315 lines
13 KiB
C#
315 lines
13 KiB
C#
using Amazon.Auth.AccessControlPolicy;
|
||
using Amazon.SecurityToken;
|
||
using AutoMapper;
|
||
using Azure.Core;
|
||
using IdentityModel.Client;
|
||
using IdentityModel.OidcClient;
|
||
using IRaCIS.Application.Contracts;
|
||
using IRaCIS.Application.Interfaces;
|
||
using IRaCIS.Core.Application.Auth;
|
||
using IRaCIS.Core.Application.Contracts;
|
||
using IRaCIS.Core.Application.Helper;
|
||
using IRaCIS.Core.Application.Service;
|
||
using IRaCIS.Core.Domain.Models;
|
||
using IRaCIS.Core.Domain.Share;
|
||
using IRaCIS.Core.Infra.EFCore;
|
||
using IRaCIS.Core.Infrastructure.Extention;
|
||
using MassTransit;
|
||
using MassTransit.Futures.Contracts;
|
||
using Microsoft.AspNetCore.Authorization;
|
||
using Microsoft.AspNetCore.Http;
|
||
using Microsoft.AspNetCore.Mvc;
|
||
using Microsoft.Extensions.Logging;
|
||
using Microsoft.Extensions.Options;
|
||
using RestSharp;
|
||
using RestSharp.Authenticators;
|
||
using System;
|
||
using System.Collections.Generic;
|
||
using System.Globalization;
|
||
using System.Linq;
|
||
using System.Net;
|
||
using System.Net.Http;
|
||
using System.Text;
|
||
using System.Text.Json;
|
||
using System.Threading.Tasks;
|
||
using ZiggyCreatures.Caching.Fusion;
|
||
using AssumeRoleRequest = Amazon.SecurityToken.Model.AssumeRoleRequest;
|
||
using LoginReturnDTO = IRaCIS.Application.Contracts.LoginReturnDTO;
|
||
|
||
namespace IRaCIS.Api.Controllers
|
||
{
|
||
/// <summary>
|
||
/// 医生基本信息 、工作信息 专业信息、审核状态
|
||
/// </summary>
|
||
[ApiController, ApiExplorerSettings(GroupName = "Reviewer")]
|
||
public class ExtraController([FromServices] IAttachmentService attachmentService, [FromServices] IDoctorService _doctorService,
|
||
[FromServices] IEducationService _educationService, [FromServices] ITrialExperienceService _trialExperienceService,
|
||
|
||
[FromServices] IResearchPublicationService _researchPublicationService, [FromServices] IVacationService _vacationService) : ControllerBase
|
||
{
|
||
|
||
|
||
/// <summary>
|
||
/// 获取医生详情
|
||
/// </summary>
|
||
/// <param name="attachmentService"></param>
|
||
/// <param name="_doctorService"></param>
|
||
/// <param name="_educationService"></param>
|
||
/// <param name="_trialExperienceService"></param>
|
||
/// <param name="_researchPublicationService"></param>
|
||
/// <param name="_vacationService"></param>
|
||
/// <param name="doctorId"></param>
|
||
/// <returns></returns>
|
||
[HttpPost, Route("doctor/getDetail")]
|
||
|
||
public async Task<IResponseOutput<DoctorDetailDTO>> GetDoctorDetail(GetDoctorDetailInDto inDto)
|
||
{
|
||
var education = await _educationService.GetEducation(inDto.doctorId);
|
||
|
||
var sowList = _doctorService.GetDoctorSowList(inDto.doctorId);
|
||
var ackSowList = _doctorService.GetDoctorAckSowList(inDto.doctorId);
|
||
|
||
var doctorDetail = new DoctorDetailDTO
|
||
{
|
||
AuditView = await _doctorService.GetAuditState(inDto.doctorId),
|
||
BasicInfoView = await _doctorService.GetBasicInfo(inDto.doctorId),
|
||
EmploymentView = await _doctorService.GetEmploymentInfo(inDto.doctorId),
|
||
AttachmentList = await attachmentService.GetAttachments(inDto.doctorId),
|
||
SummarizeInfo = await _doctorService.GetSummarizeInfo(new GetSummarizeInfoInDto()
|
||
{
|
||
DoctorId = inDto.doctorId,
|
||
TrialId = inDto.TrialId
|
||
}),
|
||
PaymentModeInfo = await _doctorService.GetPaymentMode(inDto.doctorId),
|
||
EducationList = education.EducationList,
|
||
PostgraduateList = education.PostgraduateList,
|
||
|
||
TrialExperienceView = await _trialExperienceService.GetTrialExperience(new TrialExperienceModelIndto()
|
||
{
|
||
DoctorId = inDto.doctorId,
|
||
TrialId = inDto.TrialId
|
||
}),
|
||
ResearchPublicationView = await _researchPublicationService.GetResearchPublication(inDto.doctorId),
|
||
|
||
SpecialtyView = await _doctorService.GetSpecialtyInfo(inDto.doctorId),
|
||
InHoliday = (await _vacationService.OnVacation(inDto.doctorId)).IsSuccess,
|
||
IntoGroupInfo = _doctorService.GetDoctorIntoGroupInfo(inDto.doctorId),
|
||
SowList = sowList,
|
||
AckSowList = ackSowList
|
||
};
|
||
|
||
return ResponseOutput.Ok(doctorDetail);
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
[AllowAnonymous]
|
||
[HttpGet, Route("user/getPublicKey")]
|
||
public IResponseOutput GetPublicKey([FromServices] IOptionsMonitor<IRCEncreptOption> _IRCEncreptOption)
|
||
{
|
||
//var pemPublicKey = Encoding.UTF8.GetString(Convert.FromBase64String(_IRCEncreptOption.CurrentValue.Base64RSAPublicKey));
|
||
|
||
return ResponseOutput.Ok(_IRCEncreptOption.CurrentValue.Base64RSAPublicKey);
|
||
}
|
||
|
||
|
||
[HttpGet, Route("imageShare/ShareImage")]
|
||
[AllowAnonymous]
|
||
public IResponseOutput ShareImage([FromServices] ITokenService _tokenService)
|
||
{
|
||
var token = _tokenService.GetToken(new UserTokenInfo()
|
||
{
|
||
IdentityUserId = Guid.NewGuid(),
|
||
UserName = "Share001",
|
||
UserTypeEnum = UserTypeEnum.ShareImage,
|
||
|
||
});
|
||
return ResponseOutput.Ok("/showdicom?studyId=f7b67793-8155-0223-2f15-118f2642efb8&type=Share&token=" + token);
|
||
}
|
||
|
||
[HttpGet("user/GetObjectStoreToken")]
|
||
public async Task<IResponseOutput> GetObjectStoreTokenAsync([FromServices] IOptionsMonitor<ObjectStoreServiceOptions> options, [FromServices] IOSSService _oSSService)
|
||
{
|
||
|
||
var result = _oSSService.GetObjectStoreTempToken();
|
||
|
||
//result.AWS = await GetAWSTemToken(options.CurrentValue);
|
||
|
||
return ResponseOutput.Ok(result);
|
||
|
||
}
|
||
|
||
|
||
private async Task<AWSTempToken> GetAWSTemToken(ObjectStoreServiceOptions serviceOption)
|
||
{
|
||
var awsOptions = serviceOption.AWS;
|
||
|
||
//aws 临时凭证
|
||
// 创建 STS 客户端
|
||
var stsClient = new AmazonSecurityTokenServiceClient(awsOptions.AccessKeyId, awsOptions.SecretAccessKey);
|
||
|
||
// 使用 AssumeRole 请求临时凭证
|
||
var assumeRoleRequest = new AssumeRoleRequest
|
||
{
|
||
|
||
RoleArn = awsOptions.RoleArn, // 角色 ARN
|
||
RoleSessionName = $"session-name-{NewId.NextGuid()}",
|
||
DurationSeconds = awsOptions.DurationSeconds // 临时凭证有效期
|
||
};
|
||
|
||
var assumeRoleResponse = await stsClient.AssumeRoleAsync(assumeRoleRequest);
|
||
|
||
var credentials = assumeRoleResponse.Credentials;
|
||
|
||
var tempToken = new AWSTempToken()
|
||
{
|
||
AccessKeyId = credentials.AccessKeyId,
|
||
SecretAccessKey = credentials.SecretAccessKey,
|
||
SessionToken = credentials.SessionToken,
|
||
Expiration = credentials.Expiration,
|
||
Region = awsOptions.Region,
|
||
BucketName = awsOptions.BucketName,
|
||
EndPoint = awsOptions.EndPoint,
|
||
ViewEndpoint = awsOptions.ViewEndpoint,
|
||
|
||
};
|
||
|
||
return tempToken;
|
||
}
|
||
|
||
|
||
|
||
|
||
[HttpGet("User/UserRedirect")]
|
||
[AllowAnonymous]
|
||
public async Task<IActionResult> UserRedirect([FromServices] IRepository<IdentityUser> _useRepository, string url, [FromServices] ILogger<ExtraController> _logger, [FromServices] ITokenService _tokenService)
|
||
{
|
||
|
||
var decodeUrl = System.Web.HttpUtility.UrlDecode(url);
|
||
|
||
var userId = decodeUrl.Substring(decodeUrl.IndexOf("UserId=") + "UserId=".Length, 36);
|
||
|
||
var token = decodeUrl.Substring(decodeUrl.IndexOf("access_token=") + "access_token=".Length);
|
||
|
||
var lang = decodeUrl.Substring(decodeUrl.IndexOf("lang=") + "lang=".Length, 2);
|
||
|
||
var domainStrList = decodeUrl.Split("/").ToList().Take(3).ToList();
|
||
|
||
var errorUrl = domainStrList[0] + "//" + domainStrList[2] + "/error";
|
||
|
||
if (lang == "zh")
|
||
{
|
||
CultureInfo.CurrentCulture = new CultureInfo(StaticData.CultureInfo.zh_CN);
|
||
CultureInfo.CurrentUICulture = new CultureInfo(StaticData.CultureInfo.zh_CN);
|
||
}
|
||
else
|
||
{
|
||
CultureInfo.CurrentCulture = new CultureInfo(StaticData.CultureInfo.en_US);
|
||
CultureInfo.CurrentUICulture = new CultureInfo(StaticData.CultureInfo.en_US);
|
||
}
|
||
|
||
var isExpire = _tokenService.IsTokenExpired(token);
|
||
|
||
if (!await _useRepository.AnyAsync(t => t.Id == Guid.Parse(userId) && t.EmailToken == token && t.IsFirstAdd) || isExpire)
|
||
{
|
||
decodeUrl = errorUrl + $"?lang={lang}&ErrorMessage={System.Web.HttpUtility.UrlEncode(I18n.T("UserRedirect_InitializationLinkExpire"))} ";
|
||
}
|
||
|
||
return Redirect(decodeUrl);
|
||
}
|
||
|
||
|
||
|
||
|
||
#region 项目支持Oauth 对接修改
|
||
|
||
/// <summary>
|
||
/// 回调到前端,前端调用后端的接口
|
||
/// 参考链接:https://www.ruanyifeng.com/blog/2019/04/oauth-grant-types.html
|
||
/// 后端通过这个code ,带上客户端信息,和授权类型 可以向单点登录提供商,获取厂商token
|
||
///
|
||
/// 但是单点登录提供商提供的token 和我们系统的token 是有区别的,我们的token里面有我们业务系统的UserId,涉及到很多业务操作,所以在此出现了两种方案
|
||
/// 1、前端使用厂商的Token。 后端通过code 获取厂商的Token 返回前端的同时返回我们系统的UserId,前段在http 请求头加上一个自定义参数,带上UserId 后端取用户Id的地方变动下,
|
||
/// 但是除了UserId外,后端还有其他信息也是从Token取的,所以在请求头也需要带上,此外后端认证Token的方式也需要变化,改造成本稍大(如果是微服务,做这种处理还是可以的)。
|
||
/// 2、前端还是使用我们后台自己的Token。后端通过code 获取厂商Token的同时,后端做一个隐藏登录,返回厂商的Token的同时,也返回我们系统的Token。
|
||
/// (像我们单体,这种方式最简单,我们用单点登录,无非就是不想记多个系统的密码,自动登录而已,其他不支持的项目改造成本也是最低的)
|
||
/// </summary>
|
||
/// <param name="type">回调的厂商类型 比如github, google, 我们用的logto ,不同的厂商回调到前端的地址可以不同的,但是请求后端的接口可以是同一个 </param>
|
||
/// <param name="code">在第三方平台登录成功后,回调前端的时候会返回一个code </param>
|
||
/// <returns></returns>
|
||
[HttpGet("User/OAuthCallBack")]
|
||
public async Task<IResponseOutput> OAuthCallBack(string type, string code)
|
||
{
|
||
#region 获取AccessTo
|
||
|
||
//var headerDic = new Dictionary<string, string>();
|
||
//headerDic.Add("code", code);
|
||
//headerDic.Add("grant_type", "authorization_code");
|
||
//headerDic.Add("redirect_uri", "http://localhost:6100");
|
||
//headerDic.Add("scope", "all");
|
||
|
||
#endregion
|
||
|
||
|
||
|
||
|
||
return ResponseOutput.Ok();
|
||
}
|
||
|
||
|
||
|
||
|
||
#endregion
|
||
|
||
#region 测试获取用户 ip
|
||
[HttpGet, Route("ip")]
|
||
[AllowAnonymous]
|
||
public IResponseOutput Get([FromServices] IHttpContextAccessor _context)
|
||
{
|
||
|
||
StringBuilder sb = new StringBuilder();
|
||
sb.AppendLine($"RemoteIpAddress:{_context.HttpContext.Connection.RemoteIpAddress}");
|
||
|
||
if (Request.Headers.ContainsKey("X-Real-IP"))
|
||
{
|
||
sb.AppendLine($"X-Real-IP:{Request.Headers["X-Real-IP"].ToString()}");
|
||
}
|
||
|
||
if (Request.Headers.ContainsKey("X-Forwarded-For"))
|
||
{
|
||
sb.AppendLine($"X-Forwarded-For:{Request.Headers["X-Forwarded-For"].ToString()}");
|
||
}
|
||
return ResponseOutput.Ok(sb.ToString());
|
||
}
|
||
|
||
|
||
[HttpGet, Route("ip2")]
|
||
[AllowAnonymous]
|
||
public IResponseOutput Get2([FromServices] IHttpContextAccessor _context)
|
||
{
|
||
|
||
StringBuilder sb = new StringBuilder();
|
||
sb.AppendLine($"RemoteIpAddress:{_context.HttpContext.Connection.RemoteIpAddress}");
|
||
|
||
if (Request.Headers.ContainsKey("X-Real-IP"))
|
||
{
|
||
sb.AppendLine($"X-Real-IP:{Request.Headers["X-Real-IP"].ToString()}");
|
||
}
|
||
|
||
if (Request.Headers.ContainsKey("X-Forwarded-For"))
|
||
{
|
||
sb.AppendLine($"X-Forwarded-For:{Request.Headers["X-Forwarded-For"].ToString()}");
|
||
}
|
||
return ResponseOutput.Ok(sb.ToString());
|
||
}
|
||
#endregion
|
||
|
||
|
||
|
||
}
|
||
}
|