2017-04-20 17:40:52 -05:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-05-23 11:43:05 -05:00
|
|
|
// Package auth implements authentication checks and storage.
|
2017-03-07 07:43:32 -06:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
2017-05-25 07:33:50 -05:00
|
|
|
"database/sql"
|
2017-03-07 07:43:32 -06:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
|
2017-05-23 11:43:05 -05:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/storage/devices"
|
2017-03-07 07:43:32 -06:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
|
|
|
"github.com/matrix-org/util"
|
|
|
|
)
|
|
|
|
|
|
|
|
// VerifyAccessToken verifies that an access token was supplied in the given HTTP request
|
2017-05-23 11:43:05 -05:00
|
|
|
// and returns the device it corresponds to. Returns resErr (an error response which can be
|
2017-03-07 07:43:32 -06:00
|
|
|
// sent to the client) if the token is invalid or there was a problem querying the database.
|
2017-05-23 11:43:05 -05:00
|
|
|
func VerifyAccessToken(req *http.Request, deviceDB *devices.Database) (device *authtypes.Device, resErr *util.JSONResponse) {
|
|
|
|
token, err := extractAccessToken(req)
|
|
|
|
if err != nil {
|
2017-03-07 07:43:32 -06:00
|
|
|
resErr = &util.JSONResponse{
|
|
|
|
Code: 401,
|
2017-05-23 11:43:05 -05:00
|
|
|
JSON: jsonerror.MissingToken(err.Error()),
|
2017-03-07 07:43:32 -06:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2017-05-23 11:43:05 -05:00
|
|
|
device, err = deviceDB.GetDeviceByAccessToken(token)
|
|
|
|
if err != nil {
|
2017-05-25 07:33:50 -05:00
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
resErr = &util.JSONResponse{
|
|
|
|
Code: 403,
|
|
|
|
JSON: jsonerror.Forbidden("Invalid access token"),
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
resErr = &util.JSONResponse{
|
|
|
|
Code: 500,
|
|
|
|
JSON: jsonerror.Unknown("Failed to check access token"),
|
|
|
|
}
|
2017-05-23 11:43:05 -05:00
|
|
|
}
|
2017-03-07 07:43:32 -06:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// extractAccessToken from a request, or return an error detailing what went wrong. The
|
|
|
|
// error message MUST be human-readable and comprehensible to the client.
|
|
|
|
func extractAccessToken(req *http.Request) (string, error) {
|
|
|
|
// cf https://github.com/matrix-org/synapse/blob/v0.19.2/synapse/api/auth.py#L631
|
|
|
|
authBearer := req.Header.Get("Authorization")
|
|
|
|
queryToken := req.URL.Query().Get("access_token")
|
|
|
|
if authBearer != "" && queryToken != "" {
|
|
|
|
return "", fmt.Errorf("mixing Authorization headers and access_token query parameters")
|
|
|
|
}
|
|
|
|
|
|
|
|
if queryToken != "" {
|
|
|
|
return queryToken, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if authBearer != "" {
|
|
|
|
parts := strings.SplitN(authBearer, " ", 2)
|
|
|
|
if len(parts) != 2 || parts[0] != "Bearer" {
|
|
|
|
return "", fmt.Errorf("invalid Authorization header")
|
|
|
|
}
|
|
|
|
return parts[1], nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("missing access token")
|
|
|
|
}
|