check_client_mappers.js 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. import dotenv from 'dotenv';
  2. import axios from 'axios';
  3. // Lade Umgebungsvariablen
  4. dotenv.config();
  5. // Konfigurationskonstanten
  6. const KEYCLOAK_URL = process.env.KEYCLOAK_URL || 'https://auth.mrx8086.com';
  7. const ADMIN_USERNAME = process.env.KEYCLOAK_ADMIN_USER;
  8. const ADMIN_PASSWORD = process.env.KEYCLOAK_ADMIN_PASSWORD;
  9. const REALM_NAME = 'office-automation';
  10. // Client IDs aus Umgebungsvariablen
  11. const NEXTCLOUD_CLIENT_ID = process.env.NEXTCLOUD_CLIENT_ID || 'nextcloud';
  12. const PAPERLESS_CLIENT_ID = process.env.PAPERLESS_CLIENT_ID || 'paperless';
  13. const NODERED_CLIENT_ID = process.env.NODERED_CLIENT_ID || 'nodered';
  14. // Hilfsfunktion für API-Fehlerbehandlung
  15. const handleAxiosError = (error, operation, config, response) => {
  16. console.error(`Error during ${operation}:`);
  17. if (config) {
  18. console.error('Request:', {
  19. method: config.method,
  20. url: config.url,
  21. headers: config.headers,
  22. data: config.data,
  23. });
  24. }
  25. if (error.response) {
  26. console.error('Response:', {
  27. status: error.response.status,
  28. data: error.response.data
  29. });
  30. } else {
  31. console.error('Error Message:', error.message);
  32. }
  33. throw error;
  34. };
  35. // Admin Token abrufen
  36. async function getAdminToken() {
  37. try {
  38. const response = await axios.post(
  39. `${KEYCLOAK_URL}/realms/master/protocol/openid-connect/token`,
  40. new URLSearchParams({
  41. 'client_id': 'admin-cli',
  42. 'username': ADMIN_USERNAME,
  43. 'password': ADMIN_PASSWORD,
  44. 'grant_type': 'password'
  45. }),
  46. {
  47. headers: {
  48. 'Content-Type': 'application/x-www-form-urlencoded'
  49. }
  50. }
  51. );
  52. return response.data.access_token;
  53. } catch (error) {
  54. handleAxiosError(error, 'getting admin token');
  55. }
  56. }
  57. // Funktion um Client Infos abzufragen
  58. async function getClient(token, clientId) {
  59. try {
  60. const response = await axios.get(
  61. `${KEYCLOAK_URL}/admin/realms/${REALM_NAME}/clients`,
  62. {
  63. headers: {
  64. 'Authorization': `Bearer ${token}`
  65. },
  66. params: {
  67. clientId: clientId
  68. }
  69. }
  70. );
  71. if (response.data.length === 0) {
  72. console.error(`Client ${clientId} not found`);
  73. return null;
  74. }
  75. return response.data[0];
  76. } catch (error) {
  77. handleAxiosError(error, `getting client ${clientId}`);
  78. }
  79. }
  80. // Funktion um Client Mapper abzufragen
  81. async function getClientMappers(token, clientId) {
  82. try {
  83. const client = await getClient(token, clientId);
  84. if (!client) {
  85. return [];
  86. }
  87. const response = await axios.get(
  88. `${KEYCLOAK_URL}/admin/realms/${REALM_NAME}/clients/${client.id}/protocol-mappers/models`,
  89. {
  90. headers: {
  91. 'Authorization': `Bearer ${token}`
  92. }
  93. }
  94. );
  95. return response.data;
  96. } catch (error) {
  97. handleAxiosError(error, `getting client mappers for ${clientId}`, error.config, error.response);
  98. return [];
  99. }
  100. }
  101. async function ensureClientMappers(token, clientId) {
  102. const client = await getClient(token, clientId);
  103. if (!client) {
  104. return console.error(`Client ${clientId} not found, can't create mappers.`);
  105. }
  106. let existingMappers = await getClientMappers(token, clientId)
  107. const requiredMappers = [
  108. {
  109. name: "groups",
  110. protocol: "openid-connect",
  111. protocolMapper: "oidc-group-membership-mapper",
  112. config: {
  113. "full.path": "true",
  114. "id.token.claim": "true",
  115. "access.token.claim": "true",
  116. "userinfo.token.claim": "true",
  117. "claim.name": "groups"
  118. }
  119. },
  120. {
  121. name: "realm roles",
  122. protocol: "openid-connect",
  123. protocolMapper: "oidc-usermodel-realm-role-mapper",
  124. config: {
  125. "id.token.claim": "true",
  126. "access.token.claim": "true",
  127. "userinfo.token.claim": "true",
  128. "claim.name": "roles",
  129. "jsonType.label": "String",
  130. "multivalued": "true"
  131. }
  132. }
  133. ];
  134. for (const mapper of requiredMappers) {
  135. const existingMapper = existingMappers.find(m => m.name === mapper.name);
  136. try {
  137. if (existingMapper) {
  138. // Update existierenden Mapper
  139. await axios.put(
  140. `${KEYCLOAK_URL}/admin/realms/${REALM_NAME}/clients/${client.id}/protocol-mappers/models/${existingMapper.id}`,
  141. { ...existingMapper, ...mapper },
  142. {
  143. headers: {
  144. 'Authorization': `Bearer ${token}`,
  145. 'Content-Type': 'application/json'
  146. }
  147. }
  148. );
  149. console.log(`Mapper ${mapper.name} updated for client ${clientId}`);
  150. } else {
  151. // Erstelle neuen Mapper
  152. await axios.post(
  153. `${KEYCLOAK_URL}/admin/realms/${REALM_NAME}/clients/${client.id}/protocol-mappers/models`,
  154. mapper,
  155. {
  156. headers: {
  157. 'Authorization': `Bearer ${token}`,
  158. 'Content-Type': 'application/json'
  159. }
  160. }
  161. );
  162. console.log(`Mapper ${mapper.name} created for client ${clientId}`);
  163. }
  164. } catch (error) {
  165. handleAxiosError(error, `managing mapper ${mapper.name} for client ${clientId}`, error.config, error.response);
  166. // Wir werfen den Fehler nicht weiter, damit andere Mapper noch verarbeitet werden können
  167. }
  168. }
  169. // Get Mappers and log
  170. existingMappers = await getClientMappers(token, clientId);
  171. console.log(`Current Mappers for Client ${clientId}:`, existingMappers.map(mapper => ({name: mapper.name, id: mapper.id})));
  172. }
  173. // Hauptfunktion
  174. async function main() {
  175. try {
  176. console.log('Starting Client Mapper Check...');
  177. const token = await getAdminToken();
  178. // Clients erstellen
  179. const clients = [
  180. NEXTCLOUD_CLIENT_ID,
  181. PAPERLESS_CLIENT_ID,
  182. NODERED_CLIENT_ID
  183. ];
  184. for (const client of clients) {
  185. await ensureClientMappers(token, client);
  186. }
  187. console.log('Client Mapper Check completed successfully');
  188. } catch (error) {
  189. console.error('Client Mapper Check failed:', error);
  190. process.exit(1);
  191. }
  192. }
  193. // Script ausführen
  194. main();