mirror of
https://github.com/casdoor/casdoor.git
synced 2025-05-22 18:25:47 +08:00

* feat: support custom user mapping * fix: parse id to string * Update data.json * Update data.json --------- Co-authored-by: hsluoyz <hsluoyz@qq.com>
132 lines
3.2 KiB
Go
132 lines
3.2 KiB
Go
// Copyright 2022 The Casdoor Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package idp
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
|
|
"github.com/casdoor/casdoor/util"
|
|
"github.com/mitchellh/mapstructure"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
type CustomIdProvider struct {
|
|
Client *http.Client
|
|
Config *oauth2.Config
|
|
|
|
UserInfoURL string
|
|
TokenURL string
|
|
AuthURL string
|
|
UserMapping map[string]string
|
|
Scopes []string
|
|
}
|
|
|
|
func NewCustomIdProvider(idpInfo *ProviderInfo, redirectUrl string) *CustomIdProvider {
|
|
idp := &CustomIdProvider{}
|
|
|
|
idp.Config = &oauth2.Config{
|
|
ClientID: idpInfo.ClientId,
|
|
ClientSecret: idpInfo.ClientSecret,
|
|
RedirectURL: redirectUrl,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: idpInfo.AuthURL,
|
|
TokenURL: idpInfo.TokenURL,
|
|
},
|
|
}
|
|
idp.UserInfoURL = idpInfo.UserInfoURL
|
|
idp.UserMapping = idpInfo.UserMapping
|
|
|
|
return idp
|
|
}
|
|
|
|
func (idp *CustomIdProvider) SetHttpClient(client *http.Client) {
|
|
idp.Client = client
|
|
}
|
|
|
|
func (idp *CustomIdProvider) GetToken(code string) (*oauth2.Token, error) {
|
|
ctx := context.WithValue(context.Background(), oauth2.HTTPClient, idp.Client)
|
|
return idp.Config.Exchange(ctx, code)
|
|
}
|
|
|
|
type CustomUserInfo struct {
|
|
Id string `mapstructure:"id"`
|
|
Username string `mapstructure:"username"`
|
|
DisplayName string `mapstructure:"displayName"`
|
|
Email string `mapstructure:"email"`
|
|
AvatarUrl string `mapstructure:"avatarUrl"`
|
|
}
|
|
|
|
func (idp *CustomIdProvider) GetUserInfo(token *oauth2.Token) (*UserInfo, error) {
|
|
accessToken := token.AccessToken
|
|
request, err := http.NewRequest("GET", idp.UserInfoURL, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// add accessToken to request header
|
|
request.Header.Add("Authorization", fmt.Sprintf("Bearer %s", accessToken))
|
|
resp, err := idp.Client.Do(request)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
data, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var dataMap map[string]interface{}
|
|
err = json.Unmarshal(data, &dataMap)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// map user info
|
|
for k, v := range idp.UserMapping {
|
|
_, ok := dataMap[v]
|
|
if !ok {
|
|
return nil, fmt.Errorf("cannot find %s in user from castom provider", v)
|
|
}
|
|
dataMap[k] = dataMap[v]
|
|
}
|
|
|
|
// try to parse id to string
|
|
id, err := util.ParseIdToString(dataMap["id"])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
dataMap["id"] = id
|
|
|
|
customUserinfo := &CustomUserInfo{}
|
|
err = mapstructure.Decode(dataMap, customUserinfo)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
userInfo := &UserInfo{
|
|
Id: customUserinfo.Id,
|
|
Username: customUserinfo.Username,
|
|
DisplayName: customUserinfo.DisplayName,
|
|
Email: customUserinfo.Email,
|
|
AvatarUrl: customUserinfo.AvatarUrl,
|
|
}
|
|
return userInfo, nil
|
|
}
|