refactor: renames and split room.rs
This commit is contained in:
		
							parent
							
								
									92e59f14e0
								
							
						
					
					
						commit
						025b64befc
					
				
					 67 changed files with 278 additions and 45801 deletions
				
			
		
							
								
								
									
										200
									
								
								src/api/client_server/session.rs
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										200
									
								
								src/api/client_server/session.rs
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,200 @@ | |||
| use super::{DEVICE_ID_LENGTH, TOKEN_LENGTH}; | ||||
| use crate::{database::DatabaseGuard, utils, Error, Result, Ruma}; | ||||
| use ruma::{ | ||||
|     api::client::{ | ||||
|         error::ErrorKind, | ||||
|         session::{get_login_types, login, logout, logout_all}, | ||||
|         uiaa::IncomingUserIdentifier, | ||||
|     }, | ||||
|     UserId, | ||||
| }; | ||||
| use serde::Deserialize; | ||||
| use tracing::info; | ||||
| 
 | ||||
| #[derive(Debug, Deserialize)] | ||||
| struct Claims { | ||||
|     sub: String, | ||||
|     //exp: usize,
 | ||||
| } | ||||
| 
 | ||||
| /// # `GET /_matrix/client/r0/login`
 | ||||
| ///
 | ||||
| /// Get the supported login types of this server. One of these should be used as the `type` field
 | ||||
| /// when logging in.
 | ||||
| pub async fn get_login_types_route( | ||||
|     _body: Ruma<get_login_types::v3::IncomingRequest>, | ||||
| ) -> Result<get_login_types::v3::Response> { | ||||
|     Ok(get_login_types::v3::Response::new(vec![ | ||||
|         get_login_types::v3::LoginType::Password(Default::default()), | ||||
|     ])) | ||||
| } | ||||
| 
 | ||||
| /// # `POST /_matrix/client/r0/login`
 | ||||
| ///
 | ||||
| /// Authenticates the user and returns an access token it can use in subsequent requests.
 | ||||
| ///
 | ||||
| /// - The user needs to authenticate using their password (or if enabled using a json web token)
 | ||||
| /// - If `device_id` is known: invalidates old access token of that device
 | ||||
| /// - If `device_id` is unknown: creates a new device
 | ||||
| /// - Returns access token that is associated with the user and device
 | ||||
| ///
 | ||||
| /// Note: You can use [`GET /_matrix/client/r0/login`](fn.get_supported_versions_route.html) to see
 | ||||
| /// supported login types.
 | ||||
| pub async fn login_route( | ||||
|     db: DatabaseGuard, | ||||
|     body: Ruma<login::v3::IncomingRequest>, | ||||
| ) -> Result<login::v3::Response> { | ||||
|     // Validate login method
 | ||||
|     // TODO: Other login methods
 | ||||
|     let user_id = match &body.login_info { | ||||
|         login::v3::IncomingLoginInfo::Password(login::v3::IncomingPassword { | ||||
|             identifier, | ||||
|             password, | ||||
|         }) => { | ||||
|             let username = if let IncomingUserIdentifier::UserIdOrLocalpart(user_id) = identifier { | ||||
|                 user_id.to_lowercase() | ||||
|             } else { | ||||
|                 return Err(Error::BadRequest(ErrorKind::Forbidden, "Bad login type.")); | ||||
|             }; | ||||
|             let user_id = | ||||
|                 UserId::parse_with_server_name(username.to_owned(), db.globals.server_name()) | ||||
|                     .map_err(|_| { | ||||
|                         Error::BadRequest(ErrorKind::InvalidUsername, "Username is invalid.") | ||||
|                     })?; | ||||
|             let hash = db.users.password_hash(&user_id)?.ok_or(Error::BadRequest( | ||||
|                 ErrorKind::Forbidden, | ||||
|                 "Wrong username or password.", | ||||
|             ))?; | ||||
| 
 | ||||
|             if hash.is_empty() { | ||||
|                 return Err(Error::BadRequest( | ||||
|                     ErrorKind::UserDeactivated, | ||||
|                     "The user has been deactivated", | ||||
|                 )); | ||||
|             } | ||||
| 
 | ||||
|             let hash_matches = argon2::verify_encoded(&hash, password.as_bytes()).unwrap_or(false); | ||||
| 
 | ||||
|             if !hash_matches { | ||||
|                 return Err(Error::BadRequest( | ||||
|                     ErrorKind::Forbidden, | ||||
|                     "Wrong username or password.", | ||||
|                 )); | ||||
|             } | ||||
| 
 | ||||
|             user_id | ||||
|         } | ||||
|         login::v3::IncomingLoginInfo::Token(login::v3::IncomingToken { token }) => { | ||||
|             if let Some(jwt_decoding_key) = db.globals.jwt_decoding_key() { | ||||
|                 let token = jsonwebtoken::decode::<Claims>( | ||||
|                     token, | ||||
|                     jwt_decoding_key, | ||||
|                     &jsonwebtoken::Validation::default(), | ||||
|                 ) | ||||
|                 .map_err(|_| Error::BadRequest(ErrorKind::InvalidUsername, "Token is invalid."))?; | ||||
|                 let username = token.claims.sub; | ||||
|                 UserId::parse_with_server_name(username, db.globals.server_name()).map_err( | ||||
|                     |_| Error::BadRequest(ErrorKind::InvalidUsername, "Username is invalid."), | ||||
|                 )? | ||||
|             } else { | ||||
|                 return Err(Error::BadRequest( | ||||
|                     ErrorKind::Unknown, | ||||
|                     "Token login is not supported (server has no jwt decoding key).", | ||||
|                 )); | ||||
|             } | ||||
|         } | ||||
|         _ => { | ||||
|             return Err(Error::BadRequest( | ||||
|                 ErrorKind::Unknown, | ||||
|                 "Unsupported login type.", | ||||
|             )); | ||||
|         } | ||||
|     }; | ||||
| 
 | ||||
|     // Generate new device id if the user didn't specify one
 | ||||
|     let device_id = body | ||||
|         .device_id | ||||
|         .clone() | ||||
|         .unwrap_or_else(|| utils::random_string(DEVICE_ID_LENGTH).into()); | ||||
| 
 | ||||
|     // Generate a new token for the device
 | ||||
|     let token = utils::random_string(TOKEN_LENGTH); | ||||
| 
 | ||||
|     // Determine if device_id was provided and exists in the db for this user
 | ||||
|     let device_exists = body.device_id.as_ref().map_or(false, |device_id| { | ||||
|         db.users | ||||
|             .all_device_ids(&user_id) | ||||
|             .any(|x| x.as_ref().map_or(false, |v| v == device_id)) | ||||
|     }); | ||||
| 
 | ||||
|     if device_exists { | ||||
|         db.users.set_token(&user_id, &device_id, &token)?; | ||||
|     } else { | ||||
|         db.users.create_device( | ||||
|             &user_id, | ||||
|             &device_id, | ||||
|             &token, | ||||
|             body.initial_device_display_name.clone(), | ||||
|         )?; | ||||
|     } | ||||
| 
 | ||||
|     info!("{} logged in", user_id); | ||||
| 
 | ||||
|     db.flush()?; | ||||
| 
 | ||||
|     Ok(login::v3::Response { | ||||
|         user_id, | ||||
|         access_token: token, | ||||
|         home_server: Some(db.globals.server_name().to_owned()), | ||||
|         device_id, | ||||
|         well_known: None, | ||||
|     }) | ||||
| } | ||||
| 
 | ||||
| /// # `POST /_matrix/client/r0/logout`
 | ||||
| ///
 | ||||
| /// Log out the current device.
 | ||||
| ///
 | ||||
| /// - Invalidates access token
 | ||||
| /// - Deletes device metadata (device id, device display name, last seen ip, last seen ts)
 | ||||
| /// - Forgets to-device events
 | ||||
| /// - Triggers device list updates
 | ||||
| pub async fn logout_route( | ||||
|     db: DatabaseGuard, | ||||
|     body: Ruma<logout::v3::Request>, | ||||
| ) -> Result<logout::v3::Response> { | ||||
|     let sender_user = body.sender_user.as_ref().expect("user is authenticated"); | ||||
|     let sender_device = body.sender_device.as_ref().expect("user is authenticated"); | ||||
| 
 | ||||
|     db.users.remove_device(sender_user, sender_device)?; | ||||
| 
 | ||||
|     db.flush()?; | ||||
| 
 | ||||
|     Ok(logout::v3::Response::new()) | ||||
| } | ||||
| 
 | ||||
| /// # `POST /_matrix/client/r0/logout/all`
 | ||||
| ///
 | ||||
| /// Log out all devices of this user.
 | ||||
| ///
 | ||||
| /// - Invalidates all access tokens
 | ||||
| /// - Deletes all device metadata (device id, device display name, last seen ip, last seen ts)
 | ||||
| /// - Forgets all to-device events
 | ||||
| /// - Triggers device list updates
 | ||||
| ///
 | ||||
| /// Note: This is equivalent to calling [`GET /_matrix/client/r0/logout`](fn.logout_route.html)
 | ||||
| /// from each device of this user.
 | ||||
| pub async fn logout_all_route( | ||||
|     db: DatabaseGuard, | ||||
|     body: Ruma<logout_all::v3::Request>, | ||||
| ) -> Result<logout_all::v3::Response> { | ||||
|     let sender_user = body.sender_user.as_ref().expect("user is authenticated"); | ||||
| 
 | ||||
|     for device_id in db.users.all_device_ids(sender_user).flatten() { | ||||
|         db.users.remove_device(sender_user, &device_id)?; | ||||
|     } | ||||
| 
 | ||||
|     db.flush()?; | ||||
| 
 | ||||
|     Ok(logout_all::v3::Response::new()) | ||||
| } | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue
	
	 Timo Kösters
						Timo Kösters