casdoor/object/check.go

117 lines
3.1 KiB
Go
Raw Normal View History

2021-03-13 23:06:03 +08:00
// Copyright 2021 The casbin Authors. All Rights Reserved.
2021-03-06 16:39:17 +08:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2021-02-11 22:56:08 +08:00
package object
2021-05-01 16:50:47 +08:00
import (
"fmt"
"regexp"
2021-05-01 17:45:01 +08:00
"github.com/casdoor/casdoor/util"
2021-05-01 16:50:47 +08:00
)
var reWhiteSpace *regexp.Regexp
func init() {
reWhiteSpace, _ = regexp.Compile("\\s")
}
2021-02-14 01:04:51 +08:00
2021-06-17 00:49:02 +08:00
func CheckUserSignup(application *Application, organization *Organization, username string, password string, displayName string, email string, phone string, affiliation string) string {
if organization == nil {
return "organization does not exist"
}
if application.IsSignupItemVisible("Username") {
if len(username) <= 1 {
return "username must have at least 2 characters"
} else if reWhiteSpace.MatchString(username) {
return "username cannot contain white spaces"
} else if HasUserByField(organization.Name, "name", username) {
return "username already exists"
}
}
2021-05-15 13:54:23 +08:00
2021-06-17 00:49:02 +08:00
if len(password) <= 5 {
2021-05-16 21:52:50 +08:00
return "password must have at least 6 characters"
2021-02-11 22:56:08 +08:00
}
2021-06-17 00:49:02 +08:00
if application.IsSignupItemVisible("Email") {
if HasUserByField(organization.Name, "email", email) {
return "email already exists"
} else if !util.IsEmailValid(email) {
return "email is invalid"
}
}
if application.IsSignupItemVisible("Phone") {
if HasUserByField(organization.Name, "phone", phone) {
return "phone already exists"
} else if organization.PhonePrefix == "86" && !util.IsPhoneCnValid(phone) {
return "phone number is invalid"
}
}
if application.IsSignupItemVisible("Display name") {
if displayName == "" {
return "displayName cannot be blank"
}
}
if application.IsSignupItemVisible("Affiliation") {
if affiliation == "" {
return "affiliation cannot be blank"
}
}
return ""
2021-02-11 22:56:08 +08:00
}
2021-05-16 21:04:26 +08:00
func CheckPassword(user *User, password string) string {
2021-05-16 22:58:30 +08:00
organization := GetOrganizationByUser(user)
2021-05-05 23:32:21 +08:00
if organization.PasswordType == "plain" {
2021-05-03 10:13:32 +08:00
if password == user.Password {
return ""
} else {
return "password incorrect"
}
2021-05-05 23:32:21 +08:00
} else if organization.PasswordType == "salt" {
2021-05-16 18:18:55 +08:00
if password == user.Password || getSaltedPassword(password, organization.PasswordSalt) == user.Password {
2021-05-03 10:13:32 +08:00
return ""
} else {
return "password incorrect"
}
} else {
2021-05-05 23:32:21 +08:00
return fmt.Sprintf("unsupported password type: %s", organization.PasswordType)
2021-05-03 10:13:32 +08:00
}
}
2021-05-01 19:45:40 +08:00
func CheckUserLogin(organization string, username string, password string) (*User, string) {
2021-05-01 20:23:20 +08:00
user := GetUserByFields(organization, username)
2021-05-01 19:45:40 +08:00
if user == nil {
2021-05-01 20:23:20 +08:00
return nil, "the user does not exist, please sign up first"
2021-02-11 22:56:08 +08:00
}
2021-05-05 23:32:21 +08:00
if user.IsForbidden {
return nil, "the user is forbidden to sign in, please contact the administrator"
}
2021-05-16 21:04:26 +08:00
msg := CheckPassword(user, password)
2021-05-03 10:13:32 +08:00
if msg != "" {
return nil, msg
2021-02-11 22:56:08 +08:00
}
2021-05-01 19:45:40 +08:00
return user, ""
2021-02-11 22:56:08 +08:00
}