2021-03-13 23:06:03 +08:00
// Copyright 2021 The casbin Authors. All Rights Reserved.
2021-02-14 00:22:24 +08:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package controllers
import (
2021-12-10 00:23:04 +08:00
"encoding/base64"
2021-03-15 00:49:16 +08:00
"encoding/json"
2021-02-14 00:22:24 +08:00
"fmt"
2021-12-06 21:46:50 +08:00
"net/url"
2021-06-11 23:34:45 +08:00
"strconv"
2021-06-02 13:39:01 +08:00
"strings"
2021-07-18 07:54:49 +08:00
"time"
2021-02-14 00:22:24 +08:00
"github.com/astaxie/beego"
2021-07-25 09:34:25 +08:00
"github.com/casbin/casdoor/idp"
"github.com/casbin/casdoor/object"
2021-08-21 22:16:25 +08:00
"github.com/casbin/casdoor/proxy"
2021-07-25 09:34:25 +08:00
"github.com/casbin/casdoor/util"
2021-02-14 00:22:24 +08:00
)
2021-03-20 22:34:22 +08:00
func codeToResponse ( code * object . Code ) * Response {
if code . Code == "" {
return & Response { Status : "error" , Msg : code . Message , Data : code . Code }
}
2021-08-07 22:02:56 +08:00
return & Response { Status : "ok" , Msg : "" , Data : code . Code }
2021-03-20 22:34:22 +08:00
}
2021-08-07 22:02:56 +08:00
// HandleLoggedIn ...
func ( c * ApiController ) HandleLoggedIn ( application * object . Application , user * object . User , form * RequestForm ) ( resp * Response ) {
2021-05-01 19:45:40 +08:00
userId := user . GetId ( )
2021-03-20 10:51:00 +08:00
if form . Type == ResponseTypeLogin {
2021-07-18 07:15:22 +08:00
c . SetSessionUsername ( userId )
2021-03-20 10:51:00 +08:00
util . LogInfo ( c . Ctx , "API: [%s] signed in" , userId )
2021-03-20 13:05:34 +08:00
resp = & Response { Status : "ok" , Msg : "" , Data : userId }
2021-03-20 10:51:00 +08:00
} else if form . Type == ResponseTypeCode {
clientId := c . Input ( ) . Get ( "clientId" )
responseType := c . Input ( ) . Get ( "responseType" )
redirectUri := c . Input ( ) . Get ( "redirectUri" )
scope := c . Input ( ) . Get ( "scope" )
state := c . Input ( ) . Get ( "state" )
code := object . GetOAuthCode ( userId , clientId , responseType , redirectUri , scope , state )
resp = codeToResponse ( code )
2021-06-20 22:17:03 +08:00
if application . HasPromptPage ( ) {
// The prompt page needs the user to be signed in
2021-07-18 07:15:22 +08:00
c . SetSessionUsername ( userId )
2021-06-20 22:17:03 +08:00
}
2021-03-20 10:51:00 +08:00
} else {
2021-03-28 08:59:12 +08:00
resp = & Response { Status : "error" , Msg : fmt . Sprintf ( "Unknown response type: %s" , form . Type ) }
2021-03-20 10:51:00 +08:00
}
2021-07-18 07:54:49 +08:00
// if user did not check auto signin
if resp . Status == "ok" && ! form . AutoSignin {
timestamp := time . Now ( ) . Unix ( )
timestamp += 3600 * 24
c . SetSessionData ( & SessionData {
ExpireTime : timestamp ,
} )
}
2021-03-20 10:51:00 +08:00
return resp
}
2021-08-07 22:02:56 +08:00
// GetApplicationLogin ...
2021-03-29 23:40:25 +08:00
// @Title GetApplicationLogin
2021-12-03 20:42:36 +08:00
// @Tag Login API
2021-03-29 23:40:25 +08:00
// @Description get application login
// @Param clientId query string true "client id"
// @Param responseType query string true "response type"
// @Param redirectUri query string true "redirect uri"
// @Param scope query string true "scope"
// @Param state query string true "state"
// @Success 200 {object} controllers.api_controller.Response The Response object
// @router /update-application [get]
2021-03-20 10:51:00 +08:00
func ( c * ApiController ) GetApplicationLogin ( ) {
clientId := c . Input ( ) . Get ( "clientId" )
responseType := c . Input ( ) . Get ( "responseType" )
redirectUri := c . Input ( ) . Get ( "redirectUri" )
scope := c . Input ( ) . Get ( "scope" )
state := c . Input ( ) . Get ( "state" )
msg , application := object . CheckOAuthLogin ( clientId , responseType , redirectUri , scope , state )
if msg != "" {
2021-08-08 16:00:19 +08:00
c . ResponseError ( msg , application )
2021-03-20 10:51:00 +08:00
} else {
2021-08-08 16:00:19 +08:00
c . ResponseOk ( application )
2021-03-20 10:51:00 +08:00
}
2021-03-15 19:11:41 +08:00
}
2021-08-01 14:48:29 +08:00
func setHttpClient ( idProvider idp . IdProvider , providerType string ) {
if providerType == "GitHub" || providerType == "Google" || providerType == "Facebook" || providerType == "LinkedIn" {
2021-08-21 22:16:25 +08:00
idProvider . SetHttpClient ( proxy . ProxyHttpClient )
2021-08-01 14:48:29 +08:00
} else {
2021-08-21 22:16:25 +08:00
idProvider . SetHttpClient ( proxy . DefaultHttpClient )
2021-08-01 14:48:29 +08:00
}
}
2021-08-07 22:02:56 +08:00
// Login ...
2021-03-29 23:40:25 +08:00
// @Title Login
2021-12-03 20:42:36 +08:00
// @Tag Login API
2021-03-29 23:40:25 +08:00
// @Description login
// @Param oAuthParams query string true "oAuth parameters"
// @Param body body RequestForm true "Login information"
// @Success 200 {object} controllers.api_controller.Response The Response object
// @router /login [post]
2021-03-20 00:23:37 +08:00
func ( c * ApiController ) Login ( ) {
2021-08-08 16:00:19 +08:00
resp := & Response { }
2021-03-20 09:11:03 +08:00
var form RequestForm
2021-03-15 00:49:16 +08:00
err := json . Unmarshal ( c . Ctx . Input . RequestBody , & form )
if err != nil {
2021-08-08 11:06:45 +08:00
c . ResponseError ( err . Error ( ) )
2021-06-09 19:54:26 +08:00
return
2021-03-15 00:49:16 +08:00
}
2021-02-14 00:22:24 +08:00
2021-03-20 00:23:37 +08:00
if form . Username != "" {
2021-03-20 13:05:34 +08:00
if form . Type == ResponseTypeLogin {
2021-07-18 07:15:22 +08:00
if c . GetSessionUsername ( ) != "" {
2021-08-08 11:06:45 +08:00
c . ResponseError ( "Please sign out first before signing in" , c . GetSessionUsername ( ) )
2021-03-20 13:05:34 +08:00
return
}
2021-03-20 00:23:37 +08:00
}
2021-02-21 22:33:53 +08:00
2021-06-02 13:39:01 +08:00
var user * object . User
var msg string
if form . Password == "" {
var verificationCodeType string
2021-12-07 00:05:53 +08:00
var checkResult string
2021-06-02 13:39:01 +08:00
// check result through Email or Phone
2021-12-07 00:05:53 +08:00
if strings . Contains ( form . Username , "@" ) {
2021-06-02 13:39:01 +08:00
verificationCodeType = "email"
2021-12-07 00:05:53 +08:00
checkResult = object . CheckVerificationCode ( form . Username , form . Code )
2021-06-02 13:39:01 +08:00
} else {
verificationCodeType = "phone"
2021-12-07 00:05:53 +08:00
if len ( form . PhonePrefix ) == 0 {
responseText := fmt . Sprintf ( "%s%s" , verificationCodeType , "No phone prefix" )
2021-06-02 13:39:01 +08:00
c . ResponseError ( responseText )
return
}
2021-12-07 00:05:53 +08:00
checkPhone := fmt . Sprintf ( "+%s%s" , form . PhonePrefix , form . Username )
checkResult = object . CheckVerificationCode ( checkPhone , form . Code )
2021-06-02 13:39:01 +08:00
}
2021-12-07 00:05:53 +08:00
if len ( checkResult ) != 0 {
responseText := fmt . Sprintf ( "%s%s" , verificationCodeType , checkResult )
c . ResponseError ( responseText )
return
2021-06-02 13:39:01 +08:00
}
2021-12-07 00:05:53 +08:00
// disable the verification code
object . DisableVerificationCode ( form . Username )
user = object . GetUserByFields ( form . Organization , form . Username )
2021-06-02 13:39:01 +08:00
if user == nil {
c . ResponseError ( "No such user." )
return
}
} else {
password := form . Password
2021-08-15 21:57:36 +08:00
user , msg = object . CheckUserPassword ( form . Organization , form . Username , password )
2021-06-02 13:39:01 +08:00
}
2021-02-14 00:22:24 +08:00
2021-03-20 00:23:37 +08:00
if msg != "" {
2021-08-08 11:06:45 +08:00
resp = & Response { Status : "error" , Msg : msg }
2021-03-20 00:23:37 +08:00
} else {
2021-06-20 22:17:03 +08:00
application := object . GetApplication ( fmt . Sprintf ( "admin/%s" , form . Application ) )
resp = c . HandleLoggedIn ( application , user , & form )
2021-07-07 14:59:03 +08:00
2021-11-07 16:51:16 +08:00
record := object . NewRecord ( c . Ctx )
2021-07-07 14:59:03 +08:00
record . Organization = application . Organization
2021-11-07 17:20:15 +08:00
record . User = user . Name
2021-11-07 23:53:17 +08:00
go object . AddRecord ( record )
2021-03-20 00:23:37 +08:00
}
} else if form . Provider != "" {
application := object . GetApplication ( fmt . Sprintf ( "admin/%s" , form . Application ) )
2021-06-21 01:01:16 +08:00
organization := object . GetOrganization ( fmt . Sprintf ( "%s/%s" , "admin" , application . Organization ) )
2021-03-20 00:23:37 +08:00
provider := object . GetProvider ( fmt . Sprintf ( "admin/%s" , form . Provider ) )
2021-06-14 21:35:19 +08:00
providerItem := application . GetProviderItem ( provider . Name )
2021-08-08 10:50:29 +08:00
if ! providerItem . IsProviderVisible ( ) {
2021-08-08 11:06:45 +08:00
c . ResponseError ( fmt . Sprintf ( "The provider: %s is not enabled for the application" , provider . Name ) )
2021-08-08 10:50:29 +08:00
return
}
2021-02-14 00:22:24 +08:00
2021-12-06 21:46:50 +08:00
userInfo := & idp . UserInfo { }
if provider . Category == "SAML" {
// SAML
userInfo . Id , err = object . ParseSamlResponse ( form . SamlResponse )
if err != nil {
c . ResponseError ( err . Error ( ) )
return
}
} else if provider . Category == "OAuth" {
// OAuth
idProvider := idp . GetIdProvider ( provider . Type , provider . ClientId , provider . ClientSecret , form . RedirectUri )
if idProvider == nil {
c . ResponseError ( fmt . Sprintf ( "The provider type: %s is not supported" , provider . Type ) )
return
}
2021-06-06 11:17:37 +08:00
2021-12-06 21:46:50 +08:00
setHttpClient ( idProvider , provider . Type )
2021-02-14 00:22:24 +08:00
2021-12-06 21:46:50 +08:00
if form . State != beego . AppConfig . String ( "authState" ) && form . State != application . Name {
c . ResponseError ( fmt . Sprintf ( "state expected: \"%s\", but got: \"%s\"" , beego . AppConfig . String ( "authState" ) , form . State ) )
return
}
2021-02-14 00:22:24 +08:00
2021-12-06 21:46:50 +08:00
// https://github.com/golang/oauth2/issues/123#issuecomment-103715338
token , err := idProvider . GetToken ( form . Code )
if err != nil {
c . ResponseError ( err . Error ( ) )
return
}
2021-02-14 00:22:24 +08:00
2021-12-06 21:46:50 +08:00
if ! token . Valid ( ) {
c . ResponseError ( "Invalid token" )
return
}
2021-02-21 23:51:40 +08:00
2021-12-06 21:46:50 +08:00
userInfo , err = idProvider . GetUserInfo ( token )
if err != nil {
c . ResponseError ( fmt . Sprintf ( "Failed to login in: %s" , err . Error ( ) ) )
return
}
2021-03-20 00:23:37 +08:00
}
2021-02-21 23:51:40 +08:00
2021-03-20 00:23:37 +08:00
if form . Method == "signup" {
2021-12-06 21:46:50 +08:00
user := & object . User { }
if provider . Category == "SAML" {
user = object . GetUserByField ( application . Organization , "id" , userInfo . Id )
} else if provider . Category == "OAuth" {
user := object . GetUserByField ( application . Organization , provider . Type , userInfo . Id )
if user == nil {
user = object . GetUserByField ( application . Organization , provider . Type , userInfo . Username )
}
if user == nil {
user = object . GetUserByField ( application . Organization , "name" , userInfo . Username )
}
2021-06-12 12:46:25 +08:00
}
2021-06-01 23:14:49 +08:00
2021-11-06 15:52:03 +08:00
if user != nil && user . IsDeleted == false {
2021-08-08 21:36:19 +08:00
// Sign in via OAuth (want to sign up but already have account)
2021-06-14 21:35:19 +08:00
2021-08-08 21:36:19 +08:00
if user . IsForbidden {
c . ResponseError ( "the user is forbidden to sign in, please contact the administrator" )
}
2021-02-21 23:51:40 +08:00
2021-06-20 22:17:03 +08:00
resp = c . HandleLoggedIn ( application , user , & form )
2021-07-07 14:59:03 +08:00
2021-11-07 16:51:16 +08:00
record := object . NewRecord ( c . Ctx )
2021-07-07 14:59:03 +08:00
record . Organization = application . Organization
2021-11-07 17:20:15 +08:00
record . User = user . Name
2021-11-07 23:53:17 +08:00
go object . AddRecord ( record )
2021-12-06 21:46:50 +08:00
} else if provider . Category == "OAuth" {
2021-06-14 21:35:19 +08:00
// Sign up via OAuth
if ! application . EnableSignUp {
2021-08-08 11:06:45 +08:00
c . ResponseError ( fmt . Sprintf ( "The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account, please contact your IT support" , provider . Type , userInfo . Username , userInfo . DisplayName ) )
2021-03-26 21:55:39 +08:00
return
2021-06-14 21:35:19 +08:00
}
if ! providerItem . CanSignUp {
2021-08-08 11:06:45 +08:00
c . ResponseError ( fmt . Sprintf ( "The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account via %s, please use another way to sign up" , provider . Type , userInfo . Username , userInfo . DisplayName , provider . Type ) )
2021-03-26 21:55:39 +08:00
return
2021-02-21 23:51:40 +08:00
}
2021-06-14 21:35:19 +08:00
properties := map [ string ] string { }
properties [ "no" ] = strconv . Itoa ( len ( object . GetUsers ( application . Organization ) ) + 2 )
2021-12-06 21:46:50 +08:00
user = & object . User {
2021-06-21 10:22:47 +08:00
Owner : application . Organization ,
Name : userInfo . Username ,
CreatedTime : util . GetCurrentTime ( ) ,
Id : util . GenerateId ( ) ,
Type : "normal-user" ,
DisplayName : userInfo . DisplayName ,
Avatar : userInfo . AvatarUrl ,
2021-08-27 23:43:43 +08:00
Address : [ ] string { } ,
2021-06-21 10:22:47 +08:00
Email : userInfo . Email ,
2021-08-28 11:13:38 +08:00
Score : getInitScore ( ) ,
2021-06-21 10:22:47 +08:00
IsAdmin : false ,
IsGlobalAdmin : false ,
IsForbidden : false ,
2021-11-06 15:52:03 +08:00
IsDeleted : false ,
2021-06-21 10:22:47 +08:00
SignupApplication : application . Name ,
Properties : properties ,
2021-06-14 21:35:19 +08:00
}
// sync info from 3rd-party if possible
2021-06-21 00:54:07 +08:00
object . SetUserOAuthProperties ( organization , user , provider . Type , userInfo )
2021-06-14 21:35:19 +08:00
2021-12-06 21:46:50 +08:00
object . AddUser ( user )
2021-06-14 21:35:19 +08:00
object . LinkUserAccount ( user , provider . Type , userInfo . Id )
2021-06-20 22:17:03 +08:00
resp = c . HandleLoggedIn ( application , user , & form )
2021-07-07 14:59:03 +08:00
2021-11-07 16:51:16 +08:00
record := object . NewRecord ( c . Ctx )
2021-07-07 14:59:03 +08:00
record . Organization = application . Organization
2021-11-07 17:20:15 +08:00
record . User = user . Name
2021-11-07 23:53:17 +08:00
go object . AddRecord ( record )
2021-12-06 21:46:50 +08:00
} else if provider . Category == "SAML" {
resp = & Response { Status : "error" , Msg : "The account does not exist" }
2021-02-14 00:22:24 +08:00
}
2021-03-20 13:05:34 +08:00
//resp = &Response{Status: "ok", Msg: "", Data: res}
2021-06-09 21:27:20 +08:00
} else { // form.Method != "signup"
2021-07-18 07:15:22 +08:00
userId := c . GetSessionUsername ( )
2021-03-20 00:23:37 +08:00
if userId == "" {
2021-08-08 11:06:45 +08:00
c . ResponseError ( "The account does not exist" , userInfo )
2021-03-20 00:23:37 +08:00
return
}
2021-06-18 23:25:24 +08:00
oldUser := object . GetUserByField ( application . Organization , provider . Type , userInfo . Id )
if oldUser == nil {
oldUser = object . GetUserByField ( application . Organization , provider . Type , userInfo . Username )
}
if oldUser != nil {
2021-08-08 11:06:45 +08:00
c . ResponseError ( fmt . Sprintf ( "The account for provider: %s and username: %s (%s) is already linked to another account: %s (%s)" , provider . Type , userInfo . Username , userInfo . DisplayName , oldUser . Name , oldUser . DisplayName ) )
2021-06-18 23:25:24 +08:00
return
}
2021-04-18 23:14:46 +08:00
user := object . GetUser ( userId )
2021-04-27 19:35:40 +08:00
// sync info from 3rd-party if possible
2021-06-21 00:54:07 +08:00
object . SetUserOAuthProperties ( organization , user , provider . Type , userInfo )
2021-04-27 19:35:40 +08:00
2021-05-31 00:55:29 +08:00
isLinked := object . LinkUserAccount ( user , provider . Type , userInfo . Id )
2021-03-24 00:11:20 +08:00
if isLinked {
resp = & Response { Status : "ok" , Msg : "" , Data : isLinked }
2021-03-20 00:23:37 +08:00
} else {
2021-03-28 08:59:12 +08:00
resp = & Response { Status : "error" , Msg : "Failed to link user account" , Data : isLinked }
2021-03-20 00:23:37 +08:00
}
2021-02-14 00:22:24 +08:00
}
2021-03-20 00:23:37 +08:00
} else {
2021-10-09 21:15:57 +08:00
if c . GetSessionUsername ( ) != "" {
// user already signed in to Casdoor, so let the user click the avatar button to do the quick sign-in
application := object . GetApplication ( fmt . Sprintf ( "admin/%s" , form . Application ) )
user := c . getCurrentUser ( )
resp = c . HandleLoggedIn ( application , user , & form )
} else {
c . ResponseError ( fmt . Sprintf ( "unknown authentication type (not password or provider), form = %s" , util . StructToJson ( form ) ) )
return
}
2021-02-14 00:22:24 +08:00
}
c . Data [ "json" ] = resp
c . ServeJSON ( )
}
2021-12-06 21:46:50 +08:00
func ( c * ApiController ) GetSamlLogin ( ) {
providerId := c . Input ( ) . Get ( "id" )
authURL , err := object . GenerateSamlLoginUrl ( providerId )
if err != nil {
c . ResponseError ( err . Error ( ) )
}
c . ResponseOk ( authURL )
}
func ( c * ApiController ) HandleSamlLogin ( ) {
relayState := c . Input ( ) . Get ( "RelayState" )
samlResponse := c . Input ( ) . Get ( "SAMLResponse" )
2021-12-10 00:23:04 +08:00
decode , err := base64 . StdEncoding . DecodeString ( relayState )
if err != nil {
c . ResponseError ( err . Error ( ) )
}
slice := strings . Split ( string ( decode ) , "&" )
relayState = url . QueryEscape ( relayState )
2021-12-06 21:46:50 +08:00
samlResponse = url . QueryEscape ( samlResponse )
2021-12-10 00:23:04 +08:00
targetUrl := fmt . Sprintf ( "%s?relayState=%s&samlResponse=%s" ,
slice [ 4 ] , relayState , samlResponse )
2021-12-06 21:46:50 +08:00
c . Redirect ( targetUrl , 303 )
}