/* eslint-disable camelcase, no-return-assign, no-undef, */ // TODO: This file was created by bulk-decaffeinate. // Fix any style issues and re-enable lint. /* * decaffeinate suggestions: * DS101: Remove unnecessary use of Array.from * DS102: Remove unnecessary code created because of implicit returns * Full docs: https://github.com/decaffeinate/decaffeinate/blob/master/docs/suggestions.md */ 'use strict'; /* COMMON CODE */ // list of supported authentication methods const METHODS = { DatabaseProvider: 'local_database', OAuth2Provider: 'o_auth2' }; /** * Iterate through the provided array and return the index of the requested element * @param elements {Array<{id:*}>} * @param id {*} id of the element to retrieve in the list * @returns {number} index of the requested element, in the provided array */ const findIdxById = function (elements, id) { return (elements.map(function (elem) { return elem.id; })).indexOf(id); }; /** * For OAuth2 authentications, mapping the user's ID is mandatory. This function will check that this mapping * is effective and will return false otherwise * @param mappings {Array} expected: $scope.provider.auth_provider_mappings_attributes * @returns {Boolean} true if the mapping is declared */ const check_oauth2_id_is_mapped = function (mappings) { for (const mapping of Array.from(mappings)) { if ((mapping.local_model === 'user') && (mapping.local_field === 'uid') && !mapping._destroy) { return true; } } return false; }; /** * Page listing all authentication providers */ Application.Controllers.controller('AuthentificationController', ['$scope', '$state', '$rootScope', 'dialogs', 'growl', 'authProvidersPromise', 'AuthProvider', '_t', function ($scope, $state, $rootScope, dialogs, growl, authProvidersPromise, AuthProvider, _t) { /* PUBLIC SCOPE */ // full list of authentication providers $scope.providers = authProvidersPromise; /** * Translate the classname into an explicit textual message * @param type {string} Ruby polymorphic model classname * @returns {string} */ $scope.getType = function (type) { const text = METHODS[type]; if (typeof text !== 'undefined') { return _t(`app.admin.members.authentication_form.${text}`); } else { return _t('app.admin.members.authentication_form.unknown') + type; } }; /** * Translate the status string into an explicit textual message * @param status {string} active | pending | previous * @returns {string} */ $scope.getState = function (status) { switch (status) { case 'active': return _t('app.admin.members.authentication_form.active'); case 'pending': return _t('app.admin.members.authentication_form.pending'); case 'previous': return _t('app.admin.members.authentication_form.previous_provider'); default: return _t('app.admin.members.authentication_form.unknown') + status; } }; /** * Ask for confirmation then delete the specified provider * @param providers {Array} full list of authentication providers * @param provider {Object} provider to delete */ $scope.destroyProvider = function (providers, provider) { dialogs.confirm( { resolve: { object () { return { title: _t('app.admin.members.authentication_form.confirmation_required'), msg: _t('app.admin.members.authentication_form.do_you_really_want_to_delete_the_TYPE_authentication_provider_NAME', { TYPE: $scope.getType(provider.providable_type), NAME: provider.name }) }; } } }, function () { // the admin has confirmed, delete AuthProvider.delete( { id: provider.id }, function () { providers.splice(findIdxById(providers, provider.id), 1); growl.success(_t('app.admin.members.authentication_form.authentication_provider_successfully_deleted')); }, function () { growl.error(_t('app.admin.members.authentication_form.an_error_occurred_unable_to_delete_the_specified_provider')); } ); } ); }; } ]); /** * Page to add a new authentication provider */ Application.Controllers.controller('NewAuthenticationController', ['$scope', '$state', '$rootScope', '$uibModal', 'dialogs', 'growl', 'mappingFieldsPromise', 'authProvidersPromise', 'AuthProvider', '_t', function ($scope, $state, $rootScope, $uibModal, dialogs, growl, mappingFieldsPromise, authProvidersPromise, AuthProvider, _t) { $scope.mode = 'creation'; /** * Shows a success message forwarded from a child react component */ $scope.onSuccess = function (message) { growl.success(message); }; /** * Callback triggered by react components */ $scope.onError = function (message) { growl.error(message); }; // default parameters for the new authentication provider $scope.provider = { name: '', providable_type: '', providable_attributes: {} }; /** * Initialize some provider's specific properties when selecting the provider type */ $scope.updateProvidable = function () { // === OAuth2Provider === if ($scope.provider.providable_type === 'OAuth2Provider') { if (typeof $scope.provider.auth_provider_mappings_attributes === 'undefined') { return $scope.provider.auth_provider_mappings_attributes = []; } } }; // Add others providers initializers here if needed ... /** * Validate and save the provider parameters in database */ $scope.registerProvider = function () { // === DatabaseProvider === let provider; if ($scope.provider.providable_type === 'DatabaseProvider') { // prevent from adding mode than 1 for (provider of Array.from(authProvidersPromise)) { if (provider.providable_type === 'DatabaseProvider') { growl.error(_t('app.admin.authentication_new.a_local_database_provider_already_exists_unable_to_create_another')); return false; } } return AuthProvider.save({ auth_provider: $scope.provider }, function (provider) { growl.success(_t('app.admin.authentication_new.local_provider_successfully_saved')); return $state.go('app.admin.members'); }); // === OAuth2Provider === } else if ($scope.provider.providable_type === 'OAuth2Provider') { // check the ID mapping if (!check_oauth2_id_is_mapped($scope.provider.auth_provider_mappings_attributes)) { growl.error(_t('app.admin.authentication_new.it_is_required_to_set_the_matching_between_User.uid_and_the_API_to_add_this_provider')); return false; } // discourage the use of unsecure SSO if (!($scope.provider.providable_attributes.base_url.indexOf('https://') > -1)) { dialogs.confirm( { size: 'l', resolve: { object () { return { title: _t('app.admin.authentication_new.security_issue_detected'), msg: _t('app.admin.authentication_new.beware_the_oauth2_authenticatoin_provider_you_are_about_to_add_isnt_using_HTTPS') + _t('app.admin.authentication_new.this_is_a_serious_security_issue_on_internet_and_should_never_be_used_except_for_testing_purposes') + _t('app.admin.authentication_new.do_you_really_want_to_continue') }; } } }, function () { // unsecured http confirmed AuthProvider.save({ auth_provider: $scope.provider }, function (provider) { growl.success(_t('app.admin.authentication_new.unsecured_oauth2_provider_successfully_added')); return $state.go('app.admin.members'); }); } ); } else { AuthProvider.save({ auth_provider: $scope.provider }, function (provider) { growl.success(_t('app.admin.authentication_new.oauth2_provider_successfully_added')); return $state.go('app.admin.members'); }); } } }; } ]); /** * Page to edit an already added authentication provider */ Application.Controllers.controller('EditAuthenticationController', ['$scope', '$state', '$rootScope', '$uibModal', 'dialogs', 'growl', 'providerPromise', 'mappingFieldsPromise', 'AuthProvider', '_t', function ($scope, $state, $rootScope, $uibModal, dialogs, growl, providerPromise, mappingFieldsPromise, AuthProvider, _t) { // parameters of the currently edited authentication provider $scope.provider = providerPromise; $scope.mode = 'edition'; /** * Update the current provider with the new inputs */ $scope.updateProvider = function () { // check the ID mapping if (!check_oauth2_id_is_mapped($scope.provider.auth_provider_mappings_attributes)) { growl.error(_t('app.admin.authentication_edit.it_is_required_to_set_the_matching_between_User.uid_and_the_API_to_add_this_provider')); return false; } return AuthProvider.update( { id: $scope.provider.id }, { auth_provider: $scope.provider }, function (provider) { growl.success(_t('app.admin.authentication_edit.provider_successfully_updated')); $state.go('app.admin.members'); }, function () { growl.error(_t('app.admin.authentication_edit.an_error_occurred_unable_to_update_the_provider')); } ); }; /** * Shows a success message forwarded from a child react component */ $scope.onSuccess = function (message) { growl.success(message); }; /** * Callback triggered by react components */ $scope.onError = function (message) { growl.error(message); }; } ]);