Merge pull request #211 from nagisa77/codex/optimize-google-registration-process

Improve login error handling and Google whitelist signup
This commit is contained in:
Tim
2025-07-15 11:07:00 +08:00
committed by GitHub
6 changed files with 87 additions and 43 deletions

View File

@@ -1,33 +1,47 @@
import { API_BASE_URL, GOOGLE_CLIENT_ID, toast } from '../main' import { API_BASE_URL, GOOGLE_CLIENT_ID, toast } from '../main'
import { setToken, loadCurrentUser } from './auth' import { setToken, loadCurrentUser } from './auth'
export function googleSignIn(redirect, reason) { export async function googleGetIdToken() {
if (!window.google || !GOOGLE_CLIENT_ID) { return new Promise((resolve, reject) => {
toast.error('Google 登录不可用') if (!window.google || !GOOGLE_CLIENT_ID) {
return toast.error('Google 登录不可用')
} reject()
window.google.accounts.id.initialize({ return
client_id: GOOGLE_CLIENT_ID,
callback: async ({ credential }) => {
try {
const res = await fetch(`${API_BASE_URL}/api/auth/google`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ idToken: credential, reason })
})
const data = await res.json()
if (res.ok && data.token) {
setToken(data.token)
await loadCurrentUser()
toast.success('登录成功')
if (redirect) redirect()
} else {
toast.error(data.error || '登录失败')
}
} catch (e) {
toast.error('登录失败')
}
} }
window.google.accounts.id.initialize({
client_id: GOOGLE_CLIENT_ID,
callback: ({ credential }) => resolve(credential)
})
window.google.accounts.id.prompt()
}) })
window.google.accounts.id.prompt() }
export async function googleAuthWithToken(idToken, reason, redirect) {
try {
const res = await fetch(`${API_BASE_URL}/api/auth/google`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ idToken, reason })
})
const data = await res.json()
if (res.ok && data.token) {
setToken(data.token)
await loadCurrentUser()
toast.success('登录成功')
if (redirect) redirect()
} else {
toast.error(data.error || '登录失败')
}
} catch (e) {
toast.error('登录失败')
}
}
export async function googleSignIn(redirect, reason) {
try {
const token = await googleGetIdToken()
await googleAuthWithToken(token, reason, redirect)
} catch {
/* ignore */
}
} }

View File

@@ -82,7 +82,7 @@
<script> <script>
import { API_BASE_URL, toast } from '../main' import { API_BASE_URL, toast } from '../main'
import { googleSignIn } from '../utils/google' import { googleSignIn, googleGetIdToken } from '../utils/google'
import BaseInput from '../components/BaseInput.vue' import BaseInput from '../components/BaseInput.vue'
export default { export default {
name: 'SignupPageView', name: 'SignupPageView',
@@ -197,7 +197,10 @@ export default {
}, },
signupWithGoogle() { signupWithGoogle() {
if (this.registerMode === 'WHITELIST') { if (this.registerMode === 'WHITELIST') {
this.$router.push('/signup-reason?google=1') googleGetIdToken().then(token => {
sessionStorage.setItem('google_id_token', token)
this.$router.push('/signup-reason?google=1')
}).catch(() => {})
} else { } else {
googleSignIn(() => { googleSignIn(() => {
this.$router.push('/') this.$router.push('/')

View File

@@ -16,7 +16,7 @@
<script> <script>
import BaseInput from '../components/BaseInput.vue' import BaseInput from '../components/BaseInput.vue'
import { API_BASE_URL, toast } from '../main' import { API_BASE_URL, toast } from '../main'
import { googleSignIn } from '../utils/google' import { googleAuthWithToken } from '../utils/google'
export default { export default {
name: 'SignupReasonPageView', name: 'SignupReasonPageView',
@@ -25,16 +25,20 @@ export default {
return { return {
reason: '', reason: '',
error: '', error: '',
isGoogle: false, isGoogle: false,
isWaitingForRegister: false isWaitingForRegister: false,
googleToken: ''
} }
}, },
mounted() { mounted() {
this.isGoogle = this.$route.query.google === '1' this.isGoogle = this.$route.query.google === '1'
if (!this.isGoogle) { if (this.isGoogle) {
if (!sessionStorage.getItem('signup_username')) { this.googleToken = sessionStorage.getItem('google_id_token') || ''
if (!this.googleToken) {
this.$router.push('/signup') this.$router.push('/signup')
} }
} else if (!sessionStorage.getItem('signup_username')) {
this.$router.push('/signup')
} }
}, },
methods: { methods: {
@@ -44,7 +48,13 @@ export default {
return return
} }
if (this.isGoogle) { if (this.isGoogle) {
googleSignIn(() => { this.$router.push('/') }, this.reason) const token = this.googleToken || sessionStorage.getItem('google_id_token')
if (!token) {
toast.error('Google 登录失败')
return
}
await googleAuthWithToken(token, this.reason, () => { this.$router.push('/') })
sessionStorage.removeItem('google_id_token')
return return
} }
try { try {

View File

@@ -72,12 +72,24 @@ public class AuthController {
if (captchaEnabled && loginCaptchaEnabled && !captchaService.verify(req.getCaptcha())) { if (captchaEnabled && loginCaptchaEnabled && !captchaService.verify(req.getCaptcha())) {
return ResponseEntity.badRequest().body(Map.of("error", "Invalid captcha")); return ResponseEntity.badRequest().body(Map.of("error", "Invalid captcha"));
} }
Optional<User> user = userService.authenticate(req.getUsername(), req.getPassword()); Optional<User> userOpt = userService.findByUsername(req.getUsername());
if (user.isPresent()) { if (userOpt.isEmpty() || !userService.matchesPassword(userOpt.get(), req.getPassword())) {
return ResponseEntity.ok(Map.of("token", jwtService.generateToken(user.get().getUsername()))); return ResponseEntity.badRequest().body(Map.of(
} else { "error", "Invalid credentials",
return ResponseEntity.badRequest().body(Map.of("error", "Invalid credentials or user not verified")); "reason_code", "INVALID_CREDENTIALS"));
} }
User user = userOpt.get();
if (!user.isVerified()) {
return ResponseEntity.badRequest().body(Map.of(
"error", "User not verified",
"reason_code", "NOT_VERIFIED"));
}
if (!user.isApproved()) {
return ResponseEntity.badRequest().body(Map.of(
"error", "Register reason not approved",
"reason_code", "NOT_APPROVED"));
}
return ResponseEntity.ok(Map.of("token", jwtService.generateToken(user.getUsername())));
} }
@PostMapping("/google") @PostMapping("/google")

View File

@@ -94,6 +94,10 @@ public class UserService {
.filter(user -> passwordEncoder.matches(password, user.getPassword())); .filter(user -> passwordEncoder.matches(password, user.getPassword()));
} }
public boolean matchesPassword(User user, String rawPassword) {
return passwordEncoder.matches(rawPassword, user.getPassword());
}
public Optional<User> findByUsername(String username) { public Optional<User> findByUsername(String username) {
return userRepository.findByUsername(username); return userRepository.findByUsername(username);
} }

View File

@@ -73,7 +73,8 @@ class AuthControllerTest {
void loginReturnsToken() throws Exception { void loginReturnsToken() throws Exception {
User user = new User(); User user = new User();
user.setUsername("u"); user.setUsername("u");
Mockito.when(userService.authenticate("u", "p")).thenReturn(Optional.of(user)); Mockito.when(userService.findByUsername("u")).thenReturn(Optional.of(user));
Mockito.when(userService.matchesPassword(user, "p")).thenReturn(true);
Mockito.when(jwtService.generateToken("u")).thenReturn("token"); Mockito.when(jwtService.generateToken("u")).thenReturn("token");
mockMvc.perform(post("/api/auth/login") mockMvc.perform(post("/api/auth/login")
@@ -85,12 +86,12 @@ class AuthControllerTest {
@Test @Test
void loginFails() throws Exception { void loginFails() throws Exception {
Mockito.when(userService.authenticate("u", "bad")).thenReturn(Optional.empty()); Mockito.when(userService.findByUsername("u")).thenReturn(Optional.empty());
mockMvc.perform(post("/api/auth/login") mockMvc.perform(post("/api/auth/login")
.contentType(MediaType.APPLICATION_JSON) .contentType(MediaType.APPLICATION_JSON)
.content("{\"username\":\"u\",\"password\":\"bad\"}")) .content("{\"username\":\"u\",\"password\":\"bad\"}"))
.andExpect(status().isBadRequest()) .andExpect(status().isBadRequest())
.andExpect(jsonPath("$.error").value("Invalid credentials or user not verified")); .andExpect(jsonPath("$.reason_code").value("INVALID_CREDENTIALS"));
} }
} }