mirror of
https://github.com/haiwen/seahub.git
synced 2025-09-14 06:11:16 +00:00
update login simple-check by jwt (#6842)
* update login simple-check by jwt * update
This commit is contained in:
@@ -1,6 +1,7 @@
|
|||||||
# Copyright (c) 2012-2016 Seafile Ltd.
|
# Copyright (c) 2012-2016 Seafile Ltd.
|
||||||
import hashlib
|
import hashlib
|
||||||
import logging
|
import logging
|
||||||
|
import jwt
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
# Avoid shadowing the login() view below.
|
# Avoid shadowing the login() view below.
|
||||||
@@ -17,7 +18,7 @@ from django.utils.translation import gettext as _
|
|||||||
from django.views.decorators.cache import never_cache
|
from django.views.decorators.cache import never_cache
|
||||||
from saml2.ident import decode
|
from saml2.ident import decode
|
||||||
from seaserv import seafile_api, ccnet_api
|
from seaserv import seafile_api, ccnet_api
|
||||||
|
from seahub.settings import SSO_SECRET_KEY
|
||||||
from seahub.auth import REDIRECT_FIELD_NAME, get_backends
|
from seahub.auth import REDIRECT_FIELD_NAME, get_backends
|
||||||
from seahub.auth import login as auth_login
|
from seahub.auth import login as auth_login
|
||||||
from seahub.auth.models import SocialAuthUser
|
from seahub.auth.models import SocialAuthUser
|
||||||
@@ -215,42 +216,43 @@ def login(request, template_name='registration/login.html',
|
|||||||
})
|
})
|
||||||
|
|
||||||
def login_simple_check(request):
|
def login_simple_check(request):
|
||||||
"""A simple check for login called by thirdpart systems(OA, etc).
|
|
||||||
|
|
||||||
Token generation: MD5(secret_key + foo@foo.com + 2014-1-1).hexdigest()
|
if not SSO_SECRET_KEY:
|
||||||
Token length: 32 hexadecimal digits.
|
return render_error(request, 'Permission denied.')
|
||||||
"""
|
|
||||||
username = request.GET.get('user', '')
|
login_token = request.GET.get('token', '')
|
||||||
random_key = request.GET.get('token', '')
|
if not login_token:
|
||||||
|
return render_error(request, 'token invalid.')
|
||||||
|
|
||||||
if not username or not random_key:
|
try:
|
||||||
raise Http404
|
payload = jwt.decode(login_token, SSO_SECRET_KEY, algorithms=['HS256'])
|
||||||
|
except jwt.ExpiredSignatureError:
|
||||||
|
return render_error(request, 'token expired.')
|
||||||
|
except jwt.PyJWTError:
|
||||||
|
return render_error(request, 'token invalid.')
|
||||||
|
|
||||||
today = datetime.now().strftime('%Y-%m-%d')
|
if 'exp' not in payload:
|
||||||
expect = hashlib.md5((settings.SECRET_KEY+username+today).encode('utf-8')).hexdigest()
|
return render_error(request, 'token invalid.')
|
||||||
if expect == random_key:
|
|
||||||
try:
|
user_id = payload.get('user_id')
|
||||||
user = User.objects.get(email=username)
|
if not user_id:
|
||||||
except User.DoesNotExist:
|
return render_error(request, 'token invalid.')
|
||||||
raise Http404
|
|
||||||
|
try:
|
||||||
for backend in get_backends():
|
user = User.objects.get(email=user_id)
|
||||||
user.backend = "%s.%s" % (backend.__module__, backend.__class__.__name__)
|
except User.DoesNotExist:
|
||||||
|
return render_error(request, 'token invalid.')
|
||||||
auth_login(request, user)
|
|
||||||
|
for backend in get_backends():
|
||||||
# Ensure the user-originating redirection url is safe.
|
user.backend = "%s.%s" % (backend.__module__, backend.__class__.__name__)
|
||||||
if REDIRECT_FIELD_NAME in request.GET:
|
auth_login(request, user)
|
||||||
next_page = request.GET[REDIRECT_FIELD_NAME]
|
if REDIRECT_FIELD_NAME in request.GET:
|
||||||
if not url_has_allowed_host_and_scheme(url=next_page, allowed_hosts=request.get_host()):
|
next_page = request.GET[REDIRECT_FIELD_NAME]
|
||||||
next_page = settings.LOGIN_REDIRECT_URL
|
if not url_has_allowed_host_and_scheme(url=next_page, allowed_hosts=request.get_host()):
|
||||||
else:
|
next_page = settings.LOGIN_REDIRECT_URL
|
||||||
next_page = settings.SITE_ROOT
|
|
||||||
|
|
||||||
return HttpResponseRedirect(next_page)
|
|
||||||
else:
|
else:
|
||||||
raise Http404
|
next_page = settings.SITE_ROOT
|
||||||
|
return HttpResponseRedirect(next_page)
|
||||||
|
|
||||||
def logout(request, next_page=None,
|
def logout(request, next_page=None,
|
||||||
template_name='registration/logged_out.html',
|
template_name='registration/logged_out.html',
|
||||||
|
@@ -767,6 +767,9 @@ ENABLE_SSO_TO_THIRDPART_WEBSITE = False
|
|||||||
THIRDPART_WEBSITE_SECRET_KEY = ''
|
THIRDPART_WEBSITE_SECRET_KEY = ''
|
||||||
THIRDPART_WEBSITE_URL = ''
|
THIRDPART_WEBSITE_URL = ''
|
||||||
|
|
||||||
|
|
||||||
|
SSO_SECRET_KEY = ''
|
||||||
|
|
||||||
# client sso
|
# client sso
|
||||||
CLIENT_SSO_VIA_LOCAL_BROWSER = False
|
CLIENT_SSO_VIA_LOCAL_BROWSER = False
|
||||||
CLIENT_SSO_TOKEN_EXPIRATION = 5 * 60
|
CLIENT_SSO_TOKEN_EXPIRATION = 5 * 60
|
||||||
|
@@ -6,7 +6,7 @@ from seahub.ai.apis import ImageCaption, GenerateSummary
|
|||||||
from seahub.api2.endpoints.share_link_auth import ShareLinkUserAuthView, ShareLinkEmailAuthView
|
from seahub.api2.endpoints.share_link_auth import ShareLinkUserAuthView, ShareLinkEmailAuthView
|
||||||
from seahub.api2.endpoints.internal_api import InternalUserListView, InternalCheckShareLinkAccess, \
|
from seahub.api2.endpoints.internal_api import InternalUserListView, InternalCheckShareLinkAccess, \
|
||||||
InternalCheckFileOperationAccess
|
InternalCheckFileOperationAccess
|
||||||
from seahub.auth.views import multi_adfs_sso
|
from seahub.auth.views import multi_adfs_sso, login_simple_check
|
||||||
from seahub.views import *
|
from seahub.views import *
|
||||||
from seahub.views.mobile import mobile_login
|
from seahub.views.mobile import mobile_login
|
||||||
from seahub.views.sysadmin import *
|
from seahub.views.sysadmin import *
|
||||||
@@ -950,6 +950,12 @@ if getattr(settings, 'ENABLE_KRB5_LOGIN', False):
|
|||||||
urlpatterns += [
|
urlpatterns += [
|
||||||
re_path(r'^krb5-login/', shib_login, name="krb5_login"),
|
re_path(r'^krb5-login/', shib_login, name="krb5_login"),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
if getattr(settings, 'ENABLE_LOGIN_SIMPLE_CHECK', False):
|
||||||
|
urlpatterns += [
|
||||||
|
re_path(r'^sso-auto-login/', login_simple_check),
|
||||||
|
]
|
||||||
|
|
||||||
# serve office converter static files
|
# serve office converter static files
|
||||||
from seahub.utils import HAS_OFFICE_CONVERTER
|
from seahub.utils import HAS_OFFICE_CONVERTER
|
||||||
|
@@ -54,13 +54,6 @@ urlpatterns = [
|
|||||||
name='two_factor_auth'),
|
name='two_factor_auth'),
|
||||||
]
|
]
|
||||||
|
|
||||||
if getattr(settings, 'ENABLE_LOGIN_SIMPLE_CHECK', False):
|
|
||||||
urlpatterns += [
|
|
||||||
path('login/simple_check/',
|
|
||||||
auth_views.login_simple_check),
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
urlpatterns += [
|
urlpatterns += [
|
||||||
path('login/',
|
path('login/',
|
||||||
auth_views.login,
|
auth_views.login,
|
||||||
|
Reference in New Issue
Block a user