summaryrefslogtreecommitdiff
path: root/internal/api/client/auth/middleware.go
blob: 8313b7c28693f59fdcfea722abcb6bfc3109cdd8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
/*
   GoToSocial
   Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org

   This program is free software: you can redistribute it and/or modify
   it under the terms of the GNU Affero General Public License as published by
   the Free Software Foundation, either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU Affero General Public License for more details.

   You should have received a copy of the GNU Affero General Public License
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

package auth

import (
	"github.com/gin-gonic/gin"
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
	"github.com/superseriousbusiness/gotosocial/internal/oauth"
)

// OauthTokenMiddleware checks if the client has presented a valid oauth Bearer token.
// If so, it will check the User that the token belongs to, and set that in the context of
// the request. Then, it will look up the account for that user, and set that in the request too.
// If user or account can't be found, then the handler won't *fail*, in case the server wants to allow
// public requests that don't have a Bearer token set (eg., for public instance information and so on).
func (m *Module) OauthTokenMiddleware(c *gin.Context) {
	l := m.log.WithField("func", "OauthTokenMiddleware")
	l.Trace("entering OauthTokenMiddleware")

	ti, err := m.server.ValidationBearerToken(c.Request)
	if err != nil {
		l.Tracef("could not validate token: %s", err)
		return
	}
	l.Trace("continuing with unauthenticated request")
	c.Set(oauth.SessionAuthorizedToken, ti)
	l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedToken, ti)

	// check for user-level token
	if uid := ti.GetUserID(); uid != "" {
		l.Tracef("authenticated user %s with bearer token, scope is %s", uid, ti.GetScope())

		// fetch user's and account for this user id
		user := &gtsmodel.User{}
		if err := m.db.GetByID(uid, user); err != nil || user == nil {
			l.Warnf("no user found for validated uid %s", uid)
			return
		}
		c.Set(oauth.SessionAuthorizedUser, user)
		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedUser, user)

		acct := &gtsmodel.Account{}
		if err := m.db.GetByID(user.AccountID, acct); err != nil || acct == nil {
			l.Warnf("no account found for validated user %s", uid)
			return
		}
		c.Set(oauth.SessionAuthorizedAccount, acct)
		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedAccount, acct)
	}

	// check for application token
	if cid := ti.GetClientID(); cid != "" {
		l.Tracef("authenticated client %s with bearer token, scope is %s", cid, ti.GetScope())
		app := &gtsmodel.Application{}
		if err := m.db.GetWhere("client_id", cid, app); err != nil {
			l.Tracef("no app found for client %s", cid)
		}
		c.Set(oauth.SessionAuthorizedApplication, app)
		l.Tracef("set gin context %s to %+v", oauth.SessionAuthorizedApplication, app)
	}
}