for *some reason*, coravel locks a persistent job queue behind a paywall. this means that if the server ever crashes, all pending jobs are lost. this is... not good, so we're switching to hangfire for that instead. coravel is still used for emails, though. BREAKING CHANGE: Foxnouns.NET now requires Redis to work. the EFCore storage for hangfire doesn't work well enough, unfortunately.
374 lines
12 KiB
C#
374 lines
12 KiB
C#
// Copyright (C) 2023-present sam/u1f320 (vulpine.solutions)
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published
|
|
// by the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
using System.Net;
|
|
using EntityFramework.Exceptions.Common;
|
|
using Foxnouns.Backend.Database;
|
|
using Foxnouns.Backend.Database.Models;
|
|
using Foxnouns.Backend.Dto;
|
|
using Foxnouns.Backend.Extensions;
|
|
using Foxnouns.Backend.Middleware;
|
|
using Foxnouns.Backend.Services;
|
|
using Foxnouns.Backend.Services.Auth;
|
|
using Foxnouns.Backend.Utils;
|
|
using JetBrains.Annotations;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
using Microsoft.EntityFrameworkCore;
|
|
using NodaTime;
|
|
|
|
namespace Foxnouns.Backend.Controllers.Authentication;
|
|
|
|
[Route("/api/internal/auth/email")]
|
|
[ApiExplorerSettings(IgnoreApi = true)]
|
|
public class EmailAuthController(
|
|
[UsedImplicitly] Config config,
|
|
DatabaseContext db,
|
|
AuthService authService,
|
|
MailService mailService,
|
|
EmailRateLimiter rateLimiter,
|
|
KeyCacheService keyCacheService,
|
|
UserRendererService userRenderer,
|
|
IClock clock,
|
|
ILogger logger
|
|
) : ApiControllerBase
|
|
{
|
|
private readonly ILogger _logger = logger.ForContext<EmailAuthController>();
|
|
|
|
[HttpPost("register/init")]
|
|
public async Task<IActionResult> RegisterInitAsync(
|
|
[FromBody] EmailRegisterRequest req,
|
|
CancellationToken ct = default
|
|
)
|
|
{
|
|
CheckRequirements();
|
|
|
|
if (!req.Email.Contains('@'))
|
|
throw new ApiError.BadRequest("Email is invalid", "email", req.Email);
|
|
|
|
string state = await keyCacheService.GenerateRegisterEmailStateAsync(req.Email, null);
|
|
|
|
// If there's already a user with that email address, pretend we sent an email but actually ignore it
|
|
if (
|
|
await db.AuthMethods.AnyAsync(
|
|
a => a.AuthType == AuthType.Email && a.RemoteId == req.Email,
|
|
ct
|
|
)
|
|
)
|
|
{
|
|
return NoContent();
|
|
}
|
|
|
|
if (IsRateLimited())
|
|
return NoContent();
|
|
|
|
mailService.QueueAccountCreationEmail(req.Email, state);
|
|
return NoContent();
|
|
}
|
|
|
|
[HttpPost("callback")]
|
|
public async Task<IActionResult> CallbackAsync([FromBody] EmailCallbackRequest req)
|
|
{
|
|
CheckRequirements();
|
|
|
|
RegisterEmailState? state = await keyCacheService.GetRegisterEmailStateAsync(req.State);
|
|
if (state is not { ExistingUserId: null })
|
|
throw new ApiError.BadRequest("Invalid state", "state", req.State);
|
|
|
|
string ticket = AuthUtils.RandomToken();
|
|
await keyCacheService.SetKeyAsync($"email:{ticket}", state.Email, Duration.FromMinutes(20));
|
|
|
|
return Ok(new CallbackResponse(false, ticket, state.Email, null, null, null));
|
|
}
|
|
|
|
[HttpPost("register")]
|
|
public async Task<IActionResult> CompleteRegistrationAsync(
|
|
[FromBody] EmailCompleteRegistrationRequest req
|
|
)
|
|
{
|
|
CheckRequirements();
|
|
|
|
string? email = await keyCacheService.GetKeyAsync($"email:{req.Ticket}");
|
|
if (email == null)
|
|
throw new ApiError.BadRequest("Unknown ticket", "ticket", req.Ticket);
|
|
|
|
User user = await authService.CreateUserWithPasswordAsync(
|
|
req.Username,
|
|
email,
|
|
req.Password
|
|
);
|
|
Application frontendApp = await db.GetFrontendApplicationAsync();
|
|
|
|
(string? tokenStr, Token? token) = authService.GenerateToken(
|
|
user,
|
|
frontendApp,
|
|
["*"],
|
|
clock.GetCurrentInstant() + Duration.FromDays(365)
|
|
);
|
|
db.Add(token);
|
|
|
|
await db.SaveChangesAsync();
|
|
|
|
await keyCacheService.DeleteKeyAsync($"email:{req.Ticket}");
|
|
|
|
return Ok(
|
|
new AuthResponse(
|
|
await userRenderer.RenderUserAsync(user, user, renderMembers: false),
|
|
tokenStr,
|
|
token.ExpiresAt
|
|
)
|
|
);
|
|
}
|
|
|
|
[HttpPost("login")]
|
|
[ProducesResponseType<AuthResponse>(StatusCodes.Status200OK)]
|
|
public async Task<IActionResult> LoginAsync(
|
|
[FromBody] EmailLoginRequest req,
|
|
CancellationToken ct = default
|
|
)
|
|
{
|
|
CheckRequirements();
|
|
|
|
(User? user, AuthService.EmailAuthenticationResult authenticationResult) =
|
|
await authService.AuthenticateUserAsync(req.Email, req.Password, ct);
|
|
if (authenticationResult == AuthService.EmailAuthenticationResult.MfaRequired)
|
|
throw new NotImplementedException("MFA is not implemented yet");
|
|
|
|
Application frontendApp = await db.GetFrontendApplicationAsync(ct);
|
|
|
|
_logger.Debug("Logging user {Id} in with email and password", user.Id);
|
|
|
|
(string? tokenStr, Token? token) = authService.GenerateToken(
|
|
user,
|
|
frontendApp,
|
|
["*"],
|
|
clock.GetCurrentInstant() + Duration.FromDays(365)
|
|
);
|
|
db.Add(token);
|
|
|
|
_logger.Debug("Generated token {TokenId} for {UserId}", token.Id, user.Id);
|
|
|
|
await db.SaveChangesAsync(ct);
|
|
|
|
return Ok(
|
|
new AuthResponse(
|
|
await userRenderer.RenderUserAsync(user, user, renderMembers: false, ct: ct),
|
|
tokenStr,
|
|
token.ExpiresAt
|
|
)
|
|
);
|
|
}
|
|
|
|
[HttpPost("change-password")]
|
|
[Authorize("*")]
|
|
public async Task<IActionResult> UpdatePasswordAsync([FromBody] EmailChangePasswordRequest req)
|
|
{
|
|
if (!await authService.ValidatePasswordAsync(CurrentUser!, req.Current))
|
|
throw new ApiError.Forbidden("Invalid password");
|
|
|
|
ValidationUtils.Validate([("new", ValidationUtils.ValidatePassword(req.New))]);
|
|
|
|
await authService.SetUserPasswordAsync(CurrentUser!, req.New);
|
|
await db.SaveChangesAsync();
|
|
return NoContent();
|
|
}
|
|
|
|
[HttpPost("forgot-password")]
|
|
public async Task<IActionResult> ForgotPasswordAsync([FromBody] EmailForgotPasswordRequest req)
|
|
{
|
|
CheckRequirements();
|
|
|
|
if (!req.Email.Contains('@'))
|
|
throw new ApiError.BadRequest("Email is invalid", "email", req.Email);
|
|
|
|
AuthMethod? authMethod = await db
|
|
.AuthMethods.Where(m => m.AuthType == AuthType.Email && m.RemoteId == req.Email)
|
|
.FirstOrDefaultAsync();
|
|
if (authMethod == null)
|
|
return NoContent();
|
|
|
|
string state = await keyCacheService.GenerateForgotPasswordStateAsync(
|
|
req.Email,
|
|
authMethod.UserId
|
|
);
|
|
|
|
if (IsRateLimited())
|
|
return NoContent();
|
|
|
|
mailService.QueueResetPasswordEmail(req.Email, state);
|
|
return NoContent();
|
|
}
|
|
|
|
[HttpPost("reset-password")]
|
|
public async Task<IActionResult> ResetPasswordAsync([FromBody] EmailResetPasswordRequest req)
|
|
{
|
|
ForgotPasswordState? state = await keyCacheService.GetForgotPasswordStateAsync(req.State);
|
|
if (state == null)
|
|
throw new ApiError.BadRequest("Unknown state", "state", req.State);
|
|
|
|
if (
|
|
!await db
|
|
.AuthMethods.Where(m =>
|
|
m.AuthType == AuthType.Email
|
|
&& m.RemoteId == state.Email
|
|
&& m.UserId == state.UserId
|
|
)
|
|
.AnyAsync()
|
|
)
|
|
{
|
|
throw new ApiError.BadRequest("Invalid state");
|
|
}
|
|
|
|
ValidationUtils.Validate([("password", ValidationUtils.ValidatePassword(req.Password))]);
|
|
|
|
User user = await db.Users.FirstAsync(u => u.Id == state.UserId);
|
|
await authService.SetUserPasswordAsync(user, req.Password);
|
|
await db.SaveChangesAsync();
|
|
|
|
mailService.QueuePasswordChangedEmail(state.Email);
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
[HttpPost("add-account")]
|
|
[Authorize("*")]
|
|
public async Task<IActionResult> AddEmailAddressAsync([FromBody] AddEmailAddressRequest req)
|
|
{
|
|
CheckRequirements();
|
|
|
|
List<AuthMethod> emails = await db
|
|
.AuthMethods.Where(m => m.UserId == CurrentUser!.Id && m.AuthType == AuthType.Email)
|
|
.ToListAsync();
|
|
if (emails.Count > AuthUtils.MaxAuthMethodsPerType)
|
|
{
|
|
throw new ApiError.BadRequest(
|
|
"Too many email addresses, maximum of 3 per account.",
|
|
"email",
|
|
null
|
|
);
|
|
}
|
|
|
|
if (emails.Count != 0)
|
|
{
|
|
if (!await authService.ValidatePasswordAsync(CurrentUser!, req.Password))
|
|
throw new ApiError.Forbidden("Invalid password");
|
|
}
|
|
else
|
|
{
|
|
ValidationUtils.Validate(
|
|
[("password", ValidationUtils.ValidatePassword(req.Password))]
|
|
);
|
|
await authService.SetUserPasswordAsync(CurrentUser!, req.Password);
|
|
await db.SaveChangesAsync();
|
|
}
|
|
|
|
string state = await keyCacheService.GenerateRegisterEmailStateAsync(
|
|
req.Email,
|
|
CurrentUser!.Id
|
|
);
|
|
|
|
bool emailExists = await db
|
|
.AuthMethods.Where(m => m.AuthType == AuthType.Email && m.RemoteId == req.Email)
|
|
.AnyAsync();
|
|
if (emailExists)
|
|
{
|
|
return NoContent();
|
|
}
|
|
|
|
if (IsRateLimited())
|
|
return NoContent();
|
|
|
|
mailService.QueueAddEmailAddressEmail(req.Email, state, CurrentUser.Username);
|
|
return NoContent();
|
|
}
|
|
|
|
[HttpPost("add-account/callback")]
|
|
[Authorize("*")]
|
|
public async Task<IActionResult> AddEmailCallbackAsync([FromBody] EmailCallbackRequest req)
|
|
{
|
|
CheckRequirements();
|
|
|
|
RegisterEmailState? state = await keyCacheService.GetRegisterEmailStateAsync(req.State);
|
|
if (state?.ExistingUserId != CurrentUser!.Id)
|
|
throw new ApiError.BadRequest("Invalid state", "state", req.State);
|
|
|
|
try
|
|
{
|
|
AuthMethod authMethod = await authService.AddAuthMethodAsync(
|
|
CurrentUser.Id,
|
|
AuthType.Email,
|
|
state.Email
|
|
);
|
|
_logger.Debug(
|
|
"Added email auth {AuthId} for user {UserId}",
|
|
authMethod.Id,
|
|
CurrentUser.Id
|
|
);
|
|
|
|
return Ok(
|
|
new AddOauthAccountResponse(
|
|
authMethod.Id,
|
|
AuthType.Email,
|
|
authMethod.RemoteId,
|
|
null
|
|
)
|
|
);
|
|
}
|
|
catch (UniqueConstraintException)
|
|
{
|
|
throw new ApiError(
|
|
"That email address is already linked.",
|
|
HttpStatusCode.BadRequest,
|
|
ErrorCode.AccountAlreadyLinked
|
|
);
|
|
}
|
|
}
|
|
|
|
public record AddEmailAddressRequest(string Email, string Password);
|
|
|
|
private void CheckRequirements()
|
|
{
|
|
if (!config.EmailAuth.Enabled)
|
|
throw new ApiError.BadRequest("Email authentication is not enabled on this instance.");
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks whether the context's IP address is rate limited from dispatching emails.
|
|
/// </summary>
|
|
private bool IsRateLimited()
|
|
{
|
|
if (HttpContext.Connection.RemoteIpAddress == null)
|
|
{
|
|
_logger.Information(
|
|
"No remote IP address in HTTP context for email-related request, ignoring as we can't rate limit it"
|
|
);
|
|
return true;
|
|
}
|
|
|
|
if (
|
|
!rateLimiter.IsLimited(
|
|
HttpContext.Connection.RemoteIpAddress.ToString(),
|
|
out Duration retryAfter
|
|
)
|
|
)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
_logger.Information(
|
|
"IP address cannot send email until {RetryAfter}, ignoring",
|
|
retryAfter
|
|
);
|
|
return true;
|
|
}
|
|
}
|