mirror of
https://github.com/matrix-construct/construct
synced 2024-12-12 16:43:07 +01:00
561 lines
12 KiB
C++
561 lines
12 KiB
C++
// Matrix Construct
|
|
//
|
|
// Copyright (C) Matrix Construct Developers, Authors & Contributors
|
|
// Copyright (C) 2016-2019 Jason Volk <jason@zemos.net>
|
|
//
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
// copyright notice and this permission notice is present in all copies. The
|
|
// full license for this software is available in the LICENSE file.
|
|
|
|
namespace ircd::m
|
|
{
|
|
extern conf::item<bool> x_matrix_verify_origin;
|
|
extern conf::item<bool> x_matrix_verify_destination;
|
|
|
|
static string_view authenticate_bridge(const resource::method &, const client &, resource::request &);
|
|
static user::id authenticate_user(const resource::method &, const client &, resource::request &);
|
|
static string_view authenticate_node(const resource::method &, const client &, resource::request &);
|
|
}
|
|
|
|
decltype(ircd::m::resource::log)
|
|
ircd::m::resource::log
|
|
{
|
|
"m.resource"
|
|
};
|
|
|
|
decltype(ircd::m::x_matrix_verify_origin)
|
|
ircd::m::x_matrix_verify_origin
|
|
{
|
|
{ "name", "ircd.m.x_matrix.verify_origin" },
|
|
{ "default", true },
|
|
};
|
|
|
|
decltype(ircd::m::x_matrix_verify_origin)
|
|
ircd::m::x_matrix_verify_destination
|
|
{
|
|
{ "name", "ircd.m.x_matrix.verify_destination" },
|
|
{ "default", true },
|
|
};
|
|
|
|
//
|
|
// m::resource
|
|
//
|
|
|
|
ircd::m::resource::resource(const string_view &path)
|
|
:m::resource
|
|
{
|
|
path, {},
|
|
}
|
|
{
|
|
}
|
|
|
|
ircd::m::resource::resource(const string_view &path,
|
|
struct opts opts)
|
|
:ircd::resource
|
|
{
|
|
path_canonize(path_buf, path), opts
|
|
}
|
|
{
|
|
}
|
|
|
|
ircd::m::resource::~resource()
|
|
noexcept
|
|
{
|
|
}
|
|
|
|
ircd::string_view
|
|
ircd::m::resource::params(const string_view &path)
|
|
const
|
|
{
|
|
const auto prefix_tokens
|
|
{
|
|
token_count(this->path, '/')
|
|
};
|
|
|
|
const auto version
|
|
{
|
|
path_version(path)
|
|
};
|
|
|
|
const auto params_after
|
|
{
|
|
prefix_tokens? prefix_tokens - 1 + bool(version): 0
|
|
};
|
|
|
|
const auto ret
|
|
{
|
|
tokens_after(path, '/', params_after)
|
|
};
|
|
|
|
return ret;
|
|
}
|
|
|
|
ircd::resource &
|
|
ircd::m::resource::route(const string_view &path)
|
|
const
|
|
{
|
|
thread_local char canon_buf[1024];
|
|
const string_view canon_path
|
|
{
|
|
path_canonize(canon_buf, path)
|
|
};
|
|
|
|
return mutable_cast(ircd::resource::route(canon_path));
|
|
}
|
|
|
|
ircd::string_view
|
|
ircd::m::resource::path_canonize(const mutable_buffer &buf,
|
|
const string_view &path)
|
|
{
|
|
const auto version
|
|
{
|
|
path_version(path)
|
|
};
|
|
|
|
if(!version)
|
|
return path;
|
|
|
|
const auto &[before, after]
|
|
{
|
|
tokens_split(path, '/', 2, 1)
|
|
};
|
|
|
|
mutable_buffer out{buf};
|
|
consume(out, copy(out, '/'));
|
|
consume(out, copy(out, before));
|
|
if(likely(after))
|
|
{
|
|
consume(out, copy(out, '/'));
|
|
consume(out, copy(out, after));
|
|
}
|
|
|
|
return string_view
|
|
{
|
|
data(buf), data(out)
|
|
};
|
|
}
|
|
|
|
ircd::string_view
|
|
ircd::m::resource::path_version(const string_view &path)
|
|
{
|
|
const auto version
|
|
{
|
|
token(path, '/', 2, {})
|
|
};
|
|
|
|
const bool is_version
|
|
{
|
|
true
|
|
&& version.size() >= 2
|
|
&& (version[0] == 'v' || version[0] == 'r')
|
|
&& (version[1] >= '0' && version[1] <= '9')
|
|
};
|
|
|
|
const bool pass
|
|
{
|
|
false
|
|
|| is_version
|
|
|| version == "unstable"
|
|
};
|
|
|
|
return pass? version: string_view{};
|
|
}
|
|
|
|
//
|
|
// m::resource::method
|
|
//
|
|
|
|
ircd::m::resource::method::method(m::resource &resource,
|
|
const string_view &name,
|
|
handler function,
|
|
struct opts opts)
|
|
:ircd::resource::method
|
|
{
|
|
resource,
|
|
name,
|
|
std::bind(&method::handle, this, ph::_1, ph::_2),
|
|
std::move(opts),
|
|
}
|
|
,function
|
|
{
|
|
std::move(function)
|
|
}
|
|
{
|
|
}
|
|
|
|
ircd::m::resource::method::~method()
|
|
noexcept
|
|
{
|
|
}
|
|
|
|
ircd::resource::response
|
|
ircd::m::resource::method::handle(client &client,
|
|
ircd::resource::request &request_)
|
|
try
|
|
{
|
|
m::resource::request request
|
|
{
|
|
*this, client, request_
|
|
};
|
|
|
|
const string_view &ident
|
|
{
|
|
request.bridge_id?:
|
|
request.node_id?:
|
|
request.user_id?:
|
|
string_view{}
|
|
};
|
|
|
|
if(ident)
|
|
log::debug
|
|
{
|
|
log, "%s %s %s %s `%s'",
|
|
client.loghead(),
|
|
ident,
|
|
request.head.method,
|
|
request.version?: "??"_sv,
|
|
request.head.path,
|
|
};
|
|
|
|
const bool cached_error
|
|
{
|
|
request.node_id
|
|
&& fed::errant(request.node_id)
|
|
};
|
|
|
|
// If we have an error cached from previously not being able to
|
|
// contact this origin we can clear that now that they're alive.
|
|
if(cached_error)
|
|
{
|
|
m::burst::opts opts;
|
|
m::burst::burst
|
|
{
|
|
request.node_id, opts
|
|
};
|
|
}
|
|
|
|
return function(client, request);
|
|
}
|
|
catch(const json::print_error &e)
|
|
{
|
|
throw m::error
|
|
{
|
|
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON",
|
|
"Generator Protection: %s",
|
|
e.what()
|
|
};
|
|
}
|
|
catch(const json::not_found &e)
|
|
{
|
|
throw m::error
|
|
{
|
|
http::BAD_REQUEST, "M_BAD_JSON",
|
|
"Required JSON field: %s",
|
|
e.what()
|
|
};
|
|
}
|
|
catch(const json::error &e)
|
|
{
|
|
throw m::error
|
|
{
|
|
http::BAD_REQUEST, "M_NOT_JSON",
|
|
"%s",
|
|
e.what()
|
|
};
|
|
}
|
|
catch(const ctx::timeout &e)
|
|
{
|
|
throw m::error
|
|
{
|
|
http::BAD_GATEWAY, "M_REQUEST_TIMEOUT",
|
|
"%s",
|
|
e.what()
|
|
};
|
|
}
|
|
|
|
//
|
|
// resource::request
|
|
//
|
|
|
|
ircd::m::resource::request::request(const method &method,
|
|
const client &client,
|
|
ircd::resource::request &r)
|
|
:ircd::resource::request
|
|
{
|
|
r
|
|
}
|
|
,version
|
|
{
|
|
path_version(head.path)
|
|
}
|
|
,authorization
|
|
{
|
|
split(head.authorization, ' ')
|
|
}
|
|
,access_token
|
|
{
|
|
iequals(authorization.first, "Bearer"_sv)?
|
|
authorization.second:
|
|
query["access_token"]
|
|
}
|
|
,x_matrix
|
|
{
|
|
!access_token && iequals(authorization.first, "X-Matrix"_sv)?
|
|
m::request::x_matrix{authorization.first, authorization.second}:
|
|
m::request::x_matrix{}
|
|
}
|
|
,node_id
|
|
{
|
|
// Server X-Matrix header verified here. Similar to client auth, origin
|
|
// which has been authed is referenced in the client.request. If the method
|
|
// requires, and auth fails or not provided, this function throws.
|
|
// Otherwise it returns a string_view of the origin name in
|
|
// request.node_id, or an empty string_view if an origin was not
|
|
// apropos for this request (i.e a client request rather than federation).
|
|
authenticate_node(method, client, *this)
|
|
}
|
|
,user_id
|
|
{
|
|
// Client access token verified here. On success, user_id owning the token
|
|
// is copied into the request structure. On failure, the method is
|
|
// checked to see if it requires authentication and if so, this throws.
|
|
authenticate_user(method, client, *this)
|
|
}
|
|
,bridge_id
|
|
{
|
|
// Application service access token verified here. Note that on success
|
|
// this function will set the user_id as well as the bridge_id.
|
|
authenticate_bridge(method, client, *this)
|
|
}
|
|
{
|
|
}
|
|
|
|
/// Authenticate a client based on access_token either in the query string or
|
|
/// in the Authentication bearer header. If a token is found the user_id owning
|
|
/// the token is copied into the request. If it is not found or it is invalid
|
|
/// then the method being requested is checked to see if it is required. If so
|
|
/// the appropriate exception is thrown. Note that if the access_token belongs
|
|
/// to a bridge (application service), the bridge_id is set accordingly.
|
|
ircd::m::user::id
|
|
ircd::m::authenticate_user(const resource::method &method,
|
|
const client &client,
|
|
resource::request &request)
|
|
{
|
|
assert(method.opts);
|
|
const auto requires_auth
|
|
{
|
|
method.opts->flags & resource::method::REQUIRES_AUTH
|
|
};
|
|
|
|
if(!requires_auth && !request.access_token)
|
|
return {};
|
|
|
|
// Note that we still try to auth a token and obtain a user_id here even
|
|
// if the endpoint does not require auth; an auth'ed user may enjoy
|
|
// additional functionality if credentials provided.
|
|
if(requires_auth && !request.access_token)
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_MISSING_TOKEN",
|
|
"Credentials for this method are required but missing."
|
|
};
|
|
|
|
// Belay authentication to authenticate_bridge().
|
|
if(startswith(request.access_token, "bridge_"))
|
|
return {};
|
|
|
|
const m::room::id::buf tokens_room_id
|
|
{
|
|
"tokens", origin(my())
|
|
};
|
|
|
|
const m::room::state tokens
|
|
{
|
|
tokens_room_id
|
|
};
|
|
|
|
const event::idx event_idx
|
|
{
|
|
tokens.get(std::nothrow, "ircd.access_token", request.access_token)
|
|
};
|
|
|
|
// The sender of the token is the user being authenticated.
|
|
const string_view sender
|
|
{
|
|
m::get(std::nothrow, event_idx, "sender", request.id_buf)
|
|
};
|
|
|
|
// Note that if the endpoint does not require auth and we were not
|
|
// successful in authenticating the provided token: we do not throw here;
|
|
// instead we continue as if no token was provided, and no user_id will
|
|
// be known to the requested endpoint.
|
|
if(requires_auth && !sender)
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_UNKNOWN_TOKEN",
|
|
"Credentials for this method are required but invalid."
|
|
};
|
|
|
|
return sender;
|
|
}
|
|
|
|
/// Authenticate an application service (bridge)
|
|
ircd::string_view
|
|
ircd::m::authenticate_bridge(const resource::method &method,
|
|
const client &client,
|
|
resource::request &request)
|
|
{
|
|
// Real user was already authenticated; not a bridge.
|
|
if(request.user_id)
|
|
return {};
|
|
|
|
// No attempt at authenticating as a bridge; not a bridge.
|
|
if(!startswith(request.access_token, "bridge_"))
|
|
return {};
|
|
|
|
const m::room::id::buf tokens_room_id
|
|
{
|
|
"tokens", origin(my())
|
|
};
|
|
|
|
const m::room::state tokens
|
|
{
|
|
tokens_room_id
|
|
};
|
|
|
|
const event::idx event_idx
|
|
{
|
|
tokens.get(std::nothrow, "ircd.access_token", request.access_token)
|
|
};
|
|
|
|
// The sender of the token is the bridge's user_id, where the bridge_id
|
|
// is the localpart, but none of this is a puppetting/target user_id.
|
|
const string_view sender
|
|
{
|
|
m::get(std::nothrow, event_idx, "sender", request.id_buf)
|
|
};
|
|
|
|
// Note that unlike authenticate_user, if an as_token was proffered but is
|
|
// not valid, there is no possible fallback to unauthenticated mode and
|
|
// this must throw here.
|
|
if(!sender)
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_UNKNOWN_TOKEN",
|
|
"Credentials for this method are required but invalid."
|
|
};
|
|
|
|
// Find the user_id the bridge wants to masquerade as.
|
|
const string_view puppet_user_id
|
|
{
|
|
request.query["user_id"]
|
|
};
|
|
|
|
// Set the user credentials for the request at the discretion of the
|
|
// bridge. If the bridge did not supply a user_id then we set the value
|
|
// to the bridge's own agency. Note that we urldecode into the id_buf
|
|
// after the bridge_user_id; care not to overwrite it.
|
|
{
|
|
mutable_buffer buf(request.id_buf);
|
|
request.user_id = puppet_user_id?
|
|
url::decode(buf + size(sender), puppet_user_id):
|
|
sender;
|
|
}
|
|
|
|
// Return only the localname (that's the localpart not including sigil).
|
|
return m::user::id(sender).localname();
|
|
}
|
|
|
|
ircd::string_view
|
|
ircd::m::authenticate_node(const resource::method &method,
|
|
const client &client,
|
|
resource::request &request)
|
|
try
|
|
{
|
|
assert(method.opts);
|
|
const auto required
|
|
{
|
|
method.opts->flags & resource::method::VERIFY_ORIGIN
|
|
};
|
|
|
|
const bool supplied
|
|
{
|
|
!empty(request.x_matrix.origin)
|
|
};
|
|
|
|
if(!required && !supplied)
|
|
return {};
|
|
|
|
if(required && !supplied)
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_MISSING_AUTHORIZATION",
|
|
"Required X-Matrix Authorization was not supplied"
|
|
};
|
|
|
|
if(x_matrix_verify_destination && !m::self::host(request.head.host))
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_NOT_MY_HOST",
|
|
"The HTTP Host '%s' is not an authenticable destination here.",
|
|
request.head.host,
|
|
};
|
|
|
|
const auto head_host
|
|
{
|
|
rstrip(request.head.host, ":8448")
|
|
};
|
|
|
|
const auto auth_dest
|
|
{
|
|
rstrip(request.x_matrix.destination, ":8448")
|
|
};
|
|
|
|
if(x_matrix_verify_destination && auth_dest && head_host != auth_dest)
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_NOT_MY_DESTINATION",
|
|
"The X-Matrix Authorization destination '%s' is not recognized here.",
|
|
auth_dest,
|
|
};
|
|
|
|
const m::request object
|
|
{
|
|
request.x_matrix.origin,
|
|
head_host,
|
|
method.name,
|
|
request.head.uri,
|
|
request.content
|
|
};
|
|
|
|
if(x_matrix_verify_origin && !object.verify(request.x_matrix.key, request.x_matrix.sig))
|
|
throw m::error
|
|
{
|
|
http::FORBIDDEN, "M_INVALID_SIGNATURE",
|
|
"The X-Matrix Authorization is invalid."
|
|
};
|
|
|
|
return request.x_matrix.origin;
|
|
}
|
|
catch(const m::error &)
|
|
{
|
|
throw;
|
|
}
|
|
catch(const std::exception &e)
|
|
{
|
|
thread_local char rembuf[128];
|
|
log::derror
|
|
{
|
|
resource::log, "X-Matrix Authorization from %s: %s",
|
|
string(rembuf, remote(client)),
|
|
e.what()
|
|
};
|
|
|
|
throw m::error
|
|
{
|
|
http::UNAUTHORIZED, "M_UNKNOWN_ERROR",
|
|
"An error has prevented authorization: %s",
|
|
e.what()
|
|
};
|
|
}
|