logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma

authorization.ex (2887B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.OAuth.Authorization do
  5. use Ecto.Schema
  6. alias Pleroma.Repo
  7. alias Pleroma.User
  8. alias Pleroma.Web.OAuth.App
  9. alias Pleroma.Web.OAuth.Authorization
  10. import Ecto.Changeset
  11. import Ecto.Query
  12. @type t :: %__MODULE__{}
  13. schema "oauth_authorizations" do
  14. field(:token, :string)
  15. field(:scopes, {:array, :string}, default: [])
  16. field(:valid_until, :naive_datetime_usec)
  17. field(:used, :boolean, default: false)
  18. belongs_to(:user, User, type: FlakeId.Ecto.CompatType)
  19. belongs_to(:app, App)
  20. timestamps()
  21. end
  22. @spec create_authorization(App.t(), User.t() | %{}, [String.t()] | nil) ::
  23. {:ok, Authorization.t()} | {:error, Changeset.t()}
  24. def create_authorization(%App{} = app, %User{} = user, scopes \\ nil) do
  25. %{
  26. scopes: scopes || app.scopes,
  27. user_id: user.id,
  28. app_id: app.id
  29. }
  30. |> create_changeset()
  31. |> Repo.insert()
  32. end
  33. @spec create_changeset(map()) :: Changeset.t()
  34. def create_changeset(attrs \\ %{}) do
  35. %Authorization{}
  36. |> cast(attrs, [:user_id, :app_id, :scopes, :valid_until])
  37. |> validate_required([:app_id, :scopes])
  38. |> add_token()
  39. |> add_lifetime()
  40. end
  41. defp add_token(changeset) do
  42. token = :crypto.strong_rand_bytes(32) |> Base.url_encode64(padding: false)
  43. put_change(changeset, :token, token)
  44. end
  45. defp add_lifetime(changeset) do
  46. put_change(changeset, :valid_until, NaiveDateTime.add(NaiveDateTime.utc_now(), 60 * 10))
  47. end
  48. @spec use_changeset(Authtorizatiton.t(), map()) :: Changeset.t()
  49. def use_changeset(%Authorization{} = auth, params) do
  50. auth
  51. |> cast(params, [:used])
  52. |> validate_required([:used])
  53. end
  54. @spec use_token(Authorization.t()) ::
  55. {:ok, Authorization.t()} | {:error, Changeset.t()} | {:error, String.t()}
  56. def use_token(%Authorization{used: false, valid_until: valid_until} = auth) do
  57. if NaiveDateTime.diff(NaiveDateTime.utc_now(), valid_until) < 0 do
  58. Repo.update(use_changeset(auth, %{used: true}))
  59. else
  60. {:error, "token expired"}
  61. end
  62. end
  63. def use_token(%Authorization{used: true}), do: {:error, "already used"}
  64. @spec delete_user_authorizations(User.t()) :: {integer(), any()}
  65. def delete_user_authorizations(%User{} = user) do
  66. user
  67. |> delete_by_user_query
  68. |> Repo.delete_all()
  69. end
  70. def delete_by_user_query(%User{id: user_id}) do
  71. from(a in __MODULE__, where: a.user_id == ^user_id)
  72. end
  73. @doc "gets auth for app by token"
  74. @spec get_by_token(App.t(), String.t()) :: {:ok, t()} | {:error, :not_found}
  75. def get_by_token(%App{id: app_id} = _app, token) do
  76. from(t in __MODULE__, where: t.app_id == ^app_id and t.token == ^token)
  77. |> Repo.find_resource()
  78. end
  79. end