mirror of
https://github.com/nuxsmin/sysPass.git
synced 2026-03-03 15:14:08 +01:00
* [MOD] CORS headers. * [MOD] Improve Forwarded header lookup. * [ADD] Create interface for configuration data. Signed-off-by: Rubén D <nuxsmin@syspass.org>
316 lines
12 KiB
PHP
316 lines
12 KiB
PHP
<?php
|
|
/*
|
|
* sysPass
|
|
*
|
|
* @author nuxsmin
|
|
* @link https://syspass.org
|
|
* @copyright 2012-2021, Rubén Domínguez nuxsmin@$syspass.org
|
|
*
|
|
* This file is part of sysPass.
|
|
*
|
|
* sysPass is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* sysPass is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with sysPass. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
namespace SP\Modules\Web\Controllers;
|
|
|
|
use Exception;
|
|
use RuntimeException;
|
|
use SP\Config\ConfigUtil;
|
|
use SP\Core\Acl\ActionsInterface;
|
|
use SP\Core\Acl\UnauthorizedPageException;
|
|
use SP\Core\Context\SessionContext;
|
|
use SP\Core\Events\Event;
|
|
use SP\Core\Events\EventMessage;
|
|
use SP\Http\JsonResponse;
|
|
use SP\Modules\Web\Controllers\Traits\ConfigTrait;
|
|
use SP\Services\Config\ConfigBackupService;
|
|
use SP\Storage\File\FileHandler;
|
|
use SP\Util\Util;
|
|
|
|
/**
|
|
* Class ConfigGeneral
|
|
*
|
|
* @package SP\Modules\Web\Controllers
|
|
*/
|
|
final class ConfigGeneralController extends SimpleControllerBase
|
|
{
|
|
use ConfigTrait;
|
|
|
|
/**
|
|
* @throws \DI\DependencyException
|
|
* @throws \DI\NotFoundException
|
|
* @throws \JsonException
|
|
*/
|
|
public function saveAction(): bool
|
|
{
|
|
$configData = $this->config->getConfigData();
|
|
$eventMessage = EventMessage::factory();
|
|
|
|
// General
|
|
$siteLang = $this->request->analyzeString('sitelang');
|
|
$siteTheme = $this->request->analyzeString('sitetheme', 'material-blue');
|
|
$sessionTimeout = $this->request->analyzeInt('session_timeout', 300);
|
|
$applicationUrl = $this->request->analyzeString('app_url');
|
|
$httpsEnabled = $this->request->analyzeBool('https_enabled', false);
|
|
$debugEnabled = $this->request->analyzeBool('debug_enabled', false);
|
|
$maintenanceEnabled = $this->request->analyzeBool('maintenance_enabled', false);
|
|
$checkUpdatesEnabled = $this->request->analyzeBool('check_updates_enabled', false);
|
|
$checkNoticesEnabled = $this->request->analyzeBool('check_notices_enabled', false);
|
|
$encryptSessionEnabled = $this->request->analyzeBool('encrypt_session_enabled', false);
|
|
|
|
$configData->setSiteLang($siteLang);
|
|
$configData->setSiteTheme($siteTheme);
|
|
$configData->setSessionTimeout($sessionTimeout);
|
|
$configData->setApplicationUrl($applicationUrl);
|
|
$configData->setHttpsEnabled($httpsEnabled);
|
|
$configData->setDebug($debugEnabled);
|
|
$configData->setMaintenance($maintenanceEnabled);
|
|
$configData->setCheckUpdates($checkUpdatesEnabled);
|
|
$configData->setCheckNotices($checkNoticesEnabled);
|
|
$configData->setEncryptSession($encryptSessionEnabled);
|
|
|
|
// Events
|
|
$logEnabled = $this->request->analyzeBool('log_enabled', false);
|
|
$syslogEnabled = $this->request->analyzeBool('syslog_enabled', false);
|
|
$remoteSyslogEnabled = $this->request->analyzeBool('remotesyslog_enabled', false);
|
|
$syslogServer = $this->request->analyzeString('remotesyslog_server');
|
|
$syslogPort = $this->request->analyzeInt('remotesyslog_port', 0);
|
|
|
|
$configData->setLogEnabled($logEnabled);
|
|
$configData->setLogEvents(
|
|
$this->request->analyzeArray(
|
|
'log_events',
|
|
function ($items) {
|
|
return ConfigUtil::eventsAdapter($items);
|
|
},
|
|
[]
|
|
)
|
|
);
|
|
|
|
$configData->setSyslogEnabled($syslogEnabled);
|
|
|
|
if ($remoteSyslogEnabled) {
|
|
if (!$syslogServer || !$syslogPort) {
|
|
return $this->returnJsonResponse(
|
|
JsonResponse::JSON_ERROR,
|
|
__u('Missing remote syslog parameters')
|
|
);
|
|
}
|
|
|
|
$configData->setSyslogRemoteEnabled(true);
|
|
$configData->setSyslogServer($syslogServer);
|
|
$configData->setSyslogPort($syslogPort);
|
|
|
|
if ($configData->isSyslogRemoteEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Remote syslog enabled'));
|
|
}
|
|
} elseif ($configData->isSyslogRemoteEnabled()) {
|
|
$configData->setSyslogRemoteEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Remote syslog disabled'));
|
|
}
|
|
|
|
// Proxy
|
|
$proxyEnabled = $this->request->analyzeBool('proxy_enabled', false);
|
|
$proxyServer = $this->request->analyzeString('proxy_server');
|
|
$proxyPort = $this->request->analyzeInt('proxy_port', 8080);
|
|
$proxyUser = $this->request->analyzeString('proxy_user');
|
|
$proxyPass = $this->request->analyzeEncrypted('proxy_pass');
|
|
|
|
|
|
// Valores para Proxy
|
|
if ($proxyEnabled && (!$proxyServer || !$proxyPort)) {
|
|
return $this->returnJsonResponse(
|
|
JsonResponse::JSON_ERROR,
|
|
__u('Missing Proxy parameters ')
|
|
);
|
|
}
|
|
|
|
if ($proxyEnabled) {
|
|
$configData->setProxyEnabled(true);
|
|
$configData->setProxyServer($proxyServer);
|
|
$configData->setProxyPort($proxyPort);
|
|
$configData->setProxyUser($proxyUser);
|
|
|
|
if ($proxyPass !== '***') {
|
|
$configData->setProxyPass($proxyPass);
|
|
}
|
|
|
|
if ($configData->isProxyEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Proxy enabled'));
|
|
}
|
|
} elseif ($configData->isProxyEnabled()) {
|
|
$configData->setProxyEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Proxy disabled'));
|
|
}
|
|
|
|
// Autentificación
|
|
$authBasicEnabled = $this->request->analyzeBool('authbasic_enabled', false);
|
|
$authBasicAutologinEnabled = $this->request->analyzeBool('authbasicautologin_enabled', false);
|
|
$authBasicDomain = $this->request->analyzeString('authbasic_domain');
|
|
$authSsoDefaultGroup = $this->request->analyzeInt('sso_defaultgroup');
|
|
$authSsoDefaultProfile = $this->request->analyzeInt('sso_defaultprofile');
|
|
|
|
// Valores para Autentificación
|
|
if ($authBasicEnabled) {
|
|
$configData->setAuthBasicEnabled(true);
|
|
$configData->setAuthBasicAutoLoginEnabled($authBasicAutologinEnabled);
|
|
$configData->setAuthBasicDomain($authBasicDomain);
|
|
$configData->setSsoDefaultGroup($authSsoDefaultGroup);
|
|
$configData->setSsoDefaultProfile($authSsoDefaultProfile);
|
|
|
|
if ($configData->isAuthBasicEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Auth Basic enabled'));
|
|
}
|
|
} elseif ($configData->isAuthBasicEnabled()) {
|
|
$configData->setAuthBasicEnabled(false);
|
|
$configData->setAuthBasicAutoLoginEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Auth Basic disabled'));
|
|
}
|
|
|
|
return $this->saveConfig(
|
|
$configData,
|
|
$this->config,
|
|
function () use ($eventMessage, $configData) {
|
|
if ($configData->isMaintenance()) {
|
|
Util::lockApp(
|
|
$this->session->getUserData()->getId(),
|
|
'config'
|
|
);
|
|
}
|
|
|
|
$this->eventDispatcher->notifyEvent(
|
|
'save.config.general',
|
|
new Event($this, $eventMessage)
|
|
);
|
|
}
|
|
);
|
|
}
|
|
|
|
public function downloadLogAction(): string
|
|
{
|
|
if ($this->configData->isDemoEnabled()) {
|
|
return __('Ey, this is a DEMO!!');
|
|
}
|
|
|
|
try {
|
|
SessionContext::close();
|
|
|
|
$file = new FileHandler(LOG_FILE);
|
|
$file->checkFileExists();
|
|
|
|
$this->eventDispatcher->notifyEvent(
|
|
'download.logFile',
|
|
new Event(
|
|
$this,
|
|
EventMessage::factory()
|
|
->addDescription(__u('File downloaded'))
|
|
->addDetail(__u('File'), str_replace(APP_ROOT, '', $file->getFile()))
|
|
)
|
|
);
|
|
|
|
$response = $this->router->response();
|
|
$response->header('Cache-Control', 'max-age=60, must-revalidate');
|
|
$response->header('Content-length', $file->getFileSize());
|
|
$response->header('Content-type', $file->getFileType());
|
|
$response->header('Content-Description', ' sysPass file');
|
|
$response->header('Content-transfer-encoding', 'chunked');
|
|
$response->header('Content-Disposition', 'attachment; filename="' . basename($file->getFile()) . '"');
|
|
$response->header('Set-Cookie', 'fileDownload=true; path=/');
|
|
$response->send();
|
|
|
|
$file->readChunked();
|
|
} catch (Exception $e) {
|
|
processException($e);
|
|
|
|
$this->eventDispatcher->notifyEvent(
|
|
'exception',
|
|
new Event($e)
|
|
);
|
|
}
|
|
|
|
return '';
|
|
}
|
|
|
|
public function downloadConfigBackupAction(string $type): string
|
|
{
|
|
if ($this->configData->isDemoEnabled()) {
|
|
return __('Ey, this is a DEMO!!');
|
|
}
|
|
|
|
try {
|
|
$this->eventDispatcher->notifyEvent(
|
|
'download.configBackupFile',
|
|
new Event(
|
|
$this,
|
|
EventMessage::factory()
|
|
->addDescription(__u('File downloaded'))
|
|
->addDetail(__u('File'), 'config.json')
|
|
)
|
|
);
|
|
|
|
$configBackupService = $this->dic->get(ConfigBackupService::class);
|
|
|
|
if ($type === 'json') {
|
|
$data = ConfigBackupService::configToJson($configBackupService->getBackup());
|
|
} else {
|
|
throw new RuntimeException('Not implemented');
|
|
}
|
|
|
|
$response = $this->router->response();
|
|
$response->header('Cache-Control', 'max-age=60, must-revalidate');
|
|
$response->header('Content-length', strlen($data));
|
|
$response->header('Content-type', 'application/json');
|
|
$response->header('Content-Description', ' sysPass file');
|
|
$response->header('Content-transfer-encoding', 'chunked');
|
|
$response->header('Content-Disposition', 'attachment; filename="config.json"');
|
|
$response->header('Set-Cookie', 'fileDownload=true; path=/');
|
|
$response->header('Content-transfer-encoding', 'binary');
|
|
$response->header('Set-Cookie', 'fileDownload=true; path=/');
|
|
|
|
$response->body($data);
|
|
$response->send(true);
|
|
} catch (Exception $e) {
|
|
processException($e);
|
|
|
|
$this->eventDispatcher->notifyEvent(
|
|
'exception',
|
|
new Event($e)
|
|
);
|
|
}
|
|
|
|
return '';
|
|
}
|
|
|
|
/**
|
|
* @throws \JsonException
|
|
* @throws \SP\Core\Exceptions\SessionTimeout
|
|
*/
|
|
protected function initialize(): void
|
|
{
|
|
try {
|
|
$this->checks();
|
|
$this->checkAccess(ActionsInterface::CONFIG_GENERAL);
|
|
} catch (UnauthorizedPageException $e) {
|
|
$this->eventDispatcher->notifyEvent(
|
|
'exception',
|
|
new Event($e)
|
|
);
|
|
|
|
$this->returnJsonResponseException($e);
|
|
}
|
|
}
|
|
} |