forked from AkkomaGang/akkoma
Compare commits
1 commit
develop
...
oauth2-fix
Author | SHA1 | Date | |
---|---|---|---|
d5004b02b4 |
9 changed files with 56 additions and 58 deletions
|
@ -34,7 +34,6 @@ def login(conn, %{"code" => auth_token} = params) do
|
||||||
|> UriHelper.modify_uri_params(%{"access_token" => oauth_token.token})
|
|> UriHelper.modify_uri_params(%{"access_token" => oauth_token.token})
|
||||||
|
|
||||||
conn
|
conn
|
||||||
|> AuthHelper.put_session_token(oauth_token.token)
|
|
||||||
|> redirect(to: redirect_to)
|
|> redirect(to: redirect_to)
|
||||||
else
|
else
|
||||||
_ -> redirect_to_oauth_form(conn, params)
|
_ -> redirect_to_oauth_form(conn, params)
|
||||||
|
@ -42,9 +41,9 @@ def login(conn, %{"code" => auth_token} = params) do
|
||||||
end
|
end
|
||||||
|
|
||||||
def login(conn, params) do
|
def login(conn, params) do
|
||||||
with %{assigns: %{user: %User{}, token: %Token{app_id: app_id}}} <- conn,
|
with %{assigns: %{user: %User{}, token: %Token{app_id: app_id, token: token}}} <- conn,
|
||||||
{:ok, %{id: ^app_id}} <- local_mastofe_app() do
|
{:ok, %{id: ^app_id}} <- local_mastofe_app() do
|
||||||
redirect(conn, to: local_mastodon_post_login_path(conn))
|
redirect(conn, to: local_mastodon_post_login_path(conn) <> "?access_token=#{token}")
|
||||||
else
|
else
|
||||||
_ -> redirect_to_oauth_form(conn, params)
|
_ -> redirect_to_oauth_form(conn, params)
|
||||||
end
|
end
|
||||||
|
|
|
@ -77,6 +77,17 @@ defp do_authorize(%Plug.Conn{} = conn, params) do
|
||||||
available_scopes = (app && app.scopes) || []
|
available_scopes = (app && app.scopes) || []
|
||||||
scopes = Scopes.fetch_scopes(params, available_scopes)
|
scopes = Scopes.fetch_scopes(params, available_scopes)
|
||||||
|
|
||||||
|
# if we already have a token for this specific setup, we can use that
|
||||||
|
with %App{} <- app,
|
||||||
|
{:ok, _} <- Scopes.validate(scopes, app.scopes),
|
||||||
|
{:ok, %Token{} = token} <- Token.get_by_app(app) do
|
||||||
|
token = Repo.preload(token, :app)
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> assign(:token, token)
|
||||||
|
|> handle_existing_authorization(params)
|
||||||
|
else
|
||||||
|
_ ->
|
||||||
user =
|
user =
|
||||||
with %{assigns: %{user: %User{} = user}} <- conn do
|
with %{assigns: %{user: %User{} = user}} <- conn do
|
||||||
user
|
user
|
||||||
|
@ -105,6 +116,7 @@ defp do_authorize(%Plug.Conn{} = conn, params) do
|
||||||
view_module: OAuthView
|
view_module: OAuthView
|
||||||
})
|
})
|
||||||
end
|
end
|
||||||
|
end
|
||||||
|
|
||||||
defp handle_existing_authorization(
|
defp handle_existing_authorization(
|
||||||
%Plug.Conn{assigns: %{token: %Token{} = token}} = conn,
|
%Plug.Conn{assigns: %{token: %Token{} = token}} = conn,
|
||||||
|
|
|
@ -39,6 +39,12 @@ def get_by_token(token) do
|
||||||
|> Repo.find_resource()
|
|> Repo.find_resource()
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def get_by_app(%App{} = app) do
|
||||||
|
app.id
|
||||||
|
|> Query.get_by_app()
|
||||||
|
|> Repo.find_resource()
|
||||||
|
end
|
||||||
|
|
||||||
@doc "Gets token for app by access token"
|
@doc "Gets token for app by access token"
|
||||||
@spec get_by_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
|
@spec get_by_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
|
||||||
def get_by_token(%App{id: app_id} = _app, token) do
|
def get_by_token(%App{id: app_id} = _app, token) do
|
||||||
|
|
|
@ -25,7 +25,8 @@ def get_by_token(query \\ Token, token) do
|
||||||
|
|
||||||
@spec get_by_app(query, String.t()) :: query
|
@spec get_by_app(query, String.t()) :: query
|
||||||
def get_by_app(query \\ Token, app_id) do
|
def get_by_app(query \\ Token, app_id) do
|
||||||
from(q in query, where: q.app_id == ^app_id)
|
time = NaiveDateTime.utc_now()
|
||||||
|
from(q in query, where: q.app_id == ^app_id and q.valid_until > ^time, limit: 1)
|
||||||
end
|
end
|
||||||
|
|
||||||
@spec get_by_id(query, String.t()) :: query
|
@spec get_by_id(query, String.t()) :: query
|
||||||
|
|
|
@ -8,7 +8,6 @@ defmodule Pleroma.Web.Plugs.OAuthPlug do
|
||||||
import Plug.Conn
|
import Plug.Conn
|
||||||
import Ecto.Query
|
import Ecto.Query
|
||||||
|
|
||||||
alias Pleroma.Helpers.AuthHelper
|
|
||||||
alias Pleroma.Repo
|
alias Pleroma.Repo
|
||||||
alias Pleroma.User
|
alias Pleroma.User
|
||||||
alias Pleroma.Web.OAuth.App
|
alias Pleroma.Web.OAuth.App
|
||||||
|
@ -18,8 +17,6 @@ defmodule Pleroma.Web.Plugs.OAuthPlug do
|
||||||
|
|
||||||
def init(options), do: options
|
def init(options), do: options
|
||||||
|
|
||||||
def call(%{assigns: %{user: %User{}}} = conn, _), do: conn
|
|
||||||
|
|
||||||
def call(conn, _) do
|
def call(conn, _) do
|
||||||
with {:ok, token_str} <- fetch_token_str(conn) do
|
with {:ok, token_str} <- fetch_token_str(conn) do
|
||||||
with {:ok, user, user_token} <- fetch_user_and_token(token_str),
|
with {:ok, user, user_token} <- fetch_user_and_token(token_str),
|
||||||
|
@ -82,7 +79,7 @@ defp fetch_token_str(%Plug.Conn{} = conn) do
|
||||||
with {:ok, token} <- fetch_token_str(headers) do
|
with {:ok, token} <- fetch_token_str(headers) do
|
||||||
{:ok, token}
|
{:ok, token}
|
||||||
else
|
else
|
||||||
_ -> fetch_token_from_session(conn)
|
_ -> :no_token_found
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -96,12 +93,4 @@ defp fetch_token_str([token | tail]) do
|
||||||
end
|
end
|
||||||
|
|
||||||
defp fetch_token_str([]), do: :no_token_found
|
defp fetch_token_str([]), do: :no_token_found
|
||||||
|
|
||||||
@spec fetch_token_from_session(Plug.Conn.t()) :: :no_token_found | {:ok, String.t()}
|
|
||||||
defp fetch_token_from_session(conn) do
|
|
||||||
case AuthHelper.get_session_token(conn) do
|
|
||||||
nil -> :no_token_found
|
|
||||||
token -> {:ok, token}
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -793,10 +793,8 @@ defmodule Pleroma.Web.Router do
|
||||||
|
|
||||||
get("/web/login", MastodonAPI.AuthController, :login)
|
get("/web/login", MastodonAPI.AuthController, :login)
|
||||||
delete("/auth/sign_out", MastodonAPI.AuthController, :logout)
|
delete("/auth/sign_out", MastodonAPI.AuthController, :logout)
|
||||||
|
|
||||||
post("/auth/password", MastodonAPI.AuthController, :password_reset)
|
|
||||||
|
|
||||||
get("/web/*path", MastoFEController, :index)
|
get("/web/*path", MastoFEController, :index)
|
||||||
|
post("/auth/password", MastodonAPI.AuthController, :password_reset)
|
||||||
|
|
||||||
get("/embed/:id", EmbedController, :show)
|
get("/embed/:id", EmbedController, :show)
|
||||||
end
|
end
|
||||||
|
|
4
mix.exs
4
mix.exs
|
@ -131,7 +131,7 @@ defp deps do
|
||||||
{:trailing_format_plug, "~> 0.0.7"},
|
{:trailing_format_plug, "~> 0.0.7"},
|
||||||
{:fast_sanitize, "~> 0.2.3"},
|
{:fast_sanitize, "~> 0.2.3"},
|
||||||
{:html_entities, "~> 0.5", override: true},
|
{:html_entities, "~> 0.5", override: true},
|
||||||
{:phoenix_html, "~> 3.1", override: true},
|
{:phoenix_html, "~> 3.0", override: true},
|
||||||
{:calendar, "~> 1.0"},
|
{:calendar, "~> 1.0"},
|
||||||
{:cachex, "~> 3.4"},
|
{:cachex, "~> 3.4"},
|
||||||
{:poison, "~> 3.0", override: true},
|
{:poison, "~> 3.0", override: true},
|
||||||
|
@ -152,7 +152,7 @@ defp deps do
|
||||||
ref: "f75cd55325e33cbea198fb41fe41871392f8fb76"},
|
ref: "f75cd55325e33cbea198fb41fe41871392f8fb76"},
|
||||||
{:cors_plug, "~> 2.0"},
|
{:cors_plug, "~> 2.0"},
|
||||||
{:web_push_encryption, "~> 0.3.1"},
|
{:web_push_encryption, "~> 0.3.1"},
|
||||||
{:swoosh, "~> 1.0"},
|
{:swoosh, "~> 1.3"},
|
||||||
{:phoenix_swoosh, "~> 0.3"},
|
{:phoenix_swoosh, "~> 0.3"},
|
||||||
{:gen_smtp, "~> 0.13"},
|
{:gen_smtp, "~> 0.13"},
|
||||||
{:ex_syslogger, "~> 1.4"},
|
{:ex_syslogger, "~> 1.4"},
|
||||||
|
|
|
@ -611,7 +611,7 @@ test "redirects with oauth authorization, " <>
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
test "authorize from cookie" do
|
test "should not authorize from cookie" do
|
||||||
user = insert(:user)
|
user = insert(:user)
|
||||||
app = insert(:oauth_app)
|
app = insert(:oauth_app)
|
||||||
oauth_token = insert(:oauth_token, user: user, app: app)
|
oauth_token = insert(:oauth_token, user: user, app: app)
|
||||||
|
@ -636,14 +636,7 @@ test "authorize from cookie" do
|
||||||
)
|
)
|
||||||
|
|
||||||
target = redirected_to(conn)
|
target = redirected_to(conn)
|
||||||
assert target =~ redirect_uri
|
refute target =~ redirect_uri
|
||||||
|
|
||||||
query = URI.parse(target).query |> URI.query_decoder() |> Map.new()
|
|
||||||
|
|
||||||
assert %{"state" => "statepassed", "code" => code} = query
|
|
||||||
auth = Repo.get_by(Authorization, token: code)
|
|
||||||
assert auth
|
|
||||||
assert auth.scopes == app.scopes
|
|
||||||
end
|
end
|
||||||
|
|
||||||
test "redirect to on two-factor auth page" do
|
test "redirect to on two-factor auth page" do
|
||||||
|
|
|
@ -90,15 +90,15 @@ test "with invalid token, it does not assign the user", %{conn: conn} do
|
||||||
%{conn: conn}
|
%{conn: conn}
|
||||||
end
|
end
|
||||||
|
|
||||||
test "if session-stored token matches a valid OAuth token, assigns :user and :token", %{
|
test "if session-stored token matches a valid OAuth token, should not assign :user and :token", %{
|
||||||
conn: conn,
|
conn: conn,
|
||||||
user: user,
|
user: user,
|
||||||
token: oauth_token
|
token: oauth_token
|
||||||
} do
|
} do
|
||||||
conn = OAuthPlug.call(conn, %{})
|
conn = OAuthPlug.call(conn, %{})
|
||||||
|
|
||||||
assert conn.assigns.user && conn.assigns.user.id == user.id
|
refute conn.assigns[:user]
|
||||||
assert conn.assigns.token && conn.assigns.token.id == oauth_token.id
|
refute conn.assigns[:token]
|
||||||
end
|
end
|
||||||
|
|
||||||
test "if session-stored token matches an expired OAuth token, does nothing", %{
|
test "if session-stored token matches an expired OAuth token, does nothing", %{
|
||||||
|
|
Loading…
Reference in a new issue