chore: archi package du projet
This commit is contained in:
171
routeserv/routes.auth.go
Normal file
171
routeserv/routes.auth.go
Normal file
@@ -0,0 +1,171 @@
|
||||
package routeserv
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"fmt"
|
||||
"html/template"
|
||||
"log"
|
||||
"math/rand"
|
||||
"net/http"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/dgrijalva/jwt-go"
|
||||
"github.com/ldrogou/goauth20/model"
|
||||
templateoauth "github.com/ldrogou/goauth20/templateOAuth"
|
||||
)
|
||||
|
||||
//Claim claims to export
|
||||
type Claims struct {
|
||||
Sub string `json:"sub"`
|
||||
IDEntreprise string `json:"idEntreprise,omitempty"`
|
||||
RcaPartnerID string `json:"rcaPartnerId"`
|
||||
Scopes []string `json:"scopes"`
|
||||
Roles []string `json:"roles"`
|
||||
jwt.StandardClaims
|
||||
}
|
||||
|
||||
func (s *Server) handleIndex() http.HandlerFunc {
|
||||
return func(rw http.ResponseWriter, r *http.Request) {
|
||||
|
||||
rw.Header().Set("Content-Type", "text/html")
|
||||
rw.WriteHeader(http.StatusOK)
|
||||
|
||||
t, err := template.New("test").Parse(templateoauth.TemplateIndex)
|
||||
if err != nil {
|
||||
fmt.Printf("erreur suivante %v", err)
|
||||
}
|
||||
|
||||
err = t.Execute(rw, nil)
|
||||
if err != nil {
|
||||
fmt.Printf("erreur suivante %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
func (s *Server) handleLocal() http.HandlerFunc {
|
||||
return func(rw http.ResponseWriter, r *http.Request) {
|
||||
|
||||
sub := r.FormValue("sub")
|
||||
idEntreprise := r.FormValue("id_entreprise")
|
||||
rcaPartnerID := r.FormValue("rcaPartnerId")
|
||||
jwtKey := r.FormValue("secret")
|
||||
scopes := r.FormValue("scopes")
|
||||
roles := r.FormValue("roles")
|
||||
|
||||
var sc []string
|
||||
sc = append(sc, scopes)
|
||||
|
||||
rs := strings.Fields(roles)
|
||||
|
||||
// Declare the expiration time of the token
|
||||
// here, we have kept it as 5 minutes
|
||||
expirationTime := time.Now().Add(5 * time.Hour)
|
||||
// Create the JWT claims, which includes the username and expiry time
|
||||
claims := &Claims{
|
||||
StandardClaims: jwt.StandardClaims{
|
||||
// In JWT, the expiry time is expressed as unix milliseconds
|
||||
ExpiresAt: expirationTime.Unix(),
|
||||
},
|
||||
}
|
||||
if idEntreprise != "0" {
|
||||
claims.IDEntreprise = idEntreprise
|
||||
}
|
||||
claims.Sub = sub
|
||||
claims.RcaPartnerID = rcaPartnerID
|
||||
claims.Roles = rs
|
||||
claims.Scopes = sc
|
||||
|
||||
secretBase64, err := jwt.DecodeSegment(jwtKey)
|
||||
// Declare the token with the algorithm used for signing, and the claims
|
||||
ts := jwt.NewWithClaims(jwt.SigningMethodHS512, claims)
|
||||
|
||||
at, err := ts.SignedString(secretBase64)
|
||||
// Create the JWT string
|
||||
if err != nil {
|
||||
log.Printf("erreur %v", err)
|
||||
// If there is an error in creating the JWT return an internal server error
|
||||
rw.WriteHeader(http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
// Puis redisrect vers page resultat
|
||||
o := &model.Oauth{
|
||||
ID: 0,
|
||||
AccessToken: at,
|
||||
TokenType: "bearer",
|
||||
ExpiresIN: -1,
|
||||
RefreshToken: "refresh",
|
||||
}
|
||||
err = s.Store.CreateOauth(o)
|
||||
if err != nil {
|
||||
fmt.Printf("erreur suivante %v", err)
|
||||
}
|
||||
|
||||
monID := strconv.Itoa(int(o.ID))
|
||||
// Puis redisrect vers page resultat
|
||||
rj := "http://localhost:8090/jwt/" + monID
|
||||
http.Redirect(rw, r, rj, http.StatusMovedPermanently)
|
||||
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
func (s *Server) handleOAuth20() http.HandlerFunc {
|
||||
return func(rw http.ResponseWriter, r *http.Request) {
|
||||
|
||||
d := r.FormValue("domain")
|
||||
ci := r.FormValue("clientId")
|
||||
cs := r.FormValue("clientSecret")
|
||||
sc := r.FormValue("clientScopes")
|
||||
cc := r.FormValue("currentCompany")
|
||||
|
||||
// Création du nombre aléatoire pour la state
|
||||
nr := rand.NewSource(time.Now().UnixNano())
|
||||
rand := rand.New(nr)
|
||||
st := strconv.Itoa(rand.Intn(10000000000))
|
||||
|
||||
// Insert en base de données
|
||||
p := &model.Param{
|
||||
ID: 0,
|
||||
State: st,
|
||||
Domaine: d,
|
||||
ClientID: ci,
|
||||
ClientSecret: cs,
|
||||
GrantType: "authorization_code",
|
||||
}
|
||||
|
||||
err := s.Store.CreateParam(p)
|
||||
if err != nil {
|
||||
fmt.Printf("erreur suivante %v", err)
|
||||
}
|
||||
|
||||
// on appelle les méthodes de l'instance de `rand.Rand` obtenue comme les autres méthodes du package.
|
||||
//fmt.Print(r1.Intn(100), ",")
|
||||
|
||||
var b bytes.Buffer
|
||||
if cc == "none" {
|
||||
b.WriteString("https://api.")
|
||||
b.WriteString(d)
|
||||
b.WriteString("/auth/v1/oauth2.0/authorize?response_type=code")
|
||||
} else {
|
||||
b.WriteString("https://")
|
||||
b.WriteString(d)
|
||||
b.WriteString("/entreprise-partenaire/authorize?")
|
||||
b.WriteString("current_company=")
|
||||
b.WriteString(cc)
|
||||
b.WriteString("&abort_uri=http://localhost:8090/index")
|
||||
}
|
||||
|
||||
b.WriteString("&client_id=")
|
||||
b.WriteString(ci)
|
||||
b.WriteString("&scope=")
|
||||
b.WriteString(sc)
|
||||
b.WriteString("&redirect_uri=http://localhost:8090/oauth/redirect%3Fstate=")
|
||||
b.WriteString(st)
|
||||
|
||||
http.Redirect(rw, r, b.String(), http.StatusMovedPermanently)
|
||||
}
|
||||
|
||||
}
|
||||
Reference in New Issue
Block a user