1
0
mirror of https://github.com/haiwen/seahub.git synced 2025-09-14 06:11:16 +00:00

update login simple-check by jwt (#6842)

* update login simple-check by jwt

* update
This commit is contained in:
Ranjiwei
2024-10-15 13:52:23 +08:00
committed by GitHub
parent d1227300b7
commit 936c3cfbf6
4 changed files with 45 additions and 41 deletions

View File

@@ -1,6 +1,7 @@
# Copyright (c) 2012-2016 Seafile Ltd. # Copyright (c) 2012-2016 Seafile Ltd.
import hashlib import hashlib
import logging import logging
import jwt
from datetime import datetime from datetime import datetime
from django.conf import settings from django.conf import settings
# Avoid shadowing the login() view below. # Avoid shadowing the login() view below.
@@ -17,7 +18,7 @@ from django.utils.translation import gettext as _
from django.views.decorators.cache import never_cache from django.views.decorators.cache import never_cache
from saml2.ident import decode from saml2.ident import decode
from seaserv import seafile_api, ccnet_api from seaserv import seafile_api, ccnet_api
from seahub.settings import SSO_SECRET_KEY
from seahub.auth import REDIRECT_FIELD_NAME, get_backends from seahub.auth import REDIRECT_FIELD_NAME, get_backends
from seahub.auth import login as auth_login from seahub.auth import login as auth_login
from seahub.auth.models import SocialAuthUser from seahub.auth.models import SocialAuthUser
@@ -215,42 +216,43 @@ def login(request, template_name='registration/login.html',
}) })
def login_simple_check(request): def login_simple_check(request):
"""A simple check for login called by thirdpart systems(OA, etc).
Token generation: MD5(secret_key + foo@foo.com + 2014-1-1).hexdigest() if not SSO_SECRET_KEY:
Token length: 32 hexadecimal digits. return render_error(request, 'Permission denied.')
"""
username = request.GET.get('user', '') login_token = request.GET.get('token', '')
random_key = request.GET.get('token', '') if not login_token:
return render_error(request, 'token invalid.')
if not username or not random_key: try:
raise Http404 payload = jwt.decode(login_token, SSO_SECRET_KEY, algorithms=['HS256'])
except jwt.ExpiredSignatureError:
return render_error(request, 'token expired.')
except jwt.PyJWTError:
return render_error(request, 'token invalid.')
today = datetime.now().strftime('%Y-%m-%d') if 'exp' not in payload:
expect = hashlib.md5((settings.SECRET_KEY+username+today).encode('utf-8')).hexdigest() return render_error(request, 'token invalid.')
if expect == random_key:
try: user_id = payload.get('user_id')
user = User.objects.get(email=username) if not user_id:
except User.DoesNotExist: return render_error(request, 'token invalid.')
raise Http404
try:
for backend in get_backends(): user = User.objects.get(email=user_id)
user.backend = "%s.%s" % (backend.__module__, backend.__class__.__name__) except User.DoesNotExist:
return render_error(request, 'token invalid.')
auth_login(request, user)
for backend in get_backends():
# Ensure the user-originating redirection url is safe. user.backend = "%s.%s" % (backend.__module__, backend.__class__.__name__)
if REDIRECT_FIELD_NAME in request.GET: auth_login(request, user)
next_page = request.GET[REDIRECT_FIELD_NAME] if REDIRECT_FIELD_NAME in request.GET:
if not url_has_allowed_host_and_scheme(url=next_page, allowed_hosts=request.get_host()): next_page = request.GET[REDIRECT_FIELD_NAME]
next_page = settings.LOGIN_REDIRECT_URL if not url_has_allowed_host_and_scheme(url=next_page, allowed_hosts=request.get_host()):
else: next_page = settings.LOGIN_REDIRECT_URL
next_page = settings.SITE_ROOT
return HttpResponseRedirect(next_page)
else: else:
raise Http404 next_page = settings.SITE_ROOT
return HttpResponseRedirect(next_page)
def logout(request, next_page=None, def logout(request, next_page=None,
template_name='registration/logged_out.html', template_name='registration/logged_out.html',

View File

@@ -767,6 +767,9 @@ ENABLE_SSO_TO_THIRDPART_WEBSITE = False
THIRDPART_WEBSITE_SECRET_KEY = '' THIRDPART_WEBSITE_SECRET_KEY = ''
THIRDPART_WEBSITE_URL = '' THIRDPART_WEBSITE_URL = ''
SSO_SECRET_KEY = ''
# client sso # client sso
CLIENT_SSO_VIA_LOCAL_BROWSER = False CLIENT_SSO_VIA_LOCAL_BROWSER = False
CLIENT_SSO_TOKEN_EXPIRATION = 5 * 60 CLIENT_SSO_TOKEN_EXPIRATION = 5 * 60

View File

@@ -6,7 +6,7 @@ from seahub.ai.apis import ImageCaption, GenerateSummary
from seahub.api2.endpoints.share_link_auth import ShareLinkUserAuthView, ShareLinkEmailAuthView from seahub.api2.endpoints.share_link_auth import ShareLinkUserAuthView, ShareLinkEmailAuthView
from seahub.api2.endpoints.internal_api import InternalUserListView, InternalCheckShareLinkAccess, \ from seahub.api2.endpoints.internal_api import InternalUserListView, InternalCheckShareLinkAccess, \
InternalCheckFileOperationAccess InternalCheckFileOperationAccess
from seahub.auth.views import multi_adfs_sso from seahub.auth.views import multi_adfs_sso, login_simple_check
from seahub.views import * from seahub.views import *
from seahub.views.mobile import mobile_login from seahub.views.mobile import mobile_login
from seahub.views.sysadmin import * from seahub.views.sysadmin import *
@@ -950,6 +950,12 @@ if getattr(settings, 'ENABLE_KRB5_LOGIN', False):
urlpatterns += [ urlpatterns += [
re_path(r'^krb5-login/', shib_login, name="krb5_login"), re_path(r'^krb5-login/', shib_login, name="krb5_login"),
] ]
if getattr(settings, 'ENABLE_LOGIN_SIMPLE_CHECK', False):
urlpatterns += [
re_path(r'^sso-auto-login/', login_simple_check),
]
# serve office converter static files # serve office converter static files
from seahub.utils import HAS_OFFICE_CONVERTER from seahub.utils import HAS_OFFICE_CONVERTER

View File

@@ -54,13 +54,6 @@ urlpatterns = [
name='two_factor_auth'), name='two_factor_auth'),
] ]
if getattr(settings, 'ENABLE_LOGIN_SIMPLE_CHECK', False):
urlpatterns += [
path('login/simple_check/',
auth_views.login_simple_check),
]
urlpatterns += [ urlpatterns += [
path('login/', path('login/',
auth_views.login, auth_views.login,