| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179 | import { ReactiveCache } from '/imports/reactiveCache';import Fiber from 'fibers';Meteor.startup(() => {  // Node Fibers 100% CPU usage issue  // https://github.com/wekan/wekan-mongodb/issues/2#issuecomment-381453161  // https://github.com/meteor/meteor/issues/9796#issuecomment-381676326  // https://github.com/sandstorm-io/sandstorm/blob/0f1fec013fe7208ed0fd97eb88b31b77e3c61f42/shell/server/00-startup.js#L99-L129  Fiber.poolSize = 1e9;  Accounts.validateLoginAttempt(function(options) {    const user = options.user || {};    return !user.loginDisabled;  });  Authentication = {};  Authentication.checkUserId = function(userId) {    if (userId === undefined) {      const error = new Meteor.Error('Unauthorized', 'Unauthorized');      error.statusCode = 401;      throw error;    }    const admin = ReactiveCache.getUser({ _id: userId, isAdmin: true });    if (admin === undefined) {      const error = new Meteor.Error('Forbidden', 'Forbidden');      error.statusCode = 403;      throw error;    }  };  // This will only check if the user is logged in.  // The authorization checks for the user will have to be done inside each API endpoint  Authentication.checkLoggedIn = function(userId) {    if (userId === undefined) {      const error = new Meteor.Error('Unauthorized', 'Unauthorized');      error.statusCode = 401;      throw error;    }  };  // An admin should be authorized to access everything, so we use a separate check for admins  // This throws an error if otherReq is false and the user is not an admin  Authentication.checkAdminOrCondition = function(userId, otherReq) {    if (otherReq) return;    const admin = ReactiveCache.getUser({ _id: userId, isAdmin: true });    if (admin === undefined) {      const error = new Meteor.Error('Forbidden', 'Forbidden');      error.statusCode = 403;      throw error;    }  };  // Helper function. Will throw an error if the user is not active BoardAdmin or active Normal user of the board.  Authentication.checkBoardAccess = function(userId, boardId) {    Authentication.checkLoggedIn(userId);    const board = ReactiveCache.getBoard(boardId);    const normalAccess = board.members.some(e => e.userId === userId && e.isActive && !e.isNoComments && !e.isCommentOnly && !e.isWorker);    Authentication.checkAdminOrCondition(userId, normalAccess);  };  if (Meteor.isServer) {    if (      process.env.ORACLE_OIM_ENABLED === 'true' ||      process.env.ORACLE_OIM_ENABLED === true    ) {      ServiceConfiguration.configurations.upsert(        // eslint-disable-line no-undef        { service: 'oidc' },        {          $set: {            loginStyle: process.env.OAUTH2_LOGIN_STYLE,            clientId: process.env.OAUTH2_CLIENT_ID,            secret: process.env.OAUTH2_SECRET,            serverUrl: process.env.OAUTH2_SERVER_URL,            authorizationEndpoint: process.env.OAUTH2_AUTH_ENDPOINT,            userinfoEndpoint: process.env.OAUTH2_USERINFO_ENDPOINT,            tokenEndpoint: process.env.OAUTH2_TOKEN_ENDPOINT,            idTokenWhitelistFields:              process.env.OAUTH2_ID_TOKEN_WHITELIST_FIELDS || [],            requestPermissions: process.env.OAUTH2_REQUEST_PERMISSIONS,          },        },      );    } else if (      process.env.OAUTH2_ENABLED === 'true' ||      process.env.OAUTH2_ENABLED === true    ) {      ServiceConfiguration.configurations.upsert(        // eslint-disable-line no-undef        { service: 'oidc' },        {          $set: {            loginStyle: process.env.OAUTH2_LOGIN_STYLE,            clientId: process.env.OAUTH2_CLIENT_ID,            secret: process.env.OAUTH2_SECRET,            serverUrl: process.env.OAUTH2_SERVER_URL,            authorizationEndpoint: process.env.OAUTH2_AUTH_ENDPOINT,            userinfoEndpoint: process.env.OAUTH2_USERINFO_ENDPOINT,            tokenEndpoint: process.env.OAUTH2_TOKEN_ENDPOINT,            idTokenWhitelistFields:              process.env.OAUTH2_ID_TOKEN_WHITELIST_FIELDS || [],            requestPermissions: process.env.OAUTH2_REQUEST_PERMISSIONS,          },          // OAUTH2_ID_TOKEN_WHITELIST_FIELDS || [],          // OAUTH2_REQUEST_PERMISSIONS || 'openid profile email',        },        );    } else if (      process.env.CAS_ENABLED === 'true' ||      process.env.CAS_ENABLED === true    ) {      ServiceConfiguration.configurations.upsert(        // eslint-disable-line no-undef        { service: 'cas' },        {          $set: {            baseUrl: process.env.CAS_BASE_URL,            loginUrl: process.env.CAS_LOGIN_URL,            serviceParam: 'service',            popupWidth: 810,            popupHeight: 610,            popup: true,            autoClose: true,            validateUrl: process.env.CASE_VALIDATE_URL,            casVersion: 3.0,            attributes: {              debug: process.env.DEBUG === 'true',            },          },        },      );    } else if (      process.env.SAML_ENABLED === 'true' ||      process.env.SAML_ENABLED === true    ) {      ServiceConfiguration.configurations.upsert(        // eslint-disable-line no-undef        { service: 'saml' },        {          $set: {            provider: process.env.SAML_PROVIDER,            entryPoint: process.env.SAML_ENTRYPOINT,            issuer: process.env.SAML_ISSUER,            cert: process.env.SAML_CERT,            idpSLORedirectURL: process.env.SAML_IDPSLO_REDIRECTURL,            privateKeyFile: process.env.SAML_PRIVATE_KEYFILE,            publicCertFile: process.env.SAML_PUBLIC_CERTFILE,            identifierFormat: process.env.SAML_IDENTIFIER_FORMAT,            localProfileMatchAttribute:              process.env.SAML_LOCAL_PROFILE_MATCH_ATTRIBUTE,            attributesSAML: process.env.SAML_ATTRIBUTES || [              'sn',              'givenName',              'mail',            ],            /*            settings = {"saml":[{              "provider":"openam",              "entryPoint":"https://openam.idp.io/openam/SSORedirect/metaAlias/zimt/idp",              "issuer": "https://sp.zimt.io/", //replace with url of your app              "cert":"MIICizCCAfQCCQCY8tKaMc0 LOTS OF FUNNY CHARS ==",              "idpSLORedirectURL": "http://openam.idp.io/openam/IDPSloRedirect/metaAlias/zimt/idp",              "privateKeyFile": "certs/mykey.pem",  // path is relative to $METEOR-PROJECT/private              "publicCertFile": "certs/mycert.pem",  // eg $METEOR-PROJECT/private/certs/mycert.pem              "dynamicProfile": true // set to true if we want to create a user in Meteor.users dynamically if SAML assertion is valid              "identifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", // Defaults to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress              "localProfileMatchAttribute": "telephoneNumber" // CAUTION: this will be mapped to profile.<localProfileMatchAttribute> attribute in Mongo if identifierFormat (see above) differs from urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress,              "attributesSAML": [telephoneNumber, sn, givenName, mail], // attrs from SAML attr statement, which will be used for local Meteor profile creation. Currently no real attribute mapping. If required use mapping on IdP side.            }]}            */          },        },      );    }  }});
 |