修改导表
continuous-integration/drone/push Build is passing
Details
continuous-integration/drone/push Build is passing
Details
parent
2a1047f319
commit
67667f6438
|
@ -16,6 +16,7 @@ using Microsoft.AspNetCore.Mvc;
|
||||||
using Microsoft.Extensions.Logging;
|
using Microsoft.Extensions.Logging;
|
||||||
using Microsoft.Extensions.Options;
|
using Microsoft.Extensions.Options;
|
||||||
using System;
|
using System;
|
||||||
|
using System.Collections.Generic;
|
||||||
using System.Linq;
|
using System.Linq;
|
||||||
using System.Text;
|
using System.Text;
|
||||||
using System.Threading.Tasks;
|
using System.Threading.Tasks;
|
||||||
|
@ -412,12 +413,22 @@ namespace IRaCIS.Api.Controllers
|
||||||
[HttpGet("User/OAuthCallBack")]
|
[HttpGet("User/OAuthCallBack")]
|
||||||
public async Task<IResponseOutput> OAuthCallBack(string type, string code)
|
public async Task<IResponseOutput> OAuthCallBack(string type, string code)
|
||||||
{
|
{
|
||||||
|
#region 获取AccessToken
|
||||||
|
|
||||||
|
var headerDic = new Dictionary<string, string>();
|
||||||
|
headerDic.Add("code", code);
|
||||||
|
headerDic.Add("grant_type", "authorization_code");
|
||||||
|
headerDic.Add("redirect_uri", "http://localhost:6100");
|
||||||
|
headerDic.Add("scope", "all");
|
||||||
|
|
||||||
|
#endregion
|
||||||
|
|
||||||
return ResponseOutput.Ok();
|
return ResponseOutput.Ok();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
#endregion
|
#endregion
|
||||||
|
|
||||||
#region 测试获取用户 ip
|
#region 测试获取用户 ip
|
||||||
|
|
|
@ -346,6 +346,147 @@
|
||||||
</summary>
|
</summary>
|
||||||
<returns></returns>
|
<returns></returns>
|
||||||
</member>
|
</member>
|
||||||
|
<member name="T:IRaCIS.Core.API.OAuth.LogtoParameters.Tokens">
|
||||||
|
<summary>
|
||||||
|
The token names used by Cookie and OpenID Connect middleware to store and retrieve tokens from
|
||||||
|
Logto OpenID Connect provider.
|
||||||
|
<br/>
|
||||||
|
See <see href="https://github.com/dotnet/aspnetcore/blob/4a9118c674a798aaf6379b4b7b2d8787bc688f96/src/Security/Authentication/OpenIdConnect/src/OpenIdConnectHandler.cs#L994-L1035">tokens that are stored by OpenID Connect middleware</see> for more details.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="T:IRaCIS.Core.API.OAuth.LogtoParameters.Scopes">
|
||||||
|
<summary>
|
||||||
|
The scope names used by Logto OpenID Connect provider to request for user information.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Scopes.Email">
|
||||||
|
<summary>
|
||||||
|
The scope name for requesting user's email.
|
||||||
|
Logto will issue two claims to the ID token: <c>email</c> and <c>email_verified</c>.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Scopes.Phone">
|
||||||
|
<summary>
|
||||||
|
The scope name for requesting user's phone number.
|
||||||
|
Logto will issue two claims to the ID token: <c>phone</c> and <c>phone_verified</c>.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Scopes.CustomData">
|
||||||
|
<summary>
|
||||||
|
The scope name for requesting user's custom data.
|
||||||
|
Logto will issue a claim to the response of the <c>userinfo</c> endpoint: <c>custom_data</c>.
|
||||||
|
<br/>
|
||||||
|
Note that when requesting this scope, you must set <see cref="!:LogtoOptions.GetClaimsFromUserInfoEndpoint"/> to <c>true</c>.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Scopes.Identities">
|
||||||
|
<summary>
|
||||||
|
The scope name for requesting user's identities.
|
||||||
|
Logto will issue a claim to the response of the <c>userinfo</c> endpoint: <c>identities</c>.
|
||||||
|
<br/>
|
||||||
|
Note that when requesting this scope, you must set <see cref="!:LogtoOptions.GetClaimsFromUserInfoEndpoint"/> to <c>true</c>.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="T:IRaCIS.Core.API.OAuth.LogtoParameters.Claims">
|
||||||
|
<summary>
|
||||||
|
The claim names used by Logto OpenID Connect provider for ID token and userinfo endpoint.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Issuer">
|
||||||
|
<summary>
|
||||||
|
The claim name for the issuer identifier for whom issued the token.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Subject">
|
||||||
|
<summary>
|
||||||
|
The claim name for the subject identifier for whom the token is intended (user ID).
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Audience">
|
||||||
|
<summary>
|
||||||
|
The claim name for the audience that the token is intended for, which is the client ID.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Expiration">
|
||||||
|
<summary>
|
||||||
|
The claim name for the expiration time of the token (in seconds).
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.IssuedAt">
|
||||||
|
<summary>
|
||||||
|
The claim name for the time at which the token was issued (in seconds).
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Name">
|
||||||
|
<summary>
|
||||||
|
The claim name for the user's full name.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Username">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's username.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Picture">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's profile picture URL.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Email">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's email.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.EmailVerified">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's email verification status.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.PhoneNumber">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's phone number.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.PhoneNumberVerified">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's phone number verification status.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.CustomData">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's custom data.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="F:IRaCIS.Core.API.OAuth.LogtoParameters.Claims.Identities">
|
||||||
|
<summary>
|
||||||
|
The claim name for user's identities.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="P:IRaCIS.Core.API.OAuth.LogtoTokenResponse.AccessToken">
|
||||||
|
<summary>
|
||||||
|
The access token issued by the Logto authorization server.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="P:IRaCIS.Core.API.OAuth.LogtoTokenResponse.TokenType">
|
||||||
|
<summary>
|
||||||
|
The type of the token issued by the Logto authorization server.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="P:IRaCIS.Core.API.OAuth.LogtoTokenResponse.ExpiresIn">
|
||||||
|
<summary>
|
||||||
|
The lifetime in seconds of the access token.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="P:IRaCIS.Core.API.OAuth.LogtoTokenResponse.RefreshToken">
|
||||||
|
<summary>
|
||||||
|
The refresh token, which can be used to obtain new access tokens using the same authorization grant.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
|
<member name="P:IRaCIS.Core.API.OAuth.LogtoTokenResponse.IdToken">
|
||||||
|
<summary>
|
||||||
|
The ID token, which can be used to verify the identity of the user.
|
||||||
|
</summary>
|
||||||
|
</member>
|
||||||
<member name="T:IRaCIS.Core.API.IpPolicyRateLimitSetup">
|
<member name="T:IRaCIS.Core.API.IpPolicyRateLimitSetup">
|
||||||
<summary>
|
<summary>
|
||||||
IPLimit限流 启动服务
|
IPLimit限流 启动服务
|
||||||
|
|
|
@ -0,0 +1,121 @@
|
||||||
|
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
|
||||||
|
using System.Text.Json.Serialization;
|
||||||
|
|
||||||
|
namespace IRaCIS.Core.API.OAuth;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
public static class LogtoParameters
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// The token names used by Cookie and OpenID Connect middleware to store and retrieve tokens from
|
||||||
|
/// Logto OpenID Connect provider.
|
||||||
|
/// <br/>
|
||||||
|
/// See <see href="https://github.com/dotnet/aspnetcore/blob/4a9118c674a798aaf6379b4b7b2d8787bc688f96/src/Security/Authentication/OpenIdConnect/src/OpenIdConnectHandler.cs#L994-L1035">tokens that are stored by OpenID Connect middleware</see> for more details.
|
||||||
|
/// </summary>
|
||||||
|
public static class Tokens
|
||||||
|
{
|
||||||
|
public const string AccessToken = OpenIdConnectParameterNames.AccessToken;
|
||||||
|
public const string ExpiresAt = "expires_at";
|
||||||
|
public const string AccessTokenForResource = $"{AccessToken}.resource";
|
||||||
|
public const string ExpiresAtForResource = $"{ExpiresAt}.resource";
|
||||||
|
public const string RefreshToken = OpenIdConnectParameterNames.RefreshToken;
|
||||||
|
public const string IdToken = OpenIdConnectParameterNames.IdToken;
|
||||||
|
public const string TokenType = OpenIdConnectParameterNames.TokenType;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The scope names used by Logto OpenID Connect provider to request for user information.
|
||||||
|
/// </summary>
|
||||||
|
public static class Scopes
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// The scope name for requesting user's email.
|
||||||
|
/// Logto will issue two claims to the ID token: <c>email</c> and <c>email_verified</c>.
|
||||||
|
/// </summary>
|
||||||
|
public const string Email = "email";
|
||||||
|
/// <summary>
|
||||||
|
/// The scope name for requesting user's phone number.
|
||||||
|
/// Logto will issue two claims to the ID token: <c>phone</c> and <c>phone_verified</c>.
|
||||||
|
/// </summary>
|
||||||
|
public const string Phone = "phone";
|
||||||
|
/// <summary>
|
||||||
|
/// The scope name for requesting user's custom data.
|
||||||
|
/// Logto will issue a claim to the response of the <c>userinfo</c> endpoint: <c>custom_data</c>.
|
||||||
|
/// <br/>
|
||||||
|
/// Note that when requesting this scope, you must set <see cref="LogtoOptions.GetClaimsFromUserInfoEndpoint"/> to <c>true</c>.
|
||||||
|
/// </summary>
|
||||||
|
public const string CustomData = "custom_data";
|
||||||
|
/// <summary>
|
||||||
|
/// The scope name for requesting user's identities.
|
||||||
|
/// Logto will issue a claim to the response of the <c>userinfo</c> endpoint: <c>identities</c>.
|
||||||
|
/// <br/>
|
||||||
|
/// Note that when requesting this scope, you must set <see cref="LogtoOptions.GetClaimsFromUserInfoEndpoint"/> to <c>true</c>.
|
||||||
|
/// </summary>
|
||||||
|
public const string Identities = "identities";
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The claim names used by Logto OpenID Connect provider for ID token and userinfo endpoint.
|
||||||
|
/// </summary>
|
||||||
|
public static class Claims
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the issuer identifier for whom issued the token.
|
||||||
|
/// </summary>
|
||||||
|
public const string Issuer = "iss";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the subject identifier for whom the token is intended (user ID).
|
||||||
|
/// </summary>
|
||||||
|
public const string Subject = "sub";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the audience that the token is intended for, which is the client ID.
|
||||||
|
/// </summary>
|
||||||
|
public const string Audience = "aud";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the expiration time of the token (in seconds).
|
||||||
|
/// </summary>
|
||||||
|
public const string Expiration = "exp";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the time at which the token was issued (in seconds).
|
||||||
|
/// </summary>
|
||||||
|
public const string IssuedAt = "iat";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for the user's full name.
|
||||||
|
/// </summary>
|
||||||
|
public const string Name = "name";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's username.
|
||||||
|
/// </summary>
|
||||||
|
public const string Username = "username";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's profile picture URL.
|
||||||
|
/// </summary>
|
||||||
|
public const string Picture = "picture";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's email.
|
||||||
|
/// </summary>
|
||||||
|
public const string Email = "email";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's email verification status.
|
||||||
|
/// </summary>
|
||||||
|
public const string EmailVerified = "email_verified";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's phone number.
|
||||||
|
/// </summary>
|
||||||
|
public const string PhoneNumber = "phone_number";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's phone number verification status.
|
||||||
|
/// </summary>
|
||||||
|
public const string PhoneNumberVerified = "phone_number_verified";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's custom data.
|
||||||
|
/// </summary>
|
||||||
|
public const string CustomData = "custom_data";
|
||||||
|
/// <summary>
|
||||||
|
/// The claim name for user's identities.
|
||||||
|
/// </summary>
|
||||||
|
public const string Identities = "identities";
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,36 @@
|
||||||
|
using System.Text.Json.Serialization;
|
||||||
|
|
||||||
|
namespace IRaCIS.Core.API.OAuth;
|
||||||
|
|
||||||
|
public class LogtoTokenResponse
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// The access token issued by the Logto authorization server.
|
||||||
|
/// </summary>
|
||||||
|
[JsonPropertyName("access_token")]
|
||||||
|
public string AccessToken { get; set; } = null!;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The type of the token issued by the Logto authorization server.
|
||||||
|
/// </summary>
|
||||||
|
[JsonPropertyName("token_type")]
|
||||||
|
public string TokenType { get; set; } = null!;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The lifetime in seconds of the access token.
|
||||||
|
/// </summary>
|
||||||
|
[JsonPropertyName("expires_in")]
|
||||||
|
public int ExpiresIn { get; set; }
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The refresh token, which can be used to obtain new access tokens using the same authorization grant.
|
||||||
|
/// </summary>
|
||||||
|
[JsonPropertyName("refresh_token")]
|
||||||
|
public string? RefreshToken { get; set; } = null!;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// The ID token, which can be used to verify the identity of the user.
|
||||||
|
/// </summary>
|
||||||
|
[JsonPropertyName("id_token")]
|
||||||
|
public string? IdToken { get; set; } = null;
|
||||||
|
}
|
|
@ -2345,7 +2345,7 @@ namespace IRaCIS.Core.Application.Service.Common
|
||||||
|
|
||||||
var doctor2List = _visitTaskRepository.Where(comonTaskFilter).Where(t => t.ReadingTaskState == ReadingTaskState.HaveSigned)
|
var doctor2List = _visitTaskRepository.Where(comonTaskFilter).Where(t => t.ReadingTaskState == ReadingTaskState.HaveSigned)
|
||||||
.GroupBy(t => new { t.DoctorUserId, t.DoctorUser.UserName, t.DoctorUser.FullName })
|
.GroupBy(t => new { t.DoctorUserId, t.DoctorUser.UserName, t.DoctorUser.FullName })
|
||||||
//有全局裁判
|
//有全局裁判
|
||||||
//.Where(g => g.Any(t => t.ReadingCategory == ReadingCategory.Global && t.JudgeVisitTaskId != null))
|
//.Where(g => g.Any(t => t.ReadingCategory == ReadingCategory.Global && t.JudgeVisitTaskId != null))
|
||||||
.Select(g => new DoctorJudgeRatio()
|
.Select(g => new DoctorJudgeRatio()
|
||||||
{
|
{
|
||||||
|
@ -2354,7 +2354,7 @@ namespace IRaCIS.Core.Application.Service.Common
|
||||||
FullName = g.Key.FullName,
|
FullName = g.Key.FullName,
|
||||||
|
|
||||||
//触发裁判的阅片期的数量
|
//触发裁判的阅片期的数量
|
||||||
TotalJudgeCount = g.Where(t => t.ReadingCategory == ReadingCategory.Global && t.SouceReadModuleId != null && t.JudgeVisitTaskId != null).Select(t => t.SouceReadModuleId).Distinct().Count(),
|
TotalJudgeCount = g.Where(t => t.ReadingCategory == ReadingCategory.Global && t.SouceReadModuleId != null && t.JudgeVisitTaskId != null && t.JudgeVisitTask.ReadingTaskState==ReadingTaskState.HaveSigned).Select(t => t.SouceReadModuleId).Distinct().Count(),
|
||||||
|
|
||||||
JudgeAgreeCount = g.Where(t => t.ReadingCategory == ReadingCategory.Global && t.JudgeVisitTaskId != null && t.JudgeVisitTask.JudgeResultTaskId == t.Id)
|
JudgeAgreeCount = g.Where(t => t.ReadingCategory == ReadingCategory.Global && t.JudgeVisitTaskId != null && t.JudgeVisitTask.JudgeResultTaskId == t.Id)
|
||||||
.Select(t => t.SouceReadModuleId).Distinct().Count(),
|
.Select(t => t.SouceReadModuleId).Distinct().Count(),
|
||||||
|
|
Loading…
Reference in New Issue