUrl = req.headers.referer;
if (refererUrl) {
const parsedUrl = url_1.default.parse(refererUrl);
if (parsedUrl === null || parsedUrl === void 0 ? void 0 : parsedUrl.query) {
const parsedQueryParams = querystring_1.default.parse(parsedUrl.query);
if (parsedQueryParams.redirect && typeof parsedQueryParams.redirect === 'string') {
redirectUrl = querystring_1.default.unescape(parsedQueryParams.redirect);
}
}
}
}
catch {
}
return await this.handleInitSSO(res, redirectUrl);
}
async configTestGet(_, res) {
return await this.handleInitSSO(res, (0, serviceProvider_ee_1.getServiceProviderConfigTestReturnUrl)());
}
async handleInitSSO(res, relayState) {
const result = await this.samlService.getLoginRequestUrl(relayState);
if ((result === null || result === void 0 ? void 0 : result.binding) === 'redirect') {
return result.context.context;
}
else if ((result === null || result === void 0 ? void 0 : result.binding) === 'post') {
return res.send((0, initSsoPost_1.getInitSSOFormView)(result.context));
}
else {
throw new auth_error_1.AuthError('SAML redirect failed, please check your SAML configuration.');
}
}
};
exports.SamlController = SamlController;
__decorate([
(0, decorators_1.Get)('/metadata', { skipAuth: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "getServiceProviderMetadata", null);
__decorate([
(0, decorators_1.Get)('/config', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }),
__metadata("design:type", Function),
__metadata("design:paramtypes", []),
__metadata("design:returntype", Promise)
], SamlController.prototype, "configGet", null);
__decorate([
(0, decorators_1.Post)('/config', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }),
(0, decorators_1.GlobalScope)('saml:manage'),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "configPost", null);
__decorate([
(0, decorators_1.Post)('/config/toggle', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }),
(0, decorators_1.GlobalScope)('saml:manage'),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "toggleEnabledPost", null);
__decorate([
(0, decorators_1.Get)('/acs', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware], skipAuth: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "acsGet", null);
__decorate([
(0, decorators_1.Post)('/acs', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware], skipAuth: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "acsPost", null);
__decorate([
(0, decorators_1.Get)('/initsso', { middlewares: [samlEnabledMiddleware_1.samlLicensedAndEnabledMiddleware], skipAuth: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "initSsoGet", null);
__decorate([
(0, decorators_1.Get)('/config/test', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }),
(0, decorators_1.GlobalScope)('saml:manage'),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], SamlController.prototype, "configTestGet", null);
exports.SamlController = SamlController = __decorate([
(0, decorators_1.RestController)('/sso/saml'),
__metadata("design:paramtypes", [auth_service_1.AuthService,
saml_service_ee_1.SamlService,
url_service_1.UrlService,
InternalHooks_1.InternalHooks])
], SamlController);
//# sourceMappingURL=saml.controller.ee.js.map
;