try to override oauth
This commit is contained in:
parent
b8ef30b31a
commit
b4d819dd22
498
app/Resources/HWIOAuthBundle/Controller/ConnectController.php
Executable file
498
app/Resources/HWIOAuthBundle/Controller/ConnectController.php
Executable file
@ -0,0 +1,498 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This file is part of the HWIOAuthBundle package.
|
||||||
|
*
|
||||||
|
* (c) Hardware.Info <opensource@hardware.info>
|
||||||
|
*
|
||||||
|
* For the full copyright and license information, please view the LICENSE
|
||||||
|
* file that was distributed with this source code.
|
||||||
|
*/
|
||||||
|
|
||||||
|
namespace HWI\Bundle\OAuthBundle\Controller;
|
||||||
|
|
||||||
|
use HWI\Bundle\OAuthBundle\Event\FilterUserResponseEvent;
|
||||||
|
use HWI\Bundle\OAuthBundle\Event\FormEvent;
|
||||||
|
use HWI\Bundle\OAuthBundle\Event\GetResponseUserEvent;
|
||||||
|
use HWI\Bundle\OAuthBundle\HWIOAuthEvents;
|
||||||
|
use HWI\Bundle\OAuthBundle\OAuth\ResourceOwnerInterface;
|
||||||
|
use HWI\Bundle\OAuthBundle\OAuth\Response\UserResponseInterface;
|
||||||
|
use HWI\Bundle\OAuthBundle\Security\Core\Authentication\Token\OAuthToken;
|
||||||
|
use HWI\Bundle\OAuthBundle\Security\Core\Exception\AccountNotLinkedException;
|
||||||
|
use Symfony\Bundle\FrameworkBundle\Controller\Controller;
|
||||||
|
use Symfony\Component\Form\Extension\Core\Type\FormType;
|
||||||
|
use Symfony\Component\Form\FormInterface;
|
||||||
|
use Symfony\Component\HttpFoundation\RedirectResponse;
|
||||||
|
use Symfony\Component\HttpFoundation\Request;
|
||||||
|
use Symfony\Component\HttpFoundation\Response;
|
||||||
|
use Symfony\Component\HttpFoundation\Session\SessionInterface;
|
||||||
|
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
|
||||||
|
use Symfony\Component\Security\Core\Exception\AccessDeniedException;
|
||||||
|
use Symfony\Component\Security\Core\Exception\AccountStatusException;
|
||||||
|
use Symfony\Component\Security\Core\Exception\AuthenticationException;
|
||||||
|
use Symfony\Component\Security\Core\Security;
|
||||||
|
use Symfony\Component\Security\Core\User\UserInterface;
|
||||||
|
use Symfony\Component\Security\Csrf\CsrfTokenManager;
|
||||||
|
use Symfony\Component\Security\Csrf\CsrfTokenManagerInterface;
|
||||||
|
use Symfony\Component\Security\Http\Event\InteractiveLoginEvent;
|
||||||
|
use Symfony\Component\Security\Http\SecurityEvents;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author Alexander <iam.asm89@gmail.com>
|
||||||
|
*/
|
||||||
|
class ConnectController extends Controller {
|
||||||
|
private $tokenManager;
|
||||||
|
|
||||||
|
public function __construct( CsrfTokenManagerInterface $tokenManager = null ) {
|
||||||
|
$this->tokenManager = new CsrfTokenManager();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Action that handles the login 'form'. If connecting is enabled the
|
||||||
|
* user will be redirected to the appropriate login urls or registration forms.
|
||||||
|
*
|
||||||
|
* @param Request $request
|
||||||
|
*
|
||||||
|
* @throws \LogicException
|
||||||
|
*
|
||||||
|
* @return Response
|
||||||
|
*/
|
||||||
|
public function connectAction( Request $request ) {
|
||||||
|
// var_dump( "override" );
|
||||||
|
// var_dump( $this->tokenManager );
|
||||||
|
// die();
|
||||||
|
$csrf_token = $this->tokenManager
|
||||||
|
? $this->tokenManager->getToken( 'authenticate' )->getValue()
|
||||||
|
: null;
|
||||||
|
$connect = $this->container->getParameter( 'hwi_oauth.connect' );
|
||||||
|
$hasUser = $this->getUser() ? $this->isGranted( $this->container->getParameter( 'hwi_oauth.grant_rule' ) ) : false;
|
||||||
|
|
||||||
|
$error = $this->getErrorForRequest( $request );
|
||||||
|
|
||||||
|
// if connecting is enabled and there is no user, redirect to the registration form
|
||||||
|
if ( $connect && ! $hasUser && $error instanceof AccountNotLinkedException ) {
|
||||||
|
$key = time();
|
||||||
|
$session = $request->getSession();
|
||||||
|
$session->set( '_hwi_oauth.registration_error.' . $key, $error );
|
||||||
|
|
||||||
|
return $this->redirectToRoute( 'hwi_oauth_connect_registration', [ 'key' => $key ] );
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( $error ) {
|
||||||
|
if ( $error instanceof AuthenticationException ) {
|
||||||
|
$error = $error->getMessageKey();
|
||||||
|
} else {
|
||||||
|
$error = $error->getMessage();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
$csrf_token = '';
|
||||||
|
|
||||||
|
return $this->render( '@HWIOAuth/Connect/login.html.twig',
|
||||||
|
[
|
||||||
|
'csrf_token' => $csrf_token,
|
||||||
|
'error' => $error,
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Shows a registration form if there is no user logged in and connecting
|
||||||
|
* is enabled.
|
||||||
|
*
|
||||||
|
* @param Request $request a request
|
||||||
|
* @param string $key key used for retrieving the right information for the registration form
|
||||||
|
*
|
||||||
|
* @return Response
|
||||||
|
*
|
||||||
|
* @throws NotFoundHttpException if `connect` functionality was not enabled
|
||||||
|
* @throws AccessDeniedException if any user is authenticated
|
||||||
|
* @throws \RuntimeException
|
||||||
|
*/
|
||||||
|
public function registrationAction( Request $request, $key ) {
|
||||||
|
$connect = $this->container->getParameter( 'hwi_oauth.connect' );
|
||||||
|
if ( ! $connect ) {
|
||||||
|
throw new NotFoundHttpException();
|
||||||
|
}
|
||||||
|
|
||||||
|
$hasUser = $this->isGranted( $this->container->getParameter( 'hwi_oauth.grant_rule' ) );
|
||||||
|
if ( $hasUser ) {
|
||||||
|
throw new AccessDeniedException( 'Cannot connect already registered account.' );
|
||||||
|
}
|
||||||
|
|
||||||
|
$session = $request->getSession();
|
||||||
|
$error = $session->get( '_hwi_oauth.registration_error.' . $key );
|
||||||
|
$session->remove( '_hwi_oauth.registration_error.' . $key );
|
||||||
|
|
||||||
|
if ( ! $error instanceof AccountNotLinkedException ) {
|
||||||
|
throw new \RuntimeException( 'Cannot register an account.',
|
||||||
|
0,
|
||||||
|
$error instanceof \Exception ? $error : null );
|
||||||
|
}
|
||||||
|
|
||||||
|
$userInformation = $this
|
||||||
|
->getResourceOwnerByName( $error->getResourceOwnerName() )
|
||||||
|
->getUserInformation( $error->getRawToken() );
|
||||||
|
|
||||||
|
/* @var $form FormInterface */
|
||||||
|
if ( $this->container->getParameter( 'hwi_oauth.fosub_enabled' ) ) {
|
||||||
|
// enable compatibility with FOSUserBundle 1.3.x and 2.x
|
||||||
|
if ( interface_exists( 'FOS\UserBundle\Form\Factory\FactoryInterface' ) ) {
|
||||||
|
$form = $this->container->get( 'hwi_oauth.registration.form.factory' )->createForm();
|
||||||
|
} else {
|
||||||
|
$form = $this->container->get( 'hwi_oauth.registration.form' );
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
$form = $this->container->get( 'hwi_oauth.registration.form' );
|
||||||
|
}
|
||||||
|
|
||||||
|
$formHandler = $this->container->get( 'hwi_oauth.registration.form.handler' );
|
||||||
|
if ( $formHandler->process( $request, $form, $userInformation ) ) {
|
||||||
|
$event = new FormEvent( $form, $request );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::REGISTRATION_SUCCESS, $event );
|
||||||
|
|
||||||
|
$this->container->get( 'hwi_oauth.account.connector' )->connect( $form->getData(), $userInformation );
|
||||||
|
|
||||||
|
// Authenticate the user
|
||||||
|
$this->authenticateUser( $request,
|
||||||
|
$form->getData(),
|
||||||
|
$error->getResourceOwnerName(),
|
||||||
|
$error->getAccessToken() );
|
||||||
|
|
||||||
|
if ( null === $response = $event->getResponse() ) {
|
||||||
|
if ( $targetPath = $this->getTargetPath( $session ) ) {
|
||||||
|
$response = $this->redirect( $targetPath );
|
||||||
|
} else {
|
||||||
|
$response = $this->render( '@HWIOAuth/Connect/registration_success.html.twig',
|
||||||
|
[
|
||||||
|
'userInformation' => $userInformation,
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$event = new FilterUserResponseEvent( $form->getData(), $request, $response );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::REGISTRATION_COMPLETED, $event );
|
||||||
|
|
||||||
|
return $response;
|
||||||
|
}
|
||||||
|
|
||||||
|
// reset the error in the session
|
||||||
|
$session->set( '_hwi_oauth.registration_error.' . $key, $error );
|
||||||
|
|
||||||
|
$event = new GetResponseUserEvent( $form->getData(), $request );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::REGISTRATION_INITIALIZE, $event );
|
||||||
|
|
||||||
|
if ( $response = $event->getResponse() ) {
|
||||||
|
return $response;
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->render( '@HWIOAuth/Connect/registration.html.twig',
|
||||||
|
[
|
||||||
|
'key' => $key,
|
||||||
|
'form' => $form->createView(),
|
||||||
|
'userInformation' => $userInformation,
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Connects a user to a given account if the user is logged in and connect is enabled.
|
||||||
|
*
|
||||||
|
* @param Request $request the active request
|
||||||
|
* @param string $service name of the resource owner to connect to
|
||||||
|
*
|
||||||
|
* @throws \Exception
|
||||||
|
*
|
||||||
|
* @return Response
|
||||||
|
*
|
||||||
|
* @throws NotFoundHttpException if `connect` functionality was not enabled
|
||||||
|
* @throws AccessDeniedException if no user is authenticated
|
||||||
|
*/
|
||||||
|
public function connectServiceAction( Request $request, $service ) {
|
||||||
|
$connect = $this->container->getParameter( 'hwi_oauth.connect' );
|
||||||
|
if ( ! $connect ) {
|
||||||
|
throw new NotFoundHttpException();
|
||||||
|
}
|
||||||
|
|
||||||
|
$hasUser = $this->isGranted( $this->container->getParameter( 'hwi_oauth.grant_rule' ) );
|
||||||
|
if ( ! $hasUser ) {
|
||||||
|
throw new AccessDeniedException( 'Cannot connect an account.' );
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the data from the resource owner
|
||||||
|
$resourceOwner = $this->getResourceOwnerByName( $service );
|
||||||
|
|
||||||
|
$session = $request->getSession();
|
||||||
|
$key = $request->query->get( 'key', time() );
|
||||||
|
|
||||||
|
if ( $resourceOwner->handles( $request ) ) {
|
||||||
|
$accessToken = $resourceOwner->getAccessToken(
|
||||||
|
$request,
|
||||||
|
$this->container->get( 'hwi_oauth.security.oauth_utils' )->getServiceAuthUrl( $request, $resourceOwner )
|
||||||
|
);
|
||||||
|
|
||||||
|
// save in session
|
||||||
|
$session->set( '_hwi_oauth.connect_confirmation.' . $key, $accessToken );
|
||||||
|
} else {
|
||||||
|
$accessToken = $session->get( '_hwi_oauth.connect_confirmation.' . $key );
|
||||||
|
}
|
||||||
|
|
||||||
|
// Redirect to the login path if the token is empty (Eg. User cancelled auth)
|
||||||
|
if ( null === $accessToken ) {
|
||||||
|
if ( $this->container->getParameter( 'hwi_oauth.failed_use_referer' ) && $targetPath = $this->getTargetPath( $session,
|
||||||
|
'failed_target_path' ) ) {
|
||||||
|
return $this->redirect( $targetPath );
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->redirectToRoute( $this->container->getParameter( 'hwi_oauth.failed_auth_path' ) );
|
||||||
|
}
|
||||||
|
|
||||||
|
// Show confirmation page?
|
||||||
|
if ( ! $this->container->getParameter( 'hwi_oauth.connect.confirmation' ) ) {
|
||||||
|
return $this->getConfirmationResponse( $request, $accessToken, $service );
|
||||||
|
}
|
||||||
|
|
||||||
|
// Symfony <3.0 BC
|
||||||
|
/** @var $form FormInterface */
|
||||||
|
$form = method_exists( 'Symfony\Component\Form\AbstractType', 'getBlockPrefix' )
|
||||||
|
? $this->createForm( FormType::class )
|
||||||
|
: $this->createForm( 'form' );
|
||||||
|
// Handle the form
|
||||||
|
$form->handleRequest( $request );
|
||||||
|
|
||||||
|
if ( $form->isSubmitted() && $form->isValid() ) {
|
||||||
|
return $this->getConfirmationResponse( $request, $accessToken, $service );
|
||||||
|
}
|
||||||
|
|
||||||
|
$event = new GetResponseUserEvent( $this->getUser(), $request );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::CONNECT_INITIALIZE, $event );
|
||||||
|
|
||||||
|
if ( $response = $event->getResponse() ) {
|
||||||
|
return $response;
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->render( '@HWIOAuth/Connect/connect_confirm.html.twig',
|
||||||
|
[
|
||||||
|
'key' => $key,
|
||||||
|
'service' => $service,
|
||||||
|
'form' => $form->createView(),
|
||||||
|
'userInformation' => $resourceOwner->getUserInformation( $accessToken ),
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param Request $request
|
||||||
|
* @param string $service
|
||||||
|
*
|
||||||
|
* @throws NotFoundHttpException
|
||||||
|
*
|
||||||
|
* @return RedirectResponse
|
||||||
|
*/
|
||||||
|
public function redirectToServiceAction( Request $request, $service ) {
|
||||||
|
try {
|
||||||
|
$authorizationUrl = $this->container->get( 'hwi_oauth.security.oauth_utils' )->getAuthorizationUrl( $request,
|
||||||
|
$service );
|
||||||
|
} catch ( \RuntimeException $e ) {
|
||||||
|
throw new NotFoundHttpException( $e->getMessage(), $e );
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check for a return path and store it before redirect
|
||||||
|
if ( $request->hasSession() ) {
|
||||||
|
// initialize the session for preventing SessionUnavailableException
|
||||||
|
$session = $request->getSession();
|
||||||
|
$session->start();
|
||||||
|
|
||||||
|
foreach ( $this->container->getParameter( 'hwi_oauth.firewall_names' ) as $providerKey ) {
|
||||||
|
$sessionKey = '_security.' . $providerKey . '.target_path';
|
||||||
|
$sessionKeyFailure = '_security.' . $providerKey . '.failed_target_path';
|
||||||
|
|
||||||
|
$param = $this->container->getParameter( 'hwi_oauth.target_path_parameter' );
|
||||||
|
if ( ! empty( $param ) && $targetUrl = $request->get( $param ) ) {
|
||||||
|
$session->set( $sessionKey, $targetUrl );
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( $this->container->getParameter( 'hwi_oauth.failed_use_referer' ) && ! $session->has( $sessionKeyFailure ) && ( $targetUrl = $request->headers->get( 'Referer' ) ) && $targetUrl !== $authorizationUrl ) {
|
||||||
|
$session->set( $sessionKeyFailure, $targetUrl );
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( $this->container->getParameter( 'hwi_oauth.use_referer' ) && ! $session->has( $sessionKey ) && ( $targetUrl = $request->headers->get( 'Referer' ) ) && $targetUrl !== $authorizationUrl ) {
|
||||||
|
$session->set( $sessionKey, $targetUrl );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->redirect( $authorizationUrl );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the security error for a given request.
|
||||||
|
*
|
||||||
|
* @param Request $request
|
||||||
|
*
|
||||||
|
* @return string|\Exception
|
||||||
|
*/
|
||||||
|
protected function getErrorForRequest( Request $request ) {
|
||||||
|
$authenticationErrorKey = Security::AUTHENTICATION_ERROR;
|
||||||
|
|
||||||
|
$session = $request->getSession();
|
||||||
|
if ( $request->attributes->has( $authenticationErrorKey ) ) {
|
||||||
|
$error = $request->attributes->get( $authenticationErrorKey );
|
||||||
|
} elseif ( null !== $session && $session->has( $authenticationErrorKey ) ) {
|
||||||
|
$error = $session->get( $authenticationErrorKey );
|
||||||
|
$session->remove( $authenticationErrorKey );
|
||||||
|
} else {
|
||||||
|
$error = '';
|
||||||
|
}
|
||||||
|
|
||||||
|
return $error;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get a resource owner by name.
|
||||||
|
*
|
||||||
|
* @param string $name
|
||||||
|
*
|
||||||
|
* @return ResourceOwnerInterface
|
||||||
|
*
|
||||||
|
* @throws NotFoundHttpException if there is no resource owner with the given name
|
||||||
|
*/
|
||||||
|
protected function getResourceOwnerByName( $name ) {
|
||||||
|
foreach ( $this->container->getParameter( 'hwi_oauth.firewall_names' ) as $firewall ) {
|
||||||
|
$id = 'hwi_oauth.resource_ownermap.' . $firewall;
|
||||||
|
if ( ! $this->container->has( $id ) ) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
$ownerMap = $this->container->get( $id );
|
||||||
|
if ( $resourceOwner = $ownerMap->getResourceOwnerByName( $name ) ) {
|
||||||
|
return $resourceOwner;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
throw new NotFoundHttpException( sprintf( "No resource owner with name '%s'.", $name ) );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Generates a route.
|
||||||
|
*
|
||||||
|
* @deprecated since version 0.4. Will be removed in 1.0.
|
||||||
|
*
|
||||||
|
* @param string $route Route name
|
||||||
|
* @param array $params Route parameters
|
||||||
|
* @param bool $absolute absolute url or note
|
||||||
|
*
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
protected function generate( $route, array $params = [], $absolute = false ) {
|
||||||
|
@trigger_error( 'The ' . __METHOD__ . ' method is deprecated since version 0.4 and will be removed in 1.0. Use Symfony\Bundle\FrameworkBundle\Controller\Controller::generateUrl instead.',
|
||||||
|
E_USER_DEPRECATED );
|
||||||
|
|
||||||
|
return $this->container->get( 'router' )->generate( $route, $params, $absolute );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Authenticate a user with Symfony Security.
|
||||||
|
*
|
||||||
|
* @param Request $request
|
||||||
|
* @param UserInterface $user
|
||||||
|
* @param string $resourceOwnerName
|
||||||
|
* @param string $accessToken
|
||||||
|
* @param bool $fakeLogin
|
||||||
|
*/
|
||||||
|
protected function authenticateUser(
|
||||||
|
Request $request,
|
||||||
|
UserInterface $user,
|
||||||
|
$resourceOwnerName,
|
||||||
|
$accessToken,
|
||||||
|
$fakeLogin = true
|
||||||
|
) {
|
||||||
|
try {
|
||||||
|
$this->container->get( 'hwi_oauth.user_checker' )->checkPreAuth( $user );
|
||||||
|
$this->container->get( 'hwi_oauth.user_checker' )->checkPostAuth( $user );
|
||||||
|
} catch ( AccountStatusException $e ) {
|
||||||
|
// Don't authenticate locked, disabled or expired users
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
$token = new OAuthToken( $accessToken, $user->getRoles() );
|
||||||
|
$token->setResourceOwnerName( $resourceOwnerName );
|
||||||
|
$token->setUser( $user );
|
||||||
|
$token->setAuthenticated( true );
|
||||||
|
|
||||||
|
$this->get( 'security.token_storage' )->setToken( $token );
|
||||||
|
|
||||||
|
if ( $fakeLogin ) {
|
||||||
|
// Since we're "faking" normal login, we need to throw our INTERACTIVE_LOGIN event manually
|
||||||
|
$this->container->get( 'event_dispatcher' )->dispatch(
|
||||||
|
SecurityEvents::INTERACTIVE_LOGIN,
|
||||||
|
new InteractiveLoginEvent( $request, $token )
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param SessionInterface $session
|
||||||
|
*
|
||||||
|
* @return string|null
|
||||||
|
*/
|
||||||
|
private function getTargetPath( SessionInterface $session ) {
|
||||||
|
foreach ( $this->container->getParameter( 'hwi_oauth.firewall_names' ) as $providerKey ) {
|
||||||
|
$sessionKey = '_security.' . $providerKey . '.target_path';
|
||||||
|
if ( $session->has( $sessionKey ) ) {
|
||||||
|
return $session->get( $sessionKey );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param Request $request The active request
|
||||||
|
* @param array $accessToken The access token
|
||||||
|
* @param string $service Name of the resource owner to connect to
|
||||||
|
*
|
||||||
|
* @return Response
|
||||||
|
*
|
||||||
|
* @throws NotFoundHttpException if there is no resource owner with the given name
|
||||||
|
*/
|
||||||
|
private function getConfirmationResponse( Request $request, array $accessToken, $service ) {
|
||||||
|
/** @var $currentToken OAuthToken */
|
||||||
|
$currentToken = $this->container->get( 'security.token_storage' )->getToken();
|
||||||
|
/** @var $currentUser UserInterface */
|
||||||
|
$currentUser = $currentToken->getUser();
|
||||||
|
|
||||||
|
/** @var $resourceOwner ResourceOwnerInterface */
|
||||||
|
$resourceOwner = $this->getResourceOwnerByName( $service );
|
||||||
|
/** @var $userInformation UserResponseInterface */
|
||||||
|
$userInformation = $resourceOwner->getUserInformation( $accessToken );
|
||||||
|
|
||||||
|
$event = new GetResponseUserEvent( $currentUser, $request );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::CONNECT_CONFIRMED, $event );
|
||||||
|
|
||||||
|
$this->container->get( 'hwi_oauth.account.connector' )->connect( $currentUser, $userInformation );
|
||||||
|
|
||||||
|
if ( $currentToken instanceof OAuthToken ) {
|
||||||
|
// Update user token with new details
|
||||||
|
$newToken =
|
||||||
|
is_array( $accessToken ) &&
|
||||||
|
( isset( $accessToken[ 'access_token' ] ) || isset( $accessToken[ 'oauth_token' ] ) ) ?
|
||||||
|
$accessToken : $currentToken->getRawToken();
|
||||||
|
|
||||||
|
$this->authenticateUser( $request, $currentUser, $service, $newToken, false );
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( null === $response = $event->getResponse() ) {
|
||||||
|
if ( $targetPath = $this->getTargetPath( $request->getSession() ) ) {
|
||||||
|
$response = $this->redirect( $targetPath );
|
||||||
|
} else {
|
||||||
|
$response = $this->render( '@HWIOAuth/Connect/connect_success.html.twig',
|
||||||
|
[
|
||||||
|
'userInformation' => $userInformation,
|
||||||
|
'service' => $service,
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$event = new FilterUserResponseEvent( $currentUser, $request, $response );
|
||||||
|
$this->get( 'event_dispatcher' )->dispatch( HWIOAuthEvents::CONNECT_COMPLETED, $event );
|
||||||
|
|
||||||
|
return $response;
|
||||||
|
}
|
||||||
|
}
|
@ -15,39 +15,43 @@
|
|||||||
<i class="fa fa-key"></i>
|
<i class="fa fa-key"></i>
|
||||||
Se connecter
|
Se connecter
|
||||||
</h1>
|
</h1>
|
||||||
<div class="alert alert-info">
|
{#<div class="alert alert-info">#}
|
||||||
En raison de maintenance technique, seul le login via twitter fonctionne
|
{#En raison de maintenance technique, seul le login via twitter fonctionne#}
|
||||||
actuellement.
|
{#actuellement.#}
|
||||||
</div>
|
{#</div>#}
|
||||||
{#{% if error %}#}
|
{% if error %}
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
{{ error|trans }}
|
||||||
|
</div>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{#<div class="alert alert-danger">{{ error|trans }}</div>#}
|
<form action="{{ path("fos_user_security_check") }}" method="post">
|
||||||
{#{% endif %}#}
|
{% if csrf_token is defined %}
|
||||||
|
csrf_token : {{ csrf_token }}
|
||||||
|
<input type="hidden" name="_csrf_token" value="{{ csrf_token }}"/>
|
||||||
|
{% else %}
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
|
||||||
{#<form action="{{ path("fos_user_security_check") }}" method="post">#}
|
PAS DE TOKEN
|
||||||
{#{% if csrf_token is defined %}#}
|
</div>
|
||||||
{#csrf_token : {{ csrf_token }}#}
|
{% endif %}
|
||||||
{#<input type="hidden" name="_csrf_token" value="{{ csrf_token }}"/>#}
|
|
||||||
{#{% else %}#}
|
|
||||||
{#PAS DE TOKEN#}
|
|
||||||
{#{% endif %}#}
|
|
||||||
|
|
||||||
{#<label for="username">{{ 'security.login.username'|trans }}</label>#}
|
<label for="username">{{ 'security.login.username'|trans }}</label>
|
||||||
{#<input type="text" id="username" name="_username"#}
|
<input type="text" id="username" name="_username"
|
||||||
{#value="" required="required"#}
|
value="" required="required"
|
||||||
{#autocomplete="username"/>#}
|
autocomplete="username"/>
|
||||||
|
|
||||||
{#<label for="password">{{ 'security.login.password'|trans }}</label>#}
|
<label for="password">{{ 'security.login.password'|trans }}</label>
|
||||||
{#<input type="password" id="password" name="_password"#}
|
<input type="password" id="password" name="_password"
|
||||||
{#required="required"#}
|
required="required"
|
||||||
{#autocomplete="current-password"/>#}
|
autocomplete="current-password"/>
|
||||||
|
|
||||||
{#<input type="checkbox" id="remember_me" name="_remember_me" value="on"/>#}
|
<input type="checkbox" id="remember_me" name="_remember_me" value="on"/>
|
||||||
{#<label for="remember_me">{{ 'security.login.remember_me'|trans }}</label>#}
|
<label for="remember_me">{{ 'security.login.remember_me'|trans }}</label>
|
||||||
|
|
||||||
{#<input type="submit" id="_submit" name="_submit"#}
|
<input type="submit" id="_submit" name="_submit"
|
||||||
{#value="{{ 'security.login.submit'|trans }}"/>#}
|
value="{{ 'security.login.submit'|trans }}"/>
|
||||||
{#</form>#}
|
</form>
|
||||||
</div>
|
</div>
|
||||||
<div class="col-xs-6">
|
<div class="col-xs-6">
|
||||||
{#<p>#}
|
{#<p>#}
|
||||||
|
Loading…
Reference in New Issue
Block a user