Add App setup wizard

feature/cd
garrettmills 4 years ago
parent ca11e3afae
commit b275391674
No known key found for this signature in database
GPG Key ID: 6ACD58D6ADACFC6E

@ -1,4 +1,3 @@
- App setup wizard
- Cobalt form JSON field type - Setting resource
- MFA recovery codes handling
- Forgot password handling

@ -14,10 +14,10 @@ const template = `
</span>
<span v-if="can_access">
<div class="row mb-4">
<div class="col-10"><h3>{{ resource_class.plural }}</h3></div>
<div class="col-2 text-right" v-if="definition.actions">
<div class="col-8"><h3>{{ resource_class.plural }}</h3></div>
<div class="col-4 text-right" v-if="definition.actions">
<button
:class="['btn', 'btn-'+(action.color || 'secondary'), 'btn-sm']"
:class="['mr-2', 'btn', 'btn-'+(action.color || 'secondary'), 'btn-sm']"
type="button"
v-for="action of definition.actions"
@click="perform($event, action)"

@ -4,6 +4,7 @@ import MessageContainerComponent from './dash/message/MessageContainer.component
import EditProfileComponent from './dash/profile/EditProfile.component.js'
import AppPasswordFormComponent from './dash/profile/form/AppPassword.component.js'
import ProfilePhotoUploaderComponent from './dash/profile/form/ProfilePhotoUploader.component.js'
import AppSetupComponent from './dash/AppSetup.component.js'
import ListingComponent from './cobalt/Listing.component.js'
import FormComponent from './cobalt/Form.component.js'
@ -15,6 +16,7 @@ const dash_components = {
EditProfileComponent,
AppPasswordFormComponent,
ProfilePhotoUploaderComponent,
AppSetupComponent,
ListingComponent,
FormComponent,

@ -0,0 +1,386 @@
import { Component } from '../../lib/vues6/vues6.js'
import { resource_service } from '../service/Resource.service.js'
import { location_service } from '../service/Location.service.js'
import { session } from '../service/Session.service.js'
const template = `
<div class="card col-12 col-sm-10 offset-sm-1 col-md-8 offset-md-2 col-xl-6 offset-xl-3 mb-5">
<div class="card-title m-3 mt-4"><h3>Application Setup Wizard</h3></div>
<div class="card-body">
<div v-if="step === 0">
<p>This wizard will walk you through setting up a new application to integrate with {{ app_name }}. This will allow you to grant {{ app_name }} users access to this application.</p>
<p>{{ app_name }} supports 3 different authentication schemas. The application you are setting up will need to support one of the following:</p>
<ul>
<li>OAuth2</li>
<li>SAML</li>
<li>LDAP</li>
</ul>
<p>If the application supports any of these, it can be integrated with {{ app_name }} to provide single-sign-on. All of these methods support {{ app_name }}'s IAM policy, but OAuth2 and SAML2.0 are preferred, because they support a web-based login flow. To get started, enter the application name and identifier:</p>
<input
type="text"
class="form-control"
v-model="name"
placeholder="Awesome External App"
@keyup="on_key_up"
autofocus
>
<input
id="app_id"
type="text"
class="form-control mt-3 mb-3"
v-model="identifier"
placeholder="awesome_external_app"
@keyup="on_key_up"
>
<small class="text-secondary pad-top">An app's identifier is how it is referenced in IAM configurations. This should preferrably be all lowercase, alphanumeric with underscores.</small>
</div>
<div v-if="step === 1">
Okay, we'll help you set up {{ name }}. What type of authentication does it support?
<button class="btn btn-block btn-outline-success mt-4 mb-3" @click="on_type_click('oauth')">
OAuth2
<br><small>Less common, but best integration. Web-based login flow.</small>
</button>
<button class="btn btn-block btn-outline-primary mb-3" @click="on_type_click('saml')">
SAML2.0
<br><small>More common in enterprise applications. Web-based login flow.</small>
</button>
<button class="btn btn-block btn-outline-secondary" @click="on_type_click('ldap')">
LDAP (BindDN or Simple)
<br><small>Most common in self-hosted applications. No web-based login flow.</small>
</button>
</div>
<div v-if="step === 2 && type === 'oauth'">
<p>We're going to create an OAuth2 client for {{ name }}. This client will have the credentials that {{ name }} will use to authenticate users against {{ app_name }}'s API.</p>
<p>By default, the OAuth2 client will be able to fetch information about individual users and groups. You can adjust this in the future by navigating to the OAuth2 Clients page.</p>
<p>Please provide the OAuth2 callback URL. This is where {{ app_name }} will redirect users after they have been authenticated.</p>
<input
type="text"
class="form-control mt-3 mb-3"
v-model="oauth_redirect_uri"
placeholder="https://awesome.app/oauth2/callback"
@keyup="on_key_up"
>
<p>{{ app_name }} only supports the <code>authorization_code</code> grant type.</p>
</div>
<div
v-if="step === 2 && type === 'saml'"
>
<p>We're going to register {{ name }} as a SAML2.0 service provider. This will allow it to interface with {{ app_name }}.</p>
<p>To do this, you need to provide {{ name }}'s entity ID, assertion consumer service URL, and single-logout URL (if supported).</p>
<span>Entity ID:</span>
<input
type="text"
class="form-control"
v-model="saml_entity_id"
placeholder="https://awesome.app/saml/metadata.xml"
@keyup="on_key_up"
>
<br>
<span>Assertion Consumer Service URL:</span>
<input
type="text"
class="form-control"
v-model="saml_acs_url"
placeholder="https://awesome.app/saml/acs"
@keyup="on_key_up"
>
<br>
<span>Single-Logout URL (optional):</span>
<input
type="text"
class="form-control"
v-model="saml_slo_url"
placeholder="https://awesome.app/saml/logout"
@keyup="on_key_up"
>
</div>
<div v-if="step === 3 && type === 'saml'">
<p>Success! {{ name }} was added to {{ app_name }}'s records, and a SAML2.0 service provider was created.</p>
<p>The next step is to configure {{ name }} to redirect users to {{ app_name }} to log on. Here's some information on getting it set up:</p>
<h4>Configuring the Identity Provider</h4>
<p>{{ app_name }} is the SAML2.0 identity provider in this case. To set it up, you'll need the following info:</p>
<ul>
<li>Entity ID/Metadata: <code>{{ make_url('/saml/metadata.xml') }}</code></li>
<li>Sign-On URL: <code>{{ make_url('/saml/sso') }}</code></li>
<li>Single-Log-Out URL (if supported): <code>{{ make_url('/saml/logout') }}</code></li>
</ul>
</div>
<div v-if="step === 2 && type === 'ldap'">
<p>We're going to register {{ name }} as an LDAP auth client. To do this, you'll need to specify an LDAP username and password that {{ name }} will use to authenticate users.</p>
<span>Username:</span>
<input
type="text"
v-model="ldap_username"
class='form-control'
placeholder="awesome_app_ldap"
@keyup="on_key_up"
>
<br>
<span>Password:</span>
<input
type="password"
v-model="ldap_password"
class='form-control'
placeholder="Choose a password."
@keyup="on_key_up"
>
<input
type="password"
v-model="ldap_password_confirm"
class='form-control'
placeholder="Confirm password."
@keyup="on_key_up"
>
</div>
<div v-if="step === 3 && type === 'ldap'">
<p>Success! {{ name }} was added to {{ app_name }}'s records, and an LDAP client was created.</p>
<p>The next step is to configure {{ name }} to use {{ app_name }} to log on. Here's some information on getting it set up:</p>
<h4>LDAP Credentials</h4>
<p>If {{ name }} requires a bind user to query the LDAP server against, you can use these credentials:</p>
<ul>
<li>Server address: <code>{{ host }}</code></li>
<li>Server port: {{ ldap_config.port }}</li>
<li>Bind User DN: <code>{{ ldap_config.login_field }}={{ ldap_username }},{{ ldap_config.authentication_base }},{{ ldap_config.base_dc }}</code></li>
<li>Password: <i>the password you just set</i></li>
</ul>
<h4>User Searching</h4>
<ul>
<li>User search base: <code>{{ ldap_config.authentication_base }},{{ ldap_config.base_dc }}</code></li>
<li>Group search base: <code>{{ ldap_config.group_base }},{{ ldap_config.base_dc }}</code></li>
<li>Search filter: <code>(&(objectClass=inetOrgPerson)(iamTarget={{ app.id }})({{ ldap_config.login_field }}=username_substituted_here))</code></li>
</ul>
<h4>Group Membership</h4>
<p>Groups are made available in a manner compatible with OpenLDAP's memberOf overlay.</p>
<p>That means that groups are <code>objectClass: groupOfNames</code> and can be found in the <code>memberOf</code> attribute of the user object.</p>
<p>Groups have the form <code>cn=group_name,{{ ldap_config.group_base }},{{ ldap_config.base_dc }}</code>.</p>
<h4>Other Considerations</h4>
<p>{{ app_name }}'s built-in LDAP server provides the minimum-viable level of functionality required to authenticate users. That means it sometimes lacks features that more sophisticated LDAP clients expect.</p>
<p>Here are a few settings to tweak:</p>
<ul>
<li>User display name field: <code>gecos</code> (this is the full name of the user)</li>
<li>Paging chunk size: 0 (disable - {{ app_name }} does not support LDAP paging)</li>
<li>User e-mail field: <code>mail</code></li>
<li>UUID attribute for users: <code>{{ ldap_config.login_field }}</code></li>
<li>UUID attribute for groups: <code>cn</code></li>
</ul>
</div>
<div v-if="step === 3 && type === 'oauth'">
<p>Success! {{ name }} was added to {{ app_name }}'s records, and an OAuth2 client was created.</p>
<p>The next step is to configure {{ name }} to redirect users to {{ app_name }} to log on. Here's some information on getting it set up:</p>
<h4>User Authorization</h4>
<p>First, redirect the user to {{ app_name }}. Configure {{ name }} to use this URL:</p>
<code>
{{ make_url('/auth/service/oauth2/authorize') }}?client_id={{ oauth_client.uuid }}&redirect_uri={{ oauth_client.redirect_url }}
</code>
<br><br>
<p>Once the user authenticates successfully, {{ app_name }} will redirect them back to {{ name }}.</p>
<h4>Auth Code Redemption</h4>
<p>Once the user is redirected back, {{ name }} will be given an authorization code which can be redeemed for a bearer token.</p>
<p>To redeem this code, {{ name }} should make a POST request to:</p>
<code>
{{ make_url('/auth/service/oauth2/redeem') }}
</code>
<br><br>
<p>It should have the following body fields:</p>
<ul>
<li><code>code</code> - the authorization code that was returned</li>
<li><code>client_id</code> - <code>{{ oauth_client.uuid }}</code></li>
<li><code>client_secret</code> - <code>{{ oauth_client.secret }}</code></li>
<li><code>grant_type</code> - <code>authorization_code</code></li>
</ul>
<p>This will return an <code>access_token</code> that can be used to fetch user information from the {{ app_name }} API.</p>
<h4>Fetching User Info</h4>
<p>Once the auth code has been redeemed for a bearer token, that token can be used to make requests to the {{ app_name }} API.</p>
<p>Primarily, it can be used to fetch user information by making a GET request to the following URL:</p>
<code>{{ make_url('/api/v1/auth/users/me') }}</code>
<br><br>
<p>and including the bearer token in the headers like so: <code>Authorization: Bearer AbCdEf124</code></p>
<h5>Making Test Requests</h5>
<p>To test out the API integration, you can generate API tokens for {{ name }}. You can do that by clicking on the User Menu > <a href="/dash/c/listing/reflect/Token" target="_blank">API Tokens</a>.</p>
</div>
</div>
<div class="card-footer text-right">
<span style="color: darkred;" class="font-italic mr-3" v-if="error_message">{{ error_message }}</span>
<button
v-if="btn_back"
class="btn btn-outline-secondary"
@click="on_back_click"
>Back</button>
<button
v-if="!btn_hidden"
class="btn btn-outline-primary"
:disabled="btn_disabled"
@click="on_next_click"
>Next</button>
<button
v-if="btn_listing"
class="btn btn-outline-success"
@click="on_listing_click"
>Finish</button>
</div>
</div>
`
export default class AppSetupComponent extends Component {
static get selector() { return 'coreid-app-setup' }
static get template() { return template }
static get props() { return [] }
step = 0
btn_disabled = true
btn_back = false
btn_hidden = false
btn_listing = false
name = ''
identifier = ''
type = '' // ldap | saml | oauth
oauth_redirect_uri = ''
saml_entity_id = ''
saml_acs_url = ''
saml_slo_url = ''
ldap_username = ''
ldap_password = ''
ldap_password_confirm = ''
ldap_config = {}
error_message = ''
app = {}
oauth_client = {}
saml_provider = {}
ldap_client = {}
app_name = ''
host = ''
make_url(path) {
return session.url(path)
}
async vue_on_create() {
this.app_name = session.get('app.name')
this.host = session.host()
}
on_key_up(event) {
if ( this.step === 0 ) {
this.btn_disabled = !this.name.trim() || !this.identifier.trim() || !this.identifier.match(/^([a-z]|[A-Z]|[0-9]|_)+$/)
} else if ( this.step === 2 && this.type === 'oauth' ) {
this.btn_disabled = !this.oauth_redirect_uri.trim()
} else if ( this.step === 2 && this.type === 'saml' ) {
this.btn_disabled = !this.saml_entity_id.trim() || !this.saml_acs_url.trim()
} else if ( this.step === 2 && this.type === 'ldap' ) {
this.btn_disabled = !this.ldap_username.trim() || !this.ldap_username.match(/^([a-z]|[A-Z]|[0-9]|_)+$/) || !this.ldap_password || this.ldap_password !== this.ldap_password_confirm
}
if ( event.keyCode === 13 && !this.btn_disabled ) {
// Enter was pressed
event.preventDefault()
event.stopPropagation()
return this.on_next_click()
}
}
async on_back_click() {
this.step -= 1
if ( this.step === 0 ) this.btn_back = false
if ( this.step === 0 || this.step === 2 ) this.btn_hidden = false
}
async create_app(merge_params = {}) {
const params = {
...{
name: this.name,
identifier: this.identifier,
description: '',
},
...merge_params
}
const app_rsc = await resource_service.get('App')
return app_rsc.create(params)
}
async on_next_click() {
this.error_message = ''
try {
if (this.step === 0) {
this.step += 1
this.btn_hidden = true
this.btn_back = true
} else if (this.step === 2 && this.type === 'oauth') {
const client_rsc = await resource_service.get('oauth/Client')
const oauth_client_params = {
name: this.name,
redirect_url: this.oauth_redirect_uri,
api_scopes: ['v1:auth:users:get', 'v1:auth:groups:get'],
}
this.oauth_client = await client_rsc.create(oauth_client_params)
this.app = await this.create_app({
oauth_client_ids: [this.oauth_client.id]
})
} else if (this.step === 2 && this.type === 'saml') {
const provider_rsc = await resource_service.get('saml/Provider')
const provider_params = {
name: this.name,
acs_url: this.saml_acs_url,
entity_id: this.saml_entity_id,
}
if (this.saml_slo_url)
provider_params.slo_url = this.saml_slo_url
this.saml_provider = await provider_rsc.create(provider_params)
this.app = await this.create_app({
saml_service_provider_ids: [this.saml_provider.id]
})
} else if (this.step === 2 && this.type === 'ldap') {
const client_rsc = await resource_service.get('ldap/Client')
const client_params = {
name: this.name,
uid: this.ldap_username,
password: this.ldap_password,
}
this.ldap_config = await client_rsc.server_config()
this.ldap_client = await client_rsc.create(client_params)
this.app = await this.create_app({
ldap_client_ids: [this.ldap_client.id]
})
}
if ( this.step === 2 ) {
this.step += 1
this.btn_disabled = true
this.btn_hidden = true
this.btn_listing = true
this.btn_back = false
}
} catch (e) {
if ( e.response && e.response.data && e.response.data.message )
this.error_message = e.response.data.message
else this.error_message = 'An unknown error occurred while saving the form.'
}
}
async on_type_click(type) {
this.type = type
this.step += 1
this.btn_hidden = false
this.btn_disabled = true
}
async on_listing_click() {
await location_service.back()
}
}

@ -32,8 +32,15 @@ class AppResource extends CRUDBase {
type: 'resource',
position: 'main',
action: 'insert',
text: 'Create New',
text: 'Manual Setup',
color: 'outline-success',
},
{
position: 'main',
action: 'redirect',
text: 'Setup Wizard',
color: 'success',
next: '/dash/app/setup',
},
{
type: 'resource',

@ -9,6 +9,11 @@ class ClientResource extends CRUDBase {
item = 'LDAP Client'
plural = 'LDAP Clients'
async server_config() {
const results = await axios.get('/api/v1/ldap/config')
if ( results && results.data && results.data.data ) return results.data.data
}
listing_definition = {
display: `
LDAP Clients are special user accounts that external applications can use to bind to ${session.get('app.name')}'s built-in LDAP server to allow these applications to authenticate users.

@ -32,6 +32,22 @@ class Session {
if ( permissions.length === 1 ) return result.data.data[permissions[0]]
return result.data.data
}
url(path) {
if ( !path.startsWith('/') ) path = `/${path}`
let url = this.get('app.url')
if ( url.endsWith('/') ) url = url.slice(0, -1)
return `${url}${path}`
}
host() {
let url = this.get('app.url')
if ( url.startsWith('http://') ) url = url.substr(7)
else if ( url.startsWith('https://') ) url = url.substr(8)
return url.split('/')[0].split(':')[0]
}
}
const session = new Session()

@ -3,7 +3,21 @@ const zxcvbn = require('zxcvbn')
class LDAPController extends Controller {
static get services() {
return [...super.services, 'models', 'utility']
return [...super.services, 'models', 'utility', 'configs']
}
async get_config(req, res, next) {
// ldap port
// user base dn
// group base dn
const config = this.configs.get('ldap:server')
return res.api({
port: config.port,
base_dc: config.schema.base_dc,
authentication_base: config.schema.authentication_base,
group_base: config.schema.group_base,
login_field: config.schema.auth.user_id,
})
}
async get_clients(req, res, next) {

@ -0,0 +1,16 @@
const { Controller } = require('libflitter')
class MiscController extends Controller {
static get services() {
return [...super.services, 'Vue']
}
get_app_setup(req, res, next) {
return res.page('dash:app_setup', {
...this.Vue.session(req),
...this.Vue.data()
})
}
}
module.exports = exports = MiscController

@ -22,6 +22,10 @@ const ldap_routes = {
['middleware::api:Permission', { check: 'v1:ldap:groups:get' }],
'controller::api:v1:LDAP.get_group',
],
'/config': [
['middleware::api:Permission', { check: 'v1:ldap:config:get' }],
'controller::api:v1:LDAP.get_config',
],
},
post: {

@ -5,8 +5,6 @@ const saml_routes = {
],
// TODO SLO
get: {
'/metadata.xml': ['controller::saml:SAML.get_metadata'],
'/sso': [

@ -0,0 +1,13 @@
const misc_routes = {
prefix: '/dash',
middleware: ['auth:UserOnly'],
get: {
'/app/setup': [
'controller::dash:Misc.get_app_setup'
],
},
}
module.exports = exports = misc_routes

@ -0,0 +1,7 @@
extends ../theme/dash/base
block content
.cobalt-container
.row.pad-top
.col-12
coreid-app-setup
Loading…
Cancel
Save