mirror of
https://github.com/lnbits/lnbits-legend.git
synced 2025-02-24 22:58:46 +01:00
no more superuser url! delete cookie on logout add usr login feature fix node management * Cleaned up login form * CreateUser * information leak * cleaner parsing usr from url * rename decorators * login secret * fix: add back `superuser` command * chore: remove `fastapi_login` * fix: extract `token` from cookie * chore: prepare to extract user * feat: check user * chore: code clean-up * feat: happy flow working * fix: usr only login * fix: user already logged in * feat: check user in URL * fix: verify password at DB level * fix: do not show `Login` controls if user already logged in * fix: separate login endpoints * fix: remove `usr` param * chore: update error message * refactor: register method * feat: logout * chore: move comments * fix: remove user auth check from API * fix: user check unnecessary * fix: redirect after logout * chore: remove garbage files * refactor: simplify constructor call * fix: hide user icon if not authorized * refactor: rename auth env vars * chore: code clean-up * fix: add types for `python-jose` * fix: add types for `passlib` * fix: return type * feat: set default value for `auth_secret_key` to hash of super user * fix: default value * feat: rework login page * feat: ui polishing * feat: google auth * feat: add google auth * chore: remove `authlib` dependency * refactor: extract `_handle_sso_login` method * refactor: convert methods to `properties` * refactor: rename: `user_api` to `auth_api` * feat: store user info from SSO * chore: re-arange the buttons * feat: conditional rendering of login options * feat: correctly render buttons * fix: re-add `Claim Bitcoin` from the main page * fix: create wallet must send new user * fix: no `username-password` auth method * refactor: rename auth method * fix: do not force API level UUID4 validation * feat: add validation for username * feat: add account page * feat: update account * feat: add `has_password` for user * fix: email not editable * feat: validate email for existing account * fix: register check * feat: reset password * chore: code clean-up * feat: handle token expired * fix: only redirect if `text/html` * refactor: remove `OAuth2PasswordRequestForm` * chore: remove `python-multipart` dependency * fix: handle no headers for exception * feat: add back button on error screen * feat: show user profile image * fix: check account creation permissions * fix: auth for internal api call * chore: add some docs * chore: code clean-up * fix: rebase stuff * fix: default value types * refactor: customize error messages * fix: move types libs to dev dependencies * doc: specify the `Authorization callback URL` * fix: pass missing superuser id in node ui test * fix: keep usr param on wallet redirect removing usr param causes an issue if the browser doesnt yet have an access token. * fix: do not redirect if `wal` query param not present * fix: add nativeBuildInputs and buildInputs overrides to flake.nix * bump fastapi-sso to 0.9.0 which fixes some security issues * refactor: move the `lnbits_admin_extensions` to decorators * chore: bring package config from `dev` * chore: re-add dependencies * chore: re-add cev dependencies * chore: re-add mypy ignores * feat: i18n * refactor: move admin ext check to decorator (fix after rebase) * fix: label mapping * fix: re-fetch user after first wallet was created * fix: unlikely case that `user` is not found * refactor translations (move '*' to code) * reorganize deps in pyproject.toml, add comment * update flake.lock and simplify flake.nix after upstreaming overrides for fastapi-sso, types-passlib, types-pyasn1, types-python-jose were upstreamed in https://github.com/nix-community/poetry2nix/pull/1463 * fix: more relaxed email verification (by @prusnak) * fix: remove `\b` (boundaries) since we re using `fullmatch` * chore: `make bundle` --------- Co-authored-by: dni ⚡ <office@dnilabs.com> Co-authored-by: Arc <ben@arc.wales> Co-authored-by: jackstar12 <jkranawetter05@gmail.com> Co-authored-by: Pavol Rusnak <pavol@rusnak.io>
212 lines
7.5 KiB
Python
212 lines
7.5 KiB
Python
from http import HTTPStatus
|
|
from typing import Any, List, Tuple, Union
|
|
|
|
from fastapi import FastAPI, Request
|
|
from fastapi.responses import HTMLResponse, JSONResponse
|
|
from slowapi import _rate_limit_exceeded_handler
|
|
from slowapi.errors import RateLimitExceeded
|
|
from slowapi.middleware import SlowAPIMiddleware
|
|
from starlette.middleware.gzip import GZipMiddleware
|
|
from starlette.types import ASGIApp, Receive, Scope, Send
|
|
|
|
from lnbits.core.db import core_app_extra
|
|
from lnbits.helpers import template_renderer
|
|
from lnbits.settings import settings
|
|
|
|
|
|
class InstalledExtensionMiddleware:
|
|
# This middleware class intercepts calls made to the extensions API and:
|
|
# - it blocks the calls if the extension has been disabled or uninstalled.
|
|
# - it redirects the calls to the latest version of the extension
|
|
# if the extension has been upgraded.
|
|
# - otherwise it has no effect
|
|
def __init__(self, app: ASGIApp) -> None:
|
|
self.app = app
|
|
|
|
async def __call__(self, scope: Scope, receive: Receive, send: Send) -> None:
|
|
full_path = scope.get("path", "/")
|
|
if full_path == "/":
|
|
await self.app(scope, receive, send)
|
|
return
|
|
|
|
top_path, *rest = [p for p in full_path.split("/") if p]
|
|
headers = scope.get("headers", [])
|
|
|
|
# block path for all users if the extension is disabled
|
|
if top_path in settings.lnbits_deactivated_extensions:
|
|
response = self._response_by_accepted_type(
|
|
headers, f"Extension '{top_path}' disabled", HTTPStatus.NOT_FOUND
|
|
)
|
|
await response(scope, receive, send)
|
|
return
|
|
|
|
# static resources do not require redirect
|
|
if rest[0:1] == ["static"]:
|
|
await self.app(scope, receive, send)
|
|
return
|
|
|
|
upgrade_path = next(
|
|
(
|
|
e
|
|
for e in settings.lnbits_upgraded_extensions
|
|
if e.endswith(f"/{top_path}")
|
|
),
|
|
None,
|
|
)
|
|
# re-route all trafic if the extension has been upgraded
|
|
if upgrade_path:
|
|
tail = "/".join(rest)
|
|
scope["path"] = f"/upgrades/{upgrade_path}/{tail}"
|
|
|
|
await self.app(scope, receive, send)
|
|
|
|
def _response_by_accepted_type(
|
|
self, headers: List[Any], msg: str, status_code: HTTPStatus
|
|
) -> Union[HTMLResponse, JSONResponse]:
|
|
"""
|
|
Build an HTTP response containing the `msg` as HTTP body and the `status_code`
|
|
as HTTP code. If the `accept` HTTP header is present int the request and
|
|
contains the value of `text/html` then return an `HTMLResponse`,
|
|
otherwise return an `JSONResponse`.
|
|
"""
|
|
accept_header: str = next(
|
|
(
|
|
h[1].decode("UTF-8")
|
|
for h in headers
|
|
if len(h) >= 2 and h[0].decode("UTF-8") == "accept"
|
|
),
|
|
"",
|
|
)
|
|
|
|
if "text/html" in [a for a in accept_header.split(",")]:
|
|
return HTMLResponse(
|
|
status_code=status_code,
|
|
content=template_renderer()
|
|
.TemplateResponse("error.html", {"request": {}, "err": msg})
|
|
.body,
|
|
)
|
|
|
|
return JSONResponse(
|
|
status_code=status_code,
|
|
content={"detail": msg},
|
|
)
|
|
|
|
|
|
class CustomGZipMiddleware(GZipMiddleware):
|
|
def __init__(self, *args, exclude_paths=None, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
self.exclude_paths = exclude_paths or []
|
|
|
|
async def __call__(self, scope: Scope, receive: Receive, send: Send) -> None:
|
|
if "path" in scope and scope["path"] in self.exclude_paths:
|
|
await self.app(scope, receive, send)
|
|
return
|
|
await super().__call__(scope, receive, send)
|
|
|
|
|
|
class ExtensionsRedirectMiddleware:
|
|
# Extensions are allowed to specify redirect paths. A call to a path outside the
|
|
# scope of the extension can be redirected to one of the extension's endpoints.
|
|
# Eg: redirect `GET /.well-known` to `GET /lnurlp/api/v1/well-known`
|
|
|
|
def __init__(self, app: ASGIApp) -> None:
|
|
self.app = app
|
|
|
|
async def __call__(self, scope: Scope, receive: Receive, send: Send) -> None:
|
|
if "path" not in scope:
|
|
await self.app(scope, receive, send)
|
|
return
|
|
|
|
req_headers = scope["headers"] if "headers" in scope else []
|
|
redirect = self._find_redirect(scope["path"], req_headers)
|
|
if redirect:
|
|
scope["path"] = self._new_path(redirect, scope["path"])
|
|
|
|
await self.app(scope, receive, send)
|
|
|
|
def _find_redirect(self, path: str, req_headers: List[Tuple[bytes, bytes]]):
|
|
return next(
|
|
(
|
|
r
|
|
for r in settings.lnbits_extensions_redirects
|
|
if self._redirect_matches(r, path, req_headers)
|
|
),
|
|
None,
|
|
)
|
|
|
|
def _redirect_matches(
|
|
self, redirect: dict, path: str, req_headers: List[Tuple[bytes, bytes]]
|
|
) -> bool:
|
|
if "from_path" not in redirect:
|
|
return False
|
|
header_filters = (
|
|
redirect["header_filters"] if "header_filters" in redirect else {}
|
|
)
|
|
return self._has_common_path(redirect["from_path"], path) and self._has_headers(
|
|
header_filters, req_headers
|
|
)
|
|
|
|
def _has_headers(
|
|
self, filter_headers: dict, req_headers: List[Tuple[bytes, bytes]]
|
|
) -> bool:
|
|
for h in filter_headers:
|
|
if not self._has_header(req_headers, (str(h), str(filter_headers[h]))):
|
|
return False
|
|
return True
|
|
|
|
def _has_header(
|
|
self, req_headers: List[Tuple[bytes, bytes]], header: Tuple[str, str]
|
|
) -> bool:
|
|
for h in req_headers:
|
|
if (
|
|
h[0].decode().lower() == header[0].lower()
|
|
and h[1].decode() == header[1]
|
|
):
|
|
return True
|
|
return False
|
|
|
|
def _has_common_path(self, redirect_path: str, req_path: str) -> bool:
|
|
redirect_path_elements = redirect_path.split("/")
|
|
req_path_elements = req_path.split("/")
|
|
if len(redirect_path) > len(req_path):
|
|
return False
|
|
sub_path = req_path_elements[: len(redirect_path_elements)]
|
|
return redirect_path == "/".join(sub_path)
|
|
|
|
def _new_path(self, redirect: dict, req_path: str) -> str:
|
|
from_path = redirect["from_path"].split("/")
|
|
redirect_to = redirect["redirect_to_path"].split("/")
|
|
req_tail_path = req_path.split("/")[len(from_path) :]
|
|
|
|
elements = [
|
|
e for e in ([redirect["ext_id"]] + redirect_to + req_tail_path) if e != ""
|
|
]
|
|
|
|
return "/" + "/".join(elements)
|
|
|
|
|
|
def add_ratelimit_middleware(app: FastAPI):
|
|
core_app_extra.register_new_ratelimiter()
|
|
app.add_exception_handler(RateLimitExceeded, _rate_limit_exceeded_handler)
|
|
app.add_middleware(SlowAPIMiddleware)
|
|
|
|
|
|
def add_ip_block_middleware(app: FastAPI):
|
|
@app.middleware("http")
|
|
async def block_allow_ip_middleware(request: Request, call_next):
|
|
if not request.client:
|
|
return JSONResponse(
|
|
status_code=403, # Forbidden
|
|
content={"detail": "No request client"},
|
|
)
|
|
if (
|
|
request.client.host in settings.lnbits_blocked_ips
|
|
and request.client.host not in settings.lnbits_allowed_ips
|
|
):
|
|
return JSONResponse(
|
|
status_code=403, # Forbidden
|
|
content={"detail": "IP is blocked"},
|
|
)
|
|
return await call_next(request)
|
|
|
|
app.middleware("http")(block_allow_ip_middleware)
|