124 lines
3.5 KiB
TypeScript
124 lines
3.5 KiB
TypeScript
import { z } from "zod";
|
|
|
|
import jackson from "@calcom/features/ee/sso/lib/jackson";
|
|
import { samlProductID, samlTenantID, tenantPrefix, canAccess } from "@calcom/features/ee/sso/lib/saml";
|
|
|
|
import { TRPCError } from "@trpc/server";
|
|
|
|
import { router, authedProcedure } from "../../trpc";
|
|
|
|
export const samlRouter = router({
|
|
// Retrieve SAML Connection
|
|
get: authedProcedure
|
|
.input(
|
|
z.object({
|
|
teamId: z.union([z.number(), z.null()]),
|
|
})
|
|
)
|
|
.query(async ({ ctx, input }) => {
|
|
const { connectionController, samlSPConfig } = await jackson();
|
|
|
|
const { teamId } = input;
|
|
|
|
const { message, access } = await canAccess(ctx.user, teamId);
|
|
|
|
if (!access) {
|
|
throw new TRPCError({
|
|
code: "BAD_REQUEST",
|
|
message,
|
|
});
|
|
}
|
|
|
|
// Retrieve the SP SAML Config
|
|
const SPConfig = await samlSPConfig.get();
|
|
|
|
const response = {
|
|
provider: "",
|
|
acsUrl: SPConfig.acsUrl,
|
|
entityId: SPConfig.entityId,
|
|
};
|
|
|
|
try {
|
|
const connections = await connectionController.getConnections({
|
|
tenant: teamId ? tenantPrefix + teamId : samlTenantID,
|
|
product: samlProductID,
|
|
});
|
|
|
|
if (connections.length > 0 && "idpMetadata" in connections[0]) {
|
|
response["provider"] = connections[0].idpMetadata.provider;
|
|
}
|
|
} catch (err) {
|
|
console.error("Error getting SAML config", err);
|
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Fetching SAML Connection failed." });
|
|
}
|
|
|
|
return response;
|
|
}),
|
|
// Update the SAML Connection
|
|
update: authedProcedure
|
|
.input(
|
|
z.object({
|
|
encodedRawMetadata: z.string(),
|
|
teamId: z.union([z.number(), z.null()]),
|
|
})
|
|
)
|
|
.mutation(async ({ ctx, input }) => {
|
|
const { connectionController } = await jackson();
|
|
|
|
const { encodedRawMetadata, teamId } = input;
|
|
|
|
const { message, access } = await canAccess(ctx.user, teamId);
|
|
|
|
if (!access) {
|
|
throw new TRPCError({
|
|
code: "BAD_REQUEST",
|
|
message,
|
|
});
|
|
}
|
|
|
|
try {
|
|
return await connectionController.createSAMLConnection({
|
|
encodedRawMetadata,
|
|
defaultRedirectUrl: `${process.env.NEXT_PUBLIC_WEBAPP_URL}/api/auth/saml/idp`,
|
|
redirectUrl: JSON.stringify([`${process.env.NEXT_PUBLIC_WEBAPP_URL}/*`]),
|
|
tenant: teamId ? tenantPrefix + teamId : samlTenantID,
|
|
product: samlProductID,
|
|
});
|
|
} catch (err) {
|
|
console.error("Error updating SAML connection", err);
|
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Updating SAML Connection failed." });
|
|
}
|
|
}),
|
|
// Delete the SAML Connection
|
|
delete: authedProcedure
|
|
.input(
|
|
z.object({
|
|
teamId: z.union([z.number(), z.null()]),
|
|
})
|
|
)
|
|
.mutation(async ({ ctx, input }) => {
|
|
const { connectionController } = await jackson();
|
|
|
|
const { teamId } = input;
|
|
|
|
const { message, access } = await canAccess(ctx.user, teamId);
|
|
|
|
if (!access) {
|
|
throw new TRPCError({
|
|
code: "BAD_REQUEST",
|
|
message,
|
|
});
|
|
}
|
|
|
|
try {
|
|
return await connectionController.deleteConnections({
|
|
tenant: teamId ? tenantPrefix + teamId : samlTenantID,
|
|
product: samlProductID,
|
|
});
|
|
} catch (err) {
|
|
console.error("Error deleting SAML connection", err);
|
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Deleting SAML Connection failed." });
|
|
}
|
|
}),
|
|
});
|