diff options
author | 2022-04-26 18:10:11 +0200 | |
---|---|---|
committer | 2022-04-26 18:10:11 +0200 | |
commit | 9cf66bf29871dad6523f421ae72125d584ac4c9a (patch) | |
tree | 328b62cb9fb8374dee576a3bb0f2ec213c0e93a0 /internal/processing/federation/getuser.go | |
parent | [bugfix] Trim log entries to 1700 chars before they enter syslog (#493) (diff) | |
download | gotosocial-9cf66bf29871dad6523f421ae72125d584ac4c9a.tar.xz |
[chore] Return more useful errors from auth failure (#494)v0.3.1
* try rsa_sha256 sig algo first
* return more informative errors from auth
* adapt to reworked auth function
Diffstat (limited to 'internal/processing/federation/getuser.go')
-rw-r--r-- | internal/processing/federation/getuser.go | 11 |
1 files changed, 3 insertions, 8 deletions
diff --git a/internal/processing/federation/getuser.go b/internal/processing/federation/getuser.go index b201bea4b..f870baa12 100644 --- a/internal/processing/federation/getuser.go +++ b/internal/processing/federation/getuser.go @@ -20,7 +20,6 @@ package federation import ( "context" - "errors" "fmt" "net/url" @@ -46,13 +45,9 @@ func (p *processor) GetUser(ctx context.Context, requestedUsername string, reque } } else { // if it's any other path, we want to fully authenticate the request before we serve any data, and then we can serve a more complete profile - requestingAccountURI, authenticated, err := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername) - if err != nil { - return nil, gtserror.NewErrorNotAuthorized(err, "not authorized") - } - - if !authenticated { - return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized") + requestingAccountURI, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername) + if errWithCode != nil { + return nil, errWithCode } // if we're not already handshaking/dereferencing a remote account, dereference it now |