Compare commits

...

8 Commits
4.50.0 ... main

Author SHA1 Message Date
TeamCity
ad5add0ffc ci: bump version to v4.54.0 2026-01-22 00:15:50 +00:00
30c05c3014 feat(ui): FRO-26 Nice Tie UI (#115)
Added nice tie UI Component

Co-authored-by: LQ63 <lkhermann@web.de>
Reviewed-on: #115
2026-01-22 01:11:17 +01:00
TeamCity
d75d64113b ci: bump version to v4.53.0 2026-01-21 18:34:01 +00:00
66b55945eb feat: Update CORS allowed origins to use production URL 2026-01-21 19:31:32 +01:00
TeamCity
50145c914b ci: bump version to v4.52.0 2026-01-21 11:51:57 +00:00
0430c7f4de feat: Implement OAuth session management with Redis caching for OpenID user data 2026-01-21 12:49:20 +01:00
TeamCity
1317fd40f5 ci: bump version to v4.51.0 2026-01-21 11:29:52 +00:00
daa072f2bf feat: Update ID mapping in OpenIDUserInfo to use hashed value and remove name field 2026-01-21 12:26:20 +01:00
8 changed files with 192 additions and 66 deletions

View File

@@ -443,3 +443,23 @@
### Features
* Update ID mapping in OpenIDUserInfo to use hashed value and remove name field ([4b74de1](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/4b74de12610120831fc1529f0409db66aafd4d03))
## (2026-01-21)
### Features
* Update ID mapping in OpenIDUserInfo to use hashed value and remove name field ([daa072f](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/daa072f2bf260ed62402096b41ce85aa071efaf5))
## (2026-01-21)
### Features
* Implement OAuth session management with Redis caching for OpenID user data ([0430c7f](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/0430c7f4deb37661c697406a714e2693bf0c7307))
## (2026-01-21)
### Features
* Update CORS allowed origins to use production URL ([66b5594](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/66b55945eb8f095c08a8f859955d31f7fc32ce0e))
## (2026-01-22)
### Features
* **ui:** FRO-26 Nice Tie UI ([#115](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/issues/115)) ([30c05c3](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/30c05c3014e9198e87706518bfa8d070f33242dc))

View File

@@ -1,13 +1,15 @@
package controllers
import com.github.benmanes.caffeine.cache.{Cache, Caffeine}
import logic.user.{SessionManager, UserManager}
import model.users.User
import play.api.{Configuration, Logger}
import play.api.libs.json.Json
import play.api.mvc.*
import play.api.mvc.Cookie.SameSite.Lax
import services.{OpenIDConnectService, OpenIDUserInfo}
import services.{OpenIDConnectService, OpenIDUserInfo, OAuthCacheService}
import java.util.concurrent.TimeUnit
import javax.inject.*
import scala.concurrent.{ExecutionContext, Future}
@@ -17,11 +19,12 @@ class OpenIDController @Inject()(
val openIDService: OpenIDConnectService,
val sessionManager: SessionManager,
val userManager: UserManager,
val config: Configuration
val config: Configuration,
val oauthCache: OAuthCacheService
)(implicit ec: ExecutionContext) extends BaseController {
private val logger = Logger(this.getClass)
def loginWithProvider(provider: String): Action[AnyContent] = Action.async { implicit request =>
val state = openIDService.generateState()
val nonce = openIDService.generateNonce()
@@ -83,13 +86,11 @@ class OpenIDController @Inject()(
.removingFromSession("oauth_state", "oauth_nonce", "oauth_provider", "oauth_access_token"))
case None =>
logger.warn(s"User ${userInfo.name} (${userInfo.id}) not found, creating new user")
// New user, redirect to username selection
// Store OAuth data in cache and get session ID
val oauthSessionId = oauthCache.storeOAuthData(userInfo, tokenResponse.accessToken, provider)
// New user, redirect to username selection with only session ID
Future.successful(Redirect(config.get[String]("openid.selectUserRoute"))
.withSession(
"oauth_user_info" -> Json.toJson(userInfo).toString(),
"oauth_provider" -> provider,
"oauth_access_token" -> tokenResponse.accessToken
))
.withSession("oauth_session_id" -> oauthSessionId))
}
case None =>
logger.error("Failed to retrieve user information")
@@ -107,18 +108,24 @@ class OpenIDController @Inject()(
}
def selectUsername(): Action[AnyContent] = Action.async { implicit request =>
request.session.get("oauth_user_info") match {
case Some(userInfoJson) =>
val userInfo = Json.parse(userInfoJson).as[OpenIDUserInfo]
Future.successful(Ok(Json.obj(
"id" -> userInfo.id,
"email" -> userInfo.email,
"name" -> userInfo.name,
"picture" -> userInfo.picture,
"provider" -> userInfo.provider,
"providerName" -> userInfo.providerName
)))
request.session.get("oauth_session_id") match {
case Some(sessionId) =>
oauthCache.getOAuthData(sessionId) match {
case Some((userInfo, _, _)) =>
Future.successful(Ok(Json.obj(
"id" -> userInfo.id,
"email" -> userInfo.email,
"name" -> userInfo.name,
"picture" -> userInfo.picture,
"provider" -> userInfo.provider,
"providerName" -> userInfo.providerName
)))
case None =>
logger.error(s"OAuth session data not found for session ID: $sessionId")
Future.successful(Redirect("/login").flashing("error" -> "Session expired"))
}
case None =>
logger.error("No OAuth session ID found")
Future.successful(Redirect("/login").flashing("error" -> "No authentication information found"))
}
}
@@ -126,48 +133,53 @@ class OpenIDController @Inject()(
def submitUsername(): Action[AnyContent] = Action.async { implicit request =>
val username = request.body.asJson.flatMap(json => (json \ "username").asOpt[String])
.orElse(request.body.asFormUrlEncoded.flatMap(_.get("username").flatMap(_.headOption)))
val userInfoJson = request.session.get("oauth_user_info")
val provider = request.session.get("oauth_provider").getOrElse("unknown")
val sessionId = request.session.get("oauth_session_id")
(username, userInfoJson) match {
case (Some(uname), Some(userInfoJson)) =>
val userInfo = Json.parse(userInfoJson).as[OpenIDUserInfo]
// Check if username already exists
val trimmedUsername = uname.trim
userManager.userExists(trimmedUsername) match {
case Some(_) =>
Future.successful(Conflict(Json.obj("error" -> "Username already taken")))
case None =>
// Create new user with OpenID info (no password needed)
val success = userManager.addOpenIDUser(trimmedUsername, userInfo)
if (success) {
// Get the created user and create session
userManager.userExists(trimmedUsername) match {
case Some(user) =>
val sessionToken = sessionManager.createSession(user)
Future.successful(Ok(Json.obj(
"message" -> "User created successfully",
"user" -> Json.obj(
"id" -> user.id,
"username" -> user.name
)
)).withCookies(Cookie(
name = "accessToken",
value = sessionToken,
httpOnly = true,
secure = false,
sameSite = Some(Lax)
)).removingFromSession("oauth_user_info", "oauth_provider", "oauth_access_token"))
case None =>
Future.successful(InternalServerError(Json.obj("error" -> "Failed to create user session")))
}
} else {
Future.successful(InternalServerError(Json.obj("error" -> "Failed to create user")))
(username, sessionId) match {
case (Some(uname), Some(sid)) =>
oauthCache.getOAuthData(sid) match {
case Some((userInfo, accessToken, provider)) =>
// Check if username already exists
val trimmedUsername = uname.trim
userManager.userExists(trimmedUsername) match {
case Some(_) =>
Future.successful(Conflict(Json.obj("error" -> "Username already taken")))
case None =>
// Create new user with OpenID info (no password needed)
val success = userManager.addOpenIDUser(trimmedUsername, userInfo)
if (success) {
// Get created user and create session
userManager.userExists(trimmedUsername) match {
case Some(user) =>
val sessionToken = sessionManager.createSession(user)
// Clean up cache after successful user creation
oauthCache.removeOAuthData(sid)
Future.successful(Ok(Json.obj(
"message" -> "User created successfully",
"user" -> Json.obj(
"id" -> user.id,
"username" -> user.name
)
)).withCookies(Cookie(
name = "accessToken",
value = sessionToken,
httpOnly = true,
secure = false,
sameSite = Some(Lax)
)).removingFromSession("oauth_session_id"))
case None =>
Future.successful(InternalServerError(Json.obj("error" -> "Failed to create user session")))
}
} else {
Future.successful(InternalServerError(Json.obj("error" -> "Failed to create user")))
}
}
case None =>
logger.error(s"OAuth session data not found for session ID: $sid")
Future.successful(Redirect("/login").flashing("error" -> "Session expired"))
}
case _ =>
Future.successful(BadRequest(Json.obj("error" -> "Username is required")))
Future.successful(BadRequest(Json.obj("error" -> "Username and valid session required")))
}
}
}

View File

@@ -1,12 +1,13 @@
package dto
import dto.subDTO.PlayerDTO
import de.knockoutwhist.cards.Card
import dto.subDTO.{CardDTO, PlayerDTO}
import logic.game.GameLobby
import model.users.User
import scala.util.Try
case class TieInfoDTO(gameId: String, currentPlayer: Option[PlayerDTO], self: Option[PlayerDTO], tiedPlayers: Seq[PlayerDTO], highestAmount: Int)
case class TieInfoDTO(gameId: String, currentPlayer: Option[PlayerDTO], self: Option[PlayerDTO], tiedPlayers: Seq[PlayerDTO], highestAmount: Int, selectedCards: Map[String, CardDTO], winners: Option[Seq[PlayerDTO]])
object TieInfoDTO {
@@ -20,7 +21,11 @@ object TieInfoDTO {
currentPlayer = lobby.logic.playerTieLogic.currentTiePlayer().map(PlayerDTO.apply),
self = selfPlayer.map(PlayerDTO.apply),
tiedPlayers = lobby.logic.playerTieLogic.getTiedPlayers.map(PlayerDTO.apply),
highestAmount = lobby.logic.playerTieLogic.highestAllowedNumber()
highestAmount = lobby.logic.playerTieLogic.highestAllowedNumber(),
selectedCards = lobby.logic.playerTieLogic.getSelectedCard.map {
case (player, card) => player.id.toString -> CardDTO(card)
},
winners = Some(lobby.logic.playerTieLogic.getSelectedCard.filter((_,card) => card == lobby.logic.playerTieLogic.getSelectedCard.values.maxBy(_.cardValue.ordinal)).keySet.toList.map(PlayerDTO.apply))
)
}

View File

@@ -0,0 +1,89 @@
package services
import org.redisson.Redisson
import org.redisson.api.RMapCache
import org.redisson.config.Config
import play.api.Logger
import play.api.libs.json.Json
import java.util.concurrent.TimeUnit
import javax.inject.*
@Singleton
class OAuthCacheService @Inject()() {
private val logger = Logger(this.getClass)
// Initialize Redis connection similar to Gateway
private val redis = {
val config: Config = Config()
val url = "redis://" + sys.env.getOrElse("REDIS_HOST", "localhost") + ":" + sys.env.getOrElse("REDIS_PORT", "6379")
logger.info(s"OAuthCacheService connecting to Redis at $url")
config.useSingleServer.setAddress(url)
Redisson.create(config)
}
// Cache for OAuth data with 30 minute TTL
private val oauthCache: RMapCache[String, String] = redis.getMapCache("oauth_cache")
/**
* Store OAuth data with random ID and return the ID
*/
def storeOAuthData(userInfo: OpenIDUserInfo, accessToken: String, provider: String): String = {
val sessionId = java.util.UUID.randomUUID().toString
val oauthData = Json.obj(
"userInfo" -> Json.toJson(userInfo),
"accessToken" -> accessToken,
"provider" -> provider,
"timestamp" -> System.currentTimeMillis()
).toString()
// Store with 30 minute TTL
oauthCache.put(sessionId, oauthData, 30, TimeUnit.MINUTES)
logger.info(s"Stored OAuth data for session $sessionId")
sessionId
}
/**
* Retrieve OAuth data by session ID
*/
def getOAuthData(sessionId: String): Option[(OpenIDUserInfo, String, String)] = {
Option(oauthCache.get(sessionId)) match {
case Some(dataJson) =>
try {
val json = Json.parse(dataJson)
val userInfo = (json \ "userInfo").as[OpenIDUserInfo]
val accessToken = (json \ "accessToken").as[String]
val provider = (json \ "provider").as[String]
logger.info(s"Retrieved OAuth data for session $sessionId")
Some((userInfo, accessToken, provider))
} catch {
case e: Exception =>
logger.error(s"Failed to parse OAuth data for session $sessionId: ${e.getMessage}")
None
}
case None =>
logger.warn(s"No OAuth data found for session $sessionId")
None
}
}
/**
* Remove OAuth data after use
*/
def removeOAuthData(sessionId: String): Unit = {
oauthCache.remove(sessionId)
logger.info(s"Removed OAuth data for session $sessionId")
}
/**
* Clean up expired sessions (optional maintenance)
*/
def cleanupExpiredSessions(): Unit = {
oauthCache.clear()
logger.info("Cleaned up expired OAuth sessions")
}
}

View File

@@ -138,9 +138,9 @@ class OpenIDConnectService@Inject(ws: WSClient, config: Configuration)(implicit
if (response.status == 200) {
val json = response.json
Some(OpenIDUserInfo(
id = (json \ provider.idClaimName).as[String].hashCode.toString,
id = (json \ provider.idClaimName).as[String],
email = (json \ "email").asOpt[String],
name = None,
name = (json \ "name").asOpt[String].orElse((json \ "login").asOpt[String]),
picture = (json \ "picture").asOpt[String].orElse((json \ "avatar_url").asOpt[String]),
provider = providerName,
providerName = provider.name

View File

@@ -8,7 +8,7 @@ play.http.context="/api"
play.modules.enabled += "modules.GatewayModule"
play.filters.cors {
allowedOrigins = ["http://localhost:5173"]
allowedOrigins = ["https://knockout.janis-eccarius.de"]
allowedCredentials = true
allowedHttpMethods = ["GET", "POST", "PUT", "DELETE", "OPTIONS"]
allowedHttpHeaders = ["Accept", "Content-Type", "Origin", "X-Requested-With"]

View File

@@ -1,3 +1,3 @@
MAJOR=4
MINOR=50
MINOR=54
PATCH=0