2021-03-01 14:41:43 +00:00
|
|
|
/*
|
|
|
|
GoToSocial
|
2021-12-20 17:42:19 +00:00
|
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
2021-03-01 14:41:43 +00:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2021-04-01 19:46:45 +01:00
|
|
|
package auth
|
2021-03-22 21:26:54 +00:00
|
|
|
|
|
|
|
import (
|
2022-06-11 09:39:39 +01:00
|
|
|
"net/http"
|
2021-05-15 10:58:11 +01:00
|
|
|
"net/url"
|
2021-03-22 21:26:54 +00:00
|
|
|
|
2021-12-11 16:50:00 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/api"
|
2022-06-08 19:38:03 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
2022-06-11 09:39:39 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
2021-12-11 16:50:00 +00:00
|
|
|
|
2021-04-01 19:46:45 +01:00
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
)
|
2021-03-22 21:26:54 +00:00
|
|
|
|
2022-06-11 09:39:39 +01:00
|
|
|
type tokenRequestForm struct {
|
2021-05-15 10:58:11 +01:00
|
|
|
GrantType *string `form:"grant_type" json:"grant_type" xml:"grant_type"`
|
2022-06-11 09:39:39 +01:00
|
|
|
Code *string `form:"code" json:"code" xml:"code"`
|
2021-05-15 10:58:11 +01:00
|
|
|
RedirectURI *string `form:"redirect_uri" json:"redirect_uri" xml:"redirect_uri"`
|
2022-06-11 09:39:39 +01:00
|
|
|
ClientID *string `form:"client_id" json:"client_id" xml:"client_id"`
|
|
|
|
ClientSecret *string `form:"client_secret" json:"client_secret" xml:"client_secret"`
|
2021-09-08 20:46:08 +01:00
|
|
|
Scope *string `form:"scope" json:"scope" xml:"scope"`
|
2021-05-15 10:58:11 +01:00
|
|
|
}
|
|
|
|
|
2021-04-20 17:14:23 +01:00
|
|
|
// TokenPOSTHandler should be served as a POST at https://example.org/oauth/token
|
2021-04-01 19:46:45 +01:00
|
|
|
// The idea here is to serve an oauth access token to a user, which can be used for authorizing against non-public APIs.
|
2021-04-20 17:14:23 +01:00
|
|
|
func (m *Module) TokenPOSTHandler(c *gin.Context) {
|
2021-12-11 16:50:00 +00:00
|
|
|
if _, err := api.NegotiateAccept(c, api.JSONAcceptHeaders...); err != nil {
|
2022-06-08 19:38:03 +01:00
|
|
|
api.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGet)
|
2021-12-11 16:50:00 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-06-11 09:39:39 +01:00
|
|
|
help := []string{}
|
|
|
|
|
|
|
|
form := &tokenRequestForm{}
|
2022-06-08 19:38:03 +01:00
|
|
|
if err := c.ShouldBind(form); err != nil {
|
2022-06-11 09:39:39 +01:00
|
|
|
api.OAuthErrorHandler(c, gtserror.NewErrorBadRequest(oauth.InvalidRequest(), err.Error()))
|
2022-06-08 19:38:03 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
c.Request.Form = url.Values{}
|
2022-06-11 09:39:39 +01:00
|
|
|
|
|
|
|
var grantType string
|
|
|
|
if form.GrantType != nil {
|
|
|
|
grantType = *form.GrantType
|
|
|
|
c.Request.Form.Set("grant_type", grantType)
|
|
|
|
} else {
|
|
|
|
help = append(help, "grant_type was not set in the token request form, but must be set to authorization_code or client_credentials")
|
|
|
|
}
|
|
|
|
|
2022-06-08 19:38:03 +01:00
|
|
|
if form.ClientID != nil {
|
|
|
|
c.Request.Form.Set("client_id", *form.ClientID)
|
2022-06-11 09:39:39 +01:00
|
|
|
} else {
|
|
|
|
help = append(help, "client_id was not set in the token request form")
|
2022-06-08 19:38:03 +01:00
|
|
|
}
|
2022-06-11 09:39:39 +01:00
|
|
|
|
2022-06-08 19:38:03 +01:00
|
|
|
if form.ClientSecret != nil {
|
|
|
|
c.Request.Form.Set("client_secret", *form.ClientSecret)
|
2022-06-11 09:39:39 +01:00
|
|
|
} else {
|
|
|
|
help = append(help, "client_secret was not set in the token request form")
|
2022-06-08 19:38:03 +01:00
|
|
|
}
|
2022-06-11 09:39:39 +01:00
|
|
|
|
2022-06-08 19:38:03 +01:00
|
|
|
if form.RedirectURI != nil {
|
|
|
|
c.Request.Form.Set("redirect_uri", *form.RedirectURI)
|
2022-06-11 09:39:39 +01:00
|
|
|
} else {
|
|
|
|
help = append(help, "redirect_uri was not set in the token request form")
|
|
|
|
}
|
|
|
|
|
|
|
|
var code string
|
|
|
|
if form.Code != nil {
|
|
|
|
if grantType != "authorization_code" {
|
|
|
|
help = append(help, "a code was provided in the token request form, but grant_type was not set to authorization_code")
|
|
|
|
} else {
|
|
|
|
code = *form.Code
|
|
|
|
c.Request.Form.Set("code", code)
|
|
|
|
}
|
|
|
|
} else if grantType == "authorization_code" {
|
|
|
|
help = append(help, "code was not set in the token request form, but must be set since grant_type is authorization_code")
|
2022-06-08 19:38:03 +01:00
|
|
|
}
|
2022-06-11 09:39:39 +01:00
|
|
|
|
2022-06-08 19:38:03 +01:00
|
|
|
if form.Scope != nil {
|
|
|
|
c.Request.Form.Set("scope", *form.Scope)
|
2021-05-15 10:58:11 +01:00
|
|
|
}
|
|
|
|
|
2022-06-11 09:39:39 +01:00
|
|
|
if len(help) != 0 {
|
|
|
|
api.OAuthErrorHandler(c, gtserror.NewErrorBadRequest(oauth.InvalidRequest(), help...))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
token, errWithCode := m.processor.OAuthHandleTokenRequest(c.Request)
|
|
|
|
if errWithCode != nil {
|
|
|
|
api.OAuthErrorHandler(c, errWithCode)
|
|
|
|
return
|
2021-04-01 19:46:45 +01:00
|
|
|
}
|
2022-06-11 09:39:39 +01:00
|
|
|
|
|
|
|
c.Header("Cache-Control", "no-store")
|
|
|
|
c.Header("Pragma", "no-cache")
|
|
|
|
c.JSON(http.StatusOK, token)
|
2021-03-22 21:26:54 +00:00
|
|
|
}
|