// Copyright (C) 2023-present sam/u1f320 (vulpine.solutions) // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published // by the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . using System.Net; using EntityFramework.Exceptions.Common; using Foxnouns.Backend.Database; using Foxnouns.Backend.Database.Models; using Foxnouns.Backend.Dto; using Foxnouns.Backend.Extensions; using Foxnouns.Backend.Middleware; using Foxnouns.Backend.Services; using Foxnouns.Backend.Services.Auth; using Foxnouns.Backend.Utils; using JetBrains.Annotations; using Microsoft.AspNetCore.Mvc; using Microsoft.EntityFrameworkCore; using NodaTime; namespace Foxnouns.Backend.Controllers.Authentication; [Route("/api/internal/auth/email")] [ApiExplorerSettings(IgnoreApi = true)] public class EmailAuthController( [UsedImplicitly] Config config, DatabaseContext db, AuthService authService, MailService mailService, EmailRateLimiter rateLimiter, KeyCacheService keyCacheService, UserRendererService userRenderer, IClock clock, ILogger logger ) : ApiControllerBase { private readonly ILogger _logger = logger.ForContext(); [HttpPost("register/init")] public async Task RegisterInitAsync( [FromBody] EmailRegisterRequest req, CancellationToken ct = default ) { CheckRequirements(); if (!req.Email.Contains('@')) throw new ApiError.BadRequest("Email is invalid", "email", req.Email); string state = await keyCacheService.GenerateRegisterEmailStateAsync(req.Email, null, ct); // If there's already a user with that email address, pretend we sent an email but actually ignore it if ( await db.AuthMethods.AnyAsync( a => a.AuthType == AuthType.Email && a.RemoteId == req.Email, ct ) ) { return NoContent(); } if (IsRateLimited()) return NoContent(); mailService.QueueAccountCreationEmail(req.Email, state); return NoContent(); } [HttpPost("callback")] public async Task CallbackAsync([FromBody] EmailCallbackRequest req) { CheckRequirements(); RegisterEmailState? state = await keyCacheService.GetRegisterEmailStateAsync(req.State); if (state is not { ExistingUserId: null }) throw new ApiError.BadRequest("Invalid state", "state", req.State); string ticket = AuthUtils.RandomToken(); await keyCacheService.SetKeyAsync($"email:{ticket}", state.Email, Duration.FromMinutes(20)); return Ok(new CallbackResponse(false, ticket, state.Email, null, null, null)); } [HttpPost("register")] public async Task CompleteRegistrationAsync( [FromBody] EmailCompleteRegistrationRequest req ) { CheckRequirements(); string? email = await keyCacheService.GetKeyAsync($"email:{req.Ticket}"); if (email == null) throw new ApiError.BadRequest("Unknown ticket", "ticket", req.Ticket); User user = await authService.CreateUserWithPasswordAsync( req.Username, email, req.Password ); Application frontendApp = await db.GetFrontendApplicationAsync(); (string? tokenStr, Token? token) = authService.GenerateToken( user, frontendApp, ["*"], clock.GetCurrentInstant() + Duration.FromDays(365) ); db.Add(token); await db.SaveChangesAsync(); await keyCacheService.DeleteKeyAsync($"email:{req.Ticket}"); return Ok( new AuthResponse( await userRenderer.RenderUserAsync(user, user, renderMembers: false), tokenStr, token.ExpiresAt ) ); } [HttpPost("login")] [ProducesResponseType(StatusCodes.Status200OK)] public async Task LoginAsync( [FromBody] EmailLoginRequest req, CancellationToken ct = default ) { CheckRequirements(); (User? user, AuthService.EmailAuthenticationResult authenticationResult) = await authService.AuthenticateUserAsync(req.Email, req.Password, ct); if (authenticationResult == AuthService.EmailAuthenticationResult.MfaRequired) throw new NotImplementedException("MFA is not implemented yet"); Application frontendApp = await db.GetFrontendApplicationAsync(ct); _logger.Debug("Logging user {Id} in with email and password", user.Id); (string? tokenStr, Token? token) = authService.GenerateToken( user, frontendApp, ["*"], clock.GetCurrentInstant() + Duration.FromDays(365) ); db.Add(token); _logger.Debug("Generated token {TokenId} for {UserId}", token.Id, user.Id); await db.SaveChangesAsync(ct); return Ok( new AuthResponse( await userRenderer.RenderUserAsync(user, user, renderMembers: false, ct: ct), tokenStr, token.ExpiresAt ) ); } [HttpPost("change-password")] [Authorize("*")] public async Task UpdatePasswordAsync([FromBody] EmailChangePasswordRequest req) { if (!await authService.ValidatePasswordAsync(CurrentUser!, req.Current)) throw new ApiError.Forbidden("Invalid password"); ValidationUtils.Validate([("new", ValidationUtils.ValidatePassword(req.New))]); await authService.SetUserPasswordAsync(CurrentUser!, req.New); await db.SaveChangesAsync(); return NoContent(); } [HttpPost("forgot-password")] public async Task ForgotPasswordAsync([FromBody] EmailForgotPasswordRequest req) { CheckRequirements(); if (!req.Email.Contains('@')) throw new ApiError.BadRequest("Email is invalid", "email", req.Email); AuthMethod? authMethod = await db .AuthMethods.Where(m => m.AuthType == AuthType.Email && m.RemoteId == req.Email) .FirstOrDefaultAsync(); if (authMethod == null) return NoContent(); string state = await keyCacheService.GenerateForgotPasswordStateAsync( req.Email, authMethod.UserId ); if (IsRateLimited()) return NoContent(); mailService.QueueResetPasswordEmail(req.Email, state); return NoContent(); } [HttpPost("reset-password")] public async Task ResetPasswordAsync([FromBody] EmailResetPasswordRequest req) { ForgotPasswordState? state = await keyCacheService.GetForgotPasswordStateAsync(req.State); if (state == null) throw new ApiError.BadRequest("Unknown state", "state", req.State); if ( !await db .AuthMethods.Where(m => m.AuthType == AuthType.Email && m.RemoteId == state.Email && m.UserId == state.UserId ) .AnyAsync() ) { throw new ApiError.BadRequest("Invalid state"); } ValidationUtils.Validate([("password", ValidationUtils.ValidatePassword(req.Password))]); User user = await db.Users.FirstAsync(u => u.Id == state.UserId); await authService.SetUserPasswordAsync(user, req.Password); await db.SaveChangesAsync(); mailService.QueuePasswordChangedEmail(state.Email); return NoContent(); } [HttpPost("add-account")] [Authorize("*")] public async Task AddEmailAddressAsync([FromBody] AddEmailAddressRequest req) { CheckRequirements(); List emails = await db .AuthMethods.Where(m => m.UserId == CurrentUser!.Id && m.AuthType == AuthType.Email) .ToListAsync(); if (emails.Count > AuthUtils.MaxAuthMethodsPerType) { throw new ApiError.BadRequest( "Too many email addresses, maximum of 3 per account.", "email", null ); } if (emails.Count != 0) { if (!await authService.ValidatePasswordAsync(CurrentUser!, req.Password)) throw new ApiError.Forbidden("Invalid password"); } else { ValidationUtils.Validate( [("password", ValidationUtils.ValidatePassword(req.Password))] ); await authService.SetUserPasswordAsync(CurrentUser!, req.Password); await db.SaveChangesAsync(); } string state = await keyCacheService.GenerateRegisterEmailStateAsync( req.Email, CurrentUser!.Id ); bool emailExists = await db .AuthMethods.Where(m => m.AuthType == AuthType.Email && m.RemoteId == req.Email) .AnyAsync(); if (emailExists) { return NoContent(); } if (IsRateLimited()) return NoContent(); mailService.QueueAddEmailAddressEmail(req.Email, state, CurrentUser.Username); return NoContent(); } [HttpPost("add-account/callback")] [Authorize("*")] public async Task AddEmailCallbackAsync([FromBody] EmailCallbackRequest req) { CheckRequirements(); RegisterEmailState? state = await keyCacheService.GetRegisterEmailStateAsync(req.State); if (state?.ExistingUserId != CurrentUser!.Id) throw new ApiError.BadRequest("Invalid state", "state", req.State); try { AuthMethod authMethod = await authService.AddAuthMethodAsync( CurrentUser.Id, AuthType.Email, state.Email ); _logger.Debug( "Added email auth {AuthId} for user {UserId}", authMethod.Id, CurrentUser.Id ); return Ok( new AddOauthAccountResponse( authMethod.Id, AuthType.Email, authMethod.RemoteId, null ) ); } catch (UniqueConstraintException) { throw new ApiError( "That email address is already linked.", HttpStatusCode.BadRequest, ErrorCode.AccountAlreadyLinked ); } } public record AddEmailAddressRequest(string Email, string Password); private void CheckRequirements() { if (!config.EmailAuth.Enabled) throw new ApiError.BadRequest("Email authentication is not enabled on this instance."); } /// /// Checks whether the context's IP address is rate limited from dispatching emails. /// private bool IsRateLimited() { if (HttpContext.Connection.RemoteIpAddress == null) { _logger.Information( "No remote IP address in HTTP context for email-related request, ignoring as we can't rate limit it" ); return true; } if ( !rateLimiter.IsLimited( HttpContext.Connection.RemoteIpAddress.ToString(), out Duration retryAfter ) ) { return false; } _logger.Information( "IP address cannot send email until {RetryAfter}, ignoring", retryAfter ); return true; } }