UNPKG

n8n

Version:

n8n Workflow Automation Tool

218 lines 10.9 kB
"use strict"; var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) { var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d; if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc); else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r; return c > 3 && r && Object.defineProperty(target, key, r), r; }; var __metadata = (this && this.__metadata) || function (k, v) { if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v); }; var __importDefault = (this && this.__importDefault) || function (mod) { return (mod && mod.__esModule) ? mod : { "default": mod }; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.SamlController = void 0; const express_1 = __importDefault(require("express")); const class_validator_1 = require("class-validator"); const url_1 = __importDefault(require("url")); const decorators_1 = require("../../../decorators"); const auth_service_1 = require("../../../auth/auth.service"); const InternalHooks_1 = require("../../../InternalHooks"); const querystring_1 = __importDefault(require("querystring")); const bad_request_error_1 = require("../../../errors/response-errors/bad-request.error"); const auth_error_1 = require("../../../errors/response-errors/auth.error"); const url_service_1 = require("../../../services/url.service"); const serviceProvider_ee_1 = require("../serviceProvider.ee"); const samlConnectionTestSuccess_1 = require("../views/samlConnectionTestSuccess"); const samlConnectionTestFailed_1 = require("../views/samlConnectionTestFailed"); const samlHelpers_1 = require("../samlHelpers"); const samlEnabledMiddleware_1 = require("../middleware/samlEnabledMiddleware"); const saml_service_ee_1 = require("../saml.service.ee"); const initSsoPost_1 = require("../views/initSsoPost"); let SamlController = class SamlController { constructor(authService, samlService, urlService, internalHooks) { this.authService = authService; this.samlService = samlService; this.urlService = urlService; this.internalHooks = internalHooks; } async getServiceProviderMetadata(_, res) { return res .header('Content-Type', 'text/xml') .send(this.samlService.getServiceProviderInstance().getMetadata()); } async configGet() { const prefs = this.samlService.samlPreferences; return { ...prefs, entityID: (0, serviceProvider_ee_1.getServiceProviderEntityId)(), returnUrl: (0, serviceProvider_ee_1.getServiceProviderReturnUrl)(), }; } async configPost(req) { const validationResult = await (0, class_validator_1.validate)(req.body); if (validationResult.length === 0) { const result = await this.samlService.setSamlPreferences(req.body); return result; } else { throw new bad_request_error_1.BadRequestError('Body is not a valid SamlPreferences object: ' + validationResult.map((e) => e.toString()).join(',')); } } async toggleEnabledPost(req, res) { if (req.body.loginEnabled === undefined) { throw new bad_request_error_1.BadRequestError('Body should contain a boolean "loginEnabled" property'); } await this.samlService.setSamlPreferences({ loginEnabled: req.body.loginEnabled }); return res.sendStatus(200); } async acsGet(req, res) { return await this.acsHandler(req, res, 'redirect'); } async acsPost(req, res) { return await this.acsHandler(req, res, 'post'); } async acsHandler(req, res, binding) { var _a, _b, _c; try { const loginResult = await this.samlService.handleSamlLogin(req, binding); if ((0, samlHelpers_1.isConnectionTestRequest)(req)) { if (loginResult.authenticatedUser) { return res.send((0, samlConnectionTestSuccess_1.getSamlConnectionTestSuccessView)(loginResult.attributes)); } else { return res.send((0, samlConnectionTestFailed_1.getSamlConnectionTestFailedView)('', loginResult.attributes)); } } if (loginResult.authenticatedUser) { void this.internalHooks.onUserLoginSuccess({ user: loginResult.authenticatedUser, authenticationMethod: 'saml', }); if ((0, samlHelpers_1.isSamlLicensedAndEnabled)()) { this.authService.issueCookie(res, loginResult.authenticatedUser, req.browserId); if (loginResult.onboardingRequired) { return res.redirect(this.urlService.getInstanceBaseUrl() + '/saml/onboarding'); } else { const redirectUrl = (_b = (_a = req.body) === null || _a === void 0 ? void 0 : _a.RelayState) !== null && _b !== void 0 ? _b : '/'; return res.redirect(this.urlService.getInstanceBaseUrl() + redirectUrl); } } else { return res.status(202).send(loginResult.attributes); } } void this.internalHooks.onUserLoginFailed({ user: (_c = loginResult.attributes.email) !== null && _c !== void 0 ? _c : 'unknown', authenticationMethod: 'saml', }); throw new auth_error_1.AuthError('SAML Authentication failed'); } catch (error) { if ((0, samlHelpers_1.isConnectionTestRequest)(req)) { return res.send((0, samlConnectionTestFailed_1.getSamlConnectionTestFailedView)(error.message)); } void this.internalHooks.onUserLoginFailed({ user: 'unknown', authenticationMethod: 'saml', }); throw new auth_error_1.AuthError('SAML Authentication failed: ' + error.message); } } async initSsoGet(req, res) { let redirectUrl = ''; try { const refererUrl = req.headers.referer; if (refererUrl) { const parsedUrl = url_1.default.parse(refererUrl); if (parsedUrl === null || parsedUrl === void 0 ? void 0 : parsedUrl.query) { const parsedQueryParams = querystring_1.default.parse(parsedUrl.query); if (parsedQueryParams.redirect && typeof parsedQueryParams.redirect === 'string') { redirectUrl = querystring_1.default.unescape(parsedQueryParams.redirect); } } } } catch { } return await this.handleInitSSO(res, redirectUrl); } async configTestGet(_, res) { return await this.handleInitSSO(res, (0, serviceProvider_ee_1.getServiceProviderConfigTestReturnUrl)()); } async handleInitSSO(res, relayState) { const result = await this.samlService.getLoginRequestUrl(relayState); if ((result === null || result === void 0 ? void 0 : result.binding) === 'redirect') { return result.context.context; } else if ((result === null || result === void 0 ? void 0 : result.binding) === 'post') { return res.send((0, initSsoPost_1.getInitSSOFormView)(result.context)); } else { throw new auth_error_1.AuthError('SAML redirect failed, please check your SAML configuration.'); } } }; exports.SamlController = SamlController; __decorate([ (0, decorators_1.Get)('/metadata', { skipAuth: true }), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "getServiceProviderMetadata", null); __decorate([ (0, decorators_1.Get)('/config', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }), __metadata("design:type", Function), __metadata("design:paramtypes", []), __metadata("design:returntype", Promise) ], SamlController.prototype, "configGet", null); __decorate([ (0, decorators_1.Post)('/config', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }), (0, decorators_1.GlobalScope)('saml:manage'), __metadata("design:type", Function), __metadata("design:paramtypes", [Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "configPost", null); __decorate([ (0, decorators_1.Post)('/config/toggle', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }), (0, decorators_1.GlobalScope)('saml:manage'), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "toggleEnabledPost", null); __decorate([ (0, decorators_1.Get)('/acs', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware], skipAuth: true }), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "acsGet", null); __decorate([ (0, decorators_1.Post)('/acs', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware], skipAuth: true }), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "acsPost", null); __decorate([ (0, decorators_1.Get)('/initsso', { middlewares: [samlEnabledMiddleware_1.samlLicensedAndEnabledMiddleware], skipAuth: true }), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "initSsoGet", null); __decorate([ (0, decorators_1.Get)('/config/test', { middlewares: [samlEnabledMiddleware_1.samlLicensedMiddleware] }), (0, decorators_1.GlobalScope)('saml:manage'), __metadata("design:type", Function), __metadata("design:paramtypes", [Object, Object]), __metadata("design:returntype", Promise) ], SamlController.prototype, "configTestGet", null); exports.SamlController = SamlController = __decorate([ (0, decorators_1.RestController)('/sso/saml'), __metadata("design:paramtypes", [auth_service_1.AuthService, saml_service_ee_1.SamlService, url_service_1.UrlService, InternalHooks_1.InternalHooks]) ], SamlController); //# sourceMappingURL=saml.controller.ee.js.map