2018-04-21 02:59:30 -03:00
|
|
|
/*****************************************************************************\
|
|
|
|
| ( )_ _ |
|
|
|
|
| _ _ _ __ _ _ __ ___ ___ _ _ | ,_)(_) ___ ___ _ |
|
|
|
|
| ( '_`\ ( '__)/'_` ) /'_ `\/' _ ` _ `\ /'_` )| | | |/',__)/' _ `\ /'_`\ |
|
2019-03-09 16:59:31 -03:00
|
|
|
| | (_) )| | ( (_| |( (_) || ( ) ( ) |( (_| || |_ | |\__, \| (˅) |( (_) ) |
|
2018-04-21 02:59:30 -03:00
|
|
|
| | ,__/'(_) `\__,_)`\__ |(_) (_) (_)`\__,_)`\__)(_)(____/(_) (_)`\___/' |
|
|
|
|
| | | ( )_) | |
|
|
|
|
| (_) \___/' |
|
|
|
|
| |
|
|
|
|
| General Bots Copyright (c) Pragmatismo.io. All rights reserved. |
|
|
|
|
| Licensed under the AGPL-3.0. |
|
2018-11-11 19:09:18 -02:00
|
|
|
| |
|
2018-04-21 02:59:30 -03:00
|
|
|
| According to our dual licensing model, this program can be used either |
|
|
|
|
| under the terms of the GNU Affero General Public License, version 3, |
|
|
|
|
| or under a proprietary license. |
|
|
|
|
| |
|
|
|
|
| The texts of the GNU Affero General Public License with an additional |
|
|
|
|
| permission and of our proprietary license can be found at and |
|
|
|
|
| in the LICENSE file you have received along with this program. |
|
|
|
|
| |
|
|
|
|
| This program is distributed in the hope that it will be useful, |
|
2018-09-09 18:11:41 -03:00
|
|
|
| but WITHOUT ANY WARRANTY without even the implied warranty of |
|
2018-04-21 02:59:30 -03:00
|
|
|
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
|
|
|
| GNU Affero General Public License for more details. |
|
|
|
|
| |
|
|
|
|
| "General Bots" is a registered trademark of Pragmatismo.io. |
|
|
|
|
| The licensing of the program under the AGPLv3 does not imply a |
|
|
|
|
| trademark license. Therefore any rights, title and interest in |
|
|
|
|
| our trademarks remain entirely with us. |
|
|
|
|
| |
|
|
|
|
\*****************************************************************************/
|
|
|
|
|
2018-11-11 19:09:18 -02:00
|
|
|
/**
|
|
|
|
* @fileoverview General Bots server core.
|
|
|
|
*/
|
|
|
|
|
|
|
|
'use strict';
|
2018-09-16 17:00:17 -03:00
|
|
|
|
2019-05-15 22:30:14 -03:00
|
|
|
var crypto = require('crypto')
|
2019-03-08 06:37:13 -03:00
|
|
|
import { WaterfallDialog } from 'botbuilder-dialogs';
|
|
|
|
import { GBMinInstance, IGBDialog } from 'botlib';
|
2019-03-09 16:59:31 -03:00
|
|
|
import urlJoin = require('url-join');
|
2019-03-08 06:49:22 -03:00
|
|
|
import { AzureDeployerService } from '../../azuredeployer.gbapp/services/AzureDeployerService';
|
2018-11-12 12:20:44 -02:00
|
|
|
import { GBConfigService } from '../../core.gbapp/services/GBConfigService';
|
|
|
|
import { GBDeployer } from '../../core.gbapp/services/GBDeployer';
|
2018-11-26 14:09:09 -02:00
|
|
|
import { GBImporter } from '../../core.gbapp/services/GBImporterService';
|
2018-11-12 12:20:44 -02:00
|
|
|
import { Messages } from '../strings';
|
2018-10-14 19:58:54 -03:00
|
|
|
|
2018-09-09 14:39:37 -03:00
|
|
|
/**
|
|
|
|
* Dialogs for administration tasks.
|
|
|
|
*/
|
2018-04-21 02:59:30 -03:00
|
|
|
export class AdminDialog extends IGBDialog {
|
2019-07-18 19:19:38 -03:00
|
|
|
public static async undeployPackageCommand(text: any, min: GBMinInstance) {
|
2018-11-12 12:20:44 -02:00
|
|
|
const packageName = text.split(' ')[1];
|
|
|
|
const importer = new GBImporter(min.core);
|
|
|
|
const deployer = new GBDeployer(min.core, importer);
|
2019-03-09 16:59:31 -03:00
|
|
|
await deployer.undeployPackageFromLocalPath(min.instance, urlJoin('packages', packageName));
|
2018-09-09 14:39:37 -03:00
|
|
|
}
|
|
|
|
|
2019-01-31 11:32:33 -02:00
|
|
|
public static isSharePointPath(path: string) {
|
|
|
|
return path.indexOf('sharepoint.com') > 0;
|
|
|
|
}
|
|
|
|
|
2018-11-27 22:56:11 -02:00
|
|
|
public static async deployPackageCommand(min: GBMinInstance, text: string, deployer: GBDeployer) {
|
2018-11-12 12:20:44 -02:00
|
|
|
const packageName = text.split(' ')[1];
|
2019-01-31 11:32:33 -02:00
|
|
|
|
2019-03-09 16:59:31 -03:00
|
|
|
if (!AdminDialog.isSharePointPath(packageName)) {
|
2019-01-31 11:32:33 -02:00
|
|
|
const additionalPath = GBConfigService.get('ADDITIONAL_DEPLOY_PATH');
|
2019-04-07 12:23:27 -03:00
|
|
|
if (additionalPath === undefined) {
|
2019-01-31 11:32:33 -02:00
|
|
|
throw new Error('ADDITIONAL_DEPLOY_PATH is not set and deployPackage was called.');
|
|
|
|
}
|
2019-03-09 16:59:31 -03:00
|
|
|
await deployer.deployPackage(min, urlJoin(additionalPath, packageName));
|
2018-12-18 13:50:35 -02:00
|
|
|
}
|
2018-12-06 10:16:28 -02:00
|
|
|
}
|
|
|
|
|
2019-03-08 19:13:00 -03:00
|
|
|
public static async rebuildIndexPackageCommand(min: GBMinInstance, deployer: GBDeployer) {
|
2019-03-08 06:37:13 -03:00
|
|
|
await deployer.rebuildIndex(
|
|
|
|
min.instance,
|
|
|
|
new AzureDeployerService(deployer).getKBSearchSchema(min.instance.searchIndex)
|
|
|
|
);
|
2018-09-09 14:39:37 -03:00
|
|
|
}
|
2018-12-06 10:16:28 -02:00
|
|
|
|
2019-05-27 07:45:23 -03:00
|
|
|
public static async syncBotServerCommand(min: GBMinInstance, deployer: GBDeployer) {
|
|
|
|
const serverName = `${min.instance.botId}-server`;
|
|
|
|
const service = await AzureDeployerService.createInstance(deployer);
|
|
|
|
service.syncBotServerRepository(min.instance.botId, serverName);
|
|
|
|
}
|
|
|
|
|
2018-09-09 14:39:37 -03:00
|
|
|
/**
|
|
|
|
* Setup dialogs flows and define services call.
|
2018-09-16 17:00:17 -03:00
|
|
|
*
|
2018-09-09 14:39:37 -03:00
|
|
|
* @param bot The bot adapter.
|
|
|
|
* @param min The minimal bot instance data.
|
|
|
|
*/
|
2019-03-08 19:13:00 -03:00
|
|
|
public static setup(min: GBMinInstance) {
|
2018-09-09 14:39:37 -03:00
|
|
|
// Setup services.
|
|
|
|
|
2018-11-12 12:20:44 -02:00
|
|
|
const importer = new GBImporter(min.core);
|
|
|
|
const deployer = new GBDeployer(min.core, importer);
|
2018-04-21 02:59:30 -03:00
|
|
|
|
2019-01-31 11:32:33 -02:00
|
|
|
AdminDialog.setupSecurityDialogs(min);
|
|
|
|
|
2018-11-01 21:06:11 -03:00
|
|
|
min.dialogs.add(
|
2018-11-12 12:20:44 -02:00
|
|
|
new WaterfallDialog('/admin', [
|
2018-11-01 21:06:11 -03:00
|
|
|
async step => {
|
|
|
|
const locale = step.context.activity.locale;
|
|
|
|
const prompt = Messages[locale].authenticate;
|
2018-12-06 10:16:28 -02:00
|
|
|
|
|
|
|
return await step.prompt('textPrompt', prompt);
|
2018-11-01 21:06:11 -03:00
|
|
|
},
|
|
|
|
async step => {
|
|
|
|
const locale = step.context.activity.locale;
|
2019-03-08 19:13:00 -03:00
|
|
|
const sensitive = step.result;
|
2018-12-06 10:16:28 -02:00
|
|
|
|
2019-03-08 19:13:00 -03:00
|
|
|
if (sensitive === GBConfigService.get('ADMIN_PASS')) {
|
2018-11-01 21:06:11 -03:00
|
|
|
await step.context.sendActivity(Messages[locale].welcome);
|
2018-12-06 10:16:28 -02:00
|
|
|
|
|
|
|
return await step.prompt('textPrompt', Messages[locale].which_task);
|
2018-11-01 21:06:11 -03:00
|
|
|
} else {
|
2018-12-06 10:16:28 -02:00
|
|
|
await step.context.sendActivity(Messages[locale].wrong_password);
|
|
|
|
|
|
|
|
return await step.endDialog();
|
2018-11-01 21:06:11 -03:00
|
|
|
}
|
|
|
|
},
|
|
|
|
async step => {
|
2019-03-08 19:13:00 -03:00
|
|
|
const locale: string = step.context.activity.locale;
|
|
|
|
// tslint:disable-next-line:no-unsafe-any
|
|
|
|
const text: string = step.result;
|
2018-11-12 12:20:44 -02:00
|
|
|
const cmdName = text.split(' ')[0];
|
2018-09-24 15:27:26 -03:00
|
|
|
|
2019-07-18 20:42:08 -03:00
|
|
|
await step.context.sendActivity(Messages[locale].working(cmdName));
|
2018-11-01 21:06:11 -03:00
|
|
|
let unknownCommand = false;
|
2018-09-24 15:27:26 -03:00
|
|
|
|
2018-11-12 12:20:44 -02:00
|
|
|
if (text === 'quit') {
|
2018-12-06 10:16:28 -02:00
|
|
|
return await step.replaceDialog('/');
|
2018-11-12 12:20:44 -02:00
|
|
|
} else if (cmdName === 'deployPackage') {
|
2018-11-27 22:56:11 -02:00
|
|
|
await AdminDialog.deployPackageCommand(min, text, deployer);
|
2018-12-06 10:16:28 -02:00
|
|
|
|
|
|
|
return await step.replaceDialog('/admin', { firstRun: false });
|
2018-11-12 12:20:44 -02:00
|
|
|
} else if (cmdName === 'redeployPackage') {
|
2019-07-18 19:19:38 -03:00
|
|
|
await step.context.sendActivity('The package is being *unloaded*...');
|
|
|
|
await AdminDialog.undeployPackageCommand(text, min);
|
|
|
|
await step.context.sendActivity('Now, *deploying* package...');
|
2018-11-27 22:56:11 -02:00
|
|
|
await AdminDialog.deployPackageCommand(min, text, deployer);
|
2019-07-18 19:19:38 -03:00
|
|
|
await step.context.sendActivity('Package deployed. Just need to rebuild the index... Doing it right now.');
|
|
|
|
await AdminDialog.rebuildIndexPackageCommand(min, deployer);
|
|
|
|
await step.context.sendActivity('Finished importing of that .gbkb package. Thanks.');
|
2018-12-06 10:16:28 -02:00
|
|
|
return await step.replaceDialog('/admin', { firstRun: false });
|
|
|
|
} else if (cmdName === 'rebuildIndex') {
|
2019-03-08 19:13:00 -03:00
|
|
|
await AdminDialog.rebuildIndexPackageCommand(min, deployer);
|
2018-12-06 10:16:28 -02:00
|
|
|
|
2019-05-27 07:45:23 -03:00
|
|
|
return await step.replaceDialog('/admin', { firstRun: false });
|
|
|
|
} else if (cmdName === 'syncBotServer') {
|
|
|
|
await AdminDialog.syncBotServerCommand(min, deployer);
|
|
|
|
|
2018-12-06 10:16:28 -02:00
|
|
|
return await step.replaceDialog('/admin', { firstRun: false });
|
2018-11-12 12:20:44 -02:00
|
|
|
} else if (cmdName === 'setupSecurity') {
|
2019-01-31 11:32:33 -02:00
|
|
|
return await step.beginDialog('/setupSecurity');
|
2018-11-01 21:06:11 -03:00
|
|
|
} else {
|
|
|
|
unknownCommand = true;
|
|
|
|
}
|
2018-09-24 15:27:26 -03:00
|
|
|
|
2018-11-01 21:06:11 -03:00
|
|
|
if (unknownCommand) {
|
|
|
|
await step.context.sendActivity(Messages[locale].unknown_command);
|
|
|
|
} else {
|
2019-01-31 11:32:33 -02:00
|
|
|
await step.context.sendActivity(Messages[locale].finished_working);
|
2018-11-01 21:06:11 -03:00
|
|
|
}
|
|
|
|
await step.endDialog();
|
2018-12-06 10:16:28 -02:00
|
|
|
|
|
|
|
return await step.replaceDialog('/answer', { query: text });
|
2018-04-21 02:59:30 -03:00
|
|
|
}
|
2018-11-01 21:06:11 -03:00
|
|
|
])
|
|
|
|
);
|
2018-09-16 17:00:17 -03:00
|
|
|
}
|
|
|
|
|
2019-02-23 13:17:21 -03:00
|
|
|
private static setupSecurityDialogs(min: GBMinInstance) {
|
2019-01-31 11:32:33 -02:00
|
|
|
min.dialogs.add(
|
|
|
|
new WaterfallDialog('/setupSecurity', [
|
|
|
|
async step => {
|
|
|
|
const locale = step.context.activity.locale;
|
|
|
|
const prompt = Messages[locale].enter_authenticator_tenant;
|
|
|
|
|
|
|
|
return await step.prompt('textPrompt', prompt);
|
|
|
|
},
|
|
|
|
async step => {
|
|
|
|
step.activeDialog.state.authenticatorTenant = step.result;
|
|
|
|
const locale = step.context.activity.locale;
|
|
|
|
const prompt = Messages[locale].enter_authenticator_authority_host_url;
|
|
|
|
|
|
|
|
return await step.prompt('textPrompt', prompt);
|
|
|
|
},
|
|
|
|
async step => {
|
|
|
|
step.activeDialog.state.authenticatorAuthorityHostUrl = step.result;
|
|
|
|
const locale = step.context.activity.locale;
|
|
|
|
const prompt = Messages[locale].enter_authenticator_client_id;
|
|
|
|
|
|
|
|
return await step.prompt('textPrompt', prompt);
|
|
|
|
},
|
|
|
|
async step => {
|
|
|
|
step.activeDialog.state.authenticatorClientId = step.result;
|
|
|
|
const locale = step.context.activity.locale;
|
|
|
|
const prompt = Messages[locale].enter_authenticator_client_secret;
|
|
|
|
|
|
|
|
return await step.prompt('textPrompt', prompt);
|
|
|
|
},
|
|
|
|
async step => {
|
|
|
|
step.activeDialog.state.authenticatorClientSecret = step.result;
|
|
|
|
|
|
|
|
await min.adminService.updateSecurityInfo(
|
|
|
|
min.instance.instanceId,
|
|
|
|
step.activeDialog.state.authenticatorTenant,
|
|
|
|
step.activeDialog.state.authenticatorAuthorityHostUrl,
|
|
|
|
step.activeDialog.state.authenticatorClientId,
|
|
|
|
step.activeDialog.state.authenticatorClientSecret
|
|
|
|
);
|
|
|
|
|
|
|
|
const locale = step.context.activity.locale;
|
2019-03-08 19:13:00 -03:00
|
|
|
const state = `${min.instance.instanceId}${crypto.getRandomValues(new Uint32Array(16))[0]}`;
|
2019-01-31 11:32:33 -02:00
|
|
|
|
2019-03-08 19:13:00 -03:00
|
|
|
min.adminService.setValue(min.instance.instanceId, 'AntiCSRFAttackState', state);
|
2019-01-31 11:32:33 -02:00
|
|
|
|
2019-03-08 06:37:13 -03:00
|
|
|
const url = `https://login.microsoftonline.com/${
|
|
|
|
min.instance.authenticatorTenant
|
2019-05-15 22:30:14 -03:00
|
|
|
}/oauth2/authorize?client_id=${min.instance.authenticatorClientId}&response_type=code&redirect_uri=${urlJoin(
|
|
|
|
min.instance.botEndpoint,
|
|
|
|
min.instance.botId,
|
|
|
|
'/token'
|
|
|
|
)}&state=${state}&response_mode=query`;
|
2019-01-31 11:32:33 -02:00
|
|
|
|
|
|
|
await step.context.sendActivity(Messages[locale].consent(url));
|
|
|
|
|
2019-03-08 06:37:13 -03:00
|
|
|
return await step.replaceDialog('/ask', { isReturning: true });
|
2019-01-31 11:32:33 -02:00
|
|
|
}
|
|
|
|
])
|
|
|
|
);
|
2018-04-21 02:59:30 -03:00
|
|
|
}
|
|
|
|
}
|