gotosocial/internal/module/account/account.go

183 lines
6.3 KiB
Go
Raw Normal View History

2021-03-01 15:41:43 +01:00
/*
GoToSocial
Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package account
import (
2021-03-26 19:02:20 +01:00
"fmt"
"net"
2021-03-23 13:17:54 +01:00
"net/http"
"github.com/gin-gonic/gin"
2021-03-27 13:00:22 +01:00
"github.com/superseriousbusiness/gotosocial/internal/config"
"github.com/superseriousbusiness/gotosocial/internal/db"
"github.com/superseriousbusiness/gotosocial/internal/db/model"
"github.com/superseriousbusiness/gotosocial/internal/module"
"github.com/superseriousbusiness/gotosocial/internal/oauth"
"github.com/superseriousbusiness/gotosocial/internal/router"
"github.com/superseriousbusiness/gotosocial/pkg/mastotypes"
"github.com/superseriousbusiness/oauth2/v4"
2021-03-24 17:34:41 +01:00
"github.com/sirupsen/logrus"
)
2021-03-23 13:17:54 +01:00
const (
basePath = "/api/v1/accounts"
basePathWithID = basePath + "/:id"
verifyPath = basePath + "/verify_credentials"
)
type accountModule struct {
2021-03-26 19:02:20 +01:00
config *config.Config
db db.DB
oauthServer oauth.Server
log *logrus.Logger
}
// New returns a new account module
2021-03-24 17:34:41 +01:00
func New(config *config.Config, db db.DB, log *logrus.Logger) module.ClientAPIModule {
2021-03-23 13:17:54 +01:00
return &accountModule{
config: config,
db: db,
2021-03-25 20:10:10 +01:00
log: log,
2021-03-23 13:17:54 +01:00
}
}
// Route attaches all routes from this module to the given router
func (m *accountModule) Route(r router.Router) error {
2021-03-25 20:10:10 +01:00
r.AttachHandler(http.MethodPost, basePath, m.accountCreatePOSTHandler)
r.AttachHandler(http.MethodGet, verifyPath, m.accountVerifyGETHandler)
return nil
}
2021-03-23 13:17:54 +01:00
2021-03-26 19:02:20 +01:00
// accountCreatePOSTHandler handles create account requests, validates them,
// and puts them in the database if they're valid.
// It should be served as a POST at /api/v1/accounts
2021-03-25 20:10:10 +01:00
func (m *accountModule) accountCreatePOSTHandler(c *gin.Context) {
2021-03-26 19:02:20 +01:00
l := m.log.WithField("func", "accountCreatePOSTHandler")
2021-03-26 23:48:21 +01:00
authed, err := oauth.MustAuthed(c, true, true, false, false)
2021-03-26 19:02:20 +01:00
if err != nil {
l.Debugf("couldn't auth: %s", err)
c.JSON(http.StatusForbidden, gin.H{"error": err.Error()})
2021-03-25 20:10:10 +01:00
return
}
l.Trace("parsing request form")
form := &mastotypes.AccountCreateRequest{}
if err := c.ShouldBind(form); err != nil {
l.Debugf("could not parse form from request: %s", err)
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
l.Tracef("validating form %+v", form)
2021-03-26 19:02:20 +01:00
if err := validateCreateAccount(form, m.config.AccountsConfig, m.db); err != nil {
2021-03-25 20:10:10 +01:00
l.Debugf("error validating form: %s", err)
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
2021-03-24 17:34:41 +01:00
}
2021-03-26 19:02:20 +01:00
clientIP := c.ClientIP()
l.Tracef("attempting to parse client ip address %s", clientIP)
signUpIP := net.ParseIP(clientIP)
if signUpIP == nil {
l.Debugf("error validating sign up ip address %s", clientIP)
c.JSON(http.StatusBadRequest, gin.H{"error": "ip address could not be parsed from request"})
return
}
ti, err := m.accountCreate(form, signUpIP, authed.Token, authed.Application)
if err != nil {
l.Errorf("internal server error while creating new account: %s", err)
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
return
}
c.JSON(http.StatusOK, ti)
2021-03-24 17:34:41 +01:00
}
2021-03-25 20:10:10 +01:00
// accountVerifyGETHandler serves a user's account details to them IF they reached this
2021-03-23 22:13:01 +01:00
// handler while in possession of a valid token, according to the oauth middleware.
2021-03-26 19:02:20 +01:00
// It should be served as a GET at /api/v1/accounts/verify_credentials
2021-03-25 20:10:10 +01:00
func (m *accountModule) accountVerifyGETHandler(c *gin.Context) {
2021-03-24 17:34:41 +01:00
l := m.log.WithField("func", "AccountVerifyGETHandler")
2021-03-25 20:10:10 +01:00
2021-03-24 17:34:41 +01:00
l.Trace("getting account details from session")
i, ok := c.Get(oauth.SessionAuthorizedAccount)
2021-03-23 22:13:01 +01:00
if !ok {
2021-03-24 17:34:41 +01:00
l.Trace("no account in session, returning error to client")
2021-03-23 22:13:01 +01:00
c.JSON(http.StatusUnauthorized, gin.H{"error": "The access token is invalid"})
return
}
2021-03-24 17:34:41 +01:00
l.Trace("attempting to convert account interface into account struct...")
acct, ok := i.(*model.Account)
if !ok {
l.Tracef("could not convert %+v into account struct, returning error to client", i)
2021-03-23 13:17:54 +01:00
c.JSON(http.StatusUnauthorized, gin.H{"error": "The access token is invalid"})
return
}
2021-03-24 17:34:41 +01:00
l.Tracef("retrieved account %+v, converting to mastosensitive...", acct)
2021-03-23 22:13:01 +01:00
acctSensitive, err := m.db.AccountToMastoSensitive(acct)
if err != nil {
2021-03-24 17:34:41 +01:00
l.Tracef("could not convert account into mastosensitive account: %s", err)
2021-03-23 22:13:01 +01:00
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
return
2021-03-23 13:17:54 +01:00
}
2021-03-24 17:34:41 +01:00
l.Tracef("conversion successful, returning OK and mastosensitive account %+v", acctSensitive)
2021-03-23 22:13:01 +01:00
c.JSON(http.StatusOK, acctSensitive)
2021-03-23 13:17:54 +01:00
}
2021-03-26 19:02:20 +01:00
/*
HELPER FUNCTIONS
*/
// accountCreate does the dirty work of making an account and user in the database.
// It then returns a token to the caller, for use with the new account, as per the
// spec here: https://docs.joinmastodon.org/methods/accounts/
func (m *accountModule) accountCreate(form *mastotypes.AccountCreateRequest, signUpIP net.IP, token oauth2.TokenInfo, app *model.Application) (*mastotypes.Token, error) {
l := m.log.WithField("func", "accountCreate")
// don't store a reason if we don't require one
reason := form.Reason
if !m.config.AccountsConfig.ReasonRequired {
reason = ""
}
l.Trace("creating new username and account")
user, err := m.db.NewSignup(form.Username, reason, m.config.AccountsConfig.RequireApproval, form.Email, form.Password, signUpIP, form.Locale)
if err != nil {
return nil, fmt.Errorf("error creating new signup in the database: %s", err)
}
l.Tracef("generating a token for user %s with account %s and application %s", user.ID, user.AccountID, app.ID)
2021-03-26 23:48:21 +01:00
fmt.Printf("ACCOUNT CREATE\n\n%+v\n\n%+v\n\n%+v\n", token, app, user)
2021-03-26 19:02:20 +01:00
ti, err := m.oauthServer.GenerateUserAccessToken(token, app.ClientSecret, user.ID)
if err != nil {
return nil, fmt.Errorf("error creating new access token for user %s: %s", user.ID, err)
}
return &mastotypes.Token{
AccessToken: ti.GetCode(),
TokenType: "Bearer",
Scope: ti.GetScope(),
CreatedAt: ti.GetCodeCreateAt().Unix(),
}, nil
}