2018-12-23 13:04:54 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-12 23:49:20 -07:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:04:54 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-09-06 11:06:25 -06:00
|
|
|
defmodule Pleroma.Web.OAuth.Token do
|
|
|
|
use Ecto.Schema
|
|
|
|
|
2019-05-06 11:51:03 -06:00
|
|
|
import Ecto.Changeset
|
2018-10-13 17:45:11 -06:00
|
|
|
|
2019-02-09 08:16:26 -07:00
|
|
|
alias Pleroma.Repo
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.User
|
2019-02-09 08:16:26 -07:00
|
|
|
alias Pleroma.Web.OAuth.App
|
|
|
|
alias Pleroma.Web.OAuth.Authorization
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Web.OAuth.Token
|
2019-05-22 09:44:50 -06:00
|
|
|
alias Pleroma.Web.OAuth.Token.Query
|
2017-09-06 11:06:25 -06:00
|
|
|
|
2019-05-06 11:51:03 -06:00
|
|
|
@type t :: %__MODULE__{}
|
|
|
|
|
2017-09-06 11:06:25 -06:00
|
|
|
schema "oauth_tokens" do
|
2018-03-30 07:01:53 -06:00
|
|
|
field(:token, :string)
|
|
|
|
field(:refresh_token, :string)
|
2019-02-13 14:29:29 -07:00
|
|
|
field(:scopes, {:array, :string}, default: [])
|
2019-03-20 06:59:27 -06:00
|
|
|
field(:valid_until, :naive_datetime_usec)
|
2019-09-18 08:54:31 -06:00
|
|
|
belongs_to(:user, User, type: FlakeId.Ecto.CompatType)
|
2018-05-07 10:11:37 -06:00
|
|
|
belongs_to(:app, App)
|
2017-09-06 11:06:25 -06:00
|
|
|
|
|
|
|
timestamps()
|
|
|
|
end
|
|
|
|
|
2020-12-09 11:14:39 -07:00
|
|
|
def lifespan do
|
|
|
|
Pleroma.Config.get!([:oauth2, :token_expires_in])
|
|
|
|
end
|
|
|
|
|
2020-11-21 09:47:25 -07:00
|
|
|
@doc "Gets token by unique access token"
|
|
|
|
@spec get_by_token(String.t()) :: {:ok, t()} | {:error, :not_found}
|
|
|
|
def get_by_token(token) do
|
|
|
|
token
|
|
|
|
|> Query.get_by_token()
|
|
|
|
|> Repo.find_resource()
|
|
|
|
end
|
|
|
|
|
2019-05-06 11:51:03 -06:00
|
|
|
@doc "Gets token for app by access token"
|
|
|
|
@spec get_by_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
|
|
|
|
def get_by_token(%App{id: app_id} = _app, token) do
|
2019-05-22 09:44:50 -06:00
|
|
|
Query.get_by_app(app_id)
|
|
|
|
|> Query.get_by_token(token)
|
2019-05-06 11:51:03 -06:00
|
|
|
|> Repo.find_resource()
|
|
|
|
end
|
|
|
|
|
|
|
|
@doc "Gets token for app by refresh token"
|
|
|
|
@spec get_by_refresh_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
|
|
|
|
def get_by_refresh_token(%App{id: app_id} = _app, token) do
|
2019-05-22 09:44:50 -06:00
|
|
|
Query.get_by_app(app_id)
|
|
|
|
|> Query.get_by_refresh_token(token)
|
|
|
|
|> Query.preload([:user])
|
2019-05-06 11:51:03 -06:00
|
|
|
|> Repo.find_resource()
|
|
|
|
end
|
|
|
|
|
2019-07-28 20:43:19 -06:00
|
|
|
@spec exchange_token(App.t(), Authorization.t()) :: {:ok, Token.t()} | {:error, Changeset.t()}
|
2017-09-09 04:02:59 -06:00
|
|
|
def exchange_token(app, auth) do
|
|
|
|
with {:ok, auth} <- Authorization.use_token(auth),
|
|
|
|
true <- auth.app_id == app.id do
|
2019-05-13 12:35:45 -06:00
|
|
|
user = if auth.user_id, do: User.get_cached_by_id(auth.user_id), else: %User{}
|
|
|
|
|
2020-08-25 10:17:51 -06:00
|
|
|
create(
|
2019-05-06 11:51:03 -06:00
|
|
|
app,
|
2019-05-13 12:35:45 -06:00
|
|
|
user,
|
2019-05-06 11:51:03 -06:00
|
|
|
%{scopes: auth.scopes}
|
|
|
|
)
|
2017-09-09 04:02:59 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-08-25 08:37:51 -06:00
|
|
|
def get_preeexisting_by_app_and_user(app, user) do
|
|
|
|
Query.get_by_app(app.id)
|
|
|
|
|> Query.get_by_user(user.id)
|
|
|
|
|> Query.get_unexpired()
|
|
|
|
|> Query.preload([:user])
|
|
|
|
|> Query.sort_by_inserted_at()
|
|
|
|
|> Query.limit(1)
|
|
|
|
|> Repo.find_resource()
|
|
|
|
end
|
|
|
|
|
2019-05-06 11:51:03 -06:00
|
|
|
defp put_token(changeset) do
|
|
|
|
changeset
|
|
|
|
|> change(%{token: Token.Utils.generate_token()})
|
|
|
|
|> validate_required([:token])
|
|
|
|
|> unique_constraint(:token)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp put_refresh_token(changeset, attrs) do
|
|
|
|
refresh_token = Map.get(attrs, :refresh_token, Token.Utils.generate_token())
|
|
|
|
|
|
|
|
changeset
|
|
|
|
|> change(%{refresh_token: refresh_token})
|
|
|
|
|> validate_required([:refresh_token])
|
|
|
|
|> unique_constraint(:refresh_token)
|
|
|
|
end
|
|
|
|
|
2022-08-25 08:37:51 -06:00
|
|
|
def get_or_exchange_token(%Authorization{} = auth, %App{} = app, %User{} = user) do
|
|
|
|
if auth.used do
|
|
|
|
get_preeexisting_by_app_and_user(app, user)
|
|
|
|
else
|
|
|
|
exchange_token(app, auth)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-06 11:51:03 -06:00
|
|
|
defp put_valid_until(changeset, attrs) do
|
2020-12-09 11:14:39 -07:00
|
|
|
valid_until =
|
|
|
|
Map.get(attrs, :valid_until, NaiveDateTime.add(NaiveDateTime.utc_now(), lifespan()))
|
2019-05-06 11:51:03 -06:00
|
|
|
|
|
|
|
changeset
|
2020-12-09 11:14:39 -07:00
|
|
|
|> change(%{valid_until: valid_until})
|
2019-05-06 11:51:03 -06:00
|
|
|
|> validate_required([:valid_until])
|
|
|
|
end
|
|
|
|
|
2020-08-25 10:17:51 -06:00
|
|
|
@spec create(App.t(), User.t(), map()) :: {:ok, Token} | {:error, Changeset.t()}
|
|
|
|
def create(%App{} = app, %User{} = user, attrs \\ %{}) do
|
|
|
|
with {:ok, token} <- do_create(app, user, attrs) do
|
|
|
|
if Pleroma.Config.get([:oauth2, :clean_expired_tokens]) do
|
2020-09-05 09:35:01 -06:00
|
|
|
Pleroma.Workers.PurgeExpiredToken.enqueue(%{
|
2020-08-25 10:17:51 -06:00
|
|
|
token_id: token.id,
|
2020-09-05 09:35:01 -06:00
|
|
|
valid_until: DateTime.from_naive!(token.valid_until, "Etc/UTC"),
|
|
|
|
mod: __MODULE__
|
2020-08-25 10:17:51 -06:00
|
|
|
})
|
|
|
|
end
|
|
|
|
|
|
|
|
{:ok, token}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp do_create(app, user, attrs) do
|
2019-05-06 11:51:03 -06:00
|
|
|
%__MODULE__{user_id: user.id, app_id: app.id}
|
|
|
|
|> cast(%{scopes: attrs[:scopes] || app.scopes}, [:scopes])
|
2019-05-13 12:35:45 -06:00
|
|
|
|> validate_required([:scopes, :app_id])
|
2019-05-06 11:51:03 -06:00
|
|
|
|> put_valid_until(attrs)
|
2019-05-13 12:35:45 -06:00
|
|
|
|> put_token()
|
2019-05-06 11:51:03 -06:00
|
|
|
|> put_refresh_token(attrs)
|
|
|
|
|> Repo.insert()
|
2017-09-06 11:06:25 -06:00
|
|
|
end
|
2018-10-13 17:45:11 -06:00
|
|
|
|
|
|
|
def delete_user_tokens(%User{id: user_id}) do
|
2019-05-22 09:44:50 -06:00
|
|
|
Query.get_by_user(user_id)
|
2018-10-13 17:45:11 -06:00
|
|
|
|> Repo.delete_all()
|
|
|
|
end
|
2019-02-10 12:41:06 -07:00
|
|
|
|
2019-02-10 14:49:56 -07:00
|
|
|
def delete_user_token(%User{id: user_id}, token_id) do
|
2019-05-22 09:44:50 -06:00
|
|
|
Query.get_by_user(user_id)
|
|
|
|
|> Query.get_by_id(token_id)
|
|
|
|
|> Repo.delete_all()
|
|
|
|
end
|
|
|
|
|
2019-02-10 14:49:56 -07:00
|
|
|
def get_user_tokens(%User{id: user_id}) do
|
2019-05-22 09:44:50 -06:00
|
|
|
Query.get_by_user(user_id)
|
|
|
|
|> Query.preload([:app])
|
2019-02-10 12:41:06 -07:00
|
|
|
|> Repo.all()
|
|
|
|
end
|
2019-05-06 11:51:03 -06:00
|
|
|
|
|
|
|
def is_expired?(%__MODULE__{valid_until: valid_until}) do
|
|
|
|
NaiveDateTime.diff(NaiveDateTime.utc_now(), valid_until) > 0
|
|
|
|
end
|
|
|
|
|
|
|
|
def is_expired?(_), do: false
|
2017-09-06 11:06:25 -06:00
|
|
|
end
|