/
web.go
75 lines (59 loc) · 1.76 KB
/
web.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
package core
import (
"fmt"
"github.com/gin-contrib/sessions"
"github.com/gin-gonic/gin"
"github.com/ochanoco/ninsho"
gin_ninsho "github.com/ochanoco/ninsho/extension/gin"
)
func StaticWeb(proxy *TorimaProxy, r *gin.RouterGroup) {
r.Use(func() gin.HandlerFunc {
return func(c *gin.Context) {
c.Writer.Header().Set("Service-Worker-Allowed", "/")
}
}())
r.Static("/static", STATIC_FOLDER)
}
func ConfigWeb(proxy *TorimaProxy, r *gin.RouterGroup) {
r.GET("/status", func(c *gin.Context) {
session := sessions.Default(c)
userId := session.Get("userId")
c.JSON(200, gin.H{
"protection_scope": proxy.Config.ProtectionScope,
"white_list_path": proxy.Config.WhiteListPath,
"is_authenticated": userId != nil, // is it needed?.
})
})
}
func LoginWebs(proxy *TorimaProxy, r *gin.RouterGroup) {
var redirectUri = proxy.Config.Host + proxy.Config.WebRoot + AUTH_PATH.Callback
fmt.Printf("please set '%v' to redirect uri\n", redirectUri)
var provider = ninsho.Provider{
ClientID: CLIENT_ID,
ClientSecret: CLIENT_SECRET,
RedirectUri: redirectUri,
Scope: "profile openid",
UsePKCE: true,
}
login, err := gin_ninsho.NewNinshoGin(r, &provider, &ninsho.LINE_LOGIN, proxy.Config.WebRoot, &AUTH_PATH)
if err != nil {
panic(err)
}
r.GET("/login", func(c *gin.Context) {
login.Login(c)
})
r.GET("/auth/logout", func(c *gin.Context) {
login.Logout(c)
c.JSON(200, gin.H{"message": "logout"})
})
r.GET("/auth/status", login.AuthMiddleware(), func(c *gin.Context) {
c.JSON(200, gin.H{"message": "loggined!"})
})
r.GET("/auth/redirect", login.AuthMiddleware(), func(c *gin.Context) {
user, err := gin_ninsho.LoadUser[ninsho.LINE_USER](c)
if err != nil {
panic(err)
}
c.JSON(200, gin.H{"user_id": user.Sub})
})
}