mirror of
https://github.com/casdoor/casdoor.git
synced 2025-05-22 18:25:47 +08:00
1331 lines
39 KiB
Go
1331 lines
39 KiB
Go
// Copyright 2021 The Casdoor Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package controllers
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"encoding/xml"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/casdoor/casdoor/captcha"
|
|
"github.com/casdoor/casdoor/conf"
|
|
"github.com/casdoor/casdoor/form"
|
|
"github.com/casdoor/casdoor/i18n"
|
|
"github.com/casdoor/casdoor/idp"
|
|
"github.com/casdoor/casdoor/object"
|
|
"github.com/casdoor/casdoor/proxy"
|
|
"github.com/casdoor/casdoor/util"
|
|
"github.com/google/uuid"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
func codeToResponse(code *object.Code) *Response {
|
|
if code.Code == "" {
|
|
return &Response{Status: "error", Msg: code.Message, Data: code.Code}
|
|
}
|
|
|
|
return &Response{Status: "ok", Msg: "", Data: code.Code}
|
|
}
|
|
|
|
func tokenToResponse(token *object.Token) *Response {
|
|
if token.AccessToken == "" {
|
|
return &Response{Status: "error", Msg: "fail to get accessToken", Data: token.AccessToken}
|
|
}
|
|
return &Response{Status: "ok", Msg: "", Data: token.AccessToken, Data2: token.RefreshToken}
|
|
}
|
|
|
|
// HandleLoggedIn ...
|
|
func (c *ApiController) HandleLoggedIn(application *object.Application, user *object.User, form *form.AuthForm) (resp *Response) {
|
|
if user.IsForbidden {
|
|
c.ResponseError(c.T("check:The user is forbidden to sign in, please contact the administrator"))
|
|
return
|
|
}
|
|
|
|
userId := user.GetId()
|
|
|
|
clientIp := util.GetClientIpFromRequest(c.Ctx.Request)
|
|
err := object.CheckEntryIp(clientIp, user, application, application.OrganizationObj, c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
allowed, err := object.CheckLoginPermission(userId, application)
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
if !allowed {
|
|
c.ResponseError(c.T("auth:Unauthorized operation"))
|
|
return
|
|
}
|
|
|
|
// check user's tag
|
|
if !user.IsGlobalAdmin() && !user.IsAdmin && len(application.Tags) > 0 {
|
|
// only users with the tag that is listed in the application tags can login
|
|
if !util.InSlice(application.Tags, user.Tag) {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:User's tag: %s is not listed in the application's tags"), user.Tag))
|
|
return
|
|
}
|
|
}
|
|
|
|
// check whether paid-user have active subscription
|
|
if user.Type == "paid-user" {
|
|
subscriptions, err := object.GetSubscriptionsByUser(user.Owner, user.Name)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
existActiveSubscription := false
|
|
for _, subscription := range subscriptions {
|
|
if subscription.State == object.SubStateActive {
|
|
existActiveSubscription = true
|
|
break
|
|
}
|
|
}
|
|
if !existActiveSubscription {
|
|
// check pending subscription
|
|
for _, sub := range subscriptions {
|
|
if sub.State == object.SubStatePending {
|
|
c.ResponseOk("BuyPlanResult", sub)
|
|
return
|
|
}
|
|
}
|
|
// paid-user does not have active or pending subscription, find the default pricing of application
|
|
pricing, err := object.GetApplicationDefaultPricing(application.Organization, application.Name)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if pricing == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:paid-user %s does not have active or pending subscription and the application: %s does not have default pricing"), user.Name, application.Name))
|
|
return
|
|
} else {
|
|
// let the paid-user select plan
|
|
c.ResponseOk("SelectPlan", pricing)
|
|
return
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
if form.Type == ResponseTypeLogin {
|
|
c.SetSessionUsername(userId)
|
|
util.LogInfo(c.Ctx, "API: [%s] signed in", userId)
|
|
resp = &Response{Status: "ok", Msg: "", Data: userId, Data2: user.NeedUpdatePassword}
|
|
} else if form.Type == ResponseTypeCode {
|
|
clientId := c.Input().Get("clientId")
|
|
responseType := c.Input().Get("responseType")
|
|
redirectUri := c.Input().Get("redirectUri")
|
|
scope := c.Input().Get("scope")
|
|
state := c.Input().Get("state")
|
|
nonce := c.Input().Get("nonce")
|
|
challengeMethod := c.Input().Get("code_challenge_method")
|
|
codeChallenge := c.Input().Get("code_challenge")
|
|
|
|
if challengeMethod != "S256" && challengeMethod != "null" && challengeMethod != "" {
|
|
c.ResponseError(c.T("auth:Challenge method should be S256"))
|
|
return
|
|
}
|
|
code, err := object.GetOAuthCode(userId, clientId, responseType, redirectUri, scope, state, nonce, codeChallenge, c.Ctx.Request.Host, c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
|
|
resp = codeToResponse(code)
|
|
resp.Data2 = user.NeedUpdatePassword
|
|
if application.EnableSigninSession || application.HasPromptPage() {
|
|
// The prompt page needs the user to be signed in
|
|
c.SetSessionUsername(userId)
|
|
}
|
|
} else if form.Type == ResponseTypeToken || form.Type == ResponseTypeIdToken { // implicit flow
|
|
if !object.IsGrantTypeValid(form.Type, application.GrantTypes) {
|
|
resp = &Response{Status: "error", Msg: fmt.Sprintf("error: grant_type: %s is not supported in this application", form.Type), Data: ""}
|
|
} else {
|
|
scope := c.Input().Get("scope")
|
|
nonce := c.Input().Get("nonce")
|
|
token, _ := object.GetTokenByUser(application, user, scope, nonce, c.Ctx.Request.Host)
|
|
resp = tokenToResponse(token)
|
|
|
|
resp.Data2 = user.NeedUpdatePassword
|
|
}
|
|
} else if form.Type == ResponseTypeDevice {
|
|
authCache, ok := object.DeviceAuthMap.LoadAndDelete(form.UserCode)
|
|
if !ok {
|
|
c.ResponseError(c.T("auth:UserCode Expired"))
|
|
return
|
|
}
|
|
|
|
authCacheCast := authCache.(object.DeviceAuthCache)
|
|
if authCacheCast.RequestAt.Add(time.Second * 120).Before(time.Now()) {
|
|
c.ResponseError(c.T("auth:UserCode Expired"))
|
|
return
|
|
}
|
|
|
|
deviceAuthCacheDeviceCode, ok := object.DeviceAuthMap.Load(authCacheCast.UserName)
|
|
if !ok {
|
|
c.ResponseError(c.T("auth:DeviceCode Invalid"))
|
|
return
|
|
}
|
|
|
|
deviceAuthCacheDeviceCodeCast := deviceAuthCacheDeviceCode.(object.DeviceAuthCache)
|
|
deviceAuthCacheDeviceCodeCast.UserName = user.Name
|
|
deviceAuthCacheDeviceCodeCast.UserSignIn = true
|
|
|
|
object.DeviceAuthMap.Store(authCacheCast.UserName, deviceAuthCacheDeviceCodeCast)
|
|
|
|
resp = &Response{Status: "ok", Msg: "", Data: userId, Data2: user.NeedUpdatePassword}
|
|
} else if form.Type == ResponseTypeSaml { // saml flow
|
|
res, redirectUrl, method, err := object.GetSamlResponse(application, user, form.SamlRequest, c.Ctx.Request.Host)
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
resp = &Response{Status: "ok", Msg: "", Data: res, Data2: map[string]interface{}{"redirectUrl": redirectUrl, "method": method, "needUpdatePassword": user.NeedUpdatePassword}}
|
|
|
|
if application.EnableSigninSession || application.HasPromptPage() {
|
|
// The prompt page needs the user to be signed in
|
|
c.SetSessionUsername(userId)
|
|
}
|
|
} else if form.Type == ResponseTypeCas {
|
|
// not oauth but CAS SSO protocol
|
|
service := c.Input().Get("service")
|
|
resp = wrapErrorResponse(nil)
|
|
if service != "" {
|
|
st, err := object.GenerateCasToken(userId, service)
|
|
if err != nil {
|
|
resp = wrapErrorResponse(err)
|
|
} else {
|
|
resp.Data = st
|
|
}
|
|
}
|
|
|
|
if application.EnableSigninSession || application.HasPromptPage() {
|
|
// The prompt page needs the user to be signed in
|
|
c.SetSessionUsername(userId)
|
|
}
|
|
} else {
|
|
resp = wrapErrorResponse(fmt.Errorf("unknown response type: %s", form.Type))
|
|
}
|
|
|
|
// if user did not check auto signin
|
|
if resp.Status == "ok" && !form.AutoSignin {
|
|
c.setExpireForSession()
|
|
}
|
|
|
|
if resp.Status == "ok" {
|
|
_, err = object.AddSession(&object.Session{
|
|
Owner: user.Owner,
|
|
Name: user.Name,
|
|
Application: application.Name,
|
|
SessionId: []string{c.Ctx.Input.CruSession.SessionID()},
|
|
})
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
// GetApplicationLogin ...
|
|
// @Title GetApplicationLogin
|
|
// @Tag Login API
|
|
// @Description get application login
|
|
// @Param clientId query string true "client id"
|
|
// @Param responseType query string true "response type"
|
|
// @Param redirectUri query string true "redirect uri"
|
|
// @Param scope query string true "scope"
|
|
// @Param state query string true "state"
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
// @router /get-app-login [get]
|
|
func (c *ApiController) GetApplicationLogin() {
|
|
clientId := c.Input().Get("clientId")
|
|
responseType := c.Input().Get("responseType")
|
|
redirectUri := c.Input().Get("redirectUri")
|
|
scope := c.Input().Get("scope")
|
|
state := c.Input().Get("state")
|
|
id := c.Input().Get("id")
|
|
loginType := c.Input().Get("type")
|
|
userCode := c.Input().Get("userCode")
|
|
|
|
var application *object.Application
|
|
var msg string
|
|
var err error
|
|
if loginType == "code" {
|
|
msg, application, err = object.CheckOAuthLogin(clientId, responseType, redirectUri, scope, state, c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else if loginType == "cas" {
|
|
application, err = object.GetApplication(id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), id))
|
|
return
|
|
}
|
|
|
|
err = object.CheckCasLogin(application, c.GetAcceptLanguage(), redirectUri)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else if loginType == "device" {
|
|
deviceAuthCache, ok := object.DeviceAuthMap.Load(userCode)
|
|
if !ok {
|
|
c.ResponseError(c.T("auth:UserCode Invalid"))
|
|
return
|
|
}
|
|
|
|
deviceAuthCacheCast := deviceAuthCache.(object.DeviceAuthCache)
|
|
application, err = object.GetApplication(deviceAuthCacheCast.ApplicationId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
clientIp := util.GetClientIpFromRequest(c.Ctx.Request)
|
|
object.CheckEntryIp(clientIp, nil, application, nil, c.GetAcceptLanguage())
|
|
|
|
application = object.GetMaskedApplication(application, "")
|
|
if msg != "" {
|
|
c.ResponseError(msg, application)
|
|
} else {
|
|
c.ResponseOk(application)
|
|
}
|
|
}
|
|
|
|
func setHttpClient(idProvider idp.IdProvider, providerType string) {
|
|
if isProxyProviderType(providerType) {
|
|
idProvider.SetHttpClient(proxy.ProxyHttpClient)
|
|
} else {
|
|
idProvider.SetHttpClient(proxy.DefaultHttpClient)
|
|
}
|
|
}
|
|
|
|
func isProxyProviderType(providerType string) bool {
|
|
providerTypes := []string{
|
|
"GitHub",
|
|
"Google",
|
|
"Facebook",
|
|
"LinkedIn",
|
|
"Steam",
|
|
"Line",
|
|
"Amazon",
|
|
"Instagram",
|
|
"TikTok",
|
|
"Twitter",
|
|
"Uber",
|
|
"Yahoo",
|
|
}
|
|
for _, v := range providerTypes {
|
|
if strings.EqualFold(v, providerType) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func checkMfaEnable(c *ApiController, user *object.User, organization *object.Organization, verificationType string) bool {
|
|
if object.IsNeedPromptMfa(organization, user) {
|
|
// The prompt page needs the user to be srigned in
|
|
c.SetSessionUsername(user.GetId())
|
|
c.ResponseOk(object.RequiredMfa)
|
|
return true
|
|
}
|
|
|
|
if user.IsMfaEnabled() {
|
|
c.setMfaUserSession(user.GetId())
|
|
mfaList := object.GetAllMfaProps(user, true)
|
|
mfaAllowList := []*object.MfaProps{}
|
|
for _, prop := range mfaList {
|
|
if prop.MfaType == verificationType || !prop.Enabled {
|
|
continue
|
|
}
|
|
mfaAllowList = append(mfaAllowList, prop)
|
|
}
|
|
if len(mfaAllowList) >= 1 {
|
|
c.SetSession("verificationCodeType", verificationType)
|
|
c.Ctx.Input.CruSession.SessionRelease(c.Ctx.ResponseWriter)
|
|
c.ResponseOk(object.NextMfa, mfaAllowList)
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// Login ...
|
|
// @Title Login
|
|
// @Tag Login API
|
|
// @Description login
|
|
// @Param clientId query string true clientId
|
|
// @Param responseType query string true responseType
|
|
// @Param redirectUri query string true redirectUri
|
|
// @Param scope query string false scope
|
|
// @Param state query string false state
|
|
// @Param nonce query string false nonce
|
|
// @Param code_challenge_method query string false code_challenge_method
|
|
// @Param code_challenge query string false code_challenge
|
|
// @Param form body controllers.AuthForm true "Login information"
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
// @router /login [post]
|
|
func (c *ApiController) Login() {
|
|
resp := &Response{}
|
|
|
|
var authForm form.AuthForm
|
|
err := json.Unmarshal(c.Ctx.Input.RequestBody, &authForm)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
verificationType := ""
|
|
|
|
if authForm.Username != "" {
|
|
if authForm.Type == ResponseTypeLogin {
|
|
if c.GetSessionUsername() != "" {
|
|
c.ResponseError(c.T("account:Please sign out first"), c.GetSessionUsername())
|
|
return
|
|
}
|
|
}
|
|
|
|
var user *object.User
|
|
if authForm.SigninMethod == "Face ID" {
|
|
if user, err = object.GetUserByFields(authForm.Organization, authForm.Username); err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
} else if user == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(authForm.Organization, authForm.Username)))
|
|
return
|
|
}
|
|
|
|
var application *object.Application
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
if !application.IsFaceIdEnabled() {
|
|
c.ResponseError(c.T("auth:The login method: login with face is not enabled for the application"))
|
|
return
|
|
}
|
|
|
|
faceIdProvider, err := object.GetFaceIdProviderByApplication(util.GetId(application.Owner, application.Name), "false", c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
}
|
|
|
|
if faceIdProvider == nil {
|
|
if err := object.CheckFaceId(user, authForm.FaceId, c.GetAcceptLanguage()); err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
} else {
|
|
ok, err := user.CheckUserFace(authForm.FaceIdImage, faceIdProvider)
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
}
|
|
|
|
if !ok {
|
|
c.ResponseError(i18n.Translate(c.GetAcceptLanguage(), "check:Face data does not exist, cannot log in"))
|
|
return
|
|
}
|
|
}
|
|
} else if authForm.Password == "" {
|
|
if user, err = object.GetUserByFields(authForm.Organization, authForm.Username); err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
} else if user == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(authForm.Organization, authForm.Username)))
|
|
return
|
|
}
|
|
|
|
var application *object.Application
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
verificationCodeType := object.GetVerifyType(authForm.Username)
|
|
if verificationCodeType == object.VerifyTypeEmail && !application.IsCodeSigninViaEmailEnabled() {
|
|
c.ResponseError(c.T("auth:The login method: login with email is not enabled for the application"))
|
|
return
|
|
}
|
|
if verificationCodeType == object.VerifyTypePhone && !application.IsCodeSigninViaSmsEnabled() {
|
|
c.ResponseError(c.T("auth:The login method: login with SMS is not enabled for the application"))
|
|
return
|
|
}
|
|
|
|
var checkDest string
|
|
if verificationCodeType == object.VerifyTypePhone {
|
|
authForm.CountryCode = user.GetCountryCode(authForm.CountryCode)
|
|
var ok bool
|
|
if checkDest, ok = util.GetE164Number(authForm.Username, authForm.CountryCode); !ok {
|
|
c.ResponseError(fmt.Sprintf(c.T("verification:Phone number is invalid in your region %s"), authForm.CountryCode))
|
|
return
|
|
}
|
|
}
|
|
|
|
// check result through Email or Phone
|
|
err = object.CheckSigninCode(user, checkDest, authForm.Code, c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(fmt.Sprintf("%s - %s", verificationCodeType, err.Error()))
|
|
return
|
|
}
|
|
|
|
// disable the verification code
|
|
err = object.DisableVerificationCode(checkDest)
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
|
|
if verificationCodeType == object.VerifyTypePhone {
|
|
verificationType = "sms"
|
|
} else {
|
|
verificationType = "email"
|
|
if !user.EmailVerified {
|
|
user.EmailVerified = true
|
|
_, err = object.UpdateUser(user.GetId(), user, []string{"email_verified"}, false)
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
var application *object.Application
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error(), nil)
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
if authForm.SigninMethod == "Password" && !application.IsPasswordEnabled() {
|
|
c.ResponseError(c.T("auth:The login method: login with password is not enabled for the application"))
|
|
return
|
|
}
|
|
if authForm.SigninMethod == "LDAP" && !application.IsLdapEnabled() {
|
|
c.ResponseError(c.T("auth:The login method: login with LDAP is not enabled for the application"))
|
|
return
|
|
}
|
|
var enableCaptcha bool
|
|
if enableCaptcha, err = object.CheckToEnableCaptcha(application, authForm.Organization, authForm.Username); err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
} else if enableCaptcha {
|
|
captchaProvider, err := object.GetCaptchaProviderByApplication(util.GetId(application.Owner, application.Name), "false", c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if captchaProvider.Type != "Default" {
|
|
authForm.ClientSecret = captchaProvider.ClientSecret
|
|
}
|
|
|
|
var isHuman bool
|
|
isHuman, err = captcha.VerifyCaptchaByCaptchaType(authForm.CaptchaType, authForm.CaptchaToken, authForm.ClientSecret)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if !isHuman {
|
|
c.ResponseError(c.T("verification:Turing test failed."))
|
|
return
|
|
}
|
|
}
|
|
|
|
password := authForm.Password
|
|
|
|
if application.OrganizationObj != nil {
|
|
password, err = util.GetUnobfuscatedPassword(application.OrganizationObj.PasswordObfuscatorType, application.OrganizationObj.PasswordObfuscatorKey, authForm.Password)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
isSigninViaLdap := authForm.SigninMethod == "LDAP"
|
|
var isPasswordWithLdapEnabled bool
|
|
if authForm.SigninMethod == "Password" {
|
|
isPasswordWithLdapEnabled = application.IsPasswordWithLdapEnabled()
|
|
} else {
|
|
isPasswordWithLdapEnabled = false
|
|
}
|
|
user, err = object.CheckUserPassword(authForm.Organization, authForm.Username, password, c.GetAcceptLanguage(), enableCaptcha, isSigninViaLdap, isPasswordWithLdapEnabled)
|
|
}
|
|
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
} else {
|
|
var application *object.Application
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
var organization *object.Organization
|
|
organization, err = object.GetOrganizationByUser(user)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
}
|
|
|
|
if checkMfaEnable(c, user, organization, verificationType) {
|
|
return
|
|
}
|
|
|
|
resp = c.HandleLoggedIn(application, user, &authForm)
|
|
|
|
c.Ctx.Input.SetParam("recordUserId", user.GetId())
|
|
}
|
|
} else if authForm.Provider != "" {
|
|
var application *object.Application
|
|
if authForm.ClientId != "" {
|
|
application, err = object.GetApplicationByClientId(authForm.ClientId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else {
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
var organization *object.Organization
|
|
organization, err = object.GetOrganization(util.GetId("admin", application.Organization))
|
|
if err != nil {
|
|
c.ResponseError(c.T(err.Error()))
|
|
}
|
|
|
|
var provider *object.Provider
|
|
provider, err = object.GetProvider(util.GetId("admin", authForm.Provider))
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if provider == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The provider: %s does not exist"), authForm.Provider))
|
|
}
|
|
|
|
providerItem := application.GetProviderItem(provider.Name)
|
|
if !providerItem.IsProviderVisible() {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The provider: %s is not enabled for the application"), provider.Name))
|
|
return
|
|
}
|
|
userInfo := &idp.UserInfo{}
|
|
if provider.Category == "SAML" {
|
|
// SAML
|
|
userInfo, err = object.ParseSamlResponse(authForm.SamlResponse, provider, c.Ctx.Request.Host)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else if provider.Category == "OAuth" || provider.Category == "Web3" {
|
|
// OAuth
|
|
idpInfo := object.FromProviderToIdpInfo(c.Ctx, provider)
|
|
var idProvider idp.IdProvider
|
|
idProvider, err = idp.GetIdProvider(idpInfo, authForm.RedirectUri)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if idProvider == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("storage:The provider type: %s is not supported"), provider.Type))
|
|
return
|
|
}
|
|
|
|
setHttpClient(idProvider, provider.Type)
|
|
|
|
if authForm.State != conf.GetConfigString("authState") && authForm.State != application.Name {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:State expected: %s, but got: %s"), conf.GetConfigString("authState"), authForm.State))
|
|
return
|
|
}
|
|
|
|
// https://github.com/golang/oauth2/issues/123#issuecomment-103715338
|
|
var token *oauth2.Token
|
|
token, err = idProvider.GetToken(authForm.Code)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if !token.Valid() {
|
|
c.ResponseError(c.T("auth:Invalid token"))
|
|
return
|
|
}
|
|
|
|
userInfo, err = idProvider.GetUserInfo(token)
|
|
if err != nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:Failed to login in: %s"), err.Error()))
|
|
return
|
|
}
|
|
|
|
if provider.EmailRegex != "" {
|
|
reg, err := regexp.Compile(provider.EmailRegex)
|
|
if err != nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:Failed to login in: %s"), err.Error()))
|
|
return
|
|
}
|
|
if !reg.MatchString(userInfo.Email) {
|
|
c.ResponseError(fmt.Sprintf(c.T("check:Email is invalid")))
|
|
}
|
|
}
|
|
}
|
|
|
|
if authForm.Method == "signup" {
|
|
user := &object.User{}
|
|
if provider.Category == "SAML" {
|
|
// The userInfo.Id is the NameID in SAML response, it could be name / email / phone
|
|
user, err = object.GetUserByFields(application.Organization, userInfo.Id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else if provider.Category == "OAuth" || provider.Category == "Web3" {
|
|
user, err = object.GetUserByField(application.Organization, provider.Type, userInfo.Id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
if user != nil && !user.IsDeleted {
|
|
// Sign in via OAuth (want to sign up but already have account)
|
|
// sync info from 3rd-party if possible
|
|
_, err = object.SetUserOAuthProperties(organization, user, provider.Type, userInfo)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if checkMfaEnable(c, user, organization, verificationType) {
|
|
return
|
|
}
|
|
|
|
resp = c.HandleLoggedIn(application, user, &authForm)
|
|
|
|
c.Ctx.Input.SetParam("recordUserId", user.GetId())
|
|
} else if provider.Category == "OAuth" || provider.Category == "Web3" {
|
|
// Sign up via OAuth
|
|
if application.EnableLinkWithEmail {
|
|
if userInfo.Email != "" {
|
|
// Find existing user with Email
|
|
user, err = object.GetUserByField(application.Organization, "email", userInfo.Email)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
if user == nil && userInfo.Phone != "" {
|
|
// Find existing user with phone number
|
|
user, err = object.GetUserByField(application.Organization, "phone", userInfo.Phone)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
if user == nil || user.IsDeleted {
|
|
if !application.EnableSignUp {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account, please contact your IT support"), provider.Type, userInfo.Username, userInfo.DisplayName))
|
|
return
|
|
}
|
|
|
|
if !providerItem.CanSignUp {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) does not exist and is not allowed to sign up as new account via %%s, please use another way to sign up"), provider.Type, userInfo.Username, userInfo.DisplayName, provider.Type))
|
|
return
|
|
}
|
|
|
|
if application.IsSignupItemRequired("Invitation code") {
|
|
c.ResponseError(c.T("check:Invitation code cannot be blank"))
|
|
return
|
|
}
|
|
|
|
// Handle username conflicts
|
|
var tmpUser *object.User
|
|
tmpUser, err = object.GetUser(util.GetId(application.Organization, userInfo.Username))
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if tmpUser != nil {
|
|
var uid uuid.UUID
|
|
uid, err = uuid.NewRandom()
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
uidStr := strings.Split(uid.String(), "-")
|
|
userInfo.Username = fmt.Sprintf("%s_%s", userInfo.Username, uidStr[1])
|
|
}
|
|
|
|
properties := map[string]string{}
|
|
var count int64
|
|
count, err = object.GetUserCount(application.Organization, "", "", "")
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
properties["no"] = strconv.Itoa(int(count + 2))
|
|
var initScore int
|
|
initScore, err = organization.GetInitScore()
|
|
if err != nil {
|
|
c.ResponseError(fmt.Errorf(c.T("account:Get init score failed, error: %w"), err).Error())
|
|
return
|
|
}
|
|
|
|
userId := userInfo.Id
|
|
if userId == "" {
|
|
userId = util.GenerateId()
|
|
}
|
|
|
|
user = &object.User{
|
|
Owner: application.Organization,
|
|
Name: userInfo.Username,
|
|
CreatedTime: util.GetCurrentTime(),
|
|
Id: userId,
|
|
Type: "normal-user",
|
|
DisplayName: userInfo.DisplayName,
|
|
Avatar: userInfo.AvatarUrl,
|
|
Address: []string{},
|
|
Email: userInfo.Email,
|
|
Phone: userInfo.Phone,
|
|
CountryCode: userInfo.CountryCode,
|
|
Region: userInfo.CountryCode,
|
|
Score: initScore,
|
|
IsAdmin: false,
|
|
IsForbidden: false,
|
|
IsDeleted: false,
|
|
SignupApplication: application.Name,
|
|
Properties: properties,
|
|
}
|
|
|
|
var affected bool
|
|
affected, err = object.AddUser(user)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if !affected {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:Failed to create user, user information is invalid: %s"), util.StructToJson(user)))
|
|
return
|
|
}
|
|
|
|
if providerItem.SignupGroup != "" {
|
|
user.Groups = []string{providerItem.SignupGroup}
|
|
_, err = object.UpdateUser(user.GetId(), user, []string{"groups"}, false)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
// sync info from 3rd-party if possible
|
|
_, err = object.SetUserOAuthProperties(organization, user, provider.Type, userInfo)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
_, err = object.LinkUserAccount(user, provider.Type, userInfo.Id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
resp = c.HandleLoggedIn(application, user, &authForm)
|
|
|
|
c.Ctx.Input.SetParam("recordUserId", user.GetId())
|
|
c.Ctx.Input.SetParam("recordSignup", "true")
|
|
} else if provider.Category == "SAML" {
|
|
// TODO: since we get the user info from SAML response, we can try to create the user
|
|
resp = &Response{Status: "error", Msg: fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(application.Organization, userInfo.Id))}
|
|
}
|
|
// resp = &Response{Status: "ok", Msg: "", Data: res}
|
|
} else { // authForm.Method != "signup"
|
|
userId := c.GetSessionUsername()
|
|
if userId == "" {
|
|
c.ResponseError(fmt.Sprintf(c.T("general:The user: %s doesn't exist"), util.GetId(application.Organization, userInfo.Id)), userInfo)
|
|
return
|
|
}
|
|
|
|
var oldUser *object.User
|
|
oldUser, err = object.GetUserByField(application.Organization, provider.Type, userInfo.Id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if oldUser != nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The account for provider: %s and username: %s (%s) is already linked to another account: %s (%s)"), provider.Type, userInfo.Username, userInfo.DisplayName, oldUser.Name, oldUser.DisplayName))
|
|
return
|
|
}
|
|
|
|
var user *object.User
|
|
user, err = object.GetUser(userId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
// sync info from 3rd-party if possible
|
|
_, err = object.SetUserOAuthProperties(organization, user, provider.Type, userInfo)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
var isLinked bool
|
|
isLinked, err = object.LinkUserAccount(user, provider.Type, userInfo.Id)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if isLinked {
|
|
resp = &Response{Status: "ok", Msg: "", Data: isLinked}
|
|
} else {
|
|
resp = &Response{Status: "error", Msg: "Failed to link user account", Data: isLinked}
|
|
}
|
|
}
|
|
} else if c.getMfaUserSession() != "" {
|
|
var user *object.User
|
|
user, err = object.GetUser(c.getMfaUserSession())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if user == nil {
|
|
c.ResponseError("expired user session")
|
|
return
|
|
}
|
|
|
|
if authForm.Passcode != "" {
|
|
if authForm.MfaType == c.GetSession("verificationCodeType") {
|
|
c.ResponseError("Invalid multi-factor authentication type")
|
|
return
|
|
}
|
|
user.CountryCode = user.GetCountryCode(user.CountryCode)
|
|
mfaUtil := object.GetMfaUtil(authForm.MfaType, user.GetMfaProps(authForm.MfaType, false))
|
|
if mfaUtil == nil {
|
|
c.ResponseError("Invalid multi-factor authentication type")
|
|
return
|
|
}
|
|
|
|
passed, err := c.checkOrgMasterVerificationCode(user, authForm.Passcode)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if !passed {
|
|
err = mfaUtil.Verify(authForm.Passcode)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
|
|
c.SetSession("verificationCodeType", "")
|
|
} else if authForm.RecoveryCode != "" {
|
|
err = object.MfaRecover(user, authForm.RecoveryCode)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
} else {
|
|
c.ResponseError("missing passcode or recovery code")
|
|
return
|
|
}
|
|
|
|
var application *object.Application
|
|
if authForm.ClientId == "" {
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
} else {
|
|
application, err = object.GetApplicationByClientId(authForm.ClientId)
|
|
}
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
resp = c.HandleLoggedIn(application, user, &authForm)
|
|
c.setMfaUserSession("")
|
|
|
|
c.Ctx.Input.SetParam("recordUserId", user.GetId())
|
|
} else {
|
|
if c.GetSessionUsername() != "" {
|
|
// user already signed in to Casdoor, so let the user click the avatar button to do the quick sign-in
|
|
var application *object.Application
|
|
application, err = object.GetApplication(fmt.Sprintf("admin/%s", authForm.Application))
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:The application: %s does not exist"), authForm.Application))
|
|
return
|
|
}
|
|
|
|
if authForm.Provider == "" {
|
|
authForm.Provider = authForm.ProviderBack
|
|
}
|
|
|
|
user := c.getCurrentUser()
|
|
resp = c.HandleLoggedIn(application, user, &authForm)
|
|
|
|
c.Ctx.Input.SetParam("recordUserId", user.GetId())
|
|
} else {
|
|
c.ResponseError(fmt.Sprintf(c.T("auth:Unknown authentication type (not password or provider), form = %s"), util.StructToJson(authForm)))
|
|
return
|
|
}
|
|
}
|
|
|
|
if authForm.Language != "" {
|
|
user := c.getCurrentUser()
|
|
if user != nil {
|
|
user.Language = authForm.Language
|
|
_, err = object.UpdateUser(user.GetId(), user, []string{"language"}, user.IsAdmin)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
c.Data["json"] = resp
|
|
c.ServeJSON()
|
|
}
|
|
|
|
func (c *ApiController) GetSamlLogin() {
|
|
providerId := c.Input().Get("id")
|
|
relayState := c.Input().Get("relayState")
|
|
authURL, method, err := object.GenerateSamlRequest(providerId, relayState, c.Ctx.Request.Host, c.GetAcceptLanguage())
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
c.ResponseOk(authURL, method)
|
|
}
|
|
|
|
func (c *ApiController) HandleSamlLogin() {
|
|
relayState := c.Input().Get("RelayState")
|
|
samlResponse := c.Input().Get("SAMLResponse")
|
|
decode, err := base64.StdEncoding.DecodeString(relayState)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
slice := strings.Split(string(decode), "&")
|
|
relayState = url.QueryEscape(relayState)
|
|
samlResponse = url.QueryEscape(samlResponse)
|
|
targetUrl := fmt.Sprintf("%s?relayState=%s&samlResponse=%s",
|
|
slice[4], relayState, samlResponse)
|
|
c.Redirect(targetUrl, http.StatusSeeOther)
|
|
}
|
|
|
|
// HandleOfficialAccountEvent ...
|
|
// @Tag System API
|
|
// @Title HandleOfficialAccountEvent
|
|
// @router /webhook [POST]
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
func (c *ApiController) HandleOfficialAccountEvent() {
|
|
if c.Ctx.Request.Method == "GET" {
|
|
s := c.Ctx.Request.FormValue("echostr")
|
|
echostr, _ := strconv.Atoi(s)
|
|
c.SetData(echostr)
|
|
c.ServeJSON()
|
|
return
|
|
}
|
|
respBytes, err := io.ReadAll(c.Ctx.Request.Body)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
signature := c.Input().Get("signature")
|
|
timestamp := c.Input().Get("timestamp")
|
|
nonce := c.Input().Get("nonce")
|
|
var data struct {
|
|
MsgType string `xml:"MsgType"`
|
|
Event string `xml:"Event"`
|
|
EventKey string `xml:"EventKey"`
|
|
FromUserName string `xml:"FromUserName"`
|
|
Ticket string `xml:"Ticket"`
|
|
}
|
|
err = xml.Unmarshal(respBytes, &data)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if strings.ToUpper(data.Event) != "SCAN" && strings.ToUpper(data.Event) != "SUBSCRIBE" {
|
|
c.Ctx.WriteString("")
|
|
return
|
|
}
|
|
if data.Ticket == "" {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
providerId := data.EventKey
|
|
provider, err := object.GetProvider(providerId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
if data.Ticket == "" {
|
|
c.ResponseError("empty ticket")
|
|
return
|
|
}
|
|
if !idp.VerifyWechatSignature(provider.Content, nonce, timestamp, signature) {
|
|
c.ResponseError("invalid signature")
|
|
return
|
|
}
|
|
|
|
idp.Lock.Lock()
|
|
if idp.WechatCacheMap == nil {
|
|
idp.WechatCacheMap = make(map[string]idp.WechatCacheMapValue)
|
|
}
|
|
idp.WechatCacheMap[data.Ticket] = idp.WechatCacheMapValue{
|
|
IsScanned: true,
|
|
WechatUnionId: data.FromUserName,
|
|
}
|
|
idp.Lock.Unlock()
|
|
|
|
c.Ctx.WriteString("")
|
|
}
|
|
|
|
// GetWebhookEventType ...
|
|
// @Tag System API
|
|
// @Title GetWebhookEventType
|
|
// @router /get-webhook-event [GET]
|
|
// @Param ticket query string true "The eventId of QRCode"
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
func (c *ApiController) GetWebhookEventType() {
|
|
ticket := c.Input().Get("ticket")
|
|
|
|
idp.Lock.RLock()
|
|
_, ok := idp.WechatCacheMap[ticket]
|
|
idp.Lock.RUnlock()
|
|
if !ok {
|
|
c.ResponseError("ticket not found")
|
|
return
|
|
}
|
|
|
|
c.ResponseOk("SCAN", ticket)
|
|
}
|
|
|
|
// GetQRCode
|
|
// @Tag System API
|
|
// @Title GetWechatQRCode
|
|
// @router /get-qrcode [GET]
|
|
// @Param id query string true "The id ( owner/name ) of provider"
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
func (c *ApiController) GetQRCode() {
|
|
providerId := c.Input().Get("id")
|
|
provider, err := object.GetProvider(providerId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
code, ticket, err := idp.GetWechatOfficialAccountQRCode(provider.ClientId2, provider.ClientSecret2, providerId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
c.ResponseOk(code, ticket)
|
|
}
|
|
|
|
// GetCaptchaStatus
|
|
// @Title GetCaptchaStatus
|
|
// @Tag Token API
|
|
// @Description Get Login Error Counts
|
|
// @Param id query string true "The id ( owner/name ) of user"
|
|
// @Success 200 {object} controllers.Response The Response object
|
|
// @router /get-captcha-status [get]
|
|
func (c *ApiController) GetCaptchaStatus() {
|
|
organization := c.Input().Get("organization")
|
|
userId := c.Input().Get("userId")
|
|
user, err := object.GetUserByFields(organization, userId)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
captchaEnabled := false
|
|
if user != nil {
|
|
var failedSigninLimit int
|
|
failedSigninLimit, _, err = object.GetFailedSigninConfigByUser(user)
|
|
if err != nil {
|
|
c.ResponseError(err.Error())
|
|
return
|
|
}
|
|
|
|
if user.SigninWrongTimes >= failedSigninLimit {
|
|
captchaEnabled = true
|
|
}
|
|
}
|
|
|
|
c.ResponseOk(captchaEnabled)
|
|
}
|
|
|
|
// Callback
|
|
// @Title Callback
|
|
// @Tag Callback API
|
|
// @Description Get Login Error Counts
|
|
// @router /Callback [post]
|
|
// @Success 200 {object} object.Userinfo The Response object
|
|
func (c *ApiController) Callback() {
|
|
code := c.GetString("code")
|
|
state := c.GetString("state")
|
|
|
|
frontendCallbackUrl := fmt.Sprintf("/callback?code=%s&state=%s", code, state)
|
|
c.Ctx.Redirect(http.StatusFound, frontendCallbackUrl)
|
|
}
|
|
|
|
// DeviceAuth
|
|
// @Title DeviceAuth
|
|
// @Tag Device Authorization Endpoint
|
|
// @Description Endpoint for the device authorization flow
|
|
// @router /device-auth [post]
|
|
// @Success 200 {object} object.DeviceAuthResponse The Response object
|
|
func (c *ApiController) DeviceAuth() {
|
|
clientId := c.Input().Get("client_id")
|
|
scope := c.Input().Get("scope")
|
|
application, err := object.GetApplicationByClientId(clientId)
|
|
if err != nil {
|
|
c.Data["json"] = object.TokenError{
|
|
Error: err.Error(),
|
|
ErrorDescription: err.Error(),
|
|
}
|
|
c.ServeJSON()
|
|
return
|
|
}
|
|
|
|
if application == nil {
|
|
c.Data["json"] = object.TokenError{
|
|
Error: c.T("token:Invalid client_id"),
|
|
ErrorDescription: c.T("token:Invalid client_id"),
|
|
}
|
|
c.ServeJSON()
|
|
return
|
|
}
|
|
|
|
deviceCode := util.GenerateId()
|
|
userCode := util.GetRandomName()
|
|
|
|
generateTime := 0
|
|
for {
|
|
if generateTime > 5 {
|
|
c.Data["json"] = object.TokenError{
|
|
Error: "userCode gen",
|
|
ErrorDescription: c.T("token:Invalid client_id"),
|
|
}
|
|
c.ServeJSON()
|
|
return
|
|
}
|
|
_, ok := object.DeviceAuthMap.Load(userCode)
|
|
if !ok {
|
|
break
|
|
}
|
|
|
|
generateTime++
|
|
}
|
|
|
|
deviceAuthCache := object.DeviceAuthCache{
|
|
UserSignIn: false,
|
|
UserName: "",
|
|
Scope: scope,
|
|
ApplicationId: application.GetId(),
|
|
RequestAt: time.Now(),
|
|
}
|
|
|
|
userAuthCache := object.DeviceAuthCache{
|
|
UserSignIn: false,
|
|
UserName: deviceCode,
|
|
Scope: scope,
|
|
ApplicationId: application.GetId(),
|
|
RequestAt: time.Now(),
|
|
}
|
|
|
|
object.DeviceAuthMap.Store(deviceCode, deviceAuthCache)
|
|
object.DeviceAuthMap.Store(userCode, userAuthCache)
|
|
|
|
c.Data["json"] = object.GetDeviceAuthResponse(deviceCode, userCode, c.Ctx.Request.Host)
|
|
c.ServeJSON()
|
|
}
|