summaryrefslogtreecommitdiff
path: root/internal/processing/fedi/common.go
diff options
context:
space:
mode:
authorLibravatar kim <89579420+NyaaaWhatsUpDoc@users.noreply.github.com>2023-11-21 10:35:30 +0000
committerLibravatar GitHub <noreply@github.com>2023-11-21 11:35:30 +0100
commit42d8011ff4f10664a853c483685db8e97b7a3118 (patch)
treec0ea4d930add2363312766da7da35c4e846aa3e6 /internal/processing/fedi/common.go
parent[feature] Initial Prometheus metrics implementation (#2334) (diff)
downloadgotosocial-42d8011ff4f10664a853c483685db8e97b7a3118.tar.xz
[chore/security] refactor AuthenticateFederatedRequest() to handle account deref + suspension checks (#2371)
* refactor AuthenticateFederatedRequest() to handle account suspension + fetching of owner * small fixups * small changes * revert to 'IsEitherBlocked' instead of just 'IsBlocked" :grimace: * update code comment to indicate that AuthenticateFederatedRequest() will handle account + instance dereferencing
Diffstat (limited to 'internal/processing/fedi/common.go')
-rw-r--r--internal/processing/fedi/common.go33
1 files changed, 10 insertions, 23 deletions
diff --git a/internal/processing/fedi/common.go b/internal/processing/fedi/common.go
index f395ec3cf..a02779e73 100644
--- a/internal/processing/fedi/common.go
+++ b/internal/processing/fedi/common.go
@@ -22,7 +22,6 @@ import (
"errors"
"github.com/superseriousbusiness/gotosocial/internal/db"
- "github.com/superseriousbusiness/gotosocial/internal/gtscontext"
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
)
@@ -45,8 +44,6 @@ func (p *Processor) authenticate(ctx context.Context, requestedUser string) (
return nil, nil, gtserror.NewErrorNotFound(err)
}
- var requester *gtsmodel.Account
-
// Ensure request signed, and use signature URI to
// get requesting account, dereferencing if necessary.
pubKeyAuth, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUser)
@@ -54,33 +51,23 @@ func (p *Processor) authenticate(ctx context.Context, requestedUser string) (
return nil, nil, errWithCode
}
- if requester = pubKeyAuth.Owner; requester == nil {
- requester, _, err = p.federator.GetAccountByURI(
- gtscontext.SetFastFail(ctx),
- requestedUser,
- pubKeyAuth.OwnerURI,
- )
- if err != nil {
- err = gtserror.Newf("error getting account %s: %w", pubKeyAuth.OwnerURI, err)
- return nil, nil, gtserror.NewErrorUnauthorized(err)
- }
+ if pubKeyAuth.Handshaking {
+ // This should happen very rarely, we are in the middle of handshaking.
+ err := gtserror.Newf("network race handshaking %s", pubKeyAuth.OwnerURI)
+ return nil, nil, gtserror.NewErrorInternalError(err)
}
- if !requester.SuspendedAt.IsZero() {
- // Account was marked as suspended by a
- // local admin action. Stop request early.
- const text = "requesting account is suspended"
- return nil, nil, gtserror.NewErrorForbidden(errors.New(text))
- }
+ // Get requester from auth.
+ requester := pubKeyAuth.Owner
- // Ensure no block exists between requester + requested.
+ // Check that block does not exist between receiver and requester.
blocked, err := p.state.DB.IsEitherBlocked(ctx, receiver.ID, requester.ID)
if err != nil {
- err = gtserror.Newf("db error getting checking block: %w", err)
+ err := gtserror.Newf("error checking block: %w", err)
return nil, nil, gtserror.NewErrorInternalError(err)
} else if blocked {
- err = gtserror.Newf("block exists between accounts %s and %s", requester.ID, receiver.ID)
- return nil, nil, gtserror.NewErrorForbidden(err)
+ const text = "block exists between accounts"
+ return nil, nil, gtserror.NewErrorForbidden(errors.New(text))
}
return requester, receiver, nil