| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							|  |  |  |    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package auth | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"errors" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/gin-contrib/sessions" | 
					
						
							|  |  |  | 	"github.com/gin-gonic/gin" | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"golang.org/x/crypto/bcrypt" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // login just wraps a form-submitted username (we want an email) and password | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | type login struct { | 
					
						
							|  |  |  | 	Email    string `form:"username"` | 
					
						
							|  |  |  | 	Password string `form:"password"` | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // SignInGETHandler should be served at https://example.org/auth/sign_in. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // The idea is to present a sign in page to the user, where they can enter their username and password. | 
					
						
							|  |  |  | // The form will then POST to the sign in page, which will be handled by SignInPOSTHandler | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | func (m *Module) SignInGETHandler(c *gin.Context) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	m.log.WithField("func", "SignInGETHandler").Trace("serving sign in html") | 
					
						
							|  |  |  | 	c.HTML(http.StatusOK, "sign-in.tmpl", gin.H{}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // SignInPOSTHandler should be served at https://example.org/auth/sign_in. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // The idea is to present a sign in page to the user, where they can enter their username and password. | 
					
						
							|  |  |  | // The handler will then redirect to the auth handler served at /auth | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | func (m *Module) SignInPOSTHandler(c *gin.Context) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	l := m.log.WithField("func", "SignInPOSTHandler") | 
					
						
							|  |  |  | 	s := sessions.Default(c) | 
					
						
							|  |  |  | 	form := &login{} | 
					
						
							|  |  |  | 	if err := c.ShouldBind(form); err != nil { | 
					
						
							|  |  |  | 		c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	l.Tracef("parsed form: %+v", form) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	userid, err := m.ValidatePassword(form.Email, form.Password) | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		c.String(http.StatusForbidden, err.Error()) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	s.Set("userid", userid) | 
					
						
							|  |  |  | 	if err := s.Save(); err != nil { | 
					
						
							|  |  |  | 		c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	l.Trace("redirecting to auth page") | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	c.Redirect(http.StatusFound, OauthAuthorizePath) | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // ValidatePassword takes an email address and a password. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // The goal is to authenticate the password against the one for that email | 
					
						
							|  |  |  | // address stored in the database. If OK, we return the userid (a uuid) for that user, | 
					
						
							|  |  |  | // so that it can be used in further Oauth flows to generate a token/retreieve an oauth client from the db. | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | func (m *Module) ValidatePassword(email string, password string) (userid string, err error) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	l := m.log.WithField("func", "ValidatePassword") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// make sure an email/password was provided and bail if not | 
					
						
							|  |  |  | 	if email == "" || password == "" { | 
					
						
							|  |  |  | 		l.Debug("email or password was not provided") | 
					
						
							|  |  |  | 		return incorrectPassword() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// first we select the user from the database based on email address, bail if no user found for that email | 
					
						
							| 
									
										
										
										
											2021-04-19 19:42:19 +02:00
										 |  |  | 	gtsUser := >smodel.User{} | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	if err := m.db.GetWhere([]db.Where{{Key: "email", Value: email}}, gtsUser); err != nil { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 		l.Debugf("user %s was not retrievable from db during oauth authorization attempt: %s", email, err) | 
					
						
							|  |  |  | 		return incorrectPassword() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// make sure a password is actually set and bail if not | 
					
						
							|  |  |  | 	if gtsUser.EncryptedPassword == "" { | 
					
						
							|  |  |  | 		l.Warnf("encrypted password for user %s was empty for some reason", gtsUser.Email) | 
					
						
							|  |  |  | 		return incorrectPassword() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// compare the provided password with the encrypted one from the db, bail if they don't match | 
					
						
							|  |  |  | 	if err := bcrypt.CompareHashAndPassword([]byte(gtsUser.EncryptedPassword), []byte(password)); err != nil { | 
					
						
							|  |  |  | 		l.Debugf("password hash didn't match for user %s during login attempt: %s", gtsUser.Email, err) | 
					
						
							|  |  |  | 		return incorrectPassword() | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// If we've made it this far the email/password is correct, so we can just return the id of the user. | 
					
						
							|  |  |  | 	userid = gtsUser.ID | 
					
						
							|  |  |  | 	l.Tracef("returning (%s, %s)", userid, err) | 
					
						
							|  |  |  | 	return | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // incorrectPassword is just a little helper function to use in the ValidatePassword function | 
					
						
							|  |  |  | func incorrectPassword() (string, error) { | 
					
						
							|  |  |  | 	return "", errors.New("password/email combination was incorrect") | 
					
						
							|  |  |  | } |