Added optional Discourse SSO.
This commit is contained in:
parent
5527c1eb91
commit
54da04763f
8 changed files with 337 additions and 8 deletions
26
db.go
26
db.go
|
|
@ -140,6 +140,11 @@ func migrate(db *sql.DB) error {
|
||||||
department_id INTEGER NOT NULL REFERENCES departments(id) ON DELETE CASCADE,
|
department_id INTEGER NOT NULL REFERENCES departments(id) ON DELETE CASCADE,
|
||||||
PRIMARY KEY (participant_id, department_id)
|
PRIMARY KEY (participant_id, department_id)
|
||||||
);
|
);
|
||||||
|
|
||||||
|
CREATE TABLE IF NOT EXISTS sso_nonces (
|
||||||
|
nonce TEXT PRIMARY KEY,
|
||||||
|
created_at TEXT NOT NULL DEFAULT (datetime('now'))
|
||||||
|
);
|
||||||
`)
|
`)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
@ -1350,6 +1355,27 @@ func (app *App) listOpenShiftsForDept(deptID int) ([]Shift, error) {
|
||||||
ORDER BY s.day, s.position, s.start_time`, deptID)
|
ORDER BY s.day, s.position, s.start_time`, deptID)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// --- SSO Nonces ---
|
||||||
|
|
||||||
|
func (app *App) createSSONonce(nonce string) error {
|
||||||
|
_, err := app.db.Exec(`INSERT INTO sso_nonces (nonce) VALUES (?)`, nonce)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) consumeSSONonce(nonce string) (bool, error) {
|
||||||
|
res, err := app.db.Exec(
|
||||||
|
`DELETE FROM sso_nonces WHERE nonce = ? AND created_at > datetime('now', '-10 minutes')`, nonce)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
n, _ := res.RowsAffected()
|
||||||
|
return n > 0, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) cleanExpiredNonces() {
|
||||||
|
app.db.Exec(`DELETE FROM sso_nonces WHERE created_at < datetime('now', '-10 minutes')`)
|
||||||
|
}
|
||||||
|
|
||||||
// --- Helpers ---
|
// --- Helpers ---
|
||||||
|
|
||||||
func now() string {
|
func now() string {
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
<script>
|
<script>
|
||||||
import { onMount } from 'svelte'
|
import { onMount } from 'svelte'
|
||||||
import { getSession, clearSession } from './db.js'
|
import { getSession, saveSession, clearSession } from './db.js'
|
||||||
import { syncPull, startSSE, startSyncLoop } from './sync.js'
|
import { syncPull, startSSE, startSyncLoop } from './sync.js'
|
||||||
import Login from './pages/Login.svelte'
|
import Login from './pages/Login.svelte'
|
||||||
import Dashboard from './pages/Dashboard.svelte'
|
import Dashboard from './pages/Dashboard.svelte'
|
||||||
|
|
@ -25,6 +25,7 @@
|
||||||
let route = $state(window.location.pathname)
|
let route = $state(window.location.pathname)
|
||||||
let updateAvailable = $state(false)
|
let updateAvailable = $state(false)
|
||||||
let mobileNavOpen = $state(false)
|
let mobileNavOpen = $state(false)
|
||||||
|
let ssoError = $state('')
|
||||||
|
|
||||||
// Check if this is a public page (no auth needed)
|
// Check if this is a public page (no auth needed)
|
||||||
const kioskToken = $derived(route.match(/^\/v\/([A-Z0-9]+)/i)?.[1] ?? '')
|
const kioskToken = $derived(route.match(/^\/v\/([A-Z0-9]+)/i)?.[1] ?? '')
|
||||||
|
|
@ -54,7 +55,32 @@
|
||||||
loading = false
|
loading = false
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
session = await getSession()
|
|
||||||
|
// Handle SSO callback in URL fragment
|
||||||
|
const hash = window.location.hash
|
||||||
|
if (hash.startsWith('#sso_token=')) {
|
||||||
|
const token = decodeURIComponent(hash.slice('#sso_token='.length))
|
||||||
|
history.replaceState(null, '', '/')
|
||||||
|
try {
|
||||||
|
const res = await fetch('/api/me', { headers: { Authorization: `Bearer ${token}` } })
|
||||||
|
if (res.ok) {
|
||||||
|
const user = await res.json()
|
||||||
|
await saveSession(token, user)
|
||||||
|
session = { token, user }
|
||||||
|
} else {
|
||||||
|
ssoError = 'SSO login failed. Please try again.'
|
||||||
|
}
|
||||||
|
} catch {
|
||||||
|
ssoError = 'SSO login failed. Please try again.'
|
||||||
|
}
|
||||||
|
} else if (hash.startsWith('#sso_error=')) {
|
||||||
|
ssoError = decodeURIComponent(hash.slice('#sso_error='.length))
|
||||||
|
history.replaceState(null, '', '/')
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!session) {
|
||||||
|
session = await getSession()
|
||||||
|
}
|
||||||
loading = false
|
loading = false
|
||||||
if (session) {
|
if (session) {
|
||||||
await syncPull()
|
await syncPull()
|
||||||
|
|
@ -102,7 +128,7 @@
|
||||||
{:else if isConfirmEmail}
|
{:else if isConfirmEmail}
|
||||||
<ConfirmEmail />
|
<ConfirmEmail />
|
||||||
{:else if !session}
|
{:else if !session}
|
||||||
<Login onlogin={onLogin} />
|
<Login onlogin={onLogin} error={ssoError} />
|
||||||
{:else if roles.length === 1 && roles[0] === 'gatekeeper'}
|
{:else if roles.length === 1 && roles[0] === 'gatekeeper'}
|
||||||
<!-- Gate-only users get the full-screen GateKiosk instead of the standard layout -->
|
<!-- Gate-only users get the full-screen GateKiosk instead of the standard layout -->
|
||||||
<GateKiosk {session} {onLogout} />
|
<GateKiosk {session} {onLogout} />
|
||||||
|
|
|
||||||
|
|
@ -118,6 +118,10 @@ export const api = {
|
||||||
resetDepartments: () => apiJSON('/api/settings/reset-departments', { method: 'POST' }),
|
resetDepartments: () => apiJSON('/api/settings/reset-departments', { method: 'POST' }),
|
||||||
resetVolunteerShifts: () => apiJSON('/api/settings/reset-volunteer-shifts', { method: 'POST' }),
|
resetVolunteerShifts: () => apiJSON('/api/settings/reset-volunteer-shifts', { method: 'POST' }),
|
||||||
},
|
},
|
||||||
|
sso: {
|
||||||
|
enabled: () => kioskFetch('/api/public/sso-enabled'),
|
||||||
|
init: () => kioskFetch('/api/sso/init'),
|
||||||
|
},
|
||||||
signup: {
|
signup: {
|
||||||
config: () => kioskFetch('/api/public/signup-config'),
|
config: () => kioskFetch('/api/public/signup-config'),
|
||||||
submit: (data) => kioskFetch('/api/public/signup', { method: 'POST', body: JSON.stringify(data) }),
|
submit: (data) => kioskFetch('/api/public/signup', { method: 'POST', body: JSON.stringify(data) }),
|
||||||
|
|
|
||||||
|
|
@ -1,13 +1,23 @@
|
||||||
<script>
|
<script>
|
||||||
|
import { onMount } from 'svelte'
|
||||||
import { api } from '../api.js'
|
import { api } from '../api.js'
|
||||||
import { saveSession } from '../db.js'
|
import { saveSession } from '../db.js'
|
||||||
|
|
||||||
let { onlogin } = $props()
|
let { onlogin, error: initialError = '' } = $props()
|
||||||
|
|
||||||
let email = $state('')
|
let email = $state('')
|
||||||
let password = $state('')
|
let password = $state('')
|
||||||
let error = $state('')
|
let error = $state(initialError)
|
||||||
let loading = $state(false)
|
let loading = $state(false)
|
||||||
|
let ssoEnabled = $state(false)
|
||||||
|
let ssoLoading = $state(false)
|
||||||
|
|
||||||
|
onMount(async () => {
|
||||||
|
try {
|
||||||
|
const res = await api.sso.enabled()
|
||||||
|
ssoEnabled = res.enabled
|
||||||
|
} catch {}
|
||||||
|
})
|
||||||
|
|
||||||
async function submit(e) {
|
async function submit(e) {
|
||||||
e.preventDefault()
|
e.preventDefault()
|
||||||
|
|
@ -23,6 +33,18 @@
|
||||||
loading = false
|
loading = false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async function startSSO() {
|
||||||
|
error = ''
|
||||||
|
ssoLoading = true
|
||||||
|
try {
|
||||||
|
const { redirect_url } = await api.sso.init()
|
||||||
|
window.location.href = redirect_url
|
||||||
|
} catch (err) {
|
||||||
|
error = err.message || 'SSO failed'
|
||||||
|
ssoLoading = false
|
||||||
|
}
|
||||||
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
<div class="login-wrap">
|
<div class="login-wrap">
|
||||||
|
|
@ -45,5 +67,28 @@
|
||||||
{loading ? 'Signing in…' : 'Sign in'}
|
{loading ? 'Signing in…' : 'Sign in'}
|
||||||
</button>
|
</button>
|
||||||
</form>
|
</form>
|
||||||
|
{#if ssoEnabled}
|
||||||
|
<div class="sso-divider"><span>or</span></div>
|
||||||
|
<button class="btn btn-ghost" style="width:100%" onclick={startSSO} disabled={ssoLoading}>
|
||||||
|
{ssoLoading ? 'Redirecting…' : 'Log in with Discourse'}
|
||||||
|
</button>
|
||||||
|
{/if}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<style>
|
||||||
|
.sso-divider {
|
||||||
|
display: flex;
|
||||||
|
align-items: center;
|
||||||
|
margin: 1rem 0;
|
||||||
|
gap: 0.75rem;
|
||||||
|
color: var(--c-muted);
|
||||||
|
font-size: 0.8rem;
|
||||||
|
}
|
||||||
|
.sso-divider::before,
|
||||||
|
.sso-divider::after {
|
||||||
|
content: '';
|
||||||
|
flex: 1;
|
||||||
|
border-top: 1px solid var(--c-border);
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
|
|
||||||
|
|
@ -26,6 +26,8 @@
|
||||||
let eventEndDate = $state('')
|
let eventEndDate = $state('')
|
||||||
let eventTimezone = $state('')
|
let eventTimezone = $state('')
|
||||||
const timezones = Intl.supportedValuesOf('timeZone')
|
const timezones = Intl.supportedValuesOf('timeZone')
|
||||||
|
let discourseSSOUrl = $state('')
|
||||||
|
let discourseSSOSecret = $state('')
|
||||||
let shiftSignupsOpen = $state(false)
|
let shiftSignupsOpen = $state(false)
|
||||||
let togglingSignups = $state(false)
|
let togglingSignups = $state(false)
|
||||||
|
|
||||||
|
|
@ -49,6 +51,8 @@
|
||||||
baseURL = s.base_url ?? ''
|
baseURL = s.base_url ?? ''
|
||||||
noteLabel = s.volunteer_note_label ?? 'Additional note'
|
noteLabel = s.volunteer_note_label ?? 'Additional note'
|
||||||
noteRequired = s.volunteer_note_required ?? false
|
noteRequired = s.volunteer_note_required ?? false
|
||||||
|
discourseSSOUrl = s.discourse_sso_url ?? ''
|
||||||
|
discourseSSOSecret = ''
|
||||||
shiftSignupsOpen = s.shift_signups_open ?? false
|
shiftSignupsOpen = s.shift_signups_open ?? false
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
error = err.message
|
error = err.message
|
||||||
|
|
@ -89,14 +93,17 @@
|
||||||
smtp_host: smtpHost,
|
smtp_host: smtpHost,
|
||||||
smtp_port: smtpPort,
|
smtp_port: smtpPort,
|
||||||
smtp_user: smtpUser,
|
smtp_user: smtpUser,
|
||||||
smtp_password: smtpPassword, // empty = keep existing
|
smtp_password: smtpPassword,
|
||||||
smtp_from: smtpFrom,
|
smtp_from: smtpFrom,
|
||||||
smtp_from_name: smtpFromName,
|
smtp_from_name: smtpFromName,
|
||||||
base_url: baseURL,
|
base_url: baseURL,
|
||||||
volunteer_note_label: noteLabel,
|
volunteer_note_label: noteLabel,
|
||||||
volunteer_note_required: noteRequired,
|
volunteer_note_required: noteRequired,
|
||||||
|
discourse_sso_url: discourseSSOUrl,
|
||||||
|
discourse_sso_secret: discourseSSOSecret,
|
||||||
})
|
})
|
||||||
smtpPassword = ''
|
smtpPassword = ''
|
||||||
|
discourseSSOSecret = ''
|
||||||
success = 'Settings saved.'
|
success = 'Settings saved.'
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
error = err.message
|
error = err.message
|
||||||
|
|
@ -240,6 +247,24 @@
|
||||||
<input id="s-url" bind:value={baseURL} placeholder="https://events.example.com" />
|
<input id="s-url" bind:value={baseURL} placeholder="https://events.example.com" />
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<!-- Discourse SSO -->
|
||||||
|
<h2 style="font-size:0.95rem;font-weight:700;margin:1.5rem 0 1rem">Discourse SSO</h2>
|
||||||
|
<p class="text-muted" style="font-size:0.78rem;margin-bottom:1rem">
|
||||||
|
Enable DiscourseConnect SSO so users can log in with their Discourse account.
|
||||||
|
Set the same secret in your Discourse admin under Connect > discourse connect secret.
|
||||||
|
</p>
|
||||||
|
<div style="display:grid;grid-template-columns:1fr 1fr;gap:1rem">
|
||||||
|
<div class="form-group" style="grid-column:1/-1">
|
||||||
|
<label for="sso-url">Discourse URL</label>
|
||||||
|
<input id="sso-url" bind:value={discourseSSOUrl} placeholder="https://forum.example.com" />
|
||||||
|
</div>
|
||||||
|
<div class="form-group" style="grid-column:1/-1">
|
||||||
|
<label for="sso-secret">SSO Secret</label>
|
||||||
|
<input id="sso-secret" type="password" bind:value={discourseSSOSecret}
|
||||||
|
placeholder="Leave blank to keep existing" autocomplete="new-password" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
<div class="actions">
|
<div class="actions">
|
||||||
<button type="submit" class="btn btn-primary" disabled={saving}>
|
<button type="submit" class="btn btn-primary" disabled={saving}>
|
||||||
{saving ? 'Saving…' : 'Save Settings'}
|
{saving ? 'Saving…' : 'Save Settings'}
|
||||||
|
|
|
||||||
|
|
@ -27,6 +27,14 @@ func (app *App) handleGetSettings(w http.ResponseWriter, r *http.Request) {
|
||||||
noteLabel = "Additional note"
|
noteLabel = "Additional note"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var ssoURL, ssoSecret string
|
||||||
|
app.db.QueryRow(`SELECT value FROM config WHERE key = 'discourse_sso_url'`).Scan(&ssoURL)
|
||||||
|
app.db.QueryRow(`SELECT value FROM config WHERE key = 'discourse_sso_secret'`).Scan(&ssoSecret)
|
||||||
|
maskedSSOSecret := ""
|
||||||
|
if ssoSecret != "" {
|
||||||
|
maskedSSOSecret = "***"
|
||||||
|
}
|
||||||
|
|
||||||
writeJSON(w, map[string]any{
|
writeJSON(w, map[string]any{
|
||||||
"smtp_host": cfg.Host,
|
"smtp_host": cfg.Host,
|
||||||
"smtp_port": cfg.Port,
|
"smtp_port": cfg.Port,
|
||||||
|
|
@ -38,6 +46,8 @@ func (app *App) handleGetSettings(w http.ResponseWriter, r *http.Request) {
|
||||||
"volunteer_note_label": noteLabel,
|
"volunteer_note_label": noteLabel,
|
||||||
"volunteer_note_required": noteRequired == "true",
|
"volunteer_note_required": noteRequired == "true",
|
||||||
"shift_signups_open": signupsOpen == "true",
|
"shift_signups_open": signupsOpen == "true",
|
||||||
|
"discourse_sso_url": ssoURL,
|
||||||
|
"discourse_sso_secret": maskedSSOSecret,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -49,7 +59,7 @@ func (app *App) handleUpdateSettings(w http.ResponseWriter, r *http.Request) {
|
||||||
}
|
}
|
||||||
|
|
||||||
keys := []string{"smtp_host", "smtp_port", "smtp_user", "smtp_password", "smtp_from", "smtp_from_name", "base_url",
|
keys := []string{"smtp_host", "smtp_port", "smtp_user", "smtp_password", "smtp_from", "smtp_from_name", "base_url",
|
||||||
"volunteer_note_label", "volunteer_note_required"}
|
"volunteer_note_label", "volunteer_note_required", "discourse_sso_url", "discourse_sso_secret"}
|
||||||
for _, k := range keys {
|
for _, k := range keys {
|
||||||
v, ok := body[k]
|
v, ok := body[k]
|
||||||
if !ok {
|
if !ok {
|
||||||
|
|
@ -58,7 +68,7 @@ func (app *App) handleUpdateSettings(w http.ResponseWriter, r *http.Request) {
|
||||||
var val string
|
var val string
|
||||||
switch vv := v.(type) {
|
switch vv := v.(type) {
|
||||||
case string:
|
case string:
|
||||||
if k == "smtp_password" && (vv == "" || vv == "***") {
|
if (k == "smtp_password" || k == "discourse_sso_secret") && (vv == "" || vv == "***") {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
val = vv
|
val = vv
|
||||||
|
|
|
||||||
190
handle_sso.go
Normal file
190
handle_sso.go
Normal file
|
|
@ -0,0 +1,190 @@
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/rand"
|
||||||
|
"crypto/sha256"
|
||||||
|
"encoding/base64"
|
||||||
|
"encoding/hex"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (app *App) getSSOConfig() (ssoURL, ssoSecret string) {
|
||||||
|
app.db.QueryRow(`SELECT value FROM config WHERE key = 'discourse_sso_url'`).Scan(&ssoURL)
|
||||||
|
app.db.QueryRow(`SELECT value FROM config WHERE key = 'discourse_sso_secret'`).Scan(&ssoSecret)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) handleSSOEnabled(w http.ResponseWriter, r *http.Request) {
|
||||||
|
ssoURL, ssoSecret := app.getSSOConfig()
|
||||||
|
writeJSON(w, map[string]bool{"enabled": ssoURL != "" && ssoSecret != ""})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) getBaseURL() string {
|
||||||
|
if app.baseURL != "" {
|
||||||
|
return app.baseURL
|
||||||
|
}
|
||||||
|
var u string
|
||||||
|
app.db.QueryRow(`SELECT value FROM config WHERE key = 'base_url'`).Scan(&u)
|
||||||
|
return u
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) handleSSOInit(w http.ResponseWriter, r *http.Request) {
|
||||||
|
ssoURL, ssoSecret := app.getSSOConfig()
|
||||||
|
if ssoURL == "" || ssoSecret == "" {
|
||||||
|
writeError(w, "SSO not configured", http.StatusNotFound)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
baseURL := app.getBaseURL()
|
||||||
|
if baseURL == "" {
|
||||||
|
writeError(w, "base_url must be configured for SSO", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
b := make([]byte, 32)
|
||||||
|
rand.Read(b)
|
||||||
|
nonce := hex.EncodeToString(b)
|
||||||
|
|
||||||
|
app.cleanExpiredNonces()
|
||||||
|
if err := app.createSSONonce(nonce); err != nil {
|
||||||
|
writeError(w, "internal error", http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
returnURL := strings.TrimRight(baseURL, "/") + "/api/sso/callback"
|
||||||
|
|
||||||
|
payload := fmt.Sprintf("nonce=%s&return_sso_url=%s", url.QueryEscape(nonce), url.QueryEscape(returnURL))
|
||||||
|
encoded := base64.StdEncoding.EncodeToString([]byte(payload))
|
||||||
|
|
||||||
|
mac := hmac.New(sha256.New, []byte(ssoSecret))
|
||||||
|
mac.Write([]byte(encoded))
|
||||||
|
sig := hex.EncodeToString(mac.Sum(nil))
|
||||||
|
|
||||||
|
redirect := fmt.Sprintf("%s/session/sso_provider?sso=%s&sig=%s",
|
||||||
|
strings.TrimRight(ssoURL, "/"), url.QueryEscape(encoded), url.QueryEscape(sig))
|
||||||
|
|
||||||
|
writeJSON(w, map[string]string{"redirect_url": redirect})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (app *App) handleSSOCallback(w http.ResponseWriter, r *http.Request) {
|
||||||
|
baseURL := app.getBaseURL()
|
||||||
|
|
||||||
|
ssoRedirectError := func(msg string) {
|
||||||
|
if baseURL != "" {
|
||||||
|
http.Redirect(w, r, strings.TrimRight(baseURL, "/")+"/#sso_error="+url.QueryEscape(msg), http.StatusFound)
|
||||||
|
} else {
|
||||||
|
writeError(w, msg, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
_, ssoSecret := app.getSSOConfig()
|
||||||
|
if ssoSecret == "" {
|
||||||
|
ssoRedirectError("SSO not configured")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ssoParam := r.URL.Query().Get("sso")
|
||||||
|
sigParam := r.URL.Query().Get("sig")
|
||||||
|
if ssoParam == "" || sigParam == "" {
|
||||||
|
ssoRedirectError("Invalid SSO response")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
mac := hmac.New(sha256.New, []byte(ssoSecret))
|
||||||
|
mac.Write([]byte(ssoParam))
|
||||||
|
expectedSig := hex.EncodeToString(mac.Sum(nil))
|
||||||
|
if !hmac.Equal([]byte(expectedSig), []byte(sigParam)) {
|
||||||
|
ssoRedirectError("Invalid SSO signature")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
decoded, err := base64.StdEncoding.DecodeString(ssoParam)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Invalid SSO payload")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
vals, err := url.ParseQuery(string(decoded))
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Invalid SSO payload")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
nonce := vals.Get("nonce")
|
||||||
|
valid, err := app.consumeSSONonce(nonce)
|
||||||
|
if err != nil || !valid {
|
||||||
|
ssoRedirectError("SSO session expired. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
email := strings.ToLower(vals.Get("email"))
|
||||||
|
if email == "" {
|
||||||
|
ssoRedirectError("No email in SSO response")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
name := vals.Get("name")
|
||||||
|
if name == "" {
|
||||||
|
name = vals.Get("username")
|
||||||
|
}
|
||||||
|
|
||||||
|
user, _, err := app.getLoginParticipant(email)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if user == nil {
|
||||||
|
p, err := app.getParticipantByEmail(email)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if p != nil {
|
||||||
|
if _, err := app.db.Exec(
|
||||||
|
`UPDATE participants SET login_enabled = 1, updated_at = ? WHERE id = ?`,
|
||||||
|
now(), p.ID,
|
||||||
|
); err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
user, err = app.getUser(p.ID)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if user == nil {
|
||||||
|
if name == "" {
|
||||||
|
name = strings.Split(email, "@")[0]
|
||||||
|
}
|
||||||
|
res, err := app.db.Exec(
|
||||||
|
`INSERT INTO participants (email, preferred_name, login_enabled, updated_at) VALUES (?, ?, 1, ?)`,
|
||||||
|
email, name, now(),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
id, _ := res.LastInsertId()
|
||||||
|
user, err = app.getUser(int(id))
|
||||||
|
if err != nil || user == nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
token, err := app.signToken(user)
|
||||||
|
if err != nil {
|
||||||
|
ssoRedirectError("Login failed. Please try again.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
http.Redirect(w, r, strings.TrimRight(baseURL, "/")+"/#sso_token="+url.QueryEscape(token), http.StatusFound)
|
||||||
|
}
|
||||||
3
main.go
3
main.go
|
|
@ -164,6 +164,9 @@ func (app *App) registerRoutes(mux *http.ServeMux) {
|
||||||
mux.HandleFunc("POST /api/settings/shift-signups", auth(app.handleToggleShiftSignups, "admin", "staffing"))
|
mux.HandleFunc("POST /api/settings/shift-signups", auth(app.handleToggleShiftSignups, "admin", "staffing"))
|
||||||
|
|
||||||
// Public endpoints — no JWT required.
|
// Public endpoints — no JWT required.
|
||||||
|
mux.HandleFunc("GET /api/public/sso-enabled", app.handleSSOEnabled)
|
||||||
|
mux.HandleFunc("GET /api/sso/init", app.handleSSOInit)
|
||||||
|
mux.HandleFunc("GET /api/sso/callback", app.handleSSOCallback)
|
||||||
mux.HandleFunc("GET /api/public/signup-config", app.handlePublicSignupConfig)
|
mux.HandleFunc("GET /api/public/signup-config", app.handlePublicSignupConfig)
|
||||||
mux.HandleFunc("POST /api/public/signup", app.handlePublicSignup)
|
mux.HandleFunc("POST /api/public/signup", app.handlePublicSignup)
|
||||||
mux.HandleFunc("POST /api/public/confirm", app.handleConfirmEmail)
|
mux.HandleFunc("POST /api/public/confirm", app.handleConfirmEmail)
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue