|
|
|
@ -19,6 +19,7 @@ import logging |
|
|
|
|
from twisted.internet import defer |
|
|
|
|
|
|
|
|
|
from synapse import types |
|
|
|
|
from synapse.api.constants import LoginType |
|
|
|
|
from synapse.api.errors import ( |
|
|
|
|
AuthError, |
|
|
|
|
Codes, |
|
|
|
@ -26,9 +27,14 @@ from synapse.api.errors import ( |
|
|
|
|
RegistrationError, |
|
|
|
|
SynapseError, |
|
|
|
|
) |
|
|
|
|
from synapse.config.server import is_threepid_reserved |
|
|
|
|
from synapse.http.client import CaptchaServerHttpClient |
|
|
|
|
from synapse.http.servlet import assert_params_in_dict |
|
|
|
|
from synapse.replication.http.login import RegisterDeviceReplicationServlet |
|
|
|
|
from synapse.replication.http.register import ReplicationRegisterServlet |
|
|
|
|
from synapse.replication.http.register import ( |
|
|
|
|
ReplicationPostRegisterActionsServlet, |
|
|
|
|
ReplicationRegisterServlet, |
|
|
|
|
) |
|
|
|
|
from synapse.types import RoomAlias, RoomID, UserID, create_requester |
|
|
|
|
from synapse.util.async_helpers import Linearizer |
|
|
|
|
from synapse.util.threepids import check_3pid_allowed |
|
|
|
@ -53,6 +59,7 @@ class RegistrationHandler(BaseHandler): |
|
|
|
|
self.profile_handler = hs.get_profile_handler() |
|
|
|
|
self.user_directory_handler = hs.get_user_directory_handler() |
|
|
|
|
self.captcha_client = CaptchaServerHttpClient(hs) |
|
|
|
|
self.identity_handler = self.hs.get_handlers().identity_handler |
|
|
|
|
|
|
|
|
|
self._next_generated_user_id = None |
|
|
|
|
|
|
|
|
@ -68,8 +75,12 @@ class RegistrationHandler(BaseHandler): |
|
|
|
|
self._register_device_client = ( |
|
|
|
|
RegisterDeviceReplicationServlet.make_client(hs) |
|
|
|
|
) |
|
|
|
|
self._post_registration_client = ( |
|
|
|
|
ReplicationPostRegisterActionsServlet.make_client(hs) |
|
|
|
|
) |
|
|
|
|
else: |
|
|
|
|
self.device_handler = hs.get_device_handler() |
|
|
|
|
self.pusher_pool = hs.get_pusherpool() |
|
|
|
|
|
|
|
|
|
@defer.inlineCallbacks |
|
|
|
|
def check_username(self, localpart, guest_access_token=None, |
|
|
|
@ -369,8 +380,7 @@ class RegistrationHandler(BaseHandler): |
|
|
|
|
logger.info("validating threepidcred sid %s on id server %s", |
|
|
|
|
c['sid'], c['idServer']) |
|
|
|
|
try: |
|
|
|
|
identity_handler = self.hs.get_handlers().identity_handler |
|
|
|
|
threepid = yield identity_handler.threepid_from_creds(c) |
|
|
|
|
threepid = yield self.identity_handler.threepid_from_creds(c) |
|
|
|
|
except Exception: |
|
|
|
|
logger.exception("Couldn't validate 3pid") |
|
|
|
|
raise RegistrationError(400, "Couldn't validate 3pid") |
|
|
|
@ -394,9 +404,8 @@ class RegistrationHandler(BaseHandler): |
|
|
|
|
|
|
|
|
|
# Now we have a matrix ID, bind it to the threepids we were given |
|
|
|
|
for c in threepidCreds: |
|
|
|
|
identity_handler = self.hs.get_handlers().identity_handler |
|
|
|
|
# XXX: This should be a deferred list, shouldn't it? |
|
|
|
|
yield identity_handler.bind_threepid(c, user_id) |
|
|
|
|
yield self.identity_handler.bind_threepid(c, user_id) |
|
|
|
|
|
|
|
|
|
def check_user_id_not_appservice_exclusive(self, user_id, allowed_appservice=None): |
|
|
|
|
# don't allow people to register the server notices mxid |
|
|
|
@ -671,3 +680,184 @@ class RegistrationHandler(BaseHandler): |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
defer.returnValue((device_id, access_token)) |
|
|
|
|
|
|
|
|
|
@defer.inlineCallbacks |
|
|
|
|
def post_registration_actions(self, user_id, auth_result, access_token, |
|
|
|
|
bind_email, bind_msisdn): |
|
|
|
|
"""A user has completed registration |
|
|
|
|
|
|
|
|
|
Args: |
|
|
|
|
user_id (str): The user ID that consented |
|
|
|
|
auth_result (dict): The authenticated credentials of the newly |
|
|
|
|
registered user. |
|
|
|
|
access_token (str|None): The access token of the newly logged in |
|
|
|
|
device, or None if `inhibit_login` enabled. |
|
|
|
|
bind_email (bool): Whether to bind the email with the identity |
|
|
|
|
server |
|
|
|
|
bind_msisdn (bool): Whether to bind the msisdn with the identity |
|
|
|
|
server |
|
|
|
|
""" |
|
|
|
|
if self.hs.config.worker_app: |
|
|
|
|
yield self._post_registration_client( |
|
|
|
|
user_id=user_id, |
|
|
|
|
auth_result=auth_result, |
|
|
|
|
access_token=access_token, |
|
|
|
|
bind_email=bind_email, |
|
|
|
|
bind_msisdn=bind_msisdn, |
|
|
|
|
) |
|
|
|
|
return |
|
|
|
|
|
|
|
|
|
if auth_result and LoginType.EMAIL_IDENTITY in auth_result: |
|
|
|
|
threepid = auth_result[LoginType.EMAIL_IDENTITY] |
|
|
|
|
# Necessary due to auth checks prior to the threepid being |
|
|
|
|
# written to the db |
|
|
|
|
if is_threepid_reserved( |
|
|
|
|
self.hs.config.mau_limits_reserved_threepids, threepid |
|
|
|
|
): |
|
|
|
|
yield self.store.upsert_monthly_active_user(user_id) |
|
|
|
|
|
|
|
|
|
yield self._register_email_threepid( |
|
|
|
|
user_id, threepid, access_token, |
|
|
|
|
bind_email, |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
if auth_result and LoginType.MSISDN in auth_result: |
|
|
|
|
threepid = auth_result[LoginType.MSISDN] |
|
|
|
|
yield self._register_msisdn_threepid( |
|
|
|
|
user_id, threepid, bind_msisdn, |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
if auth_result and LoginType.TERMS in auth_result: |
|
|
|
|
yield self._on_user_consented( |
|
|
|
|
user_id, self.hs.config.user_consent_version, |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
@defer.inlineCallbacks |
|
|
|
|
def _on_user_consented(self, user_id, consent_version): |
|
|
|
|
"""A user consented to the terms on registration |
|
|
|
|
|
|
|
|
|
Args: |
|
|
|
|
user_id (str): The user ID that consented |
|
|
|
|
consent_version (str): version of the policy the user has |
|
|
|
|
consented to. |
|
|
|
|
""" |
|
|
|
|
logger.info("%s has consented to the privacy policy", user_id) |
|
|
|
|
yield self.store.user_set_consent_version( |
|
|
|
|
user_id, consent_version, |
|
|
|
|
) |
|
|
|
|
yield self.post_consent_actions(user_id) |
|
|
|
|
|
|
|
|
|
@defer.inlineCallbacks |
|
|
|
|
def _register_email_threepid(self, user_id, threepid, token, bind_email): |
|
|
|
|
"""Add an email address as a 3pid identifier |
|
|
|
|
|
|
|
|
|
Also adds an email pusher for the email address, if configured in the |
|
|
|
|
HS config |
|
|
|
|
|
|
|
|
|
Also optionally binds emails to the given user_id on the identity server |
|
|
|
|
|
|
|
|
|
Must be called on master. |
|
|
|
|
|
|
|
|
|
Args: |
|
|
|
|
user_id (str): id of user |
|
|
|
|
threepid (object): m.login.email.identity auth response |
|
|
|
|
token (str|None): access_token for the user, or None if not logged |
|
|
|
|
in. |
|
|
|
|
bind_email (bool): true if the client requested the email to be |
|
|
|
|
bound at the identity server |
|
|
|
|
Returns: |
|
|
|
|
defer.Deferred: |
|
|
|
|
""" |
|
|
|
|
reqd = ('medium', 'address', 'validated_at') |
|
|
|
|
if any(x not in threepid for x in reqd): |
|
|
|
|
# This will only happen if the ID server returns a malformed response |
|
|
|
|
logger.info("Can't add incomplete 3pid") |
|
|
|
|
return |
|
|
|
|
|
|
|
|
|
yield self._auth_handler.add_threepid( |
|
|
|
|
user_id, |
|
|
|
|
threepid['medium'], |
|
|
|
|
threepid['address'], |
|
|
|
|
threepid['validated_at'], |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
# And we add an email pusher for them by default, but only |
|
|
|
|
# if email notifications are enabled (so people don't start |
|
|
|
|
# getting mail spam where they weren't before if email |
|
|
|
|
# notifs are set up on a home server) |
|
|
|
|
if (self.hs.config.email_enable_notifs and |
|
|
|
|
self.hs.config.email_notif_for_new_users |
|
|
|
|
and token): |
|
|
|
|
# Pull the ID of the access token back out of the db |
|
|
|
|
# It would really make more sense for this to be passed |
|
|
|
|
# up when the access token is saved, but that's quite an |
|
|
|
|
# invasive change I'd rather do separately. |
|
|
|
|
user_tuple = yield self.store.get_user_by_access_token( |
|
|
|
|
token |
|
|
|
|
) |
|
|
|
|
token_id = user_tuple["token_id"] |
|
|
|
|
|
|
|
|
|
yield self.pusher_pool.add_pusher( |
|
|
|
|
user_id=user_id, |
|
|
|
|
access_token=token_id, |
|
|
|
|
kind="email", |
|
|
|
|
app_id="m.email", |
|
|
|
|
app_display_name="Email Notifications", |
|
|
|
|
device_display_name=threepid["address"], |
|
|
|
|
pushkey=threepid["address"], |
|
|
|
|
lang=None, # We don't know a user's language here |
|
|
|
|
data={}, |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
if bind_email: |
|
|
|
|
logger.info("bind_email specified: binding") |
|
|
|
|
logger.debug("Binding emails %s to %s" % ( |
|
|
|
|
threepid, user_id |
|
|
|
|
)) |
|
|
|
|
yield self.identity_handler.bind_threepid( |
|
|
|
|
threepid['threepid_creds'], user_id |
|
|
|
|
) |
|
|
|
|
else: |
|
|
|
|
logger.info("bind_email not specified: not binding email") |
|
|
|
|
|
|
|
|
|
@defer.inlineCallbacks |
|
|
|
|
def _register_msisdn_threepid(self, user_id, threepid, bind_msisdn): |
|
|
|
|
"""Add a phone number as a 3pid identifier |
|
|
|
|
|
|
|
|
|
Also optionally binds msisdn to the given user_id on the identity server |
|
|
|
|
|
|
|
|
|
Must be called on master. |
|
|
|
|
|
|
|
|
|
Args: |
|
|
|
|
user_id (str): id of user |
|
|
|
|
threepid (object): m.login.msisdn auth response |
|
|
|
|
token (str): access_token for the user |
|
|
|
|
bind_email (bool): true if the client requested the email to be |
|
|
|
|
bound at the identity server |
|
|
|
|
Returns: |
|
|
|
|
defer.Deferred: |
|
|
|
|
""" |
|
|
|
|
try: |
|
|
|
|
assert_params_in_dict(threepid, ['medium', 'address', 'validated_at']) |
|
|
|
|
except SynapseError as ex: |
|
|
|
|
if ex.errcode == Codes.MISSING_PARAM: |
|
|
|
|
# This will only happen if the ID server returns a malformed response |
|
|
|
|
logger.info("Can't add incomplete 3pid") |
|
|
|
|
defer.returnValue(None) |
|
|
|
|
raise |
|
|
|
|
|
|
|
|
|
yield self._auth_handler.add_threepid( |
|
|
|
|
user_id, |
|
|
|
|
threepid['medium'], |
|
|
|
|
threepid['address'], |
|
|
|
|
threepid['validated_at'], |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
if bind_msisdn: |
|
|
|
|
logger.info("bind_msisdn specified: binding") |
|
|
|
|
logger.debug("Binding msisdn %s to %s", threepid, user_id) |
|
|
|
|
yield self.identity_handler.bind_threepid( |
|
|
|
|
threepid['threepid_creds'], user_id |
|
|
|
|
) |
|
|
|
|
else: |
|
|
|
|
logger.info("bind_msisdn not specified: not binding msisdn") |
|
|
|
|