logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://hacktivis.me/git/pleroma.git

authorization.ex (2970B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.OAuth.Authorization do
  5. use Ecto.Schema
  6. alias Pleroma.Repo
  7. alias Pleroma.User
  8. alias Pleroma.Web.OAuth.App
  9. alias Pleroma.Web.OAuth.Authorization
  10. alias Pleroma.Web.OAuth.Token
  11. import Ecto.Changeset
  12. import Ecto.Query
  13. @type t :: %__MODULE__{}
  14. schema "oauth_authorizations" do
  15. field(:token, :string)
  16. field(:scopes, {:array, :string}, default: [])
  17. field(:valid_until, :naive_datetime_usec)
  18. field(:used, :boolean, default: false)
  19. belongs_to(:user, User, type: FlakeId.Ecto.CompatType)
  20. belongs_to(:app, App)
  21. timestamps()
  22. end
  23. @spec create_authorization(App.t(), User.t() | %{}, [String.t()] | nil) ::
  24. {:ok, Authorization.t()} | {:error, Ecto.Changeset.t()}
  25. def create_authorization(%App{} = app, %User{} = user, scopes \\ nil) do
  26. %{
  27. scopes: scopes || app.scopes,
  28. user_id: user.id,
  29. app_id: app.id
  30. }
  31. |> create_changeset()
  32. |> Repo.insert()
  33. end
  34. @spec create_changeset(map()) :: Ecto.Changeset.t()
  35. def create_changeset(attrs \\ %{}) do
  36. %Authorization{}
  37. |> cast(attrs, [:user_id, :app_id, :scopes, :valid_until])
  38. |> validate_required([:app_id, :scopes])
  39. |> add_token()
  40. |> add_lifetime()
  41. end
  42. defp add_token(changeset) do
  43. token = :crypto.strong_rand_bytes(32) |> Base.url_encode64(padding: false)
  44. put_change(changeset, :token, token)
  45. end
  46. defp add_lifetime(changeset) do
  47. lifespan = Token.lifespan()
  48. put_change(changeset, :valid_until, NaiveDateTime.add(NaiveDateTime.utc_now(), lifespan))
  49. end
  50. @spec use_changeset(Authorization.t(), map()) :: Ecto.Changeset.t()
  51. def use_changeset(%Authorization{} = auth, params) do
  52. auth
  53. |> cast(params, [:used])
  54. |> validate_required([:used])
  55. end
  56. @spec use_token(Authorization.t()) ::
  57. {:ok, Authorization.t()} | {:error, Ecto.Changeset.t()} | {:error, String.t()}
  58. def use_token(%Authorization{used: false, valid_until: valid_until} = auth) do
  59. if NaiveDateTime.diff(NaiveDateTime.utc_now(), valid_until) < 0 do
  60. Repo.update(use_changeset(auth, %{used: true}))
  61. else
  62. {:error, "token expired"}
  63. end
  64. end
  65. def use_token(%Authorization{used: true}), do: {:error, "already used"}
  66. @spec delete_user_authorizations(User.t()) :: {integer(), any()}
  67. def delete_user_authorizations(%User{} = user) do
  68. user
  69. |> delete_by_user_query
  70. |> Repo.delete_all()
  71. end
  72. def delete_by_user_query(%User{id: user_id}) do
  73. from(a in __MODULE__, where: a.user_id == ^user_id)
  74. end
  75. @doc "gets auth for app by token"
  76. @spec get_by_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
  77. def get_by_token(%App{id: app_id} = _app, token) do
  78. from(t in __MODULE__, where: t.app_id == ^app_id and t.token == ^token)
  79. |> Repo.find_resource()
  80. end
  81. end