mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 02:42:25 -05:00 
			
		
		
		
	* move token checker to security package * update tests with new security package * add oauth token checking to security package * check if user email confirmed when parsing token
		
			
				
	
	
		
			85 lines
		
	
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			85 lines
		
	
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    GoToSocial
 | |
|    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
 | |
| 
 | |
|    This program is free software: you can redistribute it and/or modify
 | |
|    it under the terms of the GNU Affero General Public License as published by
 | |
|    the Free Software Foundation, either version 3 of the License, or
 | |
|    (at your option) any later version.
 | |
| 
 | |
|    This program is distributed in the hope that it will be useful,
 | |
|    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|    GNU Affero General Public License for more details.
 | |
| 
 | |
|    You should have received a copy of the GNU Affero General Public License
 | |
|    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| */
 | |
| 
 | |
| package auth
 | |
| 
 | |
| import (
 | |
| 	"net/http"
 | |
| 
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/api"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/config"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/oauth"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/oidc"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/router"
 | |
| )
 | |
| 
 | |
| /* #nosec G101 */
 | |
| const (
 | |
| 	// AuthSignInPath is the API path for users to sign in through
 | |
| 	AuthSignInPath = "/auth/sign_in"
 | |
| 	// OauthTokenPath is the API path to use for granting token requests to users with valid credentials
 | |
| 	OauthTokenPath = "/oauth/token"
 | |
| 	// OauthAuthorizePath is the API path for authorization requests (eg., authorize this app to act on my behalf as a user)
 | |
| 	OauthAuthorizePath = "/oauth/authorize"
 | |
| 	// CallbackPath is the API path for receiving callback tokens from external OIDC providers
 | |
| 	CallbackPath = oidc.CallbackPath
 | |
| 
 | |
| 	callbackStateParam = "state"
 | |
| 	callbackCodeParam  = "code"
 | |
| 
 | |
| 	sessionUserID       = "userid"
 | |
| 	sessionClientID     = "client_id"
 | |
| 	sessionRedirectURI  = "redirect_uri"
 | |
| 	sessionForceLogin   = "force_login"
 | |
| 	sessionResponseType = "response_type"
 | |
| 	sessionScope        = "scope"
 | |
| 	sessionState        = "state"
 | |
| )
 | |
| 
 | |
| // Module implements the ClientAPIModule interface for
 | |
| type Module struct {
 | |
| 	config *config.Config
 | |
| 	db     db.DB
 | |
| 	server oauth.Server
 | |
| 	idp    oidc.IDP
 | |
| }
 | |
| 
 | |
| // New returns a new auth module
 | |
| func New(config *config.Config, db db.DB, server oauth.Server, idp oidc.IDP) api.ClientModule {
 | |
| 	return &Module{
 | |
| 		config: config,
 | |
| 		db:     db,
 | |
| 		server: server,
 | |
| 		idp:    idp,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Route satisfies the RESTAPIModule interface
 | |
| func (m *Module) Route(s router.Router) error {
 | |
| 	s.AttachHandler(http.MethodGet, AuthSignInPath, m.SignInGETHandler)
 | |
| 	s.AttachHandler(http.MethodPost, AuthSignInPath, m.SignInPOSTHandler)
 | |
| 
 | |
| 	s.AttachHandler(http.MethodPost, OauthTokenPath, m.TokenPOSTHandler)
 | |
| 
 | |
| 	s.AttachHandler(http.MethodGet, OauthAuthorizePath, m.AuthorizeGETHandler)
 | |
| 	s.AttachHandler(http.MethodPost, OauthAuthorizePath, m.AuthorizePOSTHandler)
 | |
| 
 | |
| 	s.AttachHandler(http.MethodGet, CallbackPath, m.CallbackGETHandler)
 | |
| 	return nil
 | |
| }
 |