mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2025-03-04 12:49:00 +01:00
206 lines
6.2 KiB
Go
206 lines
6.2 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package util
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"slices"
|
|
"strings"
|
|
|
|
"codeberg.org/superseriousbusiness/oauth2/v4"
|
|
"codeberg.org/superseriousbusiness/oauth2/v4/server"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
|
"github.com/superseriousbusiness/gotosocial/internal/state"
|
|
)
|
|
|
|
// Auth wraps an authorized token, application, user, and account.
|
|
// It is used in the functions GetAuthed and MustAuth.
|
|
// Because the user might *not* be authed, any of the fields in this struct
|
|
// might be nil, so make sure to check that when you're using this struct anywhere.
|
|
type Auth struct {
|
|
Token oauth2.TokenInfo
|
|
Application *gtsmodel.Application
|
|
User *gtsmodel.User
|
|
Account *gtsmodel.Account
|
|
}
|
|
|
|
// TokenAuth is a convenience function for returning an TokenAuth struct from a gin context.
|
|
// In essence, it tries to extract a token, application, user, and account from the context,
|
|
// and then sets them on a struct for convenience.
|
|
//
|
|
// If any are not present in the context, they will be set to nil on the returned TokenAuth struct.
|
|
//
|
|
// If *ALL* are not present, then nil and an error will be returned.
|
|
//
|
|
// If something goes wrong during parsing, then nil and an error will be returned (consider this not authed).
|
|
// TokenAuth is like GetAuthed, but will fail if one of the requirements is not met.
|
|
func TokenAuth(
|
|
c *gin.Context,
|
|
requireToken bool,
|
|
requireApp bool,
|
|
requireUser bool,
|
|
requireAccount bool,
|
|
requireScope ...Scope,
|
|
) (*Auth, gtserror.WithCode) {
|
|
var (
|
|
ctx = c.Copy()
|
|
a = &Auth{}
|
|
i interface{}
|
|
ok bool
|
|
)
|
|
|
|
i, ok = ctx.Get(oauth.SessionAuthorizedToken)
|
|
if ok {
|
|
parsed, ok := i.(oauth2.TokenInfo)
|
|
if !ok {
|
|
const errText = "could not parse token from session context"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
a.Token = parsed
|
|
}
|
|
|
|
i, ok = ctx.Get(oauth.SessionAuthorizedApplication)
|
|
if ok {
|
|
parsed, ok := i.(*gtsmodel.Application)
|
|
if !ok {
|
|
const errText = "could not parse application from session context"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
a.Application = parsed
|
|
}
|
|
|
|
i, ok = ctx.Get(oauth.SessionAuthorizedUser)
|
|
if ok {
|
|
parsed, ok := i.(*gtsmodel.User)
|
|
if !ok {
|
|
const errText = "could not parse user from session context"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
a.User = parsed
|
|
}
|
|
|
|
i, ok = ctx.Get(oauth.SessionAuthorizedAccount)
|
|
if ok {
|
|
parsed, ok := i.(*gtsmodel.Account)
|
|
if !ok {
|
|
const errText = "could not parse account from session context"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
a.Account = parsed
|
|
}
|
|
|
|
if requireToken && a.Token == nil {
|
|
const errText = "token not supplied"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
|
|
if requireApp && a.Application == nil {
|
|
const errText = "application not supplied"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
|
|
if requireUser && a.User == nil {
|
|
const errText = "user not supplied or not authorized"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
|
|
if requireAccount && a.Account == nil {
|
|
const errText = "account not supplied or not authorized"
|
|
return nil, gtserror.NewErrorUnauthorized(errors.New(errText), errText)
|
|
}
|
|
|
|
if len(requireScope) != 0 {
|
|
// We need to match one of the
|
|
// required scopes, check if we can.
|
|
hasScopes := strings.Split(a.Token.GetScope(), " ")
|
|
scopeOK := slices.ContainsFunc(
|
|
hasScopes,
|
|
func(hasScope string) bool {
|
|
for _, requiredScope := range requireScope {
|
|
if Scope(hasScope).Permits(requiredScope) {
|
|
// Got it.
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
},
|
|
)
|
|
|
|
if !scopeOK {
|
|
const errText = "token has insufficient scope permission"
|
|
return nil, gtserror.NewErrorForbidden(errors.New(errText), errText)
|
|
}
|
|
}
|
|
|
|
return a, nil
|
|
}
|
|
|
|
// GetClientScopeHandler returns a handler for testing scope on a TokenGenerateRequest.
|
|
func GetClientScopeHandler(ctx context.Context, state *state.State) server.ClientScopeHandler {
|
|
return func(tgr *oauth2.TokenGenerateRequest) (allowed bool, err error) {
|
|
application, err := state.DB.GetApplicationByClientID(
|
|
gtscontext.SetBarebones(ctx),
|
|
tgr.ClientID,
|
|
)
|
|
if err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
log.Errorf(ctx, "database error getting application: %v", err)
|
|
return false, err
|
|
}
|
|
|
|
if application == nil {
|
|
err := gtserror.Newf("no application found with client id %s", tgr.ClientID)
|
|
return false, err
|
|
}
|
|
|
|
// Normalize scope.
|
|
if strings.TrimSpace(tgr.Scope) == "" {
|
|
tgr.Scope = "read"
|
|
}
|
|
|
|
// Make sure requested scopes are all
|
|
// within scopes permitted by application.
|
|
hasScopes := strings.Split(application.Scopes, " ")
|
|
wantsScopes := strings.Split(tgr.Scope, " ")
|
|
for _, wantsScope := range wantsScopes {
|
|
thisOK := slices.ContainsFunc(
|
|
hasScopes,
|
|
func(hasScope string) bool {
|
|
has := Scope(hasScope)
|
|
wants := Scope(wantsScope)
|
|
return has.Permits(wants)
|
|
},
|
|
)
|
|
|
|
if !thisOK {
|
|
// Requested unpermitted
|
|
// scope for this app.
|
|
return false, nil
|
|
}
|
|
}
|
|
|
|
// All OK.
|
|
return true, nil
|
|
}
|
|
}
|