613 lines
20 KiB
Go
Raw Normal View History

2022-02-13 23:39:27 +08:00
// Copyright 2021 The Casdoor Authors. All Rights Reserved.
2021-02-14 00:22:24 +08:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package controllers
import (
"encoding/base64"
2021-03-15 00:49:16 +08:00
"encoding/json"
"encoding/xml"
2021-02-14 00:22:24 +08:00
"fmt"
"io/ioutil"
"net/url"
2021-06-11 23:34:45 +08:00
"strconv"
"strings"
"sync"
"time"
2021-02-14 00:22:24 +08:00
"github.com/casdoor/casdoor/captcha"
"github.com/casdoor/casdoor/conf"
2022-01-20 14:11:46 +08:00
"github.com/casdoor/casdoor/idp"
"github.com/casdoor/casdoor/object"
"github.com/casdoor/casdoor/proxy"
"github.com/casdoor/casdoor/util"
"github.com/google/uuid"
2021-02-14 00:22:24 +08:00
)
var (
wechatScanType string
lock sync.RWMutex
)
2021-03-20 22:34:22 +08:00
func codeToResponse(code *object.Code) *Response {
if code.Code == "" {
return &Response{Status: "error", Msg: code.Message, Data: code.Code}
}
2021-08-07 22:02:56 +08:00
return &Response{Status: "ok", Msg: "", Data: code.Code}
2021-03-20 22:34:22 +08:00
}
func tokenToResponse(token *object.Token) *Response {
if token.AccessToken == "" {
return &Response{Status: "error", Msg: "fail to get accessToken", Data: token.AccessToken}
}
return &Response{Status: "ok", Msg: "", Data: token.AccessToken, Data2: token.RefreshToken}
}
2021-08-07 22:02:56 +08:00
// HandleLoggedIn ...
func (c *ApiController) HandleLoggedIn(application *object.Application, user *object.User, form *RequestForm) (resp *Response) {
2021-05-01 19:45:40 +08:00
userId := user.GetId()
2022-07-13 00:50:32 +08:00
allowed, err := object.CheckAccessPermission(userId, application)
if err != nil {
c.ResponseError(err.Error(), nil)
return
}
if !allowed {
c.ResponseError(c.T("auth:Unauthorized operation"))
return
}
2021-03-20 10:51:00 +08:00
if form.Type == ResponseTypeLogin {
c.SetSessionUsername(userId)
2021-03-20 10:51:00 +08:00
util.LogInfo(c.Ctx, "API: [%s] signed in", userId)
2021-03-20 13:05:34 +08:00
resp = &Response{Status: "ok", Msg: "", Data: userId}
2021-03-20 10:51:00 +08:00
} else if form.Type == ResponseTypeCode {
clientId := c.Input().Get("clientId")
responseType := c.Input().Get("responseType")
redirectUri := c.Input().Get("redirectUri")
scope := c.Input().Get("scope")
state := c.Input().Get("state")
nonce := c.Input().Get("nonce")
challengeMethod := c.Input().Get("code_challenge_method")
codeChallenge := c.Input().Get("code_challenge")
if challengeMethod != "S256" && challengeMethod != "null" && challengeMethod != "" {
c.ResponseError(c.T("auth:Challenge method should be S256"))
return
}
code := object.GetOAuthCode(userId, clientId, responseType, redirectUri, scope, state, nonce, codeChallenge, c.Ctx.Request.Host, c.GetAcceptLanguage())
2021-03-20 10:51:00 +08:00
resp = codeToResponse(code)
2021-06-20 22:17:03 +08:00
2021-12-28 17:13:45 +08:00
if application.EnableSigninSession || application.HasPromptPage() {
2021-06-20 22:17:03 +08:00
// The prompt page needs the user to be signed in
c.SetSessionUsername(userId)
2021-06-20 22:17:03 +08:00
}
} else if form.Type == ResponseTypeToken || form.Type == ResponseTypeIdToken { // implicit flow
if !object.IsGrantTypeValid(form.Type, application.GrantTypes) {
resp = &Response{Status: "error", Msg: fmt.Sprintf("error: grant_type: %s is not supported in this application", form.Type), Data: ""}
} else {
scope := c.Input().Get("scope")
token, _ := object.GetTokenByUser(application, user, scope, c.Ctx.Request.Host)
resp = tokenToResponse(token)
}
} else if form.Type == ResponseTypeSaml { // saml flow
res, redirectUrl, method, err := object.GetSamlResponse(application, user, form.SamlRequest, c.Ctx.Request.Host)
if err != nil {
c.ResponseError(err.Error(), nil)
return
}
resp = &Response{Status: "ok", Msg: "", Data: res, Data2: map[string]string{"redirectUrl": redirectUrl, "method": method}}
} else if form.Type == ResponseTypeCas {
// not oauth but CAS SSO protocol
service := c.Input().Get("service")
resp = wrapErrorResponse(nil)
if service != "" {
st, err := object.GenerateCasToken(userId, service)
if err != nil {
resp = wrapErrorResponse(err)
} else {
resp.Data = st
}
}
if application.EnableSigninSession || application.HasPromptPage() {
// The prompt page needs the user to be signed in
c.SetSessionUsername(userId)
}
2021-03-20 10:51:00 +08:00
} else {
2022-08-09 16:50:49 +08:00
resp = wrapErrorResponse(fmt.Errorf("unknown response type: %s", form.Type))
2021-03-20 10:51:00 +08:00
}
// if user did not check auto signin
if resp.Status == "ok" && !form.AutoSignin {
timestamp := time.Now().Unix()
timestamp += 3600 * 24
c.SetSessionData(&SessionData{
ExpireTime: timestamp,
})
}
feat: app session control and db migrate (#1539) * feat: integrate application session management into Casdoor's session management (#774) && standardized the database migration process (#1533) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) * feat: integrate application session management into Casdoor's session management (#774) && standardized the database migration process * feat: integrate application session management into Casdoor's session management (#774) && standardized the database migration process * feat: integrate application session management into Casdoor's session management (#774) && standardized the database migration process --------- Co-authored-by: Zayn Xie <84443886+xiaoniuren99@users.noreply.github.com> * fix: migrate err * fix: migrate err * feat: app session control and db migrate * feat: app session control and db migrate * feat: app session control and db migrate --------- Co-authored-by: Zayn Xie <84443886+xiaoniuren99@users.noreply.github.com>
2023-02-12 09:33:24 +08:00
if resp.Status == "ok" && user.Owner == object.CasdoorOrganization && application.Name == object.CasdoorApplication {
object.AddSession(&object.Session{
Owner: user.Owner,
Name: user.Name,
Application: application.Name,
SessionId: []string{c.Ctx.Input.CruSession.SessionID()},
})
}
2021-03-20 10:51:00 +08:00
return resp
}
2021-08-07 22:02:56 +08:00
// GetApplicationLogin ...
// @Title GetApplicationLogin
// @Tag Login API
// @Description get application login
// @Param clientId query string true "client id"
// @Param responseType query string true "response type"
// @Param redirectUri query string true "redirect uri"
// @Param scope query string true "scope"
// @Param state query string true "state"
// @Success 200 {object} Response The Response object
// @router /get-app-login [get]
2021-03-20 10:51:00 +08:00
func (c *ApiController) GetApplicationLogin() {
clientId := c.Input().Get("clientId")
responseType := c.Input().Get("responseType")
redirectUri := c.Input().Get("redirectUri")
scope := c.Input().Get("scope")
state := c.Input().Get("state")
msg, application := object.CheckOAuthLogin(clientId, responseType, redirectUri, scope, state, c.GetAcceptLanguage())
application = object.GetMaskedApplication(application, "")
2021-03-20 10:51:00 +08:00
if msg != "" {
2021-08-08 16:00:19 +08:00
c.ResponseError(msg, application)
2021-03-20 10:51:00 +08:00
} else {
2021-08-08 16:00:19 +08:00
c.ResponseOk(application)
2021-03-20 10:51:00 +08:00
}
2021-03-15 19:11:41 +08:00
}
2021-08-01 14:48:29 +08:00
func setHttpClient(idProvider idp.IdProvider, providerType string) {
if isProxyProviderType(providerType) {
2021-08-21 22:16:25 +08:00
idProvider.SetHttpClient(proxy.ProxyHttpClient)
2021-08-01 14:48:29 +08:00
} else {
2021-08-21 22:16:25 +08:00
idProvider.SetHttpClient(proxy.DefaultHttpClient)
2021-08-01 14:48:29 +08:00
}
}
func isProxyProviderType(providerType string) bool {
providerTypes := []string{
"GitHub",
"Google",
"Facebook",
"LinkedIn",
"Steam",
"Line",
"Amazon",
"Instagram",
"TikTok",
"Twitter",
"Uber",
"Yahoo",
}
for _, v := range providerTypes {
if strings.EqualFold(v, providerType) {
return true
}
}
return false
}
2021-08-07 22:02:56 +08:00
// Login ...
// @Title Login
// @Tag Login API
// @Description login
// @Param clientId query string true clientId
// @Param responseType query string true responseType
// @Param redirectUri query string true redirectUri
// @Param scope query string false scope
// @Param state query string false state
// @Param nonce query string false nonce
// @Param code_challenge_method query string false code_challenge_method
// @Param code_challenge query string false code_challenge
// @Param form body controllers.RequestForm true "Login information"
// @Success 200 {object} Response The Response object
// @router /login [post]
2021-03-20 00:23:37 +08:00
func (c *ApiController) Login() {
2021-08-08 16:00:19 +08:00
resp := &Response{}
2021-03-20 09:11:03 +08:00
var form RequestForm
2021-03-15 00:49:16 +08:00
err := json.Unmarshal(c.Ctx.Input.RequestBody, &form)
if err != nil {
2021-08-08 11:06:45 +08:00
c.ResponseError(err.Error())
2021-06-09 19:54:26 +08:00
return
2021-03-15 00:49:16 +08:00
}
2021-02-14 00:22:24 +08:00
2021-03-20 00:23:37 +08:00
if form.Username != "" {
2021-03-20 13:05:34 +08:00
if form.Type == ResponseTypeLogin {
if c.GetSessionUsername() != "" {
2023-03-19 21:47:49 +08:00
c.ResponseError(c.T("account:Please sign out first"), c.GetSessionUsername())
2021-03-20 13:05:34 +08:00
return
}
2021-03-20 00:23:37 +08:00
}
2021-02-21 22:33:53 +08:00
var user *object.User
var msg string
if form.Password == "" {
if user = object.GetUserByFields(form.Organization, form.Username); user == nil {
2023-01-06 20:24:14 +08:00
c.ResponseError(fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(form.Organization, form.Username)))
return
}
verificationCodeType := object.GetVerifyType(form.Username)
var checkDest string
if verificationCodeType == object.VerifyTypePhone {
form.CountryCode = user.GetCountryCode(form.CountryCode)
var ok bool
if checkDest, ok = util.GetE164Number(form.Username, form.CountryCode); !ok {
c.ResponseError(fmt.Sprintf(c.T("verification:Phone number is invalid in your region %s"), form.CountryCode))
return
}
}
// check result through Email or Phone
checkResult := object.CheckSigninCode(user, checkDest, form.Code, c.GetAcceptLanguage())
if len(checkResult) != 0 {
c.ResponseError(fmt.Sprintf("%s - %s", verificationCodeType, checkResult))
return
}
// disable the verification code
object.DisableVerificationCode(checkDest)
} else {
application := object.GetApplication(fmt.Sprintf("admin/%s", form.Application))
if application == nil {
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), form.Application))
return
}
if !application.EnablePassword {
c.ResponseError(c.T("auth:The login method: login with password is not enabled for the application"))
return
}
if object.CheckToEnableCaptcha(application) {
isHuman, err := captcha.VerifyCaptchaByCaptchaType(form.CaptchaType, form.CaptchaToken, form.ClientSecret)
if err != nil {
c.ResponseError(err.Error())
return
}
if !isHuman {
2023-03-19 21:47:49 +08:00
c.ResponseError(c.T("verification:Turing test failed."))
return
}
}
password := form.Password
user, msg = object.CheckUserPassword(form.Organization, form.Username, password, c.GetAcceptLanguage())
}
2021-02-14 00:22:24 +08:00
2021-03-20 00:23:37 +08:00
if msg != "" {
2021-08-08 11:06:45 +08:00
resp = &Response{Status: "error", Msg: msg}
2021-03-20 00:23:37 +08:00
} else {
2021-06-20 22:17:03 +08:00
application := object.GetApplication(fmt.Sprintf("admin/%s", form.Application))
if application == nil {
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), form.Application))
return
}
2021-06-20 22:17:03 +08:00
resp = c.HandleLoggedIn(application, user, &form)
2021-11-07 16:51:16 +08:00
record := object.NewRecord(c.Ctx)
record.Organization = application.Organization
2021-11-07 17:20:15 +08:00
record.User = user.Name
util.SafeGoroutine(func() { object.AddRecord(record) })
2021-03-20 00:23:37 +08:00
}
} else if form.Provider != "" {
var application *object.Application
if form.ClientId != "" {
application = object.GetApplicationByClientId(form.ClientId)
} else {
application = object.GetApplication(fmt.Sprintf("admin/%s", form.Application))
}
if application == nil {
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), form.Application))
return
}
2021-06-21 01:01:16 +08:00
organization := object.GetOrganization(fmt.Sprintf("%s/%s", "admin", application.Organization))
provider := object.GetProvider(util.GetId("admin", form.Provider))
2021-06-14 21:35:19 +08:00
providerItem := application.GetProviderItem(provider.Name)
2021-08-08 10:50:29 +08:00
if !providerItem.IsProviderVisible() {
c.ResponseError(fmt.Sprintf(c.T("auth:The provider: %s is not enabled for the application"), provider.Name))
2021-08-08 10:50:29 +08:00
return
}
2021-02-14 00:22:24 +08:00
userInfo := &idp.UserInfo{}
if provider.Category == "SAML" {
// SAML
userInfo.Id, err = object.ParseSamlResponse(form.SamlResponse, provider, c.Ctx.Request.Host)
if err != nil {
c.ResponseError(err.Error())
return
}
} else if provider.Category == "OAuth" {
// OAuth
clientId := provider.ClientId
clientSecret := provider.ClientSecret
if provider.Type == "WeChat" && strings.Contains(c.Ctx.Request.UserAgent(), "MicroMessenger") {
clientId = provider.ClientId2
clientSecret = provider.ClientSecret2
}
idProvider := idp.GetIdProvider(provider.Type, provider.SubType, clientId, clientSecret, provider.AppId, form.RedirectUri, provider.Domain, provider.CustomAuthUrl, provider.CustomTokenUrl, provider.CustomUserInfoUrl)
if idProvider == nil {
2023-03-19 21:47:49 +08:00
c.ResponseError(fmt.Sprintf(c.T("storage:The provider type: %s is not supported"), provider.Type))
return
}
2021-06-06 11:17:37 +08:00
setHttpClient(idProvider, provider.Type)
2021-02-14 00:22:24 +08:00
if form.State != conf.GetConfigString("authState") && form.State != application.Name {
c.ResponseError(fmt.Sprintf(c.T("auth:State expected: %s, but got: %s"), conf.GetConfigString("authState"), form.State))
return
}
2021-02-14 00:22:24 +08:00
// https://github.com/golang/oauth2/issues/123#issuecomment-103715338
token, err := idProvider.GetToken(form.Code)
if err != nil {
c.ResponseError(err.Error())
return
}
2021-02-14 00:22:24 +08:00
if !token.Valid() {
c.ResponseError(c.T("auth:Invalid token"))
return
}
2021-02-21 23:51:40 +08:00
userInfo, err = idProvider.GetUserInfo(token)
if err != nil {
c.ResponseError(fmt.Sprintf(c.T("auth:Failed to login in: %s"), err.Error()))
return
}
2021-03-20 00:23:37 +08:00
}
2021-02-21 23:51:40 +08:00
2021-03-20 00:23:37 +08:00
if form.Method == "signup" {
user := &object.User{}
if provider.Category == "SAML" {
user = object.GetUser(fmt.Sprintf("%s/%s", application.Organization, userInfo.Id))
} else if provider.Category == "OAuth" {
2021-12-12 20:07:51 +08:00
user = object.GetUserByField(application.Organization, provider.Type, userInfo.Id)
2021-06-12 12:46:25 +08:00
}
2021-06-01 23:14:49 +08:00
if user != nil && !user.IsDeleted {
2021-08-08 21:36:19 +08:00
// Sign in via OAuth (want to sign up but already have account)
2021-06-14 21:35:19 +08:00
2021-08-08 21:36:19 +08:00
if user.IsForbidden {
2023-03-19 21:47:49 +08:00
c.ResponseError(c.T("check:The user is forbidden to sign in, please contact the administrator"))
2021-08-08 21:36:19 +08:00
}
2021-02-21 23:51:40 +08:00
2021-06-20 22:17:03 +08:00
resp = c.HandleLoggedIn(application, user, &form)
2021-11-07 16:51:16 +08:00
record := object.NewRecord(c.Ctx)
record.Organization = application.Organization
2021-11-07 17:20:15 +08:00
record.User = user.Name
util.SafeGoroutine(func() { object.AddRecord(record) })
} else if provider.Category == "OAuth" {
2021-06-14 21:35:19 +08:00
// Sign up via OAuth
if !application.EnableSignUp {
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account, please contact your IT support"), provider.Type, userInfo.Username, userInfo.DisplayName))
2021-03-26 21:55:39 +08:00
return
2021-06-14 21:35:19 +08:00
}
if !providerItem.CanSignUp {
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account via %%s, please use another way to sign up"), provider.Type, userInfo.Username, userInfo.DisplayName, provider.Type))
2021-03-26 21:55:39 +08:00
return
2021-02-21 23:51:40 +08:00
}
2021-06-14 21:35:19 +08:00
if application.EnableLinkWithEmail {
// find user that has the same email
user = object.GetUserByField(application.Organization, "email", userInfo.Email)
}
if user == nil || user.IsDeleted {
// Handle username conflicts
tmpUser := object.GetUser(fmt.Sprintf("%s/%s", application.Organization, userInfo.Username))
if tmpUser != nil {
uid, err := uuid.NewRandom()
if err != nil {
c.ResponseError(err.Error())
return
}
uidStr := strings.Split(uid.String(), "-")
userInfo.Username = fmt.Sprintf("%s_%s", userInfo.Username, uidStr[1])
}
properties := map[string]string{}
properties["no"] = strconv.Itoa(object.GetUserCount(application.Organization, "", "") + 2)
initScore, err := getInitScore(organization)
if err != nil {
c.ResponseError(fmt.Errorf(c.T("account:Get init score failed, error: %w"), err).Error())
return
}
user = &object.User{
Owner: application.Organization,
Name: userInfo.Username,
CreatedTime: util.GetCurrentTime(),
Id: util.GenerateId(),
Type: "normal-user",
DisplayName: userInfo.DisplayName,
Avatar: userInfo.AvatarUrl,
Address: []string{},
Email: userInfo.Email,
Score: initScore,
IsAdmin: false,
IsGlobalAdmin: false,
IsForbidden: false,
IsDeleted: false,
SignupApplication: application.Name,
Properties: properties,
}
affected := object.AddUser(user)
if !affected {
c.ResponseError(fmt.Sprintf(c.T("auth:Failed to create user, user information is invalid: %s"), util.StructToJson(user)))
return
}
}
2021-06-14 21:35:19 +08:00
// sync info from 3rd-party if possible
object.SetUserOAuthProperties(organization, user, provider.Type, userInfo)
2021-06-14 21:35:19 +08:00
object.LinkUserAccount(user, provider.Type, userInfo.Id)
2021-06-20 22:17:03 +08:00
resp = c.HandleLoggedIn(application, user, &form)
2021-11-07 16:51:16 +08:00
record := object.NewRecord(c.Ctx)
record.Organization = application.Organization
2021-11-07 17:20:15 +08:00
record.User = user.Name
util.SafeGoroutine(func() { object.AddRecord(record) })
record2 := object.NewRecord(c.Ctx)
record2.Action = "signup"
record2.Organization = application.Organization
record2.User = user.Name
util.SafeGoroutine(func() { object.AddRecord(record2) })
} else if provider.Category == "SAML" {
2023-01-06 20:24:14 +08:00
resp = &Response{Status: "error", Msg: fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(application.Organization, userInfo.Id))}
2021-02-14 00:22:24 +08:00
}
// resp = &Response{Status: "ok", Msg: "", Data: res}
2021-06-09 21:27:20 +08:00
} else { // form.Method != "signup"
userId := c.GetSessionUsername()
2021-03-20 00:23:37 +08:00
if userId == "" {
2023-01-06 20:24:14 +08:00
c.ResponseError(fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(application.Organization, userInfo.Id)), userInfo)
2021-03-20 00:23:37 +08:00
return
}
2021-06-18 23:25:24 +08:00
oldUser := object.GetUserByField(application.Organization, provider.Type, userInfo.Id)
if oldUser != nil {
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) is already linked to another account: %s (%s)"), provider.Type, userInfo.Username, userInfo.DisplayName, oldUser.Name, oldUser.DisplayName))
2021-06-18 23:25:24 +08:00
return
}
2021-04-18 23:14:46 +08:00
user := object.GetUser(userId)
2021-04-27 19:35:40 +08:00
// sync info from 3rd-party if possible
object.SetUserOAuthProperties(organization, user, provider.Type, userInfo)
2021-04-27 19:35:40 +08:00
2021-05-31 00:55:29 +08:00
isLinked := object.LinkUserAccount(user, provider.Type, userInfo.Id)
2021-03-24 00:11:20 +08:00
if isLinked {
resp = &Response{Status: "ok", Msg: "", Data: isLinked}
2021-03-20 00:23:37 +08:00
} else {
2021-03-28 08:59:12 +08:00
resp = &Response{Status: "error", Msg: "Failed to link user account", Data: isLinked}
2021-03-20 00:23:37 +08:00
}
2021-02-14 00:22:24 +08:00
}
2021-03-20 00:23:37 +08:00
} else {
2021-10-09 21:15:57 +08:00
if c.GetSessionUsername() != "" {
// user already signed in to Casdoor, so let the user click the avatar button to do the quick sign-in
application := object.GetApplication(fmt.Sprintf("admin/%s", form.Application))
if application == nil {
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), form.Application))
return
}
2021-10-09 21:15:57 +08:00
user := c.getCurrentUser()
resp = c.HandleLoggedIn(application, user, &form)
record := object.NewRecord(c.Ctx)
record.Organization = application.Organization
record.User = user.Name
util.SafeGoroutine(func() { object.AddRecord(record) })
2021-10-09 21:15:57 +08:00
} else {
c.ResponseError(fmt.Sprintf(c.T("auth:Unknown authentication type (not password or provider), form = %s"), util.StructToJson(form)))
2021-10-09 21:15:57 +08:00
return
}
2021-02-14 00:22:24 +08:00
}
c.Data["json"] = resp
c.ServeJSON()
}
func (c *ApiController) GetSamlLogin() {
providerId := c.Input().Get("id")
relayState := c.Input().Get("relayState")
authURL, method, err := object.GenerateSamlRequest(providerId, relayState, c.Ctx.Request.Host, c.GetAcceptLanguage())
if err != nil {
c.ResponseError(err.Error())
}
c.ResponseOk(authURL, method)
}
func (c *ApiController) HandleSamlLogin() {
relayState := c.Input().Get("RelayState")
samlResponse := c.Input().Get("SAMLResponse")
decode, err := base64.StdEncoding.DecodeString(relayState)
if err != nil {
c.ResponseError(err.Error())
}
slice := strings.Split(string(decode), "&")
relayState = url.QueryEscape(relayState)
samlResponse = url.QueryEscape(samlResponse)
targetUrl := fmt.Sprintf("%s?relayState=%s&samlResponse=%s",
slice[4], relayState, samlResponse)
c.Redirect(targetUrl, 303)
}
// HandleOfficialAccountEvent ...
// @Tag HandleOfficialAccountEvent API
// @Title HandleOfficialAccountEvent
// @router /api/webhook [POST]
func (c *ApiController) HandleOfficialAccountEvent() {
respBytes, err := ioutil.ReadAll(c.Ctx.Request.Body)
if err != nil {
c.ResponseError(err.Error())
}
var data struct {
MsgType string `xml:"MsgType"`
Event string `xml:"Event"`
EventKey string `xml:"EventKey"`
}
err = xml.Unmarshal(respBytes, &data)
if err != nil {
c.ResponseError(err.Error())
}
lock.Lock()
defer lock.Unlock()
if data.EventKey != "" {
wechatScanType = data.Event
c.Ctx.WriteString("")
}
}
// GetWebhookEventType ...
// @Tag GetWebhookEventType API
// @Title GetWebhookEventType
// @router /api/get-webhook-event [GET]
func (c *ApiController) GetWebhookEventType() {
lock.Lock()
defer lock.Unlock()
resp := &Response{
Status: "ok",
Msg: "",
Data: wechatScanType,
}
c.Data["json"] = resp
wechatScanType = ""
c.ServeJSON()
}