telodendria/src/Routes/RouteRegister.c

290 lines
8.9 KiB
C
Raw Normal View History

2022-12-14 15:40:23 +00:00
/*
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
2022-12-14 15:40:23 +00:00
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Routes.h>
#include <string.h>
Use `Makefile`s instead of a custom script (#38) This pull request also requires the use of the external [Cytoplasm](/Telodendria/Cytoplasm) repository by removing the in-tree copy of Cytoplasm. The increased modularity requires a little more complex build process, but is overall better. Closes #19 The appropriate documentation has been updated. Closes #18 --- Please review the developer certificate of origin: 1. The contribution was created in whole or in part by me, and I have the right to submit it under the open source licenses of the Telodendria project; or 1. The contribution is based upon a previous work that, to the best of my knowledge, is covered under an appropriate open source license and I have the right under that license to submit that work with modifications, whether created in whole or in part by me, under the Telodendria project license; or 1. The contribution was provided directly to me by some other person who certified (1), (2), or (3), and I have not modified it. 1. I understand and agree that this project and the contribution are made public and that a record of the contribution&mdash;including all personal information I submit with it&mdash;is maintained indefinitely and may be redistributed consistent with this project or the open source licenses involved. - [x] I have read the Telodendria Project development certificate of origin, and I certify that I have permission to submit this patch under the conditions specified in it. Reviewed-on: https://git.telodendria.io/Telodendria/Telodendria/pulls/38
2023-11-01 16:27:45 +00:00
#include <Cytoplasm/Json.h>
#include <Cytoplasm/HashMap.h>
#include <Cytoplasm/Str.h>
#include <Cytoplasm/Memory.h>
2023-01-07 15:51:56 +00:00
#include <Schema/Registration.h>
2023-01-07 15:51:56 +00:00
#include <User.h>
#include <Uia.h>
#include <RegToken.h>
2022-12-14 15:40:23 +00:00
2023-03-14 00:37:24 +00:00
static Array *
RouteRegisterRegFlow(void)
{
Array *response = ArrayCreate();
if (!response)
{
return NULL;
}
ArrayAdd(response, UiaStageBuild("m.login.registration_token", NULL));
return response;
}
ROUTE_IMPL(RouteRegister, path, argp)
2022-12-14 15:40:23 +00:00
{
RouteArgs *args = argp;
2022-12-14 15:40:23 +00:00
HashMap *request = NULL;
HashMap *response = NULL;
RegistrationRequest regReq;
char *kind;
char *fullUsername;
char *msg;
char *username;
2023-01-07 15:51:56 +00:00
Db *db = args->matrixArgs->db;
2023-01-09 19:22:09 +00:00
User *user = NULL;
Array *uiaFlows = NULL;
int uiaResult;
char *session;
DbRef *sessionRef;
Config *config = ConfigLock(db);
regReq.username = NULL;
regReq.password = NULL;
regReq.device_id = NULL;
regReq.initial_device_display_name = NULL;
regReq.refresh_token = 0;
regReq.inhibit_login = 0;
if (!config)
{
msg = "Internal server error while locking configuration.";
Log(LOG_ERR, "Registration endpoint failed to lock configuration.");
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
return MatrixErrorCreate(M_UNKNOWN, msg);
}
if (ArraySize(path) == 0)
2022-12-14 15:40:23 +00:00
{
if (HttpRequestMethodGet(args->context) != HTTP_POST)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNRECOGNIZED, NULL);
goto end;
}
request = JsonDecode(HttpServerStream(args->context));
if (!request)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_NOT_JSON, NULL);
goto end;
}
if (!RegistrationRequestFromJson(request, &regReq, &msg))
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_NOT_JSON, msg);
goto end;
}
if (regReq.username)
{
if (!UserValidate(regReq.username, config->serverName))
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_INVALID_USERNAME, NULL);
goto finish;
}
if (UserExists(db, regReq.username))
2023-01-07 15:51:56 +00:00
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_USER_IN_USE, NULL);
2023-01-07 15:51:56 +00:00
goto finish;
}
}
uiaFlows = ArrayCreate();
2023-03-14 00:37:24 +00:00
ArrayAdd(uiaFlows, RouteRegisterRegFlow());
if (config->flags & CONFIG_REGISTRATION)
2023-03-14 00:37:24 +00:00
{
ArrayAdd(uiaFlows, UiaDummyFlow());
}
uiaResult = UiaComplete(uiaFlows, args->context,
db, request, &response,
config);
if (uiaResult < 0)
{
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
response = MatrixErrorCreate(M_UNKNOWN, NULL);
goto finish;
}
else if (!uiaResult)
{
/* UiaComplete() sets the response and status for us. */
goto finish;
}
kind = HashMapGet(HttpRequestParams(args->context), "kind");
/* We don't support guest accounts yet */
if (kind && !StrEquals(kind, "user"))
{
msg = "Guest accounts are currently not supported";
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
response = MatrixErrorCreate(M_INVALID_PARAM, msg);
goto finish;
}
if (!regReq.password)
{
msg = "'password' field is unset";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_MISSING_PARAM, msg);
goto finish;
}
/* All of the other fields are optional, we don't have to check
* them. */
user = UserCreate(db, regReq.username, regReq.password);
2023-01-09 19:22:09 +00:00
response = HashMapCreate();
fullUsername = StrConcat(4,
"@", UserGetName(user), ":", config->serverName);
HashMapSet(response, "user_id", JsonValueString(fullUsername));
Free(fullUsername);
2023-01-09 19:22:09 +00:00
HttpResponseStatus(args->context, HTTP_OK);
if (!regReq.inhibit_login)
2023-01-07 15:51:56 +00:00
{
UserLoginInfo *loginInfo = UserLogin(user, regReq.password,
regReq.device_id, regReq.initial_device_display_name,
regReq.refresh_token);
2023-01-16 21:17:44 +00:00
HashMapSet(response, "access_token",
2023-02-17 03:23:25 +00:00
JsonValueString(loginInfo->accessToken->string));
2023-01-16 21:17:44 +00:00
HashMapSet(response, "device_id",
2023-02-17 03:23:25 +00:00
JsonValueString(loginInfo->accessToken->deviceId));
2023-01-16 21:17:44 +00:00
if (regReq.refresh_token)
2023-01-16 21:17:44 +00:00
{
HashMapSet(response, "expires_in_ms",
2023-02-17 03:23:25 +00:00
JsonValueInteger(loginInfo->accessToken->lifetime));
2023-01-16 21:17:44 +00:00
HashMapSet(response, "refresh_token",
JsonValueString(loginInfo->refreshToken));
}
UserAccessTokenFree(loginInfo->accessToken);
Free(loginInfo->refreshToken);
2023-01-16 21:17:44 +00:00
Free(loginInfo);
2023-01-07 15:51:56 +00:00
}
session = JsonValueAsString(JsonGet(request, 2, "auth", "session"));
sessionRef = DbLock(db, 2, "user_interactive", session);
if (sessionRef)
{
char *token = JsonValueAsString(HashMapGet(DbJson(sessionRef), "registration_token"));
/* Grant the privileges specified by the given token */
if (token)
{
RegTokenInfo *info = RegTokenGetInfo(db, token);
if (info)
{
UserSetPrivileges(user, UserDecodePrivileges(info->grants));
RegTokenClose(info);
RegTokenFree(info);
}
}
DbUnlock(db, sessionRef);
}
else
{
Log(LOG_WARNING, "Unable to lock UIA session reference to check");
Log(LOG_WARNING, "privileges for user registration.");
}
Log(LOG_INFO, "Registered user '%s'", UserGetName(user));
2023-01-10 00:38:47 +00:00
UserUnlock(user);
finish:
UiaFlowsFree(uiaFlows);
RegistrationRequestFree(&regReq);
JsonFree(request);
}
else
2022-12-14 15:40:23 +00:00
{
if (HttpRequestMethodGet(args->context) == HTTP_GET &&
StrEquals(ArrayGet(path, 0), "available"))
{
username = HashMapGet(
HttpRequestParams(args->context), "username");
2022-12-14 21:23:20 +00:00
if (!username)
{
msg = "'username' path parameter is not set.";
2022-12-14 21:23:20 +00:00
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_MISSING_PARAM, msg);
2022-12-14 21:23:20 +00:00
}
else if (!UserValidate(username, config->serverName))
2023-01-07 15:51:56 +00:00
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_INVALID_USERNAME, NULL);
2023-01-07 15:51:56 +00:00
}
2023-01-07 18:24:16 +00:00
else if (!UserExists(db, username))
2023-01-07 15:51:56 +00:00
{
response = HashMapCreate();
HashMapSet(response, "available", JsonValueBoolean(1));
}
else
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_USER_IN_USE, NULL);
2023-01-07 15:51:56 +00:00
}
}
else
{
HttpResponseStatus(args->context, HTTP_NOT_FOUND);
response = MatrixErrorCreate(M_UNRECOGNIZED, NULL);
}
2022-12-14 15:40:23 +00:00
}
end:
ConfigUnlock(config);
2022-12-14 15:40:23 +00:00
return response;
}