2017-10-17 18:12:54 +00:00
|
|
|
// Copyright 2017 Paul Tötterman <paul.totterman@iki.fi>
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
2023-03-31 08:15:01 +00:00
|
|
|
"encoding/json"
|
2022-08-05 09:26:59 +00:00
|
|
|
"io"
|
2020-11-20 09:26:50 +00:00
|
|
|
"net"
|
2017-10-17 18:12:54 +00:00
|
|
|
"net/http"
|
|
|
|
|
2020-07-09 23:39:44 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth"
|
2020-10-09 08:15:51 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
2020-06-16 13:10:55 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2017-10-17 18:12:54 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-05-09 22:46:49 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2017-10-17 18:12:54 +00:00
|
|
|
"github.com/matrix-org/util"
|
2022-03-01 16:39:57 +00:00
|
|
|
"github.com/tidwall/gjson"
|
2017-10-17 18:12:54 +00:00
|
|
|
)
|
|
|
|
|
2020-06-19 12:29:27 +00:00
|
|
|
// https://matrix.org/docs/spec/client_server/r0.6.1#get-matrix-client-r0-devices
|
2017-10-17 18:12:54 +00:00
|
|
|
type deviceJSON struct {
|
2020-06-19 12:29:27 +00:00
|
|
|
DeviceID string `json:"device_id"`
|
|
|
|
DisplayName string `json:"display_name"`
|
|
|
|
LastSeenIP string `json:"last_seen_ip"`
|
2020-11-20 09:26:50 +00:00
|
|
|
LastSeenTS int64 `json:"last_seen_ts"`
|
2017-10-17 18:12:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type devicesJSON struct {
|
|
|
|
Devices []deviceJSON `json:"devices"`
|
|
|
|
}
|
|
|
|
|
2017-11-14 09:59:02 +00:00
|
|
|
type deviceUpdateJSON struct {
|
|
|
|
DisplayName *string `json:"display_name"`
|
|
|
|
}
|
|
|
|
|
2020-02-11 12:13:38 +00:00
|
|
|
type devicesDeleteJSON struct {
|
|
|
|
Devices []string `json:"devices"`
|
|
|
|
}
|
|
|
|
|
2018-05-24 12:53:22 +00:00
|
|
|
// GetDeviceByID handles /devices/{deviceID}
|
2017-10-17 18:12:54 +00:00
|
|
|
func GetDeviceByID(
|
2022-05-05 12:17:38 +00:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-10-17 18:12:54 +00:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
2021-09-08 16:31:03 +00:00
|
|
|
var queryRes api.QueryDevicesResponse
|
|
|
|
err := userAPI.QueryDevices(req.Context(), &api.QueryDevicesRequest{
|
2020-08-27 17:53:40 +00:00
|
|
|
UserID: device.UserID,
|
|
|
|
}, &queryRes)
|
2017-10-17 18:12:54 +00:00
|
|
|
if err != nil {
|
2020-08-27 17:53:40 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("QueryDevices failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2017-10-17 18:12:54 +00:00
|
|
|
}
|
2021-09-08 16:31:03 +00:00
|
|
|
var targetDevice *api.Device
|
2020-08-27 17:53:40 +00:00
|
|
|
for _, device := range queryRes.Devices {
|
|
|
|
if device.ID == deviceID {
|
|
|
|
targetDevice = &device
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if targetDevice == nil {
|
2017-10-17 18:12:54 +00:00
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusNotFound,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.NotFound("Unknown device"),
|
2017-10-17 18:12:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-10-17 18:12:54 +00:00
|
|
|
JSON: deviceJSON{
|
2020-08-27 17:53:40 +00:00
|
|
|
DeviceID: targetDevice.ID,
|
|
|
|
DisplayName: targetDevice.DisplayName,
|
2020-11-20 09:26:50 +00:00
|
|
|
LastSeenIP: stripIPPort(targetDevice.LastSeenIP),
|
|
|
|
LastSeenTS: targetDevice.LastSeenTS,
|
2017-10-17 18:12:54 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDevicesByLocalpart handles /devices
|
|
|
|
func GetDevicesByLocalpart(
|
2022-05-05 12:17:38 +00:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-10-17 18:12:54 +00:00
|
|
|
) util.JSONResponse {
|
2021-09-08 16:31:03 +00:00
|
|
|
var queryRes api.QueryDevicesResponse
|
|
|
|
err := userAPI.QueryDevices(req.Context(), &api.QueryDevicesRequest{
|
2020-08-27 17:53:40 +00:00
|
|
|
UserID: device.UserID,
|
|
|
|
}, &queryRes)
|
2017-10-17 18:12:54 +00:00
|
|
|
if err != nil {
|
2020-08-27 17:53:40 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("QueryDevices failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2017-10-17 18:12:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
res := devicesJSON{}
|
|
|
|
|
2020-08-27 17:53:40 +00:00
|
|
|
for _, dev := range queryRes.Devices {
|
2017-10-17 18:12:54 +00:00
|
|
|
res.Devices = append(res.Devices, deviceJSON{
|
2020-07-09 23:39:44 +00:00
|
|
|
DeviceID: dev.ID,
|
|
|
|
DisplayName: dev.DisplayName,
|
2020-11-20 09:26:50 +00:00
|
|
|
LastSeenIP: stripIPPort(dev.LastSeenIP),
|
|
|
|
LastSeenTS: dev.LastSeenTS,
|
2017-10-17 18:12:54 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-10-17 18:12:54 +00:00
|
|
|
JSON: res,
|
|
|
|
}
|
|
|
|
}
|
2017-11-14 09:59:02 +00:00
|
|
|
|
|
|
|
// UpdateDeviceByID handles PUT on /devices/{deviceID}
|
|
|
|
func UpdateDeviceByID(
|
2022-05-05 12:17:38 +00:00
|
|
|
req *http.Request, userAPI api.ClientUserAPI, device *api.Device,
|
2017-11-14 09:59:02 +00:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
|
|
|
|
|
|
|
defer req.Body.Close() // nolint: errcheck
|
|
|
|
|
|
|
|
payload := deviceUpdateJSON{}
|
|
|
|
|
2020-10-09 08:15:51 +00:00
|
|
|
if resErr := httputil.UnmarshalJSONRequest(req, &payload); resErr != nil {
|
|
|
|
return *resErr
|
2017-11-14 09:59:02 +00:00
|
|
|
}
|
|
|
|
|
2020-07-31 13:40:45 +00:00
|
|
|
var performRes api.PerformDeviceUpdateResponse
|
|
|
|
err := userAPI.PerformDeviceUpdate(req.Context(), &api.PerformDeviceUpdateRequest{
|
|
|
|
RequestingUserID: device.UserID,
|
|
|
|
DeviceID: deviceID,
|
|
|
|
DisplayName: payload.DisplayName,
|
|
|
|
}, &performRes)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("PerformDeviceUpdate failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2017-11-14 09:59:02 +00:00
|
|
|
}
|
2020-07-31 13:40:45 +00:00
|
|
|
if !performRes.DeviceExists {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusNotFound,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.Forbidden("device does not exist"),
|
2020-07-31 13:40:45 +00:00
|
|
|
}
|
|
|
|
}
|
2017-11-14 09:59:02 +00:00
|
|
|
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-11-14 09:59:02 +00:00
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
|
|
|
|
// DeleteDeviceById handles DELETE requests to /devices/{deviceId}
|
|
|
|
func DeleteDeviceById(
|
2022-05-05 12:17:38 +00:00
|
|
|
req *http.Request, userInteractiveAuth *auth.UserInteractive, userAPI api.ClientUserAPI, device *api.Device,
|
2020-02-11 12:13:38 +00:00
|
|
|
deviceID string,
|
|
|
|
) util.JSONResponse {
|
2022-03-01 16:39:57 +00:00
|
|
|
var (
|
|
|
|
deleteOK bool
|
|
|
|
sessionID string
|
|
|
|
)
|
|
|
|
defer func() {
|
|
|
|
if deleteOK {
|
|
|
|
sessions.deleteSession(sessionID)
|
|
|
|
}
|
|
|
|
}()
|
2020-07-09 23:39:44 +00:00
|
|
|
ctx := req.Context()
|
|
|
|
defer req.Body.Close() // nolint:errcheck
|
2022-08-05 09:26:59 +00:00
|
|
|
bodyBytes, err := io.ReadAll(req.Body)
|
2020-07-09 23:39:44 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.BadJSON("The request body could not be read: " + err.Error()),
|
2020-07-09 23:39:44 +00:00
|
|
|
}
|
|
|
|
}
|
2022-03-01 16:39:57 +00:00
|
|
|
|
|
|
|
// check that we know this session, and it matches with the device to delete
|
|
|
|
s := gjson.GetBytes(bodyBytes, "auth.session").Str
|
|
|
|
if dev, ok := sessions.getDeviceToDelete(s); ok {
|
|
|
|
if dev != deviceID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.Forbidden("session and device mismatch"),
|
2022-03-01 16:39:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if s != "" {
|
|
|
|
sessionID = s
|
|
|
|
}
|
|
|
|
|
2020-07-09 23:39:44 +00:00
|
|
|
login, errRes := userInteractiveAuth.Verify(ctx, bodyBytes, device)
|
|
|
|
if errRes != nil {
|
2022-03-01 16:39:57 +00:00
|
|
|
switch data := errRes.JSON.(type) {
|
|
|
|
case auth.Challenge:
|
|
|
|
sessions.addDeviceToDelete(data.Session, deviceID)
|
|
|
|
default:
|
|
|
|
}
|
2020-07-09 23:39:44 +00:00
|
|
|
return *errRes
|
|
|
|
}
|
|
|
|
|
2020-02-11 12:13:38 +00:00
|
|
|
localpart, _, err := gomatrixserverlib.SplitID('@', device.UserID)
|
|
|
|
if err != nil {
|
2020-07-09 23:39:44 +00:00
|
|
|
util.GetLogger(ctx).WithError(err).Error("gomatrixserverlib.SplitID failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
}
|
|
|
|
|
2020-07-09 23:39:44 +00:00
|
|
|
// make sure that the access token being used matches the login creds used for user interactive auth, else
|
|
|
|
// 1 compromised access token could be used to logout all devices.
|
|
|
|
if login.Username() != localpart && login.Username() != device.UserID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: 403,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.Forbidden("Cannot delete another user's device"),
|
2020-07-09 23:39:44 +00:00
|
|
|
}
|
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
|
2020-07-30 17:00:56 +00:00
|
|
|
var res api.PerformDeviceDeletionResponse
|
|
|
|
if err := userAPI.PerformDeviceDeletion(ctx, &api.PerformDeviceDeletionRequest{
|
|
|
|
UserID: device.UserID,
|
|
|
|
DeviceIDs: []string{deviceID},
|
|
|
|
}, &res); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("userAPI.PerformDeviceDeletion failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
}
|
|
|
|
|
2022-03-01 16:39:57 +00:00
|
|
|
deleteOK = true
|
|
|
|
|
2020-02-11 12:13:38 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteDevices handles POST requests to /delete_devices
|
|
|
|
func DeleteDevices(
|
2023-03-31 08:15:01 +00:00
|
|
|
req *http.Request, userInteractiveAuth *auth.UserInteractive, userAPI api.ClientUserAPI, device *api.Device,
|
2020-02-11 12:13:38 +00:00
|
|
|
) util.JSONResponse {
|
|
|
|
ctx := req.Context()
|
|
|
|
|
2023-03-31 08:15:01 +00:00
|
|
|
bodyBytes, err := io.ReadAll(req.Body)
|
|
|
|
if err != nil {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.BadJSON("The request body could not be read: " + err.Error()),
|
2023-03-31 08:15:01 +00:00
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
}
|
2023-03-31 08:15:01 +00:00
|
|
|
defer req.Body.Close() // nolint:errcheck
|
2020-02-11 12:13:38 +00:00
|
|
|
|
2023-03-31 08:15:01 +00:00
|
|
|
// initiate UIA
|
|
|
|
login, errRes := userInteractiveAuth.Verify(ctx, bodyBytes, device)
|
|
|
|
if errRes != nil {
|
|
|
|
return *errRes
|
|
|
|
}
|
|
|
|
|
|
|
|
if login.Username() != device.UserID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
2023-05-09 22:46:49 +00:00
|
|
|
JSON: spec.Forbidden("unable to delete devices for other user"),
|
2023-03-31 08:15:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
payload := devicesDeleteJSON{}
|
|
|
|
if err = json.Unmarshal(bodyBytes, &payload); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("unable to unmarshal device deletion request")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2023-03-31 08:15:01 +00:00
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
|
2020-07-30 17:00:56 +00:00
|
|
|
var res api.PerformDeviceDeletionResponse
|
|
|
|
if err := userAPI.PerformDeviceDeletion(ctx, &api.PerformDeviceDeletionRequest{
|
|
|
|
UserID: device.UserID,
|
|
|
|
DeviceIDs: payload.Devices,
|
|
|
|
}, &res); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("userAPI.PerformDeviceDeletion failed")
|
2023-05-17 00:33:27 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
2020-02-11 12:13:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
2020-11-20 09:26:50 +00:00
|
|
|
|
|
|
|
// stripIPPort converts strings like "[::1]:12345" to "::1"
|
|
|
|
func stripIPPort(addr string) string {
|
|
|
|
ip := net.ParseIP(addr)
|
|
|
|
if ip != nil {
|
|
|
|
return addr
|
|
|
|
}
|
|
|
|
host, _, err := net.SplitHostPort(addr)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
ip = net.ParseIP(host)
|
|
|
|
if ip != nil {
|
|
|
|
return host
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|