@atproto/pds 0.4.104 → 0.4.106
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +34 -0
- package/dist/account-manager/{index.d.ts → account-manager.d.ts} +26 -35
- package/dist/account-manager/account-manager.d.ts.map +1 -0
- package/dist/account-manager/{index.js → account-manager.js} +52 -207
- package/dist/account-manager/account-manager.js.map +1 -0
- package/dist/account-manager/helpers/account.d.ts +3 -3
- package/dist/account-manager/helpers/device-account.d.ts +15 -15
- package/dist/account-manager/helpers/device-account.d.ts.map +1 -1
- package/dist/account-manager/helpers/device-account.js +2 -1
- package/dist/account-manager/helpers/device-account.js.map +1 -1
- package/dist/account-manager/helpers/token.d.ts +98 -98
- package/dist/account-manager/oauth-store.d.ts +58 -0
- package/dist/account-manager/oauth-store.d.ts.map +1 -0
- package/dist/account-manager/oauth-store.js +417 -0
- package/dist/account-manager/oauth-store.js.map +1 -0
- package/dist/actor-store/record/reader.d.ts +3 -3
- package/dist/actor-store/repo/reader.d.ts +2 -0
- package/dist/actor-store/repo/reader.d.ts.map +1 -1
- package/dist/actor-store/repo/reader.js +9 -0
- package/dist/actor-store/repo/reader.js.map +1 -1
- package/dist/actor-store/repo/sql-repo-reader.d.ts +1 -1
- package/dist/actor-store/repo/transactor.d.ts.map +1 -1
- package/dist/actor-store/repo/transactor.js +13 -4
- package/dist/actor-store/repo/transactor.js.map +1 -1
- package/dist/api/com/atproto/admin/deleteAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/admin/deleteAccount.js +2 -3
- package/dist/api/com/atproto/admin/deleteAccount.js.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountHandle.d.ts.map +1 -1
- package/dist/api/com/atproto/admin/updateAccountHandle.js +2 -6
- package/dist/api/com/atproto/admin/updateAccountHandle.js.map +1 -1
- package/dist/api/com/atproto/identity/resolveHandle.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/resolveHandle.js +2 -36
- package/dist/api/com/atproto/identity/resolveHandle.js.map +1 -1
- package/dist/api/com/atproto/identity/updateHandle.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/updateHandle.js +1 -7
- package/dist/api/com/atproto/identity/updateHandle.js.map +1 -1
- package/dist/api/com/atproto/server/activateAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/activateAccount.js +2 -18
- package/dist/api/com/atproto/server/activateAccount.js.map +1 -1
- package/dist/api/com/atproto/server/createAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/createAccount.js +7 -7
- package/dist/api/com/atproto/server/createAccount.js.map +1 -1
- package/dist/api/com/atproto/server/createSession.js +1 -1
- package/dist/api/com/atproto/server/createSession.js.map +1 -1
- package/dist/api/com/atproto/server/deleteAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/deleteAccount.js +2 -3
- package/dist/api/com/atproto/server/deleteAccount.js.map +1 -1
- package/dist/api/com/atproto/server/getSession.js +1 -1
- package/dist/api/com/atproto/server/getSession.js.map +1 -1
- package/dist/api/com/atproto/server/refreshSession.js +1 -1
- package/dist/api/com/atproto/server/refreshSession.js.map +1 -1
- package/dist/api/com/atproto/sync/getRecord.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/getRecord.js.map +1 -1
- package/dist/api/com/atproto/sync/getRepoStatus.js +1 -1
- package/dist/api/com/atproto/sync/getRepoStatus.js.map +1 -1
- package/dist/api/com/atproto/sync/listRepos.js +1 -1
- package/dist/api/com/atproto/sync/listRepos.js.map +1 -1
- package/dist/api/com/atproto/sync/subscribeRepos.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/subscribeRepos.js +2 -10
- package/dist/api/com/atproto/sync/subscribeRepos.js.map +1 -1
- package/dist/app-view.d.ts +14 -0
- package/dist/app-view.d.ts.map +1 -0
- package/dist/app-view.js +36 -0
- package/dist/app-view.js.map +1 -0
- package/dist/auth-routes.d.ts +1 -1
- package/dist/auth-routes.d.ts.map +1 -1
- package/dist/auth-routes.js +9 -3
- package/dist/auth-routes.js.map +1 -1
- package/dist/auth-verifier.d.ts +1 -1
- package/dist/auth-verifier.d.ts.map +1 -1
- package/dist/config/config.d.ts +3 -2
- package/dist/config/config.d.ts.map +1 -1
- package/dist/config/config.js +17 -7
- package/dist/config/config.js.map +1 -1
- package/dist/config/env.d.ts +4 -0
- package/dist/config/env.d.ts.map +1 -1
- package/dist/config/env.js +5 -0
- package/dist/config/env.js.map +1 -1
- package/dist/context.d.ts +4 -4
- package/dist/context.d.ts.map +1 -1
- package/dist/context.js +24 -18
- package/dist/context.js.map +1 -1
- package/dist/handle/index.d.ts +0 -7
- package/dist/handle/index.d.ts.map +1 -1
- package/dist/handle/index.js +4 -58
- package/dist/handle/index.js.map +1 -1
- package/dist/image/image-url.d.ts +8 -0
- package/dist/image/image-url.d.ts.map +1 -0
- package/dist/image/image-url.js +26 -0
- package/dist/image/image-url.js.map +1 -0
- package/dist/lexicon/index.d.ts +6 -0
- package/dist/lexicon/index.d.ts.map +1 -1
- package/dist/lexicon/index.js +12 -0
- package/dist/lexicon/index.js.map +1 -1
- package/dist/lexicon/lexicons.d.ts +310 -130
- package/dist/lexicon/lexicons.d.ts.map +1 -1
- package/dist/lexicon/lexicons.js +171 -67
- package/dist/lexicon/lexicons.js.map +1 -1
- package/dist/lexicon/types/app/bsky/embed/video.d.ts +1 -0
- package/dist/lexicon/types/app/bsky/embed/video.d.ts.map +1 -1
- package/dist/lexicon/types/app/bsky/embed/video.js.map +1 -1
- package/dist/lexicon/types/com/atproto/identity/defs.d.ts +17 -0
- package/dist/lexicon/types/com/atproto/identity/defs.d.ts.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/defs.js +16 -0
- package/dist/lexicon/types/com/atproto/identity/defs.js.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/refreshIdentity.d.ts +39 -0
- package/dist/lexicon/types/com/atproto/identity/refreshIdentity.d.ts.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/refreshIdentity.js +7 -0
- package/dist/lexicon/types/com/atproto/identity/refreshIdentity.js.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/resolveDid.d.ts +40 -0
- package/dist/lexicon/types/com/atproto/identity/resolveDid.d.ts.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/resolveDid.js +7 -0
- package/dist/lexicon/types/com/atproto/identity/resolveDid.js.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/resolveHandle.d.ts +1 -0
- package/dist/lexicon/types/com/atproto/identity/resolveHandle.d.ts.map +1 -1
- package/dist/lexicon/types/com/atproto/identity/resolveIdentity.d.ts +36 -0
- package/dist/lexicon/types/com/atproto/identity/resolveIdentity.d.ts.map +1 -0
- package/dist/lexicon/types/com/atproto/identity/resolveIdentity.js +7 -0
- package/dist/lexicon/types/com/atproto/identity/resolveIdentity.js.map +1 -0
- package/dist/lexicon/types/com/atproto/sync/subscribeRepos.d.ts +1 -30
- package/dist/lexicon/types/com/atproto/sync/subscribeRepos.d.ts.map +1 -1
- package/dist/lexicon/types/com/atproto/sync/subscribeRepos.js +0 -27
- package/dist/lexicon/types/com/atproto/sync/subscribeRepos.js.map +1 -1
- package/dist/lexicon/types/tools/ozone/team/listMembers.d.ts +1 -0
- package/dist/lexicon/types/tools/ozone/team/listMembers.d.ts.map +1 -1
- package/dist/mailer/index.d.ts +5 -5
- package/dist/mailer/index.d.ts.map +1 -1
- package/dist/mailer/index.js +6 -5
- package/dist/mailer/index.js.map +1 -1
- package/dist/read-after-write/viewer.d.ts +1 -1
- package/dist/read-after-write/viewer.d.ts.map +1 -1
- package/dist/repo/types.d.ts +6 -2
- package/dist/repo/types.d.ts.map +1 -1
- package/dist/repo/types.js.map +1 -1
- package/dist/scripts/rebuild-repo.d.ts.map +1 -1
- package/dist/scripts/rebuild-repo.js +2 -1
- package/dist/scripts/rebuild-repo.js.map +1 -1
- package/dist/sequencer/db/schema.d.ts +1 -1
- package/dist/sequencer/db/schema.d.ts.map +1 -1
- package/dist/sequencer/events.d.ts +27 -38
- package/dist/sequencer/events.d.ts.map +1 -1
- package/dist/sequencer/events.js +40 -58
- package/dist/sequencer/events.js.map +1 -1
- package/dist/sequencer/sequencer.d.ts +2 -3
- package/dist/sequencer/sequencer.d.ts.map +1 -1
- package/dist/sequencer/sequencer.js +5 -17
- package/dist/sequencer/sequencer.js.map +1 -1
- package/package.json +15 -15
- package/src/account-manager/{index.ts → account-manager.ts} +107 -307
- package/src/account-manager/helpers/device-account.ts +1 -0
- package/src/account-manager/oauth-store.ts +494 -0
- package/src/actor-store/repo/reader.ts +11 -0
- package/src/actor-store/repo/transactor.ts +15 -4
- package/src/api/com/atproto/admin/deleteAccount.ts +2 -3
- package/src/api/com/atproto/admin/updateAccountHandle.ts +7 -8
- package/src/api/com/atproto/identity/resolveHandle.ts +2 -11
- package/src/api/com/atproto/identity/updateHandle.ts +4 -7
- package/src/api/com/atproto/server/activateAccount.ts +4 -18
- package/src/api/com/atproto/server/createAccount.ts +15 -11
- package/src/api/com/atproto/server/createSession.ts +1 -1
- package/src/api/com/atproto/server/deleteAccount.ts +2 -3
- package/src/api/com/atproto/server/getSession.ts +1 -1
- package/src/api/com/atproto/server/refreshSession.ts +1 -1
- package/src/api/com/atproto/sync/getRecord.ts +0 -1
- package/src/api/com/atproto/sync/getRepoStatus.ts +1 -1
- package/src/api/com/atproto/sync/listRepos.ts +1 -1
- package/src/api/com/atproto/sync/subscribeRepos.ts +2 -9
- package/src/app-view.ts +24 -0
- package/src/auth-routes.ts +9 -3
- package/src/auth-verifier.ts +1 -1
- package/src/config/config.ts +25 -13
- package/src/config/env.ts +12 -0
- package/src/context.ts +44 -24
- package/src/handle/index.ts +6 -52
- package/src/image/image-url.ts +16 -0
- package/src/lexicon/index.ts +36 -0
- package/src/lexicon/lexicons.ts +186 -67
- package/src/lexicon/types/app/bsky/embed/video.ts +1 -0
- package/src/lexicon/types/com/atproto/identity/defs.ts +30 -0
- package/src/lexicon/types/com/atproto/identity/refreshIdentity.ts +52 -0
- package/src/lexicon/types/com/atproto/identity/resolveDid.ts +52 -0
- package/src/lexicon/types/com/atproto/identity/resolveHandle.ts +1 -0
- package/src/lexicon/types/com/atproto/identity/resolveIdentity.ts +48 -0
- package/src/lexicon/types/com/atproto/sync/subscribeRepos.ts +0 -59
- package/src/lexicon/types/tools/ozone/team/listMembers.ts +1 -0
- package/src/mailer/index.ts +7 -5
- package/src/read-after-write/viewer.ts +1 -1
- package/src/repo/types.ts +7 -2
- package/src/scripts/rebuild-repo.ts +4 -1
- package/src/sequencer/db/schema.ts +1 -8
- package/src/sequencer/events.ts +47 -75
- package/src/sequencer/sequencer.ts +9 -23
- package/tests/account-deletion.test.ts +3 -5
- package/tests/oauth.test.ts +286 -71
- package/tests/sequencer.test.ts +20 -29
- package/tests/sync/subscribe-repos.test.ts +89 -45
- package/tsconfig.build.tsbuildinfo +1 -1
- package/dist/account-manager/index.d.ts.map +0 -1
- package/dist/account-manager/index.js.map +0 -1
- package/dist/actor-store/repo/util.d.ts +0 -5
- package/dist/actor-store/repo/util.d.ts.map +0 -1
- package/dist/actor-store/repo/util.js +0 -25
- package/dist/actor-store/repo/util.js.map +0 -1
- package/dist/oauth/provider.d.ts +0 -10
- package/dist/oauth/provider.d.ts.map +0 -1
- package/dist/oauth/provider.js +0 -38
- package/dist/oauth/provider.js.map +0 -1
- package/src/actor-store/repo/util.ts +0 -22
- package/src/oauth/provider.ts +0 -59
@@ -0,0 +1,494 @@
|
|
1
|
+
import { Client, createOp as createPlcOp } from '@did-plc/lib'
|
2
|
+
import { Selectable } from 'kysely'
|
3
|
+
import { Keypair, Secp256k1Keypair } from '@atproto/crypto'
|
4
|
+
import {
|
5
|
+
Account,
|
6
|
+
AccountInfo,
|
7
|
+
AccountStore,
|
8
|
+
AuthenticateAccountData,
|
9
|
+
Code,
|
10
|
+
DeviceAccountInfo,
|
11
|
+
DeviceData,
|
12
|
+
DeviceId,
|
13
|
+
DeviceStore,
|
14
|
+
FoundRequestResult,
|
15
|
+
HandleUnavailableError,
|
16
|
+
InvalidRequestError,
|
17
|
+
NewTokenData,
|
18
|
+
RefreshToken,
|
19
|
+
RequestData,
|
20
|
+
RequestId,
|
21
|
+
RequestStore,
|
22
|
+
ResetPasswordConfirmData,
|
23
|
+
ResetPasswordRequestData,
|
24
|
+
SignUpData,
|
25
|
+
TokenData,
|
26
|
+
TokenId,
|
27
|
+
TokenInfo,
|
28
|
+
TokenStore,
|
29
|
+
UpdateRequestData,
|
30
|
+
} from '@atproto/oauth-provider'
|
31
|
+
import {
|
32
|
+
AuthRequiredError as XrpcAuthRequiredError,
|
33
|
+
InvalidRequestError as XrpcInvalidRequestError,
|
34
|
+
} from '@atproto/xrpc-server'
|
35
|
+
import { ActorStore } from '../actor-store/actor-store'
|
36
|
+
import { BackgroundQueue } from '../background'
|
37
|
+
import { ImageUrlBuilder } from '../image/image-url-builder'
|
38
|
+
import { ServerMailer } from '../mailer'
|
39
|
+
import { Sequencer } from '../sequencer'
|
40
|
+
import { AccountManager } from './account-manager'
|
41
|
+
import { AccountStatus, ActorAccount } from './helpers/account'
|
42
|
+
import * as authRequest from './helpers/authorization-request'
|
43
|
+
import * as device from './helpers/device'
|
44
|
+
import * as deviceAccount from './helpers/device-account'
|
45
|
+
import * as token from './helpers/token'
|
46
|
+
import * as usedRefreshToken from './helpers/used-refresh-token'
|
47
|
+
|
48
|
+
/**
|
49
|
+
* This class' purpose is to implement the interface needed by the OAuthProvider
|
50
|
+
* to interact with the account database (through the {@link AccountManager}).
|
51
|
+
*
|
52
|
+
* @note The use of this class assumes that there is no entryway.
|
53
|
+
*/
|
54
|
+
export class OAuthStore
|
55
|
+
implements AccountStore, RequestStore, DeviceStore, TokenStore
|
56
|
+
{
|
57
|
+
constructor(
|
58
|
+
private readonly accountManager: AccountManager,
|
59
|
+
private readonly actorStore: ActorStore,
|
60
|
+
private readonly imageUrlBuilder: ImageUrlBuilder,
|
61
|
+
private readonly backgroundQueue: BackgroundQueue,
|
62
|
+
private readonly mailer: ServerMailer,
|
63
|
+
private readonly sequencer: Sequencer,
|
64
|
+
private readonly plcClient: Client,
|
65
|
+
private readonly plcRotationKey: Keypair,
|
66
|
+
private readonly publicUrl: string,
|
67
|
+
private readonly recoveryDidKey: string | null,
|
68
|
+
) {}
|
69
|
+
|
70
|
+
private get db() {
|
71
|
+
const { db } = this.accountManager
|
72
|
+
if (db.destroyed) throw new Error('Database connection is closed')
|
73
|
+
return db
|
74
|
+
}
|
75
|
+
|
76
|
+
private get serviceDid() {
|
77
|
+
return this.accountManager.serviceDid
|
78
|
+
}
|
79
|
+
|
80
|
+
private async buildAccount(row: Selectable<ActorAccount>): Promise<Account> {
|
81
|
+
const account = deviceAccount.toAccount(row, this.serviceDid)
|
82
|
+
|
83
|
+
if (!account.name || !account.picture) {
|
84
|
+
const did = account.sub
|
85
|
+
|
86
|
+
const profile = await this.actorStore.read(did, async (store) => {
|
87
|
+
return store.record.getProfileRecord()
|
88
|
+
})
|
89
|
+
|
90
|
+
if (profile) {
|
91
|
+
const { avatar, displayName } = profile
|
92
|
+
|
93
|
+
account.name ||= displayName
|
94
|
+
account.picture ||= avatar
|
95
|
+
? this.imageUrlBuilder.build('avatar', did, avatar.ref.toString())
|
96
|
+
: undefined
|
97
|
+
}
|
98
|
+
}
|
99
|
+
|
100
|
+
return account
|
101
|
+
}
|
102
|
+
|
103
|
+
private async verifyEmailAvailability(email: string): Promise<void> {
|
104
|
+
// @NOTE Email validity & disposability check performed by the OAuthProvider
|
105
|
+
|
106
|
+
const account = await this.accountManager.getAccountByEmail(email, {
|
107
|
+
includeDeactivated: true,
|
108
|
+
includeTakenDown: true,
|
109
|
+
})
|
110
|
+
|
111
|
+
if (account) {
|
112
|
+
throw new InvalidRequestError(`Email already taken`)
|
113
|
+
}
|
114
|
+
}
|
115
|
+
|
116
|
+
// AccountStore
|
117
|
+
|
118
|
+
async createAccount({
|
119
|
+
locale: _locale,
|
120
|
+
inviteCode,
|
121
|
+
handle,
|
122
|
+
email,
|
123
|
+
password,
|
124
|
+
}: SignUpData): Promise<Account> {
|
125
|
+
// @TODO Send an account creation confirmation email (+verification link) to the user (in their locale)
|
126
|
+
// @NOTE Password strength already enforced by the OAuthProvider
|
127
|
+
|
128
|
+
await Promise.all([
|
129
|
+
this.verifyEmailAvailability(email),
|
130
|
+
this.verifyHandleAvailability(handle),
|
131
|
+
!inviteCode || this.accountManager.ensureInviteIsAvailable(inviteCode),
|
132
|
+
])
|
133
|
+
|
134
|
+
// @TODO The code bellow should probably be refactored to be common with the
|
135
|
+
// code of the `com.atproto.server.createAccount` XRPC endpoint.
|
136
|
+
|
137
|
+
const signingKey = await Secp256k1Keypair.create({ exportable: true })
|
138
|
+
const signingKeyDid = signingKey.did()
|
139
|
+
|
140
|
+
const plcCreate = await createPlcOp({
|
141
|
+
signingKey: signingKeyDid,
|
142
|
+
rotationKeys: this.recoveryDidKey
|
143
|
+
? [this.recoveryDidKey, this.plcRotationKey.did()]
|
144
|
+
: [this.plcRotationKey.did()],
|
145
|
+
handle,
|
146
|
+
pds: this.publicUrl,
|
147
|
+
signer: this.plcRotationKey,
|
148
|
+
})
|
149
|
+
|
150
|
+
const { did, op } = plcCreate
|
151
|
+
|
152
|
+
await this.actorStore.create(did, signingKey)
|
153
|
+
try {
|
154
|
+
const commit = await this.actorStore.transact(did, (actorTxn) =>
|
155
|
+
actorTxn.repo.createRepo([]),
|
156
|
+
)
|
157
|
+
|
158
|
+
await this.plcClient.sendOperation(did, op)
|
159
|
+
|
160
|
+
await this.accountManager.createAccount({
|
161
|
+
did,
|
162
|
+
handle,
|
163
|
+
email,
|
164
|
+
password,
|
165
|
+
inviteCode,
|
166
|
+
repoCid: commit.cid,
|
167
|
+
repoRev: commit.rev,
|
168
|
+
})
|
169
|
+
try {
|
170
|
+
await this.sequencer.sequenceIdentityEvt(did, handle)
|
171
|
+
await this.sequencer.sequenceAccountEvt(did, AccountStatus.Active)
|
172
|
+
await this.sequencer.sequenceCommit(did, commit)
|
173
|
+
await this.accountManager.updateRepoRoot(did, commit.cid, commit.rev)
|
174
|
+
await this.actorStore.clearReservedKeypair(signingKeyDid, did)
|
175
|
+
|
176
|
+
const account = await this.accountManager.getAccount(did)
|
177
|
+
if (!account) throw new Error('Account not found')
|
178
|
+
|
179
|
+
return await this.buildAccount(account)
|
180
|
+
} catch (err) {
|
181
|
+
this.accountManager.deleteAccount(did)
|
182
|
+
throw err
|
183
|
+
}
|
184
|
+
} catch (err) {
|
185
|
+
await this.actorStore.destroy(did)
|
186
|
+
throw err
|
187
|
+
}
|
188
|
+
}
|
189
|
+
|
190
|
+
async authenticateAccount({
|
191
|
+
locale: _locale,
|
192
|
+
username: identifier,
|
193
|
+
password,
|
194
|
+
// Not supported by the PDS (yet?)
|
195
|
+
emailOtp = undefined,
|
196
|
+
}: AuthenticateAccountData): Promise<Account> {
|
197
|
+
// @TODO (?) Send an email to the user to notify them of the login attempt
|
198
|
+
try {
|
199
|
+
// Should never happen
|
200
|
+
if (emailOtp != null) {
|
201
|
+
throw new Error('Email OTP is not supported')
|
202
|
+
}
|
203
|
+
|
204
|
+
const { user, appPassword, isSoftDeleted } =
|
205
|
+
await this.accountManager.login({ identifier, password })
|
206
|
+
|
207
|
+
if (isSoftDeleted) {
|
208
|
+
throw new InvalidRequestError('Account was taken down')
|
209
|
+
}
|
210
|
+
|
211
|
+
if (appPassword) {
|
212
|
+
throw new InvalidRequestError('App passwords are not allowed')
|
213
|
+
}
|
214
|
+
|
215
|
+
return this.buildAccount(user)
|
216
|
+
} catch (err) {
|
217
|
+
if (err instanceof XrpcAuthRequiredError) {
|
218
|
+
throw new InvalidRequestError(err.message, err)
|
219
|
+
}
|
220
|
+
throw err
|
221
|
+
}
|
222
|
+
}
|
223
|
+
|
224
|
+
async addDeviceAccount(
|
225
|
+
deviceId: DeviceId,
|
226
|
+
sub: string,
|
227
|
+
remember: boolean,
|
228
|
+
): Promise<DeviceAccountInfo> {
|
229
|
+
const [row] = await this.db.executeWithRetry(
|
230
|
+
deviceAccount.createOrUpdateQB(this.db, deviceId, sub, remember),
|
231
|
+
)
|
232
|
+
if (!row) throw new Error('Failed to create device account')
|
233
|
+
return deviceAccount.toDeviceAccountInfo(row)
|
234
|
+
}
|
235
|
+
|
236
|
+
async addAuthorizedClient(
|
237
|
+
deviceId: DeviceId,
|
238
|
+
sub: string,
|
239
|
+
clientId: string,
|
240
|
+
): Promise<void> {
|
241
|
+
await this.db.transaction(async (dbTxn) => {
|
242
|
+
const row = await deviceAccount
|
243
|
+
.readQB(dbTxn, deviceId, sub)
|
244
|
+
.executeTakeFirstOrThrow()
|
245
|
+
|
246
|
+
const { authorizedClients } = deviceAccount.toDeviceAccountInfo(row)
|
247
|
+
if (!authorizedClients.includes(clientId)) {
|
248
|
+
await deviceAccount
|
249
|
+
.updateQB(dbTxn, deviceId, sub, {
|
250
|
+
authorizedClients: [...authorizedClients, clientId],
|
251
|
+
})
|
252
|
+
.execute()
|
253
|
+
}
|
254
|
+
})
|
255
|
+
}
|
256
|
+
|
257
|
+
async getDeviceAccount(
|
258
|
+
deviceId: DeviceId,
|
259
|
+
sub: string,
|
260
|
+
): Promise<AccountInfo | null> {
|
261
|
+
const row = await deviceAccount
|
262
|
+
.getAccountInfoQB(this.db, deviceId, sub)
|
263
|
+
.executeTakeFirst()
|
264
|
+
|
265
|
+
if (!row) return null
|
266
|
+
|
267
|
+
return {
|
268
|
+
account: await this.buildAccount(row),
|
269
|
+
info: deviceAccount.toDeviceAccountInfo(row),
|
270
|
+
}
|
271
|
+
}
|
272
|
+
|
273
|
+
async listDeviceAccounts(deviceId: DeviceId): Promise<AccountInfo[]> {
|
274
|
+
const rows = await deviceAccount
|
275
|
+
.listRememberedQB(this.db, deviceId)
|
276
|
+
.execute()
|
277
|
+
|
278
|
+
return Promise.all(
|
279
|
+
rows.map(async (row) => ({
|
280
|
+
account: await this.buildAccount(row),
|
281
|
+
info: deviceAccount.toDeviceAccountInfo(row),
|
282
|
+
})),
|
283
|
+
)
|
284
|
+
}
|
285
|
+
|
286
|
+
async removeDeviceAccount(deviceId: DeviceId, sub: string): Promise<void> {
|
287
|
+
await this.db.executeWithRetry(
|
288
|
+
deviceAccount.removeQB(this.db, deviceId, sub),
|
289
|
+
)
|
290
|
+
}
|
291
|
+
|
292
|
+
async resetPasswordRequest({
|
293
|
+
locale: _locale,
|
294
|
+
email,
|
295
|
+
}: ResetPasswordRequestData): Promise<void> {
|
296
|
+
const account = await this.accountManager.getAccountByEmail(email, {
|
297
|
+
includeDeactivated: true,
|
298
|
+
includeTakenDown: true,
|
299
|
+
})
|
300
|
+
|
301
|
+
if (!account?.email || !account?.handle) return
|
302
|
+
|
303
|
+
const { handle } = account
|
304
|
+
const token = await this.accountManager.createEmailToken(
|
305
|
+
account.did,
|
306
|
+
'reset_password',
|
307
|
+
)
|
308
|
+
|
309
|
+
// @TODO Use the locale to send the email in the right language
|
310
|
+
await this.mailer.sendResetPassword(
|
311
|
+
{ handle, token },
|
312
|
+
{ to: account.email },
|
313
|
+
)
|
314
|
+
}
|
315
|
+
|
316
|
+
async resetPasswordConfirm(data: ResetPasswordConfirmData): Promise<void> {
|
317
|
+
await this.accountManager.resetPassword(data)
|
318
|
+
}
|
319
|
+
|
320
|
+
async verifyHandleAvailability(handle: string): Promise<void> {
|
321
|
+
// @NOTE Handle validity & normalization already enforced by the OAuthProvider
|
322
|
+
try {
|
323
|
+
const normalized =
|
324
|
+
await this.accountManager.normalizeAndValidateHandle(handle)
|
325
|
+
|
326
|
+
// Should never happen (OAuthProvider should have already validated the
|
327
|
+
// handle) This check is just a safeguard against future normalization
|
328
|
+
// changes.
|
329
|
+
if (normalized !== handle) {
|
330
|
+
throw new HandleUnavailableError('syntax', 'Invalid handle')
|
331
|
+
}
|
332
|
+
|
333
|
+
const account = await this.accountManager.getAccount(normalized, {
|
334
|
+
includeDeactivated: true,
|
335
|
+
includeTakenDown: true,
|
336
|
+
})
|
337
|
+
|
338
|
+
if (account) {
|
339
|
+
throw new HandleUnavailableError('taken')
|
340
|
+
}
|
341
|
+
} catch (err) {
|
342
|
+
if (err instanceof XrpcInvalidRequestError) {
|
343
|
+
throw err.customErrorName === 'HandleNotAvailable'
|
344
|
+
? new HandleUnavailableError('taken', err.message)
|
345
|
+
: new HandleUnavailableError('syntax', err.message)
|
346
|
+
}
|
347
|
+
|
348
|
+
throw err
|
349
|
+
}
|
350
|
+
}
|
351
|
+
|
352
|
+
// RequestStore
|
353
|
+
|
354
|
+
async createRequest(id: RequestId, data: RequestData): Promise<void> {
|
355
|
+
await this.db.executeWithRetry(authRequest.createQB(this.db, id, data))
|
356
|
+
}
|
357
|
+
|
358
|
+
async readRequest(id: RequestId): Promise<RequestData | null> {
|
359
|
+
try {
|
360
|
+
const row = await authRequest.readQB(this.db, id).executeTakeFirst()
|
361
|
+
if (!row) return null
|
362
|
+
return authRequest.rowToRequestData(row)
|
363
|
+
} finally {
|
364
|
+
// Take the opportunity to clean up expired requests. Do this after we got
|
365
|
+
// the current (potentially expired) request data to allow the provider to
|
366
|
+
// handle expired requests.
|
367
|
+
this.backgroundQueue.add(async () => {
|
368
|
+
await this.db.executeWithRetry(authRequest.removeOldExpiredQB(this.db))
|
369
|
+
})
|
370
|
+
}
|
371
|
+
}
|
372
|
+
|
373
|
+
async updateRequest(id: RequestId, data: UpdateRequestData): Promise<void> {
|
374
|
+
await this.db.executeWithRetry(authRequest.updateQB(this.db, id, data))
|
375
|
+
}
|
376
|
+
|
377
|
+
async deleteRequest(id: RequestId): Promise<void> {
|
378
|
+
await this.db.executeWithRetry(authRequest.removeByIdQB(this.db, id))
|
379
|
+
}
|
380
|
+
|
381
|
+
async findRequestByCode(code: Code): Promise<FoundRequestResult | null> {
|
382
|
+
const row = await authRequest.findByCodeQB(this.db, code).executeTakeFirst()
|
383
|
+
return row ? authRequest.rowToFoundRequestResult(row) : null
|
384
|
+
}
|
385
|
+
|
386
|
+
// DeviceStore
|
387
|
+
|
388
|
+
async createDevice(deviceId: DeviceId, data: DeviceData): Promise<void> {
|
389
|
+
await this.db.executeWithRetry(device.createQB(this.db, deviceId, data))
|
390
|
+
}
|
391
|
+
|
392
|
+
async readDevice(deviceId: DeviceId): Promise<null | DeviceData> {
|
393
|
+
const row = await device.readQB(this.db, deviceId).executeTakeFirst()
|
394
|
+
return row ? device.rowToDeviceData(row) : null
|
395
|
+
}
|
396
|
+
|
397
|
+
async updateDevice(
|
398
|
+
deviceId: DeviceId,
|
399
|
+
data: Partial<DeviceData>,
|
400
|
+
): Promise<void> {
|
401
|
+
await this.db.executeWithRetry(device.updateQB(this.db, deviceId, data))
|
402
|
+
}
|
403
|
+
|
404
|
+
async deleteDevice(deviceId: DeviceId): Promise<void> {
|
405
|
+
// Will cascade to device_account (device_account_device_id_fk)
|
406
|
+
await this.db.executeWithRetry(device.removeQB(this.db, deviceId))
|
407
|
+
}
|
408
|
+
|
409
|
+
// TokenStore
|
410
|
+
|
411
|
+
async createToken(
|
412
|
+
id: TokenId,
|
413
|
+
data: TokenData,
|
414
|
+
refreshToken?: RefreshToken,
|
415
|
+
): Promise<void> {
|
416
|
+
await this.db.transaction(async (dbTxn) => {
|
417
|
+
if (refreshToken) {
|
418
|
+
const { count } = await usedRefreshToken
|
419
|
+
.countQB(dbTxn, refreshToken)
|
420
|
+
.executeTakeFirstOrThrow()
|
421
|
+
|
422
|
+
if (count > 0) {
|
423
|
+
throw new Error('Refresh token already in use')
|
424
|
+
}
|
425
|
+
}
|
426
|
+
|
427
|
+
return token.createQB(dbTxn, id, data, refreshToken).execute()
|
428
|
+
})
|
429
|
+
}
|
430
|
+
|
431
|
+
async readToken(tokenId: TokenId): Promise<TokenInfo | null> {
|
432
|
+
const row = await token.findByQB(this.db, { tokenId }).executeTakeFirst()
|
433
|
+
return row ? token.toTokenInfo(row, this.serviceDid) : null
|
434
|
+
}
|
435
|
+
|
436
|
+
async deleteToken(tokenId: TokenId): Promise<void> {
|
437
|
+
// Will cascade to used_refresh_token (used_refresh_token_fk)
|
438
|
+
await this.db.executeWithRetry(token.removeQB(this.db, tokenId))
|
439
|
+
}
|
440
|
+
|
441
|
+
async rotateToken(
|
442
|
+
tokenId: TokenId,
|
443
|
+
newTokenId: TokenId,
|
444
|
+
newRefreshToken: RefreshToken,
|
445
|
+
newData: NewTokenData,
|
446
|
+
): Promise<void> {
|
447
|
+
const err = await this.db.transaction(async (dbTxn) => {
|
448
|
+
const { id, currentRefreshToken } = await token
|
449
|
+
.forRotateQB(dbTxn, tokenId)
|
450
|
+
.executeTakeFirstOrThrow()
|
451
|
+
|
452
|
+
if (currentRefreshToken) {
|
453
|
+
await usedRefreshToken
|
454
|
+
.insertQB(dbTxn, id, currentRefreshToken)
|
455
|
+
.execute()
|
456
|
+
}
|
457
|
+
|
458
|
+
const { count } = await usedRefreshToken
|
459
|
+
.countQB(dbTxn, newRefreshToken)
|
460
|
+
.executeTakeFirstOrThrow()
|
461
|
+
|
462
|
+
if (count > 0) {
|
463
|
+
// Do NOT throw (we don't want the transaction to be rolled back)
|
464
|
+
return new Error('New refresh token already in use')
|
465
|
+
}
|
466
|
+
|
467
|
+
await token
|
468
|
+
.rotateQB(dbTxn, id, newTokenId, newRefreshToken, newData)
|
469
|
+
.execute()
|
470
|
+
})
|
471
|
+
|
472
|
+
if (err) throw err
|
473
|
+
}
|
474
|
+
|
475
|
+
async findTokenByRefreshToken(
|
476
|
+
refreshToken: RefreshToken,
|
477
|
+
): Promise<TokenInfo | null> {
|
478
|
+
const used = await usedRefreshToken
|
479
|
+
.findByTokenQB(this.db, refreshToken)
|
480
|
+
.executeTakeFirst()
|
481
|
+
|
482
|
+
const search = used
|
483
|
+
? { id: used.tokenId }
|
484
|
+
: { currentRefreshToken: refreshToken }
|
485
|
+
|
486
|
+
const row = await token.findByQB(this.db, search).executeTakeFirst()
|
487
|
+
return row ? token.toTokenInfo(row, this.serviceDid) : null
|
488
|
+
}
|
489
|
+
|
490
|
+
async findTokenByCode(code: Code): Promise<TokenInfo | null> {
|
491
|
+
const row = await token.findByQB(this.db, { code }).executeTakeFirst()
|
492
|
+
return row ? token.toTokenInfo(row, this.serviceDid) : null
|
493
|
+
}
|
494
|
+
}
|
@@ -1,4 +1,5 @@
|
|
1
1
|
import { BlobStore } from '@atproto/repo'
|
2
|
+
import { SyncEvtData } from '../../repo'
|
2
3
|
import { BlobReader } from '../blob/reader'
|
3
4
|
import { ActorDb } from '../db'
|
4
5
|
import { RecordReader } from '../record/reader'
|
@@ -17,4 +18,14 @@ export class RepoReader {
|
|
17
18
|
this.record = new RecordReader(db)
|
18
19
|
this.storage = new SqlRepoReader(db)
|
19
20
|
}
|
21
|
+
|
22
|
+
async getSyncEventData(): Promise<SyncEvtData> {
|
23
|
+
const root = await this.storage.getRootDetailed()
|
24
|
+
const { blocks } = await this.storage.getBlocks([root.cid])
|
25
|
+
return {
|
26
|
+
cid: root.cid,
|
27
|
+
rev: root.rev,
|
28
|
+
blocks,
|
29
|
+
}
|
30
|
+
}
|
20
31
|
}
|
@@ -18,7 +18,6 @@ import { ActorDb } from '../db'
|
|
18
18
|
import { RecordTransactor } from '../record/transactor'
|
19
19
|
import { RepoReader } from './reader'
|
20
20
|
import { SqlRepoTransactor } from './sql-repo-transactor'
|
21
|
-
import { blobCidsFromWrites, commitOpsFromCreates } from './util'
|
22
21
|
|
23
22
|
export class RepoTransactor extends RepoReader {
|
24
23
|
blob: BlobTransactor
|
@@ -61,10 +60,14 @@ export class RepoTransactor extends RepoReader {
|
|
61
60
|
this.indexWrites(writes, commit.rev),
|
62
61
|
this.blob.processWriteBlobs(commit.rev, writes),
|
63
62
|
])
|
63
|
+
const ops = writes.map((w) => ({
|
64
|
+
action: 'create' as const,
|
65
|
+
path: formatDataKey(w.uri.collection, w.uri.rkey),
|
66
|
+
cid: w.cid,
|
67
|
+
}))
|
64
68
|
return {
|
65
69
|
...commit,
|
66
|
-
ops
|
67
|
-
blobs: blobCidsFromWrites(writes),
|
70
|
+
ops,
|
68
71
|
prevData: null,
|
69
72
|
}
|
70
73
|
}
|
@@ -74,7 +77,16 @@ export class RepoTransactor extends RepoReader {
|
|
74
77
|
swapCommitCid?: CID,
|
75
78
|
): Promise<CommitDataWithOps> {
|
76
79
|
this.db.assertTransaction()
|
80
|
+
if (writes.length > 200) {
|
81
|
+
throw new InvalidRequestError('Too many writes. Max: 200')
|
82
|
+
}
|
83
|
+
|
77
84
|
const commit = await this.formatCommit(writes, swapCommitCid)
|
85
|
+
// Do not allow commits > 2MB
|
86
|
+
if (commit.relevantBlocks.byteSize > 2000000) {
|
87
|
+
throw new InvalidRequestError('Too many writes. Max event size: 2MB')
|
88
|
+
}
|
89
|
+
|
78
90
|
await Promise.all([
|
79
91
|
// persist the commit to repo storage
|
80
92
|
this.storage.applyCommit(commit),
|
@@ -166,7 +178,6 @@ export class RepoTransactor extends RepoReader {
|
|
166
178
|
return {
|
167
179
|
...commit,
|
168
180
|
ops: commitOps,
|
169
|
-
blobs: blobCidsFromWrites(writes),
|
170
181
|
prevData,
|
171
182
|
}
|
172
183
|
}
|
@@ -1,4 +1,4 @@
|
|
1
|
-
import { AccountStatus } from '../../../../account-manager'
|
1
|
+
import { AccountStatus } from '../../../../account-manager/account-manager'
|
2
2
|
import { AppContext } from '../../../../context'
|
3
3
|
import { Server } from '../../../../lexicon'
|
4
4
|
|
@@ -9,12 +9,11 @@ export default function (server: Server, ctx: AppContext) {
|
|
9
9
|
const { did } = input.body
|
10
10
|
await ctx.actorStore.destroy(did)
|
11
11
|
await ctx.accountManager.deleteAccount(did)
|
12
|
-
const tombstoneSeq = await ctx.sequencer.sequenceTombstone(did)
|
13
12
|
const accountSeq = await ctx.sequencer.sequenceAccountEvt(
|
14
13
|
did,
|
15
14
|
AccountStatus.Deleted,
|
16
15
|
)
|
17
|
-
await ctx.sequencer.deleteAllForUser(did, [accountSeq
|
16
|
+
await ctx.sequencer.deleteAllForUser(did, [accountSeq])
|
18
17
|
},
|
19
18
|
})
|
20
19
|
}
|
@@ -1,6 +1,5 @@
|
|
1
1
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
2
2
|
import { AppContext } from '../../../../context'
|
3
|
-
import { normalizeAndValidateHandle } from '../../../../handle'
|
4
3
|
import { Server } from '../../../../lexicon'
|
5
4
|
import { httpLogger } from '../../../../logger'
|
6
5
|
|
@@ -9,12 +8,13 @@ export default function (server: Server, ctx: AppContext) {
|
|
9
8
|
auth: ctx.authVerifier.adminToken,
|
10
9
|
handler: async ({ input }) => {
|
11
10
|
const { did } = input.body
|
12
|
-
const handle = await normalizeAndValidateHandle(
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
11
|
+
const handle = await ctx.accountManager.normalizeAndValidateHandle(
|
12
|
+
input.body.handle,
|
13
|
+
{
|
14
|
+
did,
|
15
|
+
allowAnyValid: true,
|
16
|
+
},
|
17
|
+
)
|
18
18
|
|
19
19
|
// Pessimistic check to handle spam: also enforced by updateHandle() and the db.
|
20
20
|
const account = await ctx.accountManager.getAccount(handle, {
|
@@ -44,7 +44,6 @@ export default function (server: Server, ctx: AppContext) {
|
|
44
44
|
}
|
45
45
|
|
46
46
|
try {
|
47
|
-
await ctx.sequencer.sequenceHandleUpdate(did, handle)
|
48
47
|
await ctx.sequencer.sequenceIdentityEvt(did, handle)
|
49
48
|
} catch (err) {
|
50
49
|
httpLogger.error(
|
@@ -1,20 +1,11 @@
|
|
1
|
-
import * as ident from '@atproto/syntax'
|
2
1
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
3
2
|
import { AppContext } from '../../../../context'
|
3
|
+
import { baseNormalizeAndValidate } from '../../../../handle'
|
4
4
|
import { Server } from '../../../../lexicon'
|
5
5
|
|
6
6
|
export default function (server: Server, ctx: AppContext) {
|
7
7
|
server.com.atproto.identity.resolveHandle(async ({ params }) => {
|
8
|
-
|
9
|
-
try {
|
10
|
-
handle = ident.normalizeAndEnsureValidHandle(params.handle)
|
11
|
-
} catch (err) {
|
12
|
-
if (err instanceof ident.InvalidHandleError) {
|
13
|
-
throw new InvalidRequestError(err.message, 'InvalidHandle')
|
14
|
-
} else {
|
15
|
-
throw err
|
16
|
-
}
|
17
|
-
}
|
8
|
+
const handle = baseNormalizeAndValidate(params.handle)
|
18
9
|
|
19
10
|
let did: string | undefined
|
20
11
|
const user = await ctx.accountManager.getAccount(handle)
|
@@ -1,7 +1,6 @@
|
|
1
1
|
import { DAY, MINUTE } from '@atproto/common'
|
2
2
|
import { InvalidRequestError } from '@atproto/xrpc-server'
|
3
3
|
import { AppContext } from '../../../../context'
|
4
|
-
import { normalizeAndValidateHandle } from '../../../../handle'
|
5
4
|
import { Server } from '../../../../lexicon'
|
6
5
|
import { ids } from '../../../../lexicon/lexicons'
|
7
6
|
import { httpLogger } from '../../../../logger'
|
@@ -40,11 +39,10 @@ export default function (server: Server, ctx: AppContext) {
|
|
40
39
|
return
|
41
40
|
}
|
42
41
|
|
43
|
-
const handle = await normalizeAndValidateHandle(
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
})
|
42
|
+
const handle = await ctx.accountManager.normalizeAndValidateHandle(
|
43
|
+
input.body.handle,
|
44
|
+
{ did: requester },
|
45
|
+
)
|
48
46
|
|
49
47
|
// Pessimistic check to handle spam: also enforced by updateHandle() and the db.
|
50
48
|
const account = await ctx.accountManager.getAccount(handle, {
|
@@ -79,7 +77,6 @@ export default function (server: Server, ctx: AppContext) {
|
|
79
77
|
}
|
80
78
|
|
81
79
|
try {
|
82
|
-
await ctx.sequencer.sequenceHandleUpdate(requester, handle)
|
83
80
|
await ctx.sequencer.sequenceIdentityEvt(requester, handle)
|
84
81
|
} catch (err) {
|
85
82
|
httpLogger.error(
|