package defaults import ( "path" "strings" "time" "github.com/opencloud-eu/opencloud/pkg/config/defaults" "github.com/opencloud-eu/opencloud/pkg/shared" "github.com/opencloud-eu/opencloud/pkg/structs" "github.com/opencloud-eu/opencloud/services/graph/pkg/config" "github.com/opencloud-eu/opencloud/services/graph/pkg/unifiedrole" ) var ( // _disabledByDefaultUnifiedRoleRoleIDs contains all roles that are not enabled by default, // but can be enabled by the user. _disabledByDefaultUnifiedRoleRoleIDs = []string{ unifiedrole.UnifiedRoleSecureViewerID, unifiedrole.UnifiedRoleSpaceEditorWithoutVersionsID, unifiedrole.UnifiedRoleViewerListGrantsID, unifiedrole.UnifiedRoleEditorListGrantsID, unifiedrole.UnifiedRoleFileEditorListGrantsID, unifiedrole.UnifiedRoleDeniedID, } ) // FullDefaultConfig returns a fully initialized default configuration func FullDefaultConfig() *config.Config { cfg := DefaultConfig() EnsureDefaults(cfg) Sanitize(cfg) return cfg } // DefaultConfig returns a basic default configuration func DefaultConfig() *config.Config { return &config.Config{ Debug: config.Debug{ Addr: "127.0.0.1:9124", Token: "", }, HTTP: config.HTTP{ Addr: "127.0.0.1:9120", Namespace: "eu.opencloud.web", Root: "/graph", CORS: config.CORS{ AllowedOrigins: []string{"*"}, AllowedMethods: []string{"GET", "POST", "PUT", "PATCH", "DELETE", "OPTIONS"}, AllowedHeaders: []string{"Authorization", "Origin", "Content-Type", "Accept", "X-Requested-With", "X-Request-Id", "Purge", "Restore"}, AllowCredentials: true, }, }, Service: config.Service{ Name: "graph", }, Application: config.Application{ DisplayName: "OpenCloud", }, API: config.API{ GroupMembersPatchLimit: 20, UsernameMatch: "default", AssignDefaultUserRole: true, IdentitySearchMinLength: 3, }, Reva: shared.DefaultRevaConfig(), Spaces: config.Spaces{ StorageUsersAddress: "eu.opencloud.api.storage-users", WebDavBase: "https://localhost:9200", WebDavPath: "/dav/spaces/", DefaultQuota: "1000000000", // 1 minute ExtendedSpacePropertiesCacheTTL: 60, // 1 minute GroupsCacheTTL: 60, // 1 minute UsersCacheTTL: 60, }, Identity: config.Identity{ Backend: "ldap", LDAP: config.LDAP{ URI: "ldaps://localhost:9235", Insecure: false, CACert: path.Join(defaults.BaseDataPath(), "idm", "ldap.crt"), BindDN: "uid=libregraph,ou=sysusers,o=libregraph-idm", UseServerUUID: false, UsePasswordModExOp: true, WriteEnabled: true, UserBaseDN: "ou=users,o=libregraph-idm", UserSearchScope: "sub", UserFilter: "", UserObjectClass: "inetOrgPerson", UserEmailAttribute: "mail", UserDisplayNameAttribute: "displayName", UserNameAttribute: "uid", // FIXME: switch this to some more widely available attribute by default // ideally this needs to be constant for the lifetime of a users UserIDAttribute: "openCloudUUID", UserTypeAttribute: "openCloudUserType", UserEnabledAttribute: "openCloudUserEnabled", DisableUserMechanism: "attribute", LdapDisabledUsersGroupDN: "cn=DisabledUsersGroup,ou=groups,o=libregraph-idm", GroupBaseDN: "ou=groups,o=libregraph-idm", GroupSearchScope: "sub", GroupFilter: "", GroupObjectClass: "groupOfNames", GroupNameAttribute: "cn", GroupMemberAttribute: "member", GroupIDAttribute: "openCloudUUID", EducationResourcesEnabled: false, }, }, Cache: &config.Cache{ Store: "memory", Nodes: []string{"127.0.0.1:9233"}, Database: "cache-roles", TTL: time.Hour * 336, }, Events: config.Events{ Endpoint: "127.0.0.1:9233", Cluster: "opencloud-cluster", EnableTLS: false, }, MaxConcurrency: 20, UnifiedRoles: config.UnifiedRoles{ AvailableRoles: nil, // will be populated with defaults in EnsureDefaults }, Metadata: config.Metadata{ GatewayAddress: "eu.opencloud.api.storage-system", StorageAddress: "eu.opencloud.api.storage-system", SystemUserIDP: "internal", }, UserSoftDeleteRetentionTime: 0, } } // EnsureDefaults adds default values to the configuration if they are not set yet func EnsureDefaults(cfg *config.Config) { // provide with defaults for shared logging, since we need a valid destination address for "envdecode". if cfg.Log == nil && cfg.Commons != nil && cfg.Commons.Log != nil { cfg.Log = &config.Log{ Level: cfg.Commons.Log.Level, Pretty: cfg.Commons.Log.Pretty, Color: cfg.Commons.Log.Color, File: cfg.Commons.Log.File, } } else if cfg.Log == nil { cfg.Log = &config.Log{} } // provide with defaults for shared tracing, since we need a valid destination address for "envdecode". if cfg.Tracing == nil && cfg.Commons != nil && cfg.Commons.Tracing != nil { cfg.Tracing = &config.Tracing{ Enabled: cfg.Commons.Tracing.Enabled, Type: cfg.Commons.Tracing.Type, Endpoint: cfg.Commons.Tracing.Endpoint, Collector: cfg.Commons.Tracing.Collector, } } else if cfg.Tracing == nil { cfg.Tracing = &config.Tracing{} } if cfg.Cache == nil && cfg.Commons != nil && cfg.Commons.Cache != nil { cfg.Cache = &config.Cache{ Store: cfg.Commons.Cache.Store, Nodes: cfg.Commons.Cache.Nodes, } } else if cfg.Cache == nil { cfg.Cache = &config.Cache{} } if cfg.TokenManager == nil && cfg.Commons != nil && cfg.Commons.TokenManager != nil { cfg.TokenManager = &config.TokenManager{ JWTSecret: cfg.Commons.TokenManager.JWTSecret, } } else if cfg.TokenManager == nil { cfg.TokenManager = &config.TokenManager{} } if cfg.GRPCClientTLS == nil && cfg.Commons != nil { cfg.GRPCClientTLS = structs.CopyOrZeroValue(cfg.Commons.GRPCClientTLS) } if cfg.Commons != nil { cfg.HTTP.TLS = cfg.Commons.HTTPServiceTLS } if cfg.Identity.LDAP.GroupCreateBaseDN == "" { cfg.Identity.LDAP.GroupCreateBaseDN = cfg.Identity.LDAP.GroupBaseDN } // set default roles, if no roles are defined, we need to take care and provide all the default roles if len(cfg.UnifiedRoles.AvailableRoles) == 0 { for _, definition := range unifiedrole.GetRoles( // filter out the roles that are disabled by default unifiedrole.RoleFilterInvert(unifiedrole.RoleFilterIDs(_disabledByDefaultUnifiedRoleRoleIDs...)), ) { cfg.UnifiedRoles.AvailableRoles = append(cfg.UnifiedRoles.AvailableRoles, definition.GetId()) } } if cfg.Metadata.SystemUserAPIKey == "" && cfg.Commons != nil && cfg.Commons.SystemUserAPIKey != "" { cfg.Metadata.SystemUserAPIKey = cfg.Commons.SystemUserAPIKey } if cfg.Metadata.SystemUserID == "" && cfg.Commons != nil && cfg.Commons.SystemUserID != "" { cfg.Metadata.SystemUserID = cfg.Commons.SystemUserID } } // Sanitize sanitized the configuration func Sanitize(cfg *config.Config) { // sanitize config if cfg.HTTP.Root != "/" { cfg.HTTP.Root = strings.TrimSuffix(cfg.HTTP.Root, "/") } // convert ttl to millisecond // the config is in seconds, therefore we need multiply it. cfg.Spaces.ExtendedSpacePropertiesCacheTTL = cfg.Spaces.ExtendedSpacePropertiesCacheTTL * int(time.Second) cfg.Spaces.GroupsCacheTTL = cfg.Spaces.GroupsCacheTTL * int(time.Second) cfg.Spaces.UsersCacheTTL = cfg.Spaces.UsersCacheTTL * int(time.Second) }