2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-03-14 16:56:16 +00:00
|
|
|
|
|
|
|
package oauth
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"time"
|
|
|
|
|
2021-04-01 19:46:45 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2021-09-01 10:45:01 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2021-06-13 17:42:28 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
2022-07-19 09:47:55 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-04-01 19:46:45 +01:00
|
|
|
"github.com/superseriousbusiness/oauth2/v4"
|
|
|
|
"github.com/superseriousbusiness/oauth2/v4/models"
|
2021-03-14 16:56:16 +00:00
|
|
|
)
|
|
|
|
|
2021-03-22 21:26:54 +00:00
|
|
|
// tokenStore is an implementation of oauth2.TokenStore, which uses our db interface as a storage backend.
|
|
|
|
type tokenStore struct {
|
2021-03-14 16:56:16 +00:00
|
|
|
oauth2.TokenStore
|
2024-04-15 14:22:21 +01:00
|
|
|
db db.DB
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
2021-03-22 21:26:54 +00:00
|
|
|
// newTokenStore returns a token store that satisfies the oauth2.TokenStore interface.
|
2021-03-14 16:56:16 +00:00
|
|
|
//
|
2021-03-22 21:26:54 +00:00
|
|
|
// In order to allow tokens to 'expire', it will also set off a goroutine that iterates through
|
|
|
|
// the tokens in the DB once per minute and deletes any that have expired.
|
2024-04-15 14:22:21 +01:00
|
|
|
func newTokenStore(ctx context.Context, db db.DB) oauth2.TokenStore {
|
2021-08-25 14:34:33 +01:00
|
|
|
ts := &tokenStore{
|
2021-10-13 12:50:24 +01:00
|
|
|
db: db,
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// set the token store to clean out expired tokens once per minute, or return if we're done
|
2021-10-11 13:37:33 +01:00
|
|
|
go func(ctx context.Context, ts *tokenStore) {
|
2021-03-14 16:56:16 +00:00
|
|
|
cleanloop:
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
2023-02-17 11:02:29 +00:00
|
|
|
log.Info(ctx, "breaking cleanloop")
|
2021-03-14 16:56:16 +00:00
|
|
|
break cleanloop
|
|
|
|
case <-time.After(1 * time.Minute):
|
2023-02-17 11:02:29 +00:00
|
|
|
log.Trace(ctx, "sweeping out old oauth entries broom broom")
|
2021-08-25 14:34:33 +01:00
|
|
|
if err := ts.sweep(ctx); err != nil {
|
2023-02-17 11:02:29 +00:00
|
|
|
log.Errorf(ctx, "error while sweeping oauth entries: %s", err)
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-10-11 13:37:33 +01:00
|
|
|
}(ctx, ts)
|
2021-08-25 14:34:33 +01:00
|
|
|
return ts
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// sweep clears out old tokens that have expired; it should be run on a loop about once per minute or so.
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) sweep(ctx context.Context) error {
|
2021-03-14 16:56:16 +00:00
|
|
|
// select *all* tokens from the db
|
|
|
|
// todo: if this becomes expensive (ie., there are fucking LOADS of tokens) then figure out a better way.
|
2024-04-15 14:22:21 +01:00
|
|
|
tokens, err := ts.db.GetAllTokens(ctx)
|
|
|
|
if err != nil {
|
2021-03-14 16:56:16 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// iterate through and remove expired tokens
|
|
|
|
now := time.Now()
|
2024-04-15 14:22:21 +01:00
|
|
|
for _, dbt := range tokens {
|
2021-03-14 16:56:16 +00:00
|
|
|
// The zero value of a time.Time is 00:00 january 1 1970, which will always be before now. So:
|
|
|
|
// we only want to check if a token expired before now if the expiry time is *not zero*;
|
|
|
|
// ie., if it's been explicity set.
|
2021-08-25 14:34:33 +01:00
|
|
|
if !dbt.CodeExpiresAt.IsZero() && dbt.CodeExpiresAt.Before(now) || !dbt.RefreshExpiresAt.IsZero() && dbt.RefreshExpiresAt.Before(now) || !dbt.AccessExpiresAt.IsZero() && dbt.AccessExpiresAt.Before(now) {
|
2024-04-15 14:22:21 +01:00
|
|
|
if err := ts.db.DeleteTokenByID(ctx, dbt.ID); err != nil {
|
2021-03-14 16:56:16 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create creates and store the new token information.
|
2021-04-01 19:46:45 +01:00
|
|
|
// For the original implementation, see https://github.com/superseriousbusiness/oauth2/blob/master/store/token.go#L34
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) Create(ctx context.Context, info oauth2.TokenInfo) error {
|
2021-03-14 16:56:16 +00:00
|
|
|
t, ok := info.(*models.Token)
|
|
|
|
if !ok {
|
|
|
|
return errors.New("info param was not a models.Token")
|
|
|
|
}
|
2021-06-13 17:42:28 +01:00
|
|
|
|
2021-08-25 14:34:33 +01:00
|
|
|
dbt := TokenToDBToken(t)
|
|
|
|
if dbt.ID == "" {
|
|
|
|
dbtID, err := id.NewRandomULID()
|
2021-06-13 17:42:28 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-08-25 14:34:33 +01:00
|
|
|
dbt.ID = dbtID
|
2021-06-13 17:42:28 +01:00
|
|
|
}
|
|
|
|
|
2024-04-15 14:22:21 +01:00
|
|
|
return ts.db.PutToken(ctx, dbt)
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveByCode deletes a token from the DB based on the Code field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) RemoveByCode(ctx context.Context, code string) error {
|
2024-04-15 14:22:21 +01:00
|
|
|
return ts.db.DeleteTokenByCode(ctx, code)
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveByAccess deletes a token from the DB based on the Access field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) RemoveByAccess(ctx context.Context, access string) error {
|
2024-04-15 14:22:21 +01:00
|
|
|
return ts.db.DeleteTokenByAccess(ctx, access)
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveByRefresh deletes a token from the DB based on the Refresh field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) RemoveByRefresh(ctx context.Context, refresh string) error {
|
2024-04-15 14:22:21 +01:00
|
|
|
return ts.db.DeleteTokenByRefresh(ctx, refresh)
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetByCode selects a token from the DB based on the Code field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) GetByCode(ctx context.Context, code string) (oauth2.TokenInfo, error) {
|
2024-04-15 14:22:21 +01:00
|
|
|
token, err := ts.db.GetTokenByCode(ctx, code)
|
|
|
|
if err != nil {
|
2021-03-22 21:26:54 +00:00
|
|
|
return nil, err
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
2024-04-15 14:22:21 +01:00
|
|
|
return DBTokenToToken(token), nil
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetByAccess selects a token from the DB based on the Access field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) GetByAccess(ctx context.Context, access string) (oauth2.TokenInfo, error) {
|
2024-04-15 14:22:21 +01:00
|
|
|
token, err := ts.db.GetTokenByAccess(ctx, access)
|
|
|
|
if err != nil {
|
2021-03-22 21:26:54 +00:00
|
|
|
return nil, err
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
2024-04-15 14:22:21 +01:00
|
|
|
return DBTokenToToken(token), nil
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetByRefresh selects a token from the DB based on the Refresh field
|
2021-08-25 14:34:33 +01:00
|
|
|
func (ts *tokenStore) GetByRefresh(ctx context.Context, refresh string) (oauth2.TokenInfo, error) {
|
2024-04-15 14:22:21 +01:00
|
|
|
token, err := ts.db.GetTokenByRefresh(ctx, refresh)
|
|
|
|
if err != nil {
|
2021-03-22 21:26:54 +00:00
|
|
|
return nil, err
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
2024-04-15 14:22:21 +01:00
|
|
|
return DBTokenToToken(token), nil
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2021-08-25 14:34:33 +01:00
|
|
|
The following models are basically helpers for the token store implementation, they should only be used internally.
|
2021-03-14 16:56:16 +00:00
|
|
|
*/
|
|
|
|
|
2021-08-25 14:34:33 +01:00
|
|
|
// TokenToDBToken is a lil util function that takes a gotosocial token and gives back a token for inserting into a database.
|
2021-09-01 10:45:01 +01:00
|
|
|
func TokenToDBToken(tkn *models.Token) *gtsmodel.Token {
|
2021-03-14 16:56:16 +00:00
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
// For the following, we want to make sure we're not adding a time.Now() to an *empty* ExpiresIn, otherwise that's
|
|
|
|
// going to cause all sorts of interesting problems. So check first to make sure that the ExpiresIn is not equal
|
|
|
|
// to the zero value of a time.Duration, which is 0s. If it *is* empty/nil, just leave the ExpiresAt at nil as well.
|
|
|
|
|
2021-05-10 15:29:05 +01:00
|
|
|
cea := time.Time{}
|
2021-03-14 16:56:16 +00:00
|
|
|
if tkn.CodeExpiresIn != 0*time.Second {
|
|
|
|
cea = now.Add(tkn.CodeExpiresIn)
|
|
|
|
}
|
|
|
|
|
2021-05-10 15:29:05 +01:00
|
|
|
aea := time.Time{}
|
2021-03-14 16:56:16 +00:00
|
|
|
if tkn.AccessExpiresIn != 0*time.Second {
|
|
|
|
aea = now.Add(tkn.AccessExpiresIn)
|
|
|
|
}
|
|
|
|
|
2021-05-10 15:29:05 +01:00
|
|
|
rea := time.Time{}
|
2021-03-14 16:56:16 +00:00
|
|
|
if tkn.RefreshExpiresIn != 0*time.Second {
|
|
|
|
rea = now.Add(tkn.RefreshExpiresIn)
|
|
|
|
}
|
|
|
|
|
2021-09-01 10:45:01 +01:00
|
|
|
return >smodel.Token{
|
2021-03-14 16:56:16 +00:00
|
|
|
ClientID: tkn.ClientID,
|
|
|
|
UserID: tkn.UserID,
|
|
|
|
RedirectURI: tkn.RedirectURI,
|
|
|
|
Scope: tkn.Scope,
|
|
|
|
Code: tkn.Code,
|
|
|
|
CodeChallenge: tkn.CodeChallenge,
|
|
|
|
CodeChallengeMethod: tkn.CodeChallengeMethod,
|
|
|
|
CodeCreateAt: tkn.CodeCreateAt,
|
|
|
|
CodeExpiresAt: cea,
|
|
|
|
Access: tkn.Access,
|
|
|
|
AccessCreateAt: tkn.AccessCreateAt,
|
|
|
|
AccessExpiresAt: aea,
|
|
|
|
Refresh: tkn.Refresh,
|
|
|
|
RefreshCreateAt: tkn.RefreshCreateAt,
|
|
|
|
RefreshExpiresAt: rea,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-25 14:34:33 +01:00
|
|
|
// DBTokenToToken is a lil util function that takes a database token and gives back a gotosocial token
|
2021-09-01 10:45:01 +01:00
|
|
|
func DBTokenToToken(dbt *gtsmodel.Token) *models.Token {
|
2021-03-14 16:56:16 +00:00
|
|
|
now := time.Now()
|
|
|
|
|
2021-05-10 15:29:05 +01:00
|
|
|
var codeExpiresIn time.Duration
|
2021-08-25 14:34:33 +01:00
|
|
|
if !dbt.CodeExpiresAt.IsZero() {
|
|
|
|
codeExpiresIn = dbt.CodeExpiresAt.Sub(now)
|
2021-05-10 15:29:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var accessExpiresIn time.Duration
|
2021-08-25 14:34:33 +01:00
|
|
|
if !dbt.AccessExpiresAt.IsZero() {
|
|
|
|
accessExpiresIn = dbt.AccessExpiresAt.Sub(now)
|
2021-05-10 15:29:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var refreshExpiresIn time.Duration
|
2021-08-25 14:34:33 +01:00
|
|
|
if !dbt.RefreshExpiresAt.IsZero() {
|
|
|
|
refreshExpiresIn = dbt.RefreshExpiresAt.Sub(now)
|
2021-05-10 15:29:05 +01:00
|
|
|
}
|
|
|
|
|
2021-03-14 16:56:16 +00:00
|
|
|
return &models.Token{
|
2021-08-25 14:34:33 +01:00
|
|
|
ClientID: dbt.ClientID,
|
|
|
|
UserID: dbt.UserID,
|
|
|
|
RedirectURI: dbt.RedirectURI,
|
|
|
|
Scope: dbt.Scope,
|
|
|
|
Code: dbt.Code,
|
|
|
|
CodeChallenge: dbt.CodeChallenge,
|
|
|
|
CodeChallengeMethod: dbt.CodeChallengeMethod,
|
|
|
|
CodeCreateAt: dbt.CodeCreateAt,
|
2021-05-10 15:29:05 +01:00
|
|
|
CodeExpiresIn: codeExpiresIn,
|
2021-08-25 14:34:33 +01:00
|
|
|
Access: dbt.Access,
|
|
|
|
AccessCreateAt: dbt.AccessCreateAt,
|
2021-05-10 15:29:05 +01:00
|
|
|
AccessExpiresIn: accessExpiresIn,
|
2021-08-25 14:34:33 +01:00
|
|
|
Refresh: dbt.Refresh,
|
|
|
|
RefreshCreateAt: dbt.RefreshCreateAt,
|
2021-05-10 15:29:05 +01:00
|
|
|
RefreshExpiresIn: refreshExpiresIn,
|
2021-03-14 16:56:16 +00:00
|
|
|
}
|
|
|
|
}
|