mirror of
https://github.com/owncast/owncast.git
synced 2024-12-21 16:54:46 +03:00
106 lines
3.6 KiB
Go
106 lines
3.6 KiB
Go
package fediverse
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/owncast/owncast/activitypub"
|
|
"github.com/owncast/owncast/auth"
|
|
fediverseauth "github.com/owncast/owncast/auth/fediverse"
|
|
"github.com/owncast/owncast/controllers"
|
|
"github.com/owncast/owncast/core/chat"
|
|
"github.com/owncast/owncast/core/data"
|
|
"github.com/owncast/owncast/core/user"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// RegisterFediverseOTPRequest registers a new OTP request for the given access token.
|
|
func RegisterFediverseOTPRequest(u user.User, w http.ResponseWriter, r *http.Request) {
|
|
type request struct {
|
|
FediverseAccount string `json:"account"`
|
|
}
|
|
var req request
|
|
decoder := json.NewDecoder(r.Body)
|
|
if err := decoder.Decode(&req); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "Could not decode request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
accessToken := r.URL.Query().Get("accessToken")
|
|
reg, success, err := fediverseauth.RegisterFediverseOTP(accessToken, u.ID, u.DisplayName, req.FediverseAccount)
|
|
if err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "Could not register auth request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "Could not register auth request. One may already be pending. Try again later.")
|
|
return
|
|
}
|
|
|
|
msg := fmt.Sprintf("<p>This is an automated message from %s. If you did not request this message please ignore or block. Your requested one-time code is:</p><p>%s</p>", data.GetServerName(), reg.Code)
|
|
if err := activitypub.SendDirectFederatedMessage(msg, reg.Account); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "Could not send code to fediverse: "+err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "")
|
|
}
|
|
|
|
// VerifyFediverseOTPRequest verifies the given OTP code for the given access token.
|
|
func VerifyFediverseOTPRequest(w http.ResponseWriter, r *http.Request) {
|
|
type request struct {
|
|
Code string `json:"code"`
|
|
}
|
|
|
|
var req request
|
|
decoder := json.NewDecoder(r.Body)
|
|
if err := decoder.Decode(&req); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "Could not decode request: "+err.Error())
|
|
return
|
|
}
|
|
accessToken := r.URL.Query().Get("accessToken")
|
|
valid, authRegistration := fediverseauth.ValidateFediverseOTP(accessToken, req.Code)
|
|
if !valid {
|
|
w.WriteHeader(http.StatusForbidden)
|
|
return
|
|
}
|
|
|
|
// Check if a user with this auth already exists, if so, log them in.
|
|
if u := auth.GetUserByAuth(authRegistration.Account, auth.Fediverse); u != nil {
|
|
// Handle existing auth.
|
|
log.Debugln("user with provided fedvierse identity already exists, logging them in")
|
|
|
|
// Update the current user's access token to point to the existing user id.
|
|
userID := u.ID
|
|
if err := user.SetAccessTokenToOwner(accessToken, userID); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
loginMessage := fmt.Sprintf("**%s** is now authenticated as **%s**", authRegistration.UserDisplayName, u.DisplayName)
|
|
if err := chat.SendSystemAction(loginMessage, true); err != nil {
|
|
log.Errorln(err)
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "")
|
|
|
|
return
|
|
}
|
|
|
|
// Otherwise, save this as new auth.
|
|
log.Debug("fediverse account does not already exist, saving it as a new one for the current user")
|
|
if err := auth.AddAuth(authRegistration.UserID, authRegistration.Account, auth.Fediverse); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update the current user's authenticated flag so we can show it in
|
|
// the chat UI.
|
|
if err := user.SetUserAsAuthenticated(authRegistration.UserID); err != nil {
|
|
log.Errorln(err)
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "")
|
|
}
|