mirror of
https://github.com/nuxsmin/sysPass.git
synced 2026-03-01 14:14:06 +01:00
240 lines
9.1 KiB
PHP
240 lines
9.1 KiB
PHP
<?php
|
|
/*
|
|
* sysPass
|
|
*
|
|
* @author nuxsmin
|
|
* @link https://syspass.org
|
|
* @copyright 2012-2023, Rubén Domínguez nuxsmin@$syspass.org
|
|
*
|
|
* This file is part of sysPass.
|
|
*
|
|
* sysPass is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* sysPass is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with sysPass. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
namespace SP\Modules\Web\Controllers\ConfigGeneral;
|
|
|
|
use SP\Core\Acl\ActionsInterface;
|
|
use SP\Core\Acl\UnauthorizedPageException;
|
|
use SP\Core\Events\Event;
|
|
use SP\Core\Events\EventMessage;
|
|
use SP\Core\Exceptions\SPException;
|
|
use SP\Core\Exceptions\ValidationException;
|
|
use SP\Domain\Config\Ports\ConfigDataInterface;
|
|
use SP\Domain\Config\Services\ConfigUtil;
|
|
use SP\Modules\Web\Controllers\SimpleControllerBase;
|
|
use SP\Modules\Web\Controllers\Traits\ConfigTrait;
|
|
use SP\Util\Util;
|
|
|
|
/**
|
|
* Class ConfigGeneral
|
|
*
|
|
* @package SP\Modules\Web\Controllers
|
|
*/
|
|
final class SaveController extends SimpleControllerBase
|
|
{
|
|
use ConfigTrait;
|
|
|
|
/**
|
|
* @throws \JsonException
|
|
*/
|
|
public function saveAction(): bool
|
|
{
|
|
$configData = $this->config->getConfigData();
|
|
$eventMessage = EventMessage::factory();
|
|
|
|
try {
|
|
$this->handleGeneralConfig($configData);
|
|
$this->handleEventsConfig($configData, $eventMessage);
|
|
$this->handleProxyConfig($configData, $eventMessage);
|
|
$this->handleAuthConfig($configData, $eventMessage);
|
|
} catch (ValidationException $e) {
|
|
return $this->returnJsonResponseException($e);
|
|
}
|
|
|
|
return $this->saveConfig(
|
|
$configData,
|
|
$this->config,
|
|
function () use ($eventMessage, $configData) {
|
|
if ($configData->isMaintenance()) {
|
|
Util::lockApp($this->session->getUserData()->getId(), 'config');
|
|
}
|
|
|
|
$this->eventDispatcher->notify('save.config.general', new Event($this, $eventMessage));
|
|
}
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @param \SP\Domain\Config\Ports\ConfigDataInterface $configData
|
|
*
|
|
* @return void
|
|
*/
|
|
private function handleGeneralConfig(ConfigDataInterface $configData): void
|
|
{
|
|
$siteLang = $this->request->analyzeString('sitelang');
|
|
$siteTheme = $this->request->analyzeString('sitetheme', 'material-blue');
|
|
$sessionTimeout = $this->request->analyzeInt('session_timeout', 300);
|
|
$applicationUrl = $this->request->analyzeString('app_url');
|
|
$httpsEnabled = $this->request->analyzeBool('https_enabled', false);
|
|
$debugEnabled = $this->request->analyzeBool('debug_enabled', false);
|
|
$maintenanceEnabled = $this->request->analyzeBool('maintenance_enabled', false);
|
|
$checkUpdatesEnabled = $this->request->analyzeBool('check_updates_enabled', false);
|
|
$checkNoticesEnabled = $this->request->analyzeBool('check_notices_enabled', false);
|
|
$encryptSessionEnabled = $this->request->analyzeBool('encrypt_session_enabled', false);
|
|
|
|
$configData->setSiteLang($siteLang);
|
|
$configData->setSiteTheme($siteTheme);
|
|
$configData->setSessionTimeout($sessionTimeout);
|
|
$configData->setApplicationUrl($applicationUrl);
|
|
$configData->setHttpsEnabled($httpsEnabled);
|
|
$configData->setDebug($debugEnabled);
|
|
$configData->setMaintenance($maintenanceEnabled);
|
|
$configData->setCheckUpdates($checkUpdatesEnabled);
|
|
$configData->setCheckNotices($checkNoticesEnabled);
|
|
$configData->setEncryptSession($encryptSessionEnabled);
|
|
}
|
|
|
|
/**
|
|
* @param \SP\Domain\Config\Ports\ConfigDataInterface $configData
|
|
* @param \SP\Core\Events\EventMessage $eventMessage
|
|
*
|
|
* @return void
|
|
* @throws \SP\Core\Exceptions\ValidationException
|
|
*/
|
|
private function handleEventsConfig(ConfigDataInterface $configData, EventMessage $eventMessage): void
|
|
{
|
|
$logEnabled = $this->request->analyzeBool('log_enabled', false);
|
|
$syslogEnabled = $this->request->analyzeBool('syslog_enabled', false);
|
|
$remoteSyslogEnabled = $this->request->analyzeBool('remotesyslog_enabled', false);
|
|
$syslogServer = $this->request->analyzeString('remotesyslog_server');
|
|
$syslogPort = $this->request->analyzeInt('remotesyslog_port', 0);
|
|
|
|
$configData->setLogEnabled($logEnabled);
|
|
$configData->setLogEvents(
|
|
$this->request->analyzeArray(
|
|
'log_events',
|
|
fn($items) => ConfigUtil::eventsAdapter($items),
|
|
[]
|
|
)
|
|
);
|
|
|
|
$configData->setSyslogEnabled($syslogEnabled);
|
|
|
|
if ($remoteSyslogEnabled) {
|
|
if (!$syslogServer || !$syslogPort) {
|
|
throw new ValidationException(SPException::ERROR, __u('Missing remote syslog parameters'));
|
|
}
|
|
|
|
$configData->setSyslogRemoteEnabled(true);
|
|
$configData->setSyslogServer($syslogServer);
|
|
$configData->setSyslogPort($syslogPort);
|
|
|
|
if ($configData->isSyslogRemoteEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Remote syslog enabled'));
|
|
}
|
|
} elseif ($configData->isSyslogRemoteEnabled()) {
|
|
$configData->setSyslogRemoteEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Remote syslog disabled'));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param \SP\Domain\Config\Ports\ConfigDataInterface $configData
|
|
* @param \SP\Core\Events\EventMessage $eventMessage
|
|
*
|
|
* @return void
|
|
* @throws \SP\Core\Exceptions\ValidationException
|
|
*/
|
|
private function handleProxyConfig(ConfigDataInterface $configData, EventMessage $eventMessage): void
|
|
{
|
|
$proxyEnabled = $this->request->analyzeBool('proxy_enabled', false);
|
|
$proxyServer = $this->request->analyzeString('proxy_server');
|
|
$proxyPort = $this->request->analyzeInt('proxy_port', 8080);
|
|
$proxyUser = $this->request->analyzeString('proxy_user');
|
|
$proxyPass = $this->request->analyzeEncrypted('proxy_pass');
|
|
|
|
if ($proxyEnabled && (!$proxyServer || !$proxyPort)) {
|
|
throw new ValidationException(SPException::ERROR, __u('Missing Proxy parameters '));
|
|
}
|
|
|
|
if ($proxyEnabled) {
|
|
$configData->setProxyEnabled(true);
|
|
$configData->setProxyServer($proxyServer);
|
|
$configData->setProxyPort($proxyPort);
|
|
$configData->setProxyUser($proxyUser);
|
|
|
|
if ($proxyPass !== '***') {
|
|
$configData->setProxyPass($proxyPass);
|
|
}
|
|
|
|
if ($configData->isProxyEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Proxy enabled'));
|
|
}
|
|
} elseif ($configData->isProxyEnabled()) {
|
|
$configData->setProxyEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Proxy disabled'));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param \SP\Domain\Config\Ports\ConfigDataInterface $configData
|
|
* @param \SP\Core\Events\EventMessage $eventMessage
|
|
*
|
|
* @return void
|
|
*/
|
|
private function handleAuthConfig(ConfigDataInterface $configData, EventMessage $eventMessage): void
|
|
{
|
|
$authBasicEnabled = $this->request->analyzeBool('authbasic_enabled', false);
|
|
$authBasicAutologinEnabled = $this->request->analyzeBool('authbasicautologin_enabled', false);
|
|
$authBasicDomain = $this->request->analyzeString('authbasic_domain');
|
|
$authSsoDefaultGroup = $this->request->analyzeInt('sso_defaultgroup');
|
|
$authSsoDefaultProfile = $this->request->analyzeInt('sso_defaultprofile');
|
|
|
|
if ($authBasicEnabled) {
|
|
$configData->setAuthBasicEnabled(true);
|
|
$configData->setAuthBasicAutoLoginEnabled($authBasicAutologinEnabled);
|
|
$configData->setAuthBasicDomain($authBasicDomain);
|
|
$configData->setSsoDefaultGroup($authSsoDefaultGroup);
|
|
$configData->setSsoDefaultProfile($authSsoDefaultProfile);
|
|
|
|
if ($configData->isAuthBasicEnabled() === false) {
|
|
$eventMessage->addDescription(__u('Auth Basic enabled'));
|
|
}
|
|
} elseif ($configData->isAuthBasicEnabled()) {
|
|
$configData->setAuthBasicEnabled(false);
|
|
$configData->setAuthBasicAutoLoginEnabled(false);
|
|
|
|
$eventMessage->addDescription(__u('Auth Basic disabled'));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @throws \JsonException
|
|
* @throws \SP\Core\Exceptions\SessionTimeout
|
|
*/
|
|
protected function initialize(): void
|
|
{
|
|
try {
|
|
$this->checks();
|
|
$this->checkAccess(ActionsInterface::CONFIG_GENERAL);
|
|
} catch (UnauthorizedPageException $e) {
|
|
$this->eventDispatcher->notify('exception', new Event($e));
|
|
|
|
$this->returnJsonResponseException($e);
|
|
}
|
|
}
|
|
}
|