import { z } from 'zod'; import { lodash, nip19 } from '@/deps.ts'; import { AppController } from '@/app.ts'; import { nostrNow } from '@/utils.ts'; import { parseBody } from '@/utils/api.ts'; const passwordGrantSchema = z.object({ grant_type: z.literal('password'), password: z.string(), }); const codeGrantSchema = z.object({ grant_type: z.literal('authorization_code'), code: z.string(), }); const credentialsGrantSchema = z.object({ grant_type: z.literal('client_credentials'), }); const createTokenSchema = z.discriminatedUnion('grant_type', [ passwordGrantSchema, codeGrantSchema, credentialsGrantSchema, ]); const createTokenController: AppController = async (c) => { const body = await parseBody(c.req.raw); const result = createTokenSchema.safeParse(body); if (!result.success) { return c.json({ error: 'Invalid request', issues: result.error.issues }, 400); } switch (result.data.grant_type) { case 'password': return c.json({ access_token: result.data.password, token_type: 'Bearer', scope: 'read write follow push', created_at: nostrNow(), }); case 'authorization_code': return c.json({ access_token: result.data.code, token_type: 'Bearer', scope: 'read write follow push', created_at: nostrNow(), }); case 'client_credentials': return c.json({ access_token: '_', token_type: 'Bearer', scope: 'read write follow push', created_at: nostrNow(), }); } }; /** Display the OAuth form. */ const oauthController: AppController = (c) => { const encodedUri = c.req.query('redirect_uri'); if (!encodedUri) { return c.text('Missing `redirect_uri` query param.', 422); } const redirectUri = maybeDecodeUri(encodedUri); c.res.headers.set( 'content-security-policy', "default-src 'self' 'sha256-m2qD6rbE2Ixbo2Bjy2dgQebcotRIAawW7zbmXItIYAM='", ); return c.html(` Log in with Ditto
`); }; /** * If it's already a valid URL, keep it as-is. Otherwise decode it from a URI component. * This fixes compatibilty with Elk: https://github.com/elk-zone/elk/issues/2089#issuecomment-1546289725 */ function maybeDecodeUri(uri: string): string { try { new URL(uri); return uri; } catch (_e) { return decodeURIComponent(uri); } } /** Schema for FormData POSTed to the OAuthController. */ const oauthAuthorizeSchema = z.object({ pubkey: z.string().regex(/^[0-9a-f]{64}$/).optional().catch(undefined), nip19: z.string().regex(new RegExp(`^${nip19.BECH32_REGEX.source}$`)).optional().catch(undefined), redirect_uri: z.string().url(), }).superRefine((data, ctx) => { if (!data.pubkey && !data.nip19) { ctx.addIssue({ code: z.ZodIssueCode.custom, message: 'Missing `pubkey` or `nip19`.', }); } }); /** Controller the OAuth form is POSTed to. */ const oauthAuthorizeController: AppController = async (c) => { /** FormData results in JSON. */ const result = oauthAuthorizeSchema.safeParse(await parseBody(c.req.raw)); if (!result.success) { return c.json(result.error, 422); } // Parsed FormData values. const { pubkey, nip19: nip19id, redirect_uri: redirectUri } = result.data; if (pubkey) { const encoded = nip19.npubEncode(pubkey!); const url = addCodeToRedirectUri(redirectUri, encoded); return c.redirect(url); } else if (nip19id) { const url = addCodeToRedirectUri(redirectUri, nip19id); return c.redirect(url); } return c.text('The Nostr ID was not provided or invalid.', 422); }; /** Append the given `code` as a query param to the `redirect_uri`. */ function addCodeToRedirectUri(redirectUri: string, code: string): string { const url = new URL(redirectUri); const q = new URLSearchParams(); q.set('code', code); url.search = q.toString(); return url.toString(); } export { createTokenController, oauthAuthorizeController, oauthController };