| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							|  |  |  |    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package auth | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"github.com/gin-gonic/gin" | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/oauth" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // OauthTokenMiddleware checks if the client has presented a valid oauth Bearer token. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // If so, it will check the User that the token belongs to, and set that in the context of | 
					
						
							|  |  |  | // the request. Then, it will look up the account for that user, and set that in the request too. | 
					
						
							|  |  |  | // If user or account can't be found, then the handler won't *fail*, in case the server wants to allow | 
					
						
							|  |  |  | // public requests that don't have a Bearer token set (eg., for public instance information and so on). | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | func (m *Module) OauthTokenMiddleware(c *gin.Context) { | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	l := m.log.WithField("func", "OauthTokenMiddleware") | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	l.Trace("entering OauthTokenMiddleware") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	ti, err := m.server.ValidationBearerToken(c.Copy().Request) | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 		l.Tracef("could not validate token: %s", err) | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 	l.Trace("continuing with unauthenticated request") | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	c.Set(oauth.SessionAuthorizedToken, ti) | 
					
						
							|  |  |  | 	l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedToken, ti) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// check for user-level token | 
					
						
							|  |  |  | 	if uid := ti.GetUserID(); uid != "" { | 
					
						
							|  |  |  | 		l.Tracef("authenticated user %s with bearer token, scope is %s", uid, ti.GetScope()) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// fetch user's and account for this user id | 
					
						
							| 
									
										
										
										
											2021-04-19 19:42:19 +02:00
										 |  |  | 		user := >smodel.User{} | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 		if err := m.db.GetByID(uid, user); err != nil || user == nil { | 
					
						
							|  |  |  | 			l.Warnf("no user found for validated uid %s", uid) | 
					
						
							|  |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		c.Set(oauth.SessionAuthorizedUser, user) | 
					
						
							|  |  |  | 		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedUser, user) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-19 19:42:19 +02:00
										 |  |  | 		acct := >smodel.Account{} | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 		if err := m.db.GetByID(user.AccountID, acct); err != nil || acct == nil { | 
					
						
							|  |  |  | 			l.Warnf("no account found for validated user %s", uid) | 
					
						
							|  |  |  | 			return | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		c.Set(oauth.SessionAuthorizedAccount, acct) | 
					
						
							|  |  |  | 		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedAccount, acct) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// check for application token | 
					
						
							|  |  |  | 	if cid := ti.GetClientID(); cid != "" { | 
					
						
							|  |  |  | 		l.Tracef("authenticated client %s with bearer token, scope is %s", cid, ti.GetScope()) | 
					
						
							| 
									
										
										
										
											2021-04-19 19:42:19 +02:00
										 |  |  | 		app := >smodel.Application{} | 
					
						
							| 
									
										
										
										
											2021-05-21 23:04:59 +02:00
										 |  |  | 		if err := m.db.GetWhere([]db.Where{{Key: "client_id", Value: cid}}, app); err != nil { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 			l.Tracef("no app found for client %s", cid) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		c.Set(oauth.SessionAuthorizedApplication, app) | 
					
						
							|  |  |  | 		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedApplication, app) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	c.Next() | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | } |