diff options
| author | 2025-04-10 16:24:17 +0200 | |
|---|---|---|
| committer | 2025-04-10 16:24:17 +0200 | |
| commit | e032c959e13bc276d8517a51857e1c772c151f95 (patch) | |
| tree | 04b33f2202c56ff340246ebeb67d1550c821380e /internal/api/auth/revoke.go | |
| parent | [chore] add IPPrefixes type so we don't need separate rate limit parsed field... (diff) | |
| download | gotosocial-e032c959e13bc276d8517a51857e1c772c151f95.tar.xz | |
[feature] Implement /oauth/revoke for token revocation (#3983)
Diffstat (limited to 'internal/api/auth/revoke.go')
| -rw-r--r-- | internal/api/auth/revoke.go | 133 |
1 files changed, 133 insertions, 0 deletions
diff --git a/internal/api/auth/revoke.go b/internal/api/auth/revoke.go new file mode 100644 index 000000000..bb621e5e0 --- /dev/null +++ b/internal/api/auth/revoke.go @@ -0,0 +1,133 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see <http://www.gnu.org/licenses/>. + +package auth + +import ( + "net/http" + + oautherr "codeberg.org/superseriousbusiness/oauth2/v4/errors" + "github.com/gin-gonic/gin" + apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" + "github.com/superseriousbusiness/gotosocial/internal/gtserror" +) + +// TokenRevokePOSTHandler swagger:operation POST /oauth/revoke oauthTokenRevoke +// +// Revoke an access token to make it no longer valid for use. +// +// --- +// tags: +// - oauth +// +// consumes: +// - multipart/form-data +// +// produces: +// - application/json +// +// parameters: +// - +// name: client_id +// in: formData +// description: The client ID, obtained during app registration. +// type: string +// required: true +// - +// name: client_secret +// in: formData +// description: The client secret, obtained during app registration. +// type: string +// required: true +// - +// name: token +// in: formData +// description: The previously obtained token, to be invalidated. +// type: string +// required: true +// +// responses: +// '200': +// description: >- +// OK - If you own the provided token, the API call will provide OK and an empty response `{}`. +// This operation is idempotent, so calling this API multiple times will still return OK. +// '400': +// description: bad request +// '403': +// description: >- +// forbidden - If you provide a token you do not own, the API call will return a 403 error. +// '406': +// description: not acceptable +// '500': +// description: internal server error +func (m *Module) TokenRevokePOSTHandler(c *gin.Context) { + if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil { + apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1) + return + } + + form := &struct { + ClientID string `form:"client_id" validate:"required"` + ClientSecret string `form:"client_secret" validate:"required"` + Token string `form:"token" validate:"required"` + }{} + if err := c.ShouldBind(form); err != nil { + errWithCode := gtserror.NewErrorBadRequest(err, err.Error()) + apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) + return + } + + if form.Token == "" { + errWithCode := gtserror.NewErrorBadRequest( + oautherr.ErrInvalidRequest, + "token not set", + ) + apiutil.OAuthErrorHandler(c, errWithCode) + return + } + + if form.ClientID == "" { + errWithCode := gtserror.NewErrorBadRequest( + oautherr.ErrInvalidRequest, + "client_id not set", + ) + apiutil.OAuthErrorHandler(c, errWithCode) + return + } + + if form.ClientSecret == "" { + errWithCode := gtserror.NewErrorBadRequest( + oautherr.ErrInvalidRequest, + "client_secret not set", + ) + apiutil.OAuthErrorHandler(c, errWithCode) + return + } + + errWithCode := m.processor.OAuthRevokeAccessToken( + c.Request.Context(), + form.ClientID, + form.ClientSecret, + form.Token, + ) + if errWithCode != nil { + apiutil.OAuthErrorHandler(c, errWithCode) + return + } + + apiutil.JSON(c, http.StatusOK, struct{}{}) +} |
