mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-04 01:02:25 -06:00 
			
		
		
		
	* start messing about with timeline manager * i have no idea what i'm doing * i continue to not know what i'm doing * it's coming along * bit more progress * update timeline with new posts as they come in * lint and fmt * Select accounts where empty string * restructure a bunch, get unfaves working * moving stuff around * federate status deletes properly * mention regex better but not 100% there * fix regex * some more hacking away at the timeline code phew * fix up some little things * i can't even * more timeline stuff * move to ulid * fiddley * some lil fixes for kibou compatibility * timelines working pretty alright! * tidy + lint
		
			
				
	
	
		
			286 lines
		
	
	
	
		
			9.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			286 lines
		
	
	
	
		
			9.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   GoToSocial
 | 
						|
   Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
 | 
						|
 | 
						|
   This program is free software: you can redistribute it and/or modify
 | 
						|
   it under the terms of the GNU Affero General Public License as published by
 | 
						|
   the Free Software Foundation, either version 3 of the License, or
 | 
						|
   (at your option) any later version.
 | 
						|
 | 
						|
   This program is distributed in the hope that it will be useful,
 | 
						|
   but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
   GNU Affero General Public License for more details.
 | 
						|
 | 
						|
   You should have received a copy of the GNU Affero General Public License
 | 
						|
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
*/
 | 
						|
 | 
						|
package oauth
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/sirupsen/logrus"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/id"
 | 
						|
	"github.com/superseriousbusiness/oauth2/v4"
 | 
						|
	"github.com/superseriousbusiness/oauth2/v4/models"
 | 
						|
)
 | 
						|
 | 
						|
// tokenStore is an implementation of oauth2.TokenStore, which uses our db interface as a storage backend.
 | 
						|
type tokenStore struct {
 | 
						|
	oauth2.TokenStore
 | 
						|
	db  db.DB
 | 
						|
	log *logrus.Logger
 | 
						|
}
 | 
						|
 | 
						|
// newTokenStore returns a token store that satisfies the oauth2.TokenStore interface.
 | 
						|
//
 | 
						|
// In order to allow tokens to 'expire', it will also set off a goroutine that iterates through
 | 
						|
// the tokens in the DB once per minute and deletes any that have expired.
 | 
						|
func newTokenStore(ctx context.Context, db db.DB, log *logrus.Logger) oauth2.TokenStore {
 | 
						|
	pts := &tokenStore{
 | 
						|
		db:  db,
 | 
						|
		log: log,
 | 
						|
	}
 | 
						|
 | 
						|
	// set the token store to clean out expired tokens once per minute, or return if we're done
 | 
						|
	go func(ctx context.Context, pts *tokenStore, log *logrus.Logger) {
 | 
						|
	cleanloop:
 | 
						|
		for {
 | 
						|
			select {
 | 
						|
			case <-ctx.Done():
 | 
						|
				log.Info("breaking cleanloop")
 | 
						|
				break cleanloop
 | 
						|
			case <-time.After(1 * time.Minute):
 | 
						|
				log.Trace("sweeping out old oauth entries broom broom")
 | 
						|
				if err := pts.sweep(); err != nil {
 | 
						|
					log.Errorf("error while sweeping oauth entries: %s", err)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}(ctx, pts, log)
 | 
						|
	return pts
 | 
						|
}
 | 
						|
 | 
						|
// sweep clears out old tokens that have expired; it should be run on a loop about once per minute or so.
 | 
						|
func (pts *tokenStore) sweep() error {
 | 
						|
	// select *all* tokens from the db
 | 
						|
	// todo: if this becomes expensive (ie., there are fucking LOADS of tokens) then figure out a better way.
 | 
						|
	tokens := new([]*Token)
 | 
						|
	if err := pts.db.GetAll(tokens); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	// iterate through and remove expired tokens
 | 
						|
	now := time.Now()
 | 
						|
	for _, pgt := range *tokens {
 | 
						|
		// The zero value of a time.Time is 00:00 january 1 1970, which will always be before now. So:
 | 
						|
		// we only want to check if a token expired before now if the expiry time is *not zero*;
 | 
						|
		// ie., if it's been explicity set.
 | 
						|
		if !pgt.CodeExpiresAt.IsZero() && pgt.CodeExpiresAt.Before(now) || !pgt.RefreshExpiresAt.IsZero() && pgt.RefreshExpiresAt.Before(now) || !pgt.AccessExpiresAt.IsZero() && pgt.AccessExpiresAt.Before(now) {
 | 
						|
			if err := pts.db.DeleteByID(pgt.ID, pgt); err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Create creates and store the new token information.
 | 
						|
// For the original implementation, see https://github.com/superseriousbusiness/oauth2/blob/master/store/token.go#L34
 | 
						|
func (pts *tokenStore) Create(ctx context.Context, info oauth2.TokenInfo) error {
 | 
						|
	t, ok := info.(*models.Token)
 | 
						|
	if !ok {
 | 
						|
		return errors.New("info param was not a models.Token")
 | 
						|
	}
 | 
						|
 | 
						|
	pgt := TokenToPGToken(t)
 | 
						|
	if pgt.ID == "" {
 | 
						|
		pgtID, err := id.NewRandomULID()
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		pgt.ID = pgtID
 | 
						|
	}
 | 
						|
 | 
						|
	if err := pts.db.Put(pgt); err != nil {
 | 
						|
		return fmt.Errorf("error in tokenstore create: %s", err)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// RemoveByCode deletes a token from the DB based on the Code field
 | 
						|
func (pts *tokenStore) RemoveByCode(ctx context.Context, code string) error {
 | 
						|
	return pts.db.DeleteWhere([]db.Where{{Key: "code", Value: code}}, &Token{})
 | 
						|
}
 | 
						|
 | 
						|
// RemoveByAccess deletes a token from the DB based on the Access field
 | 
						|
func (pts *tokenStore) RemoveByAccess(ctx context.Context, access string) error {
 | 
						|
	return pts.db.DeleteWhere([]db.Where{{Key: "access", Value: access}}, &Token{})
 | 
						|
}
 | 
						|
 | 
						|
// RemoveByRefresh deletes a token from the DB based on the Refresh field
 | 
						|
func (pts *tokenStore) RemoveByRefresh(ctx context.Context, refresh string) error {
 | 
						|
	return pts.db.DeleteWhere([]db.Where{{Key: "refresh", Value: refresh}}, &Token{})
 | 
						|
}
 | 
						|
 | 
						|
// GetByCode selects a token from the DB based on the Code field
 | 
						|
func (pts *tokenStore) GetByCode(ctx context.Context, code string) (oauth2.TokenInfo, error) {
 | 
						|
	if code == "" {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
	pgt := &Token{
 | 
						|
		Code: code,
 | 
						|
	}
 | 
						|
	if err := pts.db.GetWhere([]db.Where{{Key: "code", Value: code}}, pgt); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return TokenToOauthToken(pgt), nil
 | 
						|
}
 | 
						|
 | 
						|
// GetByAccess selects a token from the DB based on the Access field
 | 
						|
func (pts *tokenStore) GetByAccess(ctx context.Context, access string) (oauth2.TokenInfo, error) {
 | 
						|
	if access == "" {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
	pgt := &Token{
 | 
						|
		Access: access,
 | 
						|
	}
 | 
						|
	if err := pts.db.GetWhere([]db.Where{{Key: "access", Value: access}}, pgt); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return TokenToOauthToken(pgt), nil
 | 
						|
}
 | 
						|
 | 
						|
// GetByRefresh selects a token from the DB based on the Refresh field
 | 
						|
func (pts *tokenStore) GetByRefresh(ctx context.Context, refresh string) (oauth2.TokenInfo, error) {
 | 
						|
	if refresh == "" {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
	pgt := &Token{
 | 
						|
		Refresh: refresh,
 | 
						|
	}
 | 
						|
	if err := pts.db.GetWhere([]db.Where{{Key: "refresh", Value: refresh}}, pgt); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return TokenToOauthToken(pgt), nil
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
	The following models are basically helpers for the postgres token store implementation, they should only be used internally.
 | 
						|
*/
 | 
						|
 | 
						|
// Token is a translation of the gotosocial token with the ExpiresIn fields replaced with ExpiresAt.
 | 
						|
//
 | 
						|
// Explanation for this: gotosocial assumes an in-memory or file database of some kind, where a time-to-live parameter (TTL) can be defined,
 | 
						|
// and tokens with expired TTLs are automatically removed. Since Postgres doesn't have that feature, it's easier to set an expiry time and
 | 
						|
// then periodically sweep out tokens when that time has passed.
 | 
						|
//
 | 
						|
// Note that this struct does *not* satisfy the token interface shown here: https://github.com/superseriousbusiness/oauth2/blob/master/model.go#L22
 | 
						|
// and implemented here: https://github.com/superseriousbusiness/oauth2/blob/master/models/token.go.
 | 
						|
// As such, manual translation is always required between Token and the gotosocial *model.Token. The helper functions oauthTokenToPGToken
 | 
						|
// and pgTokenToOauthToken can be used for that.
 | 
						|
type Token struct {
 | 
						|
	ID                  string `pg:"type:CHAR(26),pk,notnull"`
 | 
						|
	ClientID            string
 | 
						|
	UserID              string
 | 
						|
	RedirectURI         string
 | 
						|
	Scope               string
 | 
						|
	Code                string `pg:"default:'',pk"`
 | 
						|
	CodeChallenge       string
 | 
						|
	CodeChallengeMethod string
 | 
						|
	CodeCreateAt        time.Time `pg:"type:timestamp"`
 | 
						|
	CodeExpiresAt       time.Time `pg:"type:timestamp"`
 | 
						|
	Access              string    `pg:"default:'',pk"`
 | 
						|
	AccessCreateAt      time.Time `pg:"type:timestamp"`
 | 
						|
	AccessExpiresAt     time.Time `pg:"type:timestamp"`
 | 
						|
	Refresh             string    `pg:"default:'',pk"`
 | 
						|
	RefreshCreateAt     time.Time `pg:"type:timestamp"`
 | 
						|
	RefreshExpiresAt    time.Time `pg:"type:timestamp"`
 | 
						|
}
 | 
						|
 | 
						|
// TokenToPGToken is a lil util function that takes a gotosocial token and gives back a token for inserting into postgres
 | 
						|
func TokenToPGToken(tkn *models.Token) *Token {
 | 
						|
	now := time.Now()
 | 
						|
 | 
						|
	// For the following, we want to make sure we're not adding a time.Now() to an *empty* ExpiresIn, otherwise that's
 | 
						|
	// going to cause all sorts of interesting problems. So check first to make sure that the ExpiresIn is not equal
 | 
						|
	// to the zero value of a time.Duration, which is 0s. If it *is* empty/nil, just leave the ExpiresAt at nil as well.
 | 
						|
 | 
						|
	cea := time.Time{}
 | 
						|
	if tkn.CodeExpiresIn != 0*time.Second {
 | 
						|
		cea = now.Add(tkn.CodeExpiresIn)
 | 
						|
	}
 | 
						|
 | 
						|
	aea := time.Time{}
 | 
						|
	if tkn.AccessExpiresIn != 0*time.Second {
 | 
						|
		aea = now.Add(tkn.AccessExpiresIn)
 | 
						|
	}
 | 
						|
 | 
						|
	rea := time.Time{}
 | 
						|
	if tkn.RefreshExpiresIn != 0*time.Second {
 | 
						|
		rea = now.Add(tkn.RefreshExpiresIn)
 | 
						|
	}
 | 
						|
 | 
						|
	return &Token{
 | 
						|
		ClientID:            tkn.ClientID,
 | 
						|
		UserID:              tkn.UserID,
 | 
						|
		RedirectURI:         tkn.RedirectURI,
 | 
						|
		Scope:               tkn.Scope,
 | 
						|
		Code:                tkn.Code,
 | 
						|
		CodeChallenge:       tkn.CodeChallenge,
 | 
						|
		CodeChallengeMethod: tkn.CodeChallengeMethod,
 | 
						|
		CodeCreateAt:        tkn.CodeCreateAt,
 | 
						|
		CodeExpiresAt:       cea,
 | 
						|
		Access:              tkn.Access,
 | 
						|
		AccessCreateAt:      tkn.AccessCreateAt,
 | 
						|
		AccessExpiresAt:     aea,
 | 
						|
		Refresh:             tkn.Refresh,
 | 
						|
		RefreshCreateAt:     tkn.RefreshCreateAt,
 | 
						|
		RefreshExpiresAt:    rea,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TokenToOauthToken is a lil util function that takes a postgres token and gives back a gotosocial token
 | 
						|
func TokenToOauthToken(pgt *Token) *models.Token {
 | 
						|
	now := time.Now()
 | 
						|
 | 
						|
	var codeExpiresIn time.Duration
 | 
						|
	if !pgt.CodeExpiresAt.IsZero() {
 | 
						|
		codeExpiresIn = pgt.CodeExpiresAt.Sub(now)
 | 
						|
	}
 | 
						|
 | 
						|
	var accessExpiresIn time.Duration
 | 
						|
	if !pgt.AccessExpiresAt.IsZero() {
 | 
						|
		accessExpiresIn = pgt.AccessExpiresAt.Sub(now)
 | 
						|
	}
 | 
						|
 | 
						|
	var refreshExpiresIn time.Duration
 | 
						|
	if !pgt.RefreshExpiresAt.IsZero() {
 | 
						|
		refreshExpiresIn = pgt.RefreshExpiresAt.Sub(now)
 | 
						|
	}
 | 
						|
 | 
						|
	return &models.Token{
 | 
						|
		ClientID:            pgt.ClientID,
 | 
						|
		UserID:              pgt.UserID,
 | 
						|
		RedirectURI:         pgt.RedirectURI,
 | 
						|
		Scope:               pgt.Scope,
 | 
						|
		Code:                pgt.Code,
 | 
						|
		CodeChallenge:       pgt.CodeChallenge,
 | 
						|
		CodeChallengeMethod: pgt.CodeChallengeMethod,
 | 
						|
		CodeCreateAt:        pgt.CodeCreateAt,
 | 
						|
		CodeExpiresIn:       codeExpiresIn,
 | 
						|
		Access:              pgt.Access,
 | 
						|
		AccessCreateAt:      pgt.AccessCreateAt,
 | 
						|
		AccessExpiresIn:     accessExpiresIn,
 | 
						|
		Refresh:             pgt.Refresh,
 | 
						|
		RefreshCreateAt:     pgt.RefreshCreateAt,
 | 
						|
		RefreshExpiresIn:    refreshExpiresIn,
 | 
						|
	}
 | 
						|
}
 |