mirror of
https://github.com/matrix-org/dendrite
synced 2024-11-03 14:39:00 +01:00
78032b3f4c
Fixes https://github.com/matrix-org/dendrite/issues/401 Currently when passing a `device_id` parameter to `/login`, which is [supposed](https://matrix.org/docs/spec/client_server/unstable#post-matrix-client-r0-login) to return a device with that ID set, it instead just generates a random `device_id` and hands that back to you. The code was already there to do this correctly, it looks like it had just been broken during some change. Hopefully sytest will prevent this from becoming broken again.
150 lines
4.4 KiB
Go
150 lines
4.4 KiB
Go
// Copyright 2017 Vector Creations Ltd
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package routing
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"context"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth"
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
"github.com/matrix-org/dendrite/clientapi/auth/storage/accounts"
|
|
"github.com/matrix-org/dendrite/clientapi/auth/storage/devices"
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
|
"github.com/matrix-org/dendrite/clientapi/userutil"
|
|
"github.com/matrix-org/dendrite/common/config"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/util"
|
|
)
|
|
|
|
type loginFlows struct {
|
|
Flows []flow `json:"flows"`
|
|
}
|
|
|
|
type flow struct {
|
|
Type string `json:"type"`
|
|
Stages []string `json:"stages"`
|
|
}
|
|
|
|
type passwordRequest struct {
|
|
User string `json:"user"`
|
|
Password string `json:"password"`
|
|
// Both DeviceID and InitialDisplayName can be omitted, or empty strings ("")
|
|
// Thus a pointer is needed to differentiate between the two
|
|
InitialDisplayName *string `json:"initial_device_display_name"`
|
|
DeviceID *string `json:"device_id"`
|
|
}
|
|
|
|
type loginResponse struct {
|
|
UserID string `json:"user_id"`
|
|
AccessToken string `json:"access_token"`
|
|
HomeServer gomatrixserverlib.ServerName `json:"home_server"`
|
|
DeviceID string `json:"device_id"`
|
|
}
|
|
|
|
func passwordLogin() loginFlows {
|
|
f := loginFlows{}
|
|
s := flow{"m.login.password", []string{"m.login.password"}}
|
|
f.Flows = append(f.Flows, s)
|
|
return f
|
|
}
|
|
|
|
// Login implements GET and POST /login
|
|
func Login(
|
|
req *http.Request, accountDB *accounts.Database, deviceDB *devices.Database,
|
|
cfg config.Dendrite,
|
|
) util.JSONResponse {
|
|
if req.Method == http.MethodGet { // TODO: support other forms of login other than password, depending on config options
|
|
return util.JSONResponse{
|
|
Code: http.StatusOK,
|
|
JSON: passwordLogin(),
|
|
}
|
|
} else if req.Method == http.MethodPost {
|
|
var r passwordRequest
|
|
resErr := httputil.UnmarshalJSONRequest(req, &r)
|
|
if resErr != nil {
|
|
return *resErr
|
|
}
|
|
if r.User == "" {
|
|
return util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.BadJSON("'user' must be supplied."),
|
|
}
|
|
}
|
|
|
|
util.GetLogger(req.Context()).WithField("user", r.User).Info("Processing login request")
|
|
|
|
localpart, err := userutil.ParseUsernameParam(r.User, &cfg.Matrix.ServerName)
|
|
if err != nil {
|
|
return util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.InvalidUsername(err.Error()),
|
|
}
|
|
}
|
|
|
|
acc, err := accountDB.GetAccountByPassword(req.Context(), localpart, r.Password)
|
|
if err != nil {
|
|
// Technically we could tell them if the user does not exist by checking if err == sql.ErrNoRows
|
|
// but that would leak the existence of the user.
|
|
return util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Forbidden("username or password was incorrect, or the account does not exist"),
|
|
}
|
|
}
|
|
|
|
token, err := auth.GenerateAccessToken()
|
|
if err != nil {
|
|
return httputil.LogThenError(req, err)
|
|
}
|
|
|
|
dev, err := getDevice(req.Context(), r, deviceDB, acc, token)
|
|
if err != nil {
|
|
return util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: jsonerror.Unknown("failed to create device: " + err.Error()),
|
|
}
|
|
}
|
|
|
|
return util.JSONResponse{
|
|
Code: http.StatusOK,
|
|
JSON: loginResponse{
|
|
UserID: dev.UserID,
|
|
AccessToken: dev.AccessToken,
|
|
HomeServer: cfg.Matrix.ServerName,
|
|
DeviceID: dev.ID,
|
|
},
|
|
}
|
|
}
|
|
return util.JSONResponse{
|
|
Code: http.StatusMethodNotAllowed,
|
|
JSON: jsonerror.NotFound("Bad method"),
|
|
}
|
|
}
|
|
|
|
// getDevice returns a new or existing device
|
|
func getDevice(
|
|
ctx context.Context,
|
|
r passwordRequest,
|
|
deviceDB *devices.Database,
|
|
acc *authtypes.Account,
|
|
token string,
|
|
) (dev *authtypes.Device, err error) {
|
|
dev, err = deviceDB.CreateDevice(
|
|
ctx, acc.Localpart, r.DeviceID, token, r.InitialDisplayName,
|
|
)
|
|
return
|
|
}
|