2014-08-12 16:10:52 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
2015-01-06 14:21:39 +01:00
|
|
|
# Copyright 2014, 2015 OpenMarket Ltd
|
2014-08-12 16:10:52 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-13 04:14:34 +02:00
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
from twisted.internet import defer
|
|
|
|
|
|
|
|
from ._base import BaseHandler
|
2015-03-23 15:23:51 +01:00
|
|
|
from synapse.api.errors import LoginError, Codes
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
import bcrypt
|
|
|
|
import logging
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class LoginHandler(BaseHandler):
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
|
|
|
super(LoginHandler, self).__init__(hs)
|
|
|
|
self.hs = hs
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def login(self, user, password):
|
|
|
|
"""Login as the specified user with the specified password.
|
|
|
|
|
|
|
|
Args:
|
2014-08-14 17:40:15 +02:00
|
|
|
user (str): The user ID.
|
2014-08-12 16:10:52 +02:00
|
|
|
password (str): The password.
|
|
|
|
Returns:
|
|
|
|
The newly allocated access token.
|
|
|
|
Raises:
|
|
|
|
StoreError if there was a problem storing the token.
|
|
|
|
LoginError if there was an authentication problem.
|
|
|
|
"""
|
|
|
|
# TODO do this better, it can't go in __init__ else it cyclic loops
|
|
|
|
if not hasattr(self, "reg_handler"):
|
|
|
|
self.reg_handler = self.hs.get_handlers().registration_handler
|
|
|
|
|
|
|
|
# pull out the hash for this user if they exist
|
|
|
|
user_info = yield self.store.get_user_by_id(user_id=user)
|
|
|
|
if not user_info:
|
2014-10-30 12:10:17 +01:00
|
|
|
logger.warn("Attempted to login as %s but they do not exist", user)
|
2014-08-14 15:29:01 +02:00
|
|
|
raise LoginError(403, "", errcode=Codes.FORBIDDEN)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
stored_hash = user_info[0]["password_hash"]
|
|
|
|
if bcrypt.checkpw(password, stored_hash):
|
|
|
|
# generate an access token and store it.
|
|
|
|
token = self.reg_handler._generate_token(user)
|
|
|
|
logger.info("Adding token %s for user %s", token, user)
|
|
|
|
yield self.store.add_access_token_to_user(user, token)
|
|
|
|
defer.returnValue(token)
|
|
|
|
else:
|
|
|
|
logger.warn("Failed password login for user %s", user)
|
2014-09-16 12:22:40 +02:00
|
|
|
raise LoginError(403, "", errcode=Codes.FORBIDDEN)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2015-03-23 15:20:28 +01:00
|
|
|
def set_password(self, user_id, newpassword, token_id=None):
|
|
|
|
password_hash = bcrypt.hashpw(newpassword, bcrypt.gensalt())
|
2014-09-16 12:22:40 +02:00
|
|
|
|
2015-03-23 15:20:28 +01:00
|
|
|
yield self.store.user_set_password_hash(user_id, password_hash)
|
|
|
|
yield self.store.user_delete_access_tokens_apart_from(user_id, token_id)
|
2015-03-26 14:40:16 +01:00
|
|
|
yield self.hs.get_pusherpool().remove_pushers_by_user_access_token(
|
|
|
|
user_id, token_id
|
|
|
|
)
|
2015-03-23 15:20:28 +01:00
|
|
|
yield self.store.flush_user(user_id)
|