2020-05-03 15:57:05 +02:00
|
|
|
from http import HTTPStatus
|
2022-07-20 09:36:13 +02:00
|
|
|
|
2023-01-02 11:56:28 +01:00
|
|
|
from fastapi import Security, status
|
2021-08-29 19:38:42 +02:00
|
|
|
from fastapi.exceptions import HTTPException
|
|
|
|
from fastapi.openapi.models import APIKey, APIKeyIn
|
|
|
|
from fastapi.security.api_key import APIKeyHeader, APIKeyQuery
|
|
|
|
from fastapi.security.base import SecurityBase
|
2021-10-18 17:06:06 +02:00
|
|
|
from pydantic.types import UUID4
|
2021-08-29 19:38:42 +02:00
|
|
|
from starlette.requests import Request
|
|
|
|
|
2020-03-04 23:11:15 +01:00
|
|
|
from lnbits.core.crud import get_user, get_wallet_for_key
|
2021-10-18 17:06:06 +02:00
|
|
|
from lnbits.core.models import User, Wallet
|
2021-08-22 20:07:24 +02:00
|
|
|
from lnbits.requestvars import g
|
2022-10-03 16:46:46 +02:00
|
|
|
from lnbits.settings import settings
|
2020-03-04 23:11:15 +01:00
|
|
|
|
|
|
|
|
2021-08-29 19:38:42 +02:00
|
|
|
class KeyChecker(SecurityBase):
|
2021-10-17 19:33:29 +02:00
|
|
|
def __init__(
|
|
|
|
self, scheme_name: str = None, auto_error: bool = True, api_key: str = None
|
|
|
|
):
|
2021-08-29 19:38:42 +02:00
|
|
|
self.scheme_name = scheme_name or self.__class__.__name__
|
|
|
|
self.auto_error = auto_error
|
|
|
|
self._key_type = "invoice"
|
|
|
|
self._api_key = api_key
|
|
|
|
if api_key:
|
2022-07-20 09:36:13 +02:00
|
|
|
key = APIKey(
|
2021-10-17 19:33:29 +02:00
|
|
|
**{"in": APIKeyIn.query},
|
|
|
|
name="X-API-KEY",
|
|
|
|
description="Wallet API Key - QUERY",
|
2021-08-29 19:38:42 +02:00
|
|
|
)
|
|
|
|
else:
|
2022-07-20 09:36:13 +02:00
|
|
|
key = APIKey(
|
2021-10-17 19:33:29 +02:00
|
|
|
**{"in": APIKeyIn.header},
|
|
|
|
name="X-API-KEY",
|
|
|
|
description="Wallet API Key - HEADER",
|
2021-08-29 19:38:42 +02:00
|
|
|
)
|
2022-07-26 12:21:21 +02:00
|
|
|
self.wallet = None # type: ignore
|
2022-07-20 09:36:13 +02:00
|
|
|
self.model: APIKey = key
|
2021-08-29 19:38:42 +02:00
|
|
|
|
2022-07-20 09:36:13 +02:00
|
|
|
async def __call__(self, request: Request):
|
2021-08-29 19:38:42 +02:00
|
|
|
try:
|
2021-10-17 19:33:29 +02:00
|
|
|
key_value = (
|
|
|
|
self._api_key
|
|
|
|
if self._api_key
|
|
|
|
else request.headers.get("X-API-KEY") or request.query_params["api-key"]
|
|
|
|
)
|
2021-08-29 19:38:42 +02:00
|
|
|
# FIXME: Find another way to validate the key. A fetch from DB should be avoided here.
|
|
|
|
# Also, we should not return the wallet here - thats silly.
|
|
|
|
# Possibly store it in a Redis DB
|
2022-07-26 12:21:21 +02:00
|
|
|
self.wallet = await get_wallet_for_key(key_value, self._key_type) # type: ignore
|
2022-07-26 12:07:16 +02:00
|
|
|
if not self.wallet:
|
2021-10-17 19:33:29 +02:00
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
|
|
|
detail="Invalid key or expired key.",
|
|
|
|
)
|
2021-08-29 19:38:42 +02:00
|
|
|
|
|
|
|
except KeyError:
|
2021-10-17 19:33:29 +02:00
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.BAD_REQUEST, detail="`X-API-KEY` header missing."
|
|
|
|
)
|
|
|
|
|
2021-08-29 19:38:42 +02:00
|
|
|
|
|
|
|
class WalletInvoiceKeyChecker(KeyChecker):
|
|
|
|
"""
|
|
|
|
WalletInvoiceKeyChecker will ensure that the provided invoice
|
2021-10-15 17:21:05 +02:00
|
|
|
wallet key is correct and populate g().wallet with the wallet
|
2021-08-29 19:38:42 +02:00
|
|
|
for the key in `X-API-key`.
|
|
|
|
|
|
|
|
The checker will raise an HTTPException when the key is wrong in some ways.
|
|
|
|
"""
|
2021-10-17 19:33:29 +02:00
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self, scheme_name: str = None, auto_error: bool = True, api_key: str = None
|
|
|
|
):
|
2021-08-29 19:38:42 +02:00
|
|
|
super().__init__(scheme_name, auto_error, api_key)
|
|
|
|
self._key_type = "invoice"
|
|
|
|
|
2021-10-17 19:33:29 +02:00
|
|
|
|
2021-08-29 19:38:42 +02:00
|
|
|
class WalletAdminKeyChecker(KeyChecker):
|
|
|
|
"""
|
|
|
|
WalletAdminKeyChecker will ensure that the provided admin
|
2021-10-15 17:21:05 +02:00
|
|
|
wallet key is correct and populate g().wallet with the wallet
|
2021-08-29 19:38:42 +02:00
|
|
|
for the key in `X-API-key`.
|
|
|
|
|
|
|
|
The checker will raise an HTTPException when the key is wrong in some ways.
|
|
|
|
"""
|
2021-10-17 19:33:29 +02:00
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self, scheme_name: str = None, auto_error: bool = True, api_key: str = None
|
|
|
|
):
|
2021-08-29 19:38:42 +02:00
|
|
|
super().__init__(scheme_name, auto_error, api_key)
|
|
|
|
self._key_type = "admin"
|
|
|
|
|
2021-10-17 19:33:29 +02:00
|
|
|
|
|
|
|
class WalletTypeInfo:
|
2021-08-29 19:38:42 +02:00
|
|
|
wallet_type: int
|
2022-07-26 12:21:21 +02:00
|
|
|
wallet: Wallet
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2022-07-26 12:21:21 +02:00
|
|
|
def __init__(self, wallet_type: int, wallet: Wallet) -> None:
|
2021-08-29 19:38:42 +02:00
|
|
|
self.wallet_type = wallet_type
|
|
|
|
self.wallet = wallet
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2021-10-17 19:33:29 +02:00
|
|
|
|
|
|
|
api_key_header = APIKeyHeader(
|
|
|
|
name="X-API-KEY",
|
|
|
|
auto_error=False,
|
|
|
|
description="Admin or Invoice key for wallet API's",
|
|
|
|
)
|
|
|
|
api_key_query = APIKeyQuery(
|
|
|
|
name="api-key",
|
|
|
|
auto_error=False,
|
|
|
|
description="Admin or Invoice key for wallet API's",
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
async def get_key_type(
|
|
|
|
r: Request,
|
2023-01-02 11:56:28 +01:00
|
|
|
api_key_header: str = Security(api_key_header),
|
|
|
|
api_key_query: str = Security(api_key_query),
|
2021-10-17 19:33:29 +02:00
|
|
|
) -> WalletTypeInfo:
|
2021-08-29 19:38:42 +02:00
|
|
|
# 0: admin
|
|
|
|
# 1: invoice
|
|
|
|
# 2: invalid
|
2022-06-01 14:53:05 +02:00
|
|
|
pathname = r["path"].split("/")[1]
|
2021-10-17 19:33:29 +02:00
|
|
|
|
2022-08-16 17:01:05 +02:00
|
|
|
token = api_key_header or api_key_query
|
2021-10-15 18:05:38 +02:00
|
|
|
|
2022-08-16 17:01:05 +02:00
|
|
|
if not token:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
|
|
|
detail="Invoice (or Admin) key required.",
|
|
|
|
)
|
2021-10-17 19:33:29 +02:00
|
|
|
|
2022-09-12 17:49:57 +02:00
|
|
|
for typenr, WalletChecker in zip(
|
|
|
|
[0, 1], [WalletAdminKeyChecker, WalletInvoiceKeyChecker]
|
|
|
|
):
|
|
|
|
try:
|
|
|
|
checker = WalletChecker(api_key=token)
|
|
|
|
await checker.__call__(r)
|
|
|
|
wallet = WalletTypeInfo(typenr, checker.wallet) # type: ignore
|
|
|
|
if wallet is None or wallet.wallet is None:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.NOT_FOUND, detail="Wallet does not exist."
|
|
|
|
)
|
|
|
|
if (
|
2022-12-07 11:02:23 +01:00
|
|
|
wallet.wallet.user != settings.super_user
|
|
|
|
and wallet.wallet.user not in settings.lnbits_admin_users
|
2022-10-03 16:46:46 +02:00
|
|
|
) and (
|
|
|
|
settings.lnbits_admin_extensions
|
|
|
|
and pathname in settings.lnbits_admin_extensions
|
|
|
|
):
|
2022-09-12 17:49:57 +02:00
|
|
|
raise HTTPException(
|
2022-09-20 14:34:03 +02:00
|
|
|
status_code=HTTPStatus.FORBIDDEN,
|
|
|
|
detail="User not authorized for this extension.",
|
2022-09-12 17:49:57 +02:00
|
|
|
)
|
|
|
|
return wallet
|
|
|
|
except HTTPException as e:
|
|
|
|
if e.status_code == HTTPStatus.BAD_REQUEST:
|
|
|
|
raise
|
2022-09-20 14:34:03 +02:00
|
|
|
elif e.status_code == HTTPStatus.UNAUTHORIZED:
|
|
|
|
# we pass this in case it is not an invoice key, nor an admin key, and then return NOT_FOUND at the end of this block
|
2022-09-12 17:49:57 +02:00
|
|
|
pass
|
2022-09-20 14:34:03 +02:00
|
|
|
else:
|
|
|
|
raise
|
2022-09-12 17:49:57 +02:00
|
|
|
except:
|
2021-09-28 21:13:04 +02:00
|
|
|
raise
|
2022-09-12 17:49:57 +02:00
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.NOT_FOUND, detail="Wallet does not exist."
|
|
|
|
)
|
2021-10-17 19:33:29 +02:00
|
|
|
|
|
|
|
|
2021-10-18 17:06:06 +02:00
|
|
|
async def require_admin_key(
|
|
|
|
r: Request,
|
2023-01-02 11:56:28 +01:00
|
|
|
api_key_header: str = Security(api_key_header),
|
|
|
|
api_key_query: str = Security(api_key_query),
|
2021-10-18 17:06:06 +02:00
|
|
|
):
|
2022-08-16 17:01:05 +02:00
|
|
|
|
|
|
|
token = api_key_header or api_key_query
|
|
|
|
|
|
|
|
if not token:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
|
|
|
detail="Admin key required.",
|
|
|
|
)
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2021-10-18 17:06:06 +02:00
|
|
|
wallet = await get_key_type(r, token)
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2021-10-18 17:06:06 +02:00
|
|
|
if wallet.wallet_type != 0:
|
|
|
|
# If wallet type is not admin then return the unauthorized status
|
|
|
|
# This also covers when the user passes an invalid key type
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED, detail="Admin key required."
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
return wallet
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2022-01-30 20:43:30 +01:00
|
|
|
|
2021-12-28 16:22:45 +01:00
|
|
|
async def require_invoice_key(
|
|
|
|
r: Request,
|
2023-01-02 11:56:28 +01:00
|
|
|
api_key_header: str = Security(api_key_header),
|
|
|
|
api_key_query: str = Security(api_key_query),
|
2021-12-28 16:22:45 +01:00
|
|
|
):
|
2022-08-16 17:01:05 +02:00
|
|
|
|
2022-08-13 14:47:29 +02:00
|
|
|
token = api_key_header or api_key_query
|
|
|
|
|
2022-08-16 17:01:05 +02:00
|
|
|
if not token:
|
2022-08-13 14:47:29 +02:00
|
|
|
raise HTTPException(
|
2022-08-16 17:01:05 +02:00
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
2022-08-13 14:47:29 +02:00
|
|
|
detail="Invoice (or Admin) key required.",
|
|
|
|
)
|
2021-12-28 16:22:45 +01:00
|
|
|
|
|
|
|
wallet = await get_key_type(r, token)
|
|
|
|
|
|
|
|
if wallet.wallet_type > 1:
|
|
|
|
# If wallet type is not invoice then return the unauthorized status
|
|
|
|
# This also covers when the user passes an invalid key type
|
|
|
|
raise HTTPException(
|
2022-01-30 20:43:30 +01:00
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Invoice (or Admin) key required.",
|
2021-12-28 16:22:45 +01:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
return wallet
|
|
|
|
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2021-09-11 15:18:09 +02:00
|
|
|
async def check_user_exists(usr: UUID4) -> User:
|
2021-10-15 17:21:05 +02:00
|
|
|
g().user = await get_user(usr.hex)
|
2022-10-03 16:46:46 +02:00
|
|
|
|
2021-09-11 15:18:09 +02:00
|
|
|
if not g().user:
|
|
|
|
raise HTTPException(
|
2022-10-03 16:46:46 +02:00
|
|
|
status_code=HTTPStatus.NOT_FOUND, detail="User does not exist."
|
2021-09-11 15:18:09 +02:00
|
|
|
)
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2022-12-23 11:53:45 +01:00
|
|
|
if (
|
|
|
|
len(settings.lnbits_allowed_users) > 0
|
|
|
|
and g().user.id not in settings.lnbits_allowed_users
|
|
|
|
and g().user.id not in settings.lnbits_admin_users
|
|
|
|
and g().user.id != settings.super_user
|
|
|
|
):
|
2021-09-11 15:18:09 +02:00
|
|
|
raise HTTPException(
|
2021-10-17 19:33:29 +02:00
|
|
|
status_code=HTTPStatus.UNAUTHORIZED, detail="User not authorized."
|
2021-09-11 15:18:09 +02:00
|
|
|
)
|
2020-03-04 23:11:15 +01:00
|
|
|
|
2021-09-11 15:18:09 +02:00
|
|
|
return g().user
|
2022-10-03 16:46:46 +02:00
|
|
|
|
|
|
|
|
|
|
|
async def check_admin(usr: UUID4) -> User:
|
|
|
|
user = await check_user_exists(usr)
|
2022-12-06 12:45:26 +01:00
|
|
|
if user.id != settings.super_user and not user.id in settings.lnbits_admin_users:
|
2022-10-03 16:46:46 +02:00
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
|
|
|
detail="User not authorized. No admin privileges.",
|
|
|
|
)
|
2022-12-05 20:41:23 +01:00
|
|
|
user.admin = True
|
2022-12-06 17:08:21 +01:00
|
|
|
user.super_user = False
|
|
|
|
if user.id == settings.super_user:
|
|
|
|
user.super_user = True
|
|
|
|
|
2022-12-07 11:02:23 +01:00
|
|
|
return user
|
2022-12-12 09:43:20 +01:00
|
|
|
|
|
|
|
|
|
|
|
async def check_super_user(usr: UUID4) -> User:
|
|
|
|
user = await check_admin(usr)
|
|
|
|
if user.id != settings.super_user:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=HTTPStatus.UNAUTHORIZED,
|
|
|
|
detail="User not authorized. No super user privileges.",
|
|
|
|
)
|
|
|
|
return user
|