| 
									
										
										
										
											2025-03-03 16:03:36 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package handlers | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"errors" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"net/url" | 
					
						
							|  |  |  | 	"slices" | 
					
						
							|  |  |  | 	"strings" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-26 15:34:10 +02:00
										 |  |  | 	apiutil "code.superseriousbusiness.org/gotosocial/internal/api/util" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/db" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/gtscontext" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/gtserror" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/log" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/gotosocial/internal/state" | 
					
						
							| 
									
										
										
										
											2025-04-25 15:15:36 +02:00
										 |  |  | 	"code.superseriousbusiness.org/oauth2/v4" | 
					
						
							|  |  |  | 	oautherr "code.superseriousbusiness.org/oauth2/v4/errors" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/oauth2/v4/manage" | 
					
						
							|  |  |  | 	"code.superseriousbusiness.org/oauth2/v4/server" | 
					
						
							| 
									
										
										
										
											2025-03-03 16:03:36 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // GetClientScopeHandler returns a handler for testing scope on a TokenGenerateRequest. | 
					
						
							|  |  |  | func GetClientScopeHandler(ctx context.Context, state *state.State) server.ClientScopeHandler { | 
					
						
							|  |  |  | 	return func(tgr *oauth2.TokenGenerateRequest) (allowed bool, err error) { | 
					
						
							|  |  |  | 		application, err := state.DB.GetApplicationByClientID( | 
					
						
							|  |  |  | 			gtscontext.SetBarebones(ctx), | 
					
						
							|  |  |  | 			tgr.ClientID, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 		if err != nil && !errors.Is(err, db.ErrNoEntries) { | 
					
						
							|  |  |  | 			log.Errorf(ctx, "database error getting application: %v", err) | 
					
						
							|  |  |  | 			return false, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		if application == nil { | 
					
						
							|  |  |  | 			err := gtserror.Newf("no application found with client id %s", tgr.ClientID) | 
					
						
							|  |  |  | 			return false, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Normalize scope. | 
					
						
							|  |  |  | 		if strings.TrimSpace(tgr.Scope) == "" { | 
					
						
							|  |  |  | 			tgr.Scope = "read" | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Make sure requested scopes are all | 
					
						
							|  |  |  | 		// within scopes permitted by application. | 
					
						
							|  |  |  | 		hasScopes := strings.Split(application.Scopes, " ") | 
					
						
							|  |  |  | 		wantsScopes := strings.Split(tgr.Scope, " ") | 
					
						
							|  |  |  | 		for _, wantsScope := range wantsScopes { | 
					
						
							|  |  |  | 			thisOK := slices.ContainsFunc( | 
					
						
							|  |  |  | 				hasScopes, | 
					
						
							|  |  |  | 				func(hasScope string) bool { | 
					
						
							|  |  |  | 					has := apiutil.Scope(hasScope) | 
					
						
							|  |  |  | 					wants := apiutil.Scope(wantsScope) | 
					
						
							|  |  |  | 					return has.Permits(wants) | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			if !thisOK { | 
					
						
							|  |  |  | 				// Requested unpermitted | 
					
						
							|  |  |  | 				// scope for this app. | 
					
						
							|  |  |  | 				return false, nil | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// All OK. | 
					
						
							|  |  |  | 		return true, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func GetValidateURIHandler(ctx context.Context) manage.ValidateURIHandler { | 
					
						
							|  |  |  | 	return func(hasRedirects string, wantsRedirect string) error { | 
					
						
							|  |  |  | 		// Normalize the wantsRedirect URI | 
					
						
							|  |  |  | 		// string by parsing + reserializing. | 
					
						
							|  |  |  | 		wantsRedirectURI, err := url.Parse(wantsRedirect) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		wantsRedirect = wantsRedirectURI.String() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Redirect URIs are given to us as | 
					
						
							|  |  |  | 		// a list of URIs, newline-separated. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// They're already normalized on input so | 
					
						
							|  |  |  | 		// we don't need to parse + reserialize them. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// Ensure that one of them matches. | 
					
						
							|  |  |  | 		if slices.ContainsFunc( | 
					
						
							|  |  |  | 			strings.Split(hasRedirects, "\n"), | 
					
						
							|  |  |  | 			func(hasRedirect string) bool { | 
					
						
							|  |  |  | 				// Want an exact match. | 
					
						
							|  |  |  | 				// See: https://www.oauth.com/oauth2-servers/redirect-uris/redirect-uri-validation/ | 
					
						
							|  |  |  | 				return wantsRedirect == hasRedirect | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		) { | 
					
						
							|  |  |  | 			return nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		return oautherr.ErrInvalidRedirectURI | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func GetAuthorizeScopeHandler() server.AuthorizeScopeHandler { | 
					
						
							|  |  |  | 	return func(_ http.ResponseWriter, r *http.Request) (string, error) { | 
					
						
							|  |  |  | 		// Use provided scope or | 
					
						
							|  |  |  | 		// fall back to default "read". | 
					
						
							|  |  |  | 		scope := r.FormValue("scope") | 
					
						
							|  |  |  | 		if strings.TrimSpace(scope) == "" { | 
					
						
							|  |  |  | 			scope = "read" | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return scope, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func GetInternalErrorHandler(ctx context.Context) server.InternalErrorHandler { | 
					
						
							|  |  |  | 	return func(err error) *oautherr.Response { | 
					
						
							|  |  |  | 		log.Errorf(ctx, "internal oauth error: %v", err) | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func GetResponseErrorHandler(ctx context.Context) server.ResponseErrorHandler { | 
					
						
							|  |  |  | 	return func(re *oautherr.Response) { | 
					
						
							|  |  |  | 		log.Errorf(ctx, "internal response error: %v", re.Error) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func GetUserAuthorizationHandler() server.UserAuthorizationHandler { | 
					
						
							|  |  |  | 	return func(w http.ResponseWriter, r *http.Request) (string, error) { | 
					
						
							|  |  |  | 		userID := r.FormValue("userid") | 
					
						
							|  |  |  | 		if userID == "" { | 
					
						
							|  |  |  | 			return "", errors.New("userid was empty") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return userID, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } |