mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-10-31 22:40:01 +00:00
[bugfix] improved authenticate post inbox error handling (#2803)
* improved PostInboxScheme() error handling / logging in case of failed auth * dumbass kim. returning err instead of errWithCode... * add checks for the slightly changed error handling in tests, add notes in codebase about the odd way of working
This commit is contained in:
parent
65b5366031
commit
15ede4c1ea
4 changed files with 31 additions and 8 deletions
|
@ -590,7 +590,7 @@ func (suite *InboxPostTestSuite) TestPostUnauthorized() {
|
||||||
requestingAccount,
|
requestingAccount,
|
||||||
targetAccount,
|
targetAccount,
|
||||||
http.StatusUnauthorized,
|
http.StatusUnauthorized,
|
||||||
`{"error":"Unauthorized: not authenticated"}`,
|
`{"error":"Unauthorized: http request wasn't signed or http signature was invalid: (verifier)"}`,
|
||||||
// Omit signature check middleware.
|
// Omit signature check middleware.
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
|
@ -80,8 +80,23 @@ func (f *federatingActor) PostInboxScheme(ctx context.Context, w http.ResponseWr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Authenticate request by checking http signature.
|
// Authenticate request by checking http signature.
|
||||||
|
//
|
||||||
|
// NOTE: the behaviour here is a little strange as we have
|
||||||
|
// the competing code styles of the go-fed interface expecting
|
||||||
|
// that any 'err' is fatal, but 'authenticated' bool is intended to
|
||||||
|
// be the main passer of whether failed auth occurred, but we in
|
||||||
|
// the gts codebase use errors to pass-back non-200 status codes,
|
||||||
|
// so we specifically have to check for already wrapped with code.
|
||||||
|
//
|
||||||
ctx, authenticated, err := f.sideEffectActor.AuthenticatePostInbox(ctx, w, r)
|
ctx, authenticated, err := f.sideEffectActor.AuthenticatePostInbox(ctx, w, r)
|
||||||
if err != nil {
|
if errors.As(err, new(gtserror.WithCode)) {
|
||||||
|
// If it was already wrapped with an
|
||||||
|
// HTTP code then don't bother rewrapping
|
||||||
|
// it, just return it as-is for caller to
|
||||||
|
// handle. AuthenticatePostInbox already
|
||||||
|
// calls WriteHeader() in some situations.
|
||||||
|
return false, err
|
||||||
|
} else if err != nil {
|
||||||
err := gtserror.Newf("error authenticating post inbox: %w", err)
|
err := gtserror.Newf("error authenticating post inbox: %w", err)
|
||||||
return false, gtserror.NewErrorInternalError(err)
|
return false, gtserror.NewErrorInternalError(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -216,7 +216,6 @@ func (f *Federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr
|
||||||
// If codes 400, 401, or 403, obey the go-fed
|
// If codes 400, 401, or 403, obey the go-fed
|
||||||
// interface by writing the header and bailing.
|
// interface by writing the header and bailing.
|
||||||
w.WriteHeader(errWithCode.Code())
|
w.WriteHeader(errWithCode.Code())
|
||||||
return ctx, false, nil
|
|
||||||
case http.StatusGone:
|
case http.StatusGone:
|
||||||
// If the requesting account's key has gone
|
// If the requesting account's key has gone
|
||||||
// (410) then likely inbox post was a delete.
|
// (410) then likely inbox post was a delete.
|
||||||
|
@ -225,11 +224,11 @@ func (f *Federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr
|
||||||
// know about the account anyway, so we can't
|
// know about the account anyway, so we can't
|
||||||
// do any further processing.
|
// do any further processing.
|
||||||
w.WriteHeader(http.StatusAccepted)
|
w.WriteHeader(http.StatusAccepted)
|
||||||
return ctx, false, nil
|
|
||||||
default:
|
|
||||||
// Proper error.
|
|
||||||
return ctx, false, err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// We still return the error
|
||||||
|
// for later request logging.
|
||||||
|
return ctx, false, errWithCode
|
||||||
}
|
}
|
||||||
|
|
||||||
if pubKeyAuth.Handshaking {
|
if pubKeyAuth.Handshaking {
|
||||||
|
|
|
@ -21,6 +21,7 @@
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
|
@ -30,6 +31,7 @@
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
"github.com/superseriousbusiness/gotosocial/testrig"
|
"github.com/superseriousbusiness/gotosocial/testrig"
|
||||||
"github.com/superseriousbusiness/httpsig"
|
"github.com/superseriousbusiness/httpsig"
|
||||||
|
@ -99,7 +101,14 @@ func (suite *FederatingProtocolTestSuite) authenticatePostInbox(
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
recorder := httptest.NewRecorder()
|
||||||
newContext, authed, err := suite.federator.AuthenticatePostInbox(ctx, recorder, request)
|
newContext, authed, err := suite.federator.AuthenticatePostInbox(ctx, recorder, request)
|
||||||
if err != nil {
|
if withCode := new(gtserror.WithCode); (errors.As(err, withCode) &&
|
||||||
|
(*withCode).Code() >= 500) || (err != nil && (*withCode) == nil) {
|
||||||
|
// NOTE: the behaviour here is a little strange as we have
|
||||||
|
// the competing code styles of the go-fed interface expecting
|
||||||
|
// that any err is a no-go, but authed bool is intended to be
|
||||||
|
// the main passer of whether failed auth occurred, but we in
|
||||||
|
// the gts codebase use errors to pass-back non-200 status codes,
|
||||||
|
// so we specifically have to check for an internal error code.
|
||||||
suite.FailNow(err.Error())
|
suite.FailNow(err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue