authentication.js 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237
  1. const _ = require('lodash')
  2. const fs = require('fs-extra')
  3. const path = require('path')
  4. const graphHelper = require('../../helpers/graph')
  5. /* global WIKI */
  6. module.exports = {
  7. Query: {
  8. async authentication () { return {} }
  9. },
  10. Mutation: {
  11. async authentication () { return {} }
  12. },
  13. AuthenticationQuery: {
  14. /**
  15. * List of API Keys
  16. */
  17. async apiKeys (obj, args, context) {
  18. const keys = await WIKI.models.apiKeys.query().orderBy(['isRevoked', 'name'])
  19. return keys.map(k => ({
  20. id: k.id,
  21. name: k.name,
  22. keyShort: '...' + k.key.substring(k.key.length - 20),
  23. isRevoked: k.isRevoked,
  24. expiration: k.expiration,
  25. createdAt: k.createdAt,
  26. updatedAt: k.updatedAt
  27. }))
  28. },
  29. /**
  30. * Current API State
  31. */
  32. apiState () {
  33. return WIKI.config.api.isEnabled
  34. },
  35. /**
  36. * Fetch active authentication strategies
  37. */
  38. async strategies (obj, args, context, info) {
  39. let strategies = await WIKI.models.authentication.getStrategies(args.isEnabled)
  40. strategies = strategies.map(stg => {
  41. const strategyInfo = _.find(WIKI.data.authentication, ['key', stg.key]) || {}
  42. return {
  43. ...strategyInfo,
  44. ...stg,
  45. config: _.sortBy(_.transform(stg.config, (res, value, key) => {
  46. const configData = _.get(strategyInfo.props, key, false)
  47. if (configData) {
  48. res.push({
  49. key,
  50. value: JSON.stringify({
  51. ...configData,
  52. value
  53. })
  54. })
  55. }
  56. }, []), 'key')
  57. }
  58. })
  59. return strategies
  60. }
  61. },
  62. AuthenticationMutation: {
  63. /**
  64. * Create New API Key
  65. */
  66. async createApiKey (obj, args, context) {
  67. try {
  68. return {
  69. key: await WIKI.models.apiKeys.createNewKey(args),
  70. responseResult: graphHelper.generateSuccess('API Key created successfully')
  71. }
  72. } catch (err) {
  73. return graphHelper.generateError(err)
  74. }
  75. },
  76. /**
  77. * Perform Login
  78. */
  79. async login (obj, args, context) {
  80. try {
  81. const authResult = await WIKI.models.users.login(args, context)
  82. return {
  83. ...authResult,
  84. responseResult: graphHelper.generateSuccess('Login success')
  85. }
  86. } catch (err) {
  87. // LDAP Debug Flag
  88. if (args.strategy === 'ldap' && WIKI.config.flags.ldapdebug) {
  89. WIKI.logger.warn('LDAP LOGIN ERROR (c1): ', err)
  90. }
  91. return graphHelper.generateError(err)
  92. }
  93. },
  94. /**
  95. * Perform 2FA Login
  96. */
  97. async loginTFA (obj, args, context) {
  98. try {
  99. const authResult = await WIKI.models.users.loginTFA(args, context)
  100. return {
  101. ...authResult,
  102. responseResult: graphHelper.generateSuccess('TFA success')
  103. }
  104. } catch (err) {
  105. return graphHelper.generateError(err)
  106. }
  107. },
  108. /**
  109. * Perform Mandatory Password Change after Login
  110. */
  111. async loginChangePassword (obj, args, context) {
  112. try {
  113. const authResult = await WIKI.models.users.loginChangePassword(args, context)
  114. return {
  115. ...authResult,
  116. responseResult: graphHelper.generateSuccess('Password changed successfully')
  117. }
  118. } catch (err) {
  119. return graphHelper.generateError(err)
  120. }
  121. },
  122. /**
  123. * Register a new account
  124. */
  125. async register (obj, args, context) {
  126. try {
  127. await WIKI.models.users.register({ ...args, verify: true }, context)
  128. return {
  129. responseResult: graphHelper.generateSuccess('Registration success')
  130. }
  131. } catch (err) {
  132. return graphHelper.generateError(err)
  133. }
  134. },
  135. /**
  136. * Set API state
  137. */
  138. async setApiState (obj, args, context) {
  139. try {
  140. WIKI.config.api.isEnabled = args.enabled
  141. await WIKI.configSvc.saveToDb(['api'])
  142. return {
  143. responseResult: graphHelper.generateSuccess('API State changed successfully')
  144. }
  145. } catch (err) {
  146. return graphHelper.generateError(err)
  147. }
  148. },
  149. /**
  150. * Revoke an API key
  151. */
  152. async revokeApiKey (obj, args, context) {
  153. try {
  154. await WIKI.models.apiKeys.query().findById(args.id).patch({
  155. isRevoked: true
  156. })
  157. await WIKI.auth.reloadApiKeys()
  158. return {
  159. responseResult: graphHelper.generateSuccess('API Key revoked successfully')
  160. }
  161. } catch (err) {
  162. return graphHelper.generateError(err)
  163. }
  164. },
  165. /**
  166. * Update Authentication Strategies
  167. */
  168. async updateStrategies (obj, args, context) {
  169. try {
  170. WIKI.config.auth = {
  171. audience: _.get(args, 'config.audience', WIKI.config.auth.audience),
  172. tokenExpiration: _.get(args, 'config.tokenExpiration', WIKI.config.auth.tokenExpiration),
  173. tokenRenewal: _.get(args, 'config.tokenRenewal', WIKI.config.auth.tokenRenewal)
  174. }
  175. await WIKI.configSvc.saveToDb(['auth'])
  176. for (let str of args.strategies) {
  177. await WIKI.models.authentication.query().patch({
  178. isEnabled: str.isEnabled,
  179. config: _.reduce(str.config, (result, value, key) => {
  180. _.set(result, `${value.key}`, _.get(JSON.parse(value.value), 'v', null))
  181. return result
  182. }, {}),
  183. selfRegistration: str.selfRegistration,
  184. domainWhitelist: { v: str.domainWhitelist },
  185. autoEnrollGroups: { v: str.autoEnrollGroups }
  186. }).where('key', str.key)
  187. }
  188. await WIKI.auth.activateStrategies()
  189. return {
  190. responseResult: graphHelper.generateSuccess('Strategies updated successfully')
  191. }
  192. } catch (err) {
  193. return graphHelper.generateError(err)
  194. }
  195. },
  196. /**
  197. * Generate New Authentication Public / Private Key Certificates
  198. */
  199. async regenerateCertificates (obj, args, context) {
  200. try {
  201. await WIKI.auth.regenerateCertificates()
  202. return {
  203. responseResult: graphHelper.generateSuccess('Certificates have been regenerated successfully.')
  204. }
  205. } catch (err) {
  206. return graphHelper.generateError(err)
  207. }
  208. },
  209. /**
  210. * Reset Guest User
  211. */
  212. async resetGuestUser (obj, args, context) {
  213. try {
  214. await WIKI.auth.resetGuestUser()
  215. return {
  216. responseResult: graphHelper.generateSuccess('Guest user has been reset successfully.')
  217. }
  218. } catch (err) {
  219. return graphHelper.generateError(err)
  220. }
  221. }
  222. },
  223. AuthenticationStrategy: {
  224. icon (ap, args) {
  225. return fs.readFile(path.join(WIKI.ROOTPATH, `assets/svg/auth-icon-${ap.key}.svg`), 'utf8').catch(err => {
  226. if (err.code === 'ENOENT') {
  227. return null
  228. }
  229. throw err
  230. })
  231. }
  232. }
  233. }