2017-10-17 20:12:54 +02:00
|
|
|
// Copyright 2017 Paul Tötterman <paul.totterman@iki.fi>
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
2022-08-05 11:26:59 +02:00
|
|
|
"io"
|
2020-11-20 10:26:50 +01:00
|
|
|
"net"
|
2017-10-17 20:12:54 +02:00
|
|
|
"net/http"
|
|
|
|
|
2020-07-10 01:39:44 +02:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth"
|
2020-10-09 10:15:51 +02:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
2017-10-17 20:12:54 +02:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
2020-06-16 15:10:55 +02:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2017-10-17 20:12:54 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"github.com/matrix-org/util"
|
2022-03-01 17:39:57 +01:00
|
|
|
"github.com/tidwall/gjson"
|
2017-10-17 20:12:54 +02:00
|
|
|
)
|
|
|
|
|
2020-06-19 14:29:27 +02:00
|
|
|
// https://matrix.org/docs/spec/client_server/r0.6.1#get-matrix-client-r0-devices
|
2017-10-17 20:12:54 +02:00
|
|
|
type deviceJSON struct {
|
2020-06-19 14:29:27 +02:00
|
|
|
DeviceID string `json:"device_id"`
|
|
|
|
DisplayName string `json:"display_name"`
|
|
|
|
LastSeenIP string `json:"last_seen_ip"`
|
2020-11-20 10:26:50 +01:00
|
|
|
LastSeenTS int64 `json:"last_seen_ts"`
|
2017-10-17 20:12:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type devicesJSON struct {
|
|
|
|
Devices []deviceJSON `json:"devices"`
|
|
|
|
}
|
|
|
|
|
2017-11-14 10:59:02 +01:00
|
|
|
type deviceUpdateJSON struct {
|
|
|
|
DisplayName *string `json:"display_name"`
|
|
|
|
}
|
|
|
|
|
2020-02-11 13:13:38 +01:00
|
|
|
type devicesDeleteJSON struct {
|
|
|
|
Devices []string `json:"devices"`
|
|
|
|
}
|
|
|
|
|
2018-05-24 14:53:22 +02:00
|
|
|
// GetDeviceByID handles /devices/{deviceID}
|
2017-10-17 20:12:54 +02:00
|
|
|
func GetDeviceByID(
|
2022-05-05 14:17:38 +02:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-10-17 20:12:54 +02:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
2021-09-08 18:31:03 +02:00
|
|
|
var queryRes api.QueryDevicesResponse
|
|
|
|
err := userAPI.QueryDevices(req.Context(), &api.QueryDevicesRequest{
|
2020-08-27 19:53:40 +02:00
|
|
|
UserID: device.UserID,
|
|
|
|
}, &queryRes)
|
2017-10-17 20:12:54 +02:00
|
|
|
if err != nil {
|
2020-08-27 19:53:40 +02:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("QueryDevices failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2017-10-17 20:12:54 +02:00
|
|
|
}
|
2021-09-08 18:31:03 +02:00
|
|
|
var targetDevice *api.Device
|
2020-08-27 19:53:40 +02:00
|
|
|
for _, device := range queryRes.Devices {
|
|
|
|
if device.ID == deviceID {
|
|
|
|
targetDevice = &device
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if targetDevice == nil {
|
2017-10-17 20:12:54 +02:00
|
|
|
return util.JSONResponse{
|
2018-03-13 16:55:45 +01:00
|
|
|
Code: http.StatusNotFound,
|
2017-10-17 20:12:54 +02:00
|
|
|
JSON: jsonerror.NotFound("Unknown device"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 16:55:45 +01:00
|
|
|
Code: http.StatusOK,
|
2017-10-17 20:12:54 +02:00
|
|
|
JSON: deviceJSON{
|
2020-08-27 19:53:40 +02:00
|
|
|
DeviceID: targetDevice.ID,
|
|
|
|
DisplayName: targetDevice.DisplayName,
|
2020-11-20 10:26:50 +01:00
|
|
|
LastSeenIP: stripIPPort(targetDevice.LastSeenIP),
|
|
|
|
LastSeenTS: targetDevice.LastSeenTS,
|
2017-10-17 20:12:54 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDevicesByLocalpart handles /devices
|
|
|
|
func GetDevicesByLocalpart(
|
2022-05-05 14:17:38 +02:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-10-17 20:12:54 +02:00
|
|
|
) util.JSONResponse {
|
2021-09-08 18:31:03 +02:00
|
|
|
var queryRes api.QueryDevicesResponse
|
|
|
|
err := userAPI.QueryDevices(req.Context(), &api.QueryDevicesRequest{
|
2020-08-27 19:53:40 +02:00
|
|
|
UserID: device.UserID,
|
|
|
|
}, &queryRes)
|
2017-10-17 20:12:54 +02:00
|
|
|
if err != nil {
|
2020-08-27 19:53:40 +02:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("QueryDevices failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2017-10-17 20:12:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
res := devicesJSON{}
|
|
|
|
|
2020-08-27 19:53:40 +02:00
|
|
|
for _, dev := range queryRes.Devices {
|
2017-10-17 20:12:54 +02:00
|
|
|
res.Devices = append(res.Devices, deviceJSON{
|
2020-07-10 01:39:44 +02:00
|
|
|
DeviceID: dev.ID,
|
|
|
|
DisplayName: dev.DisplayName,
|
2020-11-20 10:26:50 +01:00
|
|
|
LastSeenIP: stripIPPort(dev.LastSeenIP),
|
|
|
|
LastSeenTS: dev.LastSeenTS,
|
2017-10-17 20:12:54 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 16:55:45 +01:00
|
|
|
Code: http.StatusOK,
|
2017-10-17 20:12:54 +02:00
|
|
|
JSON: res,
|
|
|
|
}
|
|
|
|
}
|
2017-11-14 10:59:02 +01:00
|
|
|
|
|
|
|
// UpdateDeviceByID handles PUT on /devices/{deviceID}
|
|
|
|
func UpdateDeviceByID(
|
2022-05-05 14:17:38 +02:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-11-14 10:59:02 +01:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
|
|
|
|
|
|
|
defer req.Body.Close() // nolint: errcheck
|
|
|
|
|
|
|
|
payload := deviceUpdateJSON{}
|
|
|
|
|
2020-10-09 10:15:51 +02:00
|
|
|
if resErr := httputil.UnmarshalJSONRequest(req, &payload); resErr != nil {
|
|
|
|
return *resErr
|
2017-11-14 10:59:02 +01:00
|
|
|
}
|
|
|
|
|
2020-07-31 15:40:45 +02:00
|
|
|
var performRes api.PerformDeviceUpdateResponse
|
|
|
|
err := userAPI.PerformDeviceUpdate(req.Context(), &api.PerformDeviceUpdateRequest{
|
|
|
|
RequestingUserID: device.UserID,
|
|
|
|
DeviceID: deviceID,
|
|
|
|
DisplayName: payload.DisplayName,
|
|
|
|
}, &performRes)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("PerformDeviceUpdate failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2017-11-14 10:59:02 +01:00
|
|
|
}
|
2020-07-31 15:40:45 +02:00
|
|
|
if !performRes.DeviceExists {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusNotFound,
|
|
|
|
JSON: jsonerror.Forbidden("device does not exist"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if performRes.Forbidden {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
|
|
|
JSON: jsonerror.Forbidden("device not owned by current user"),
|
|
|
|
}
|
|
|
|
}
|
2017-11-14 10:59:02 +01:00
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 16:55:45 +01:00
|
|
|
Code: http.StatusOK,
|
2017-11-14 10:59:02 +01:00
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
2020-02-11 13:13:38 +01:00
|
|
|
|
|
|
|
// DeleteDeviceById handles DELETE requests to /devices/{deviceId}
|
|
|
|
func DeleteDeviceById(
|
2022-05-05 14:17:38 +02:00
|
|
|
req *http.Request, userInteractiveAuth *auth.UserInteractive, userAPI api.ClientUserAPI, device *api.Device,
|
2020-02-11 13:13:38 +01:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
2022-03-01 17:39:57 +01:00
|
|
|
var (
|
|
|
|
deleteOK bool
|
|
|
|
sessionID string
|
|
|
|
)
|
|
|
|
defer func() {
|
|
|
|
if deleteOK {
|
|
|
|
sessions.deleteSession(sessionID)
|
|
|
|
}
|
|
|
|
}()
|
2020-07-10 01:39:44 +02:00
|
|
|
ctx := req.Context()
|
|
|
|
defer req.Body.Close() // nolint:errcheck
|
2022-08-05 11:26:59 +02:00
|
|
|
bodyBytes, err := io.ReadAll(req.Body)
|
2020-07-10 01:39:44 +02:00
|
|
|
if err != nil {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
|
|
|
JSON: jsonerror.BadJSON("The request body could not be read: " + err.Error()),
|
|
|
|
}
|
|
|
|
}
|
2022-03-01 17:39:57 +01:00
|
|
|
|
|
|
|
// check that we know this session, and it matches with the device to delete
|
|
|
|
s := gjson.GetBytes(bodyBytes, "auth.session").Str
|
|
|
|
if dev, ok := sessions.getDeviceToDelete(s); ok {
|
|
|
|
if dev != deviceID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
|
|
|
JSON: jsonerror.Forbidden("session & device mismatch"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if s != "" {
|
|
|
|
sessionID = s
|
|
|
|
}
|
|
|
|
|
2020-07-10 01:39:44 +02:00
|
|
|
login, errRes := userInteractiveAuth.Verify(ctx, bodyBytes, device)
|
|
|
|
if errRes != nil {
|
2022-03-01 17:39:57 +01:00
|
|
|
switch data := errRes.JSON.(type) {
|
|
|
|
case auth.Challenge:
|
|
|
|
sessions.addDeviceToDelete(data.Session, deviceID)
|
|
|
|
default:
|
|
|
|
}
|
2020-07-10 01:39:44 +02:00
|
|
|
return *errRes
|
|
|
|
}
|
|
|
|
|
2020-02-11 13:13:38 +01:00
|
|
|
localpart, _, err := gomatrixserverlib.SplitID('@', device.UserID)
|
|
|
|
if err != nil {
|
2020-07-10 01:39:44 +02:00
|
|
|
util.GetLogger(ctx).WithError(err).Error("gomatrixserverlib.SplitID failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2020-02-11 13:13:38 +01:00
|
|
|
}
|
|
|
|
|
2020-07-10 01:39:44 +02:00
|
|
|
// make sure that the access token being used matches the login creds used for user interactive auth, else
|
|
|
|
// 1 compromised access token could be used to logout all devices.
|
|
|
|
if login.Username() != localpart && login.Username() != device.UserID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 403,
|
|
|
|
JSON: jsonerror.Forbidden("Cannot delete another user's device"),
|
|
|
|
}
|
|
|
|
}
|
2020-02-11 13:13:38 +01:00
|
|
|
|
2020-07-30 19:00:56 +02:00
|
|
|
var res api.PerformDeviceDeletionResponse
|
|
|
|
if err := userAPI.PerformDeviceDeletion(ctx, &api.PerformDeviceDeletionRequest{
|
|
|
|
UserID: device.UserID,
|
|
|
|
DeviceIDs: []string{deviceID},
|
|
|
|
}, &res); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("userAPI.PerformDeviceDeletion failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2020-02-11 13:13:38 +01:00
|
|
|
}
|
|
|
|
|
2022-03-01 17:39:57 +01:00
|
|
|
deleteOK = true
|
|
|
|
|
2020-02-11 13:13:38 +01:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteDevices handles POST requests to /delete_devices
|
|
|
|
func DeleteDevices(
|
2022-05-05 14:17:38 +02:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2020-02-11 13:13:38 +01:00
|
|
|
) util.JSONResponse {
|
|
|
|
ctx := req.Context()
|
|
|
|
payload := devicesDeleteJSON{}
|
|
|
|
|
2020-10-09 10:15:51 +02:00
|
|
|
if resErr := httputil.UnmarshalJSONRequest(req, &payload); resErr != nil {
|
|
|
|
return *resErr
|
2020-02-11 13:13:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
defer req.Body.Close() // nolint: errcheck
|
|
|
|
|
2020-07-30 19:00:56 +02:00
|
|
|
var res api.PerformDeviceDeletionResponse
|
|
|
|
if err := userAPI.PerformDeviceDeletion(ctx, &api.PerformDeviceDeletionRequest{
|
|
|
|
UserID: device.UserID,
|
|
|
|
DeviceIDs: payload.Devices,
|
|
|
|
}, &res); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("userAPI.PerformDeviceDeletion failed")
|
2020-03-02 17:20:44 +01:00
|
|
|
return jsonerror.InternalServerError()
|
2020-02-11 13:13:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
2020-11-20 10:26:50 +01:00
|
|
|
|
|
|
|
// stripIPPort converts strings like "[::1]:12345" to "::1"
|
|
|
|
func stripIPPort(addr string) string {
|
|
|
|
ip := net.ParseIP(addr)
|
|
|
|
if ip != nil {
|
|
|
|
return addr
|
|
|
|
}
|
|
|
|
host, _, err := net.SplitHostPort(addr)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
ip = net.ParseIP(host)
|
|
|
|
if ip != nil {
|
|
|
|
return host
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|