mirror of
https://git.anonymousland.org/anonymousland/synapse.git
synced 2025-05-11 15:34:59 -04:00
Support expiry of refresh tokens and expiry of the overall session when refresh tokens are in use. (#11425)
This commit is contained in:
parent
e2c300e7e4
commit
1d8b80b334
8 changed files with 338 additions and 54 deletions
|
@ -119,6 +119,7 @@ class RegistrationHandler:
|
|||
self.refreshable_access_token_lifetime = (
|
||||
hs.config.registration.refreshable_access_token_lifetime
|
||||
)
|
||||
self.refresh_token_lifetime = hs.config.registration.refresh_token_lifetime
|
||||
|
||||
init_counters_for_auth_provider("")
|
||||
|
||||
|
@ -793,13 +794,13 @@ class RegistrationHandler:
|
|||
class and RegisterDeviceReplicationServlet.
|
||||
"""
|
||||
assert not self.hs.config.worker.worker_app
|
||||
valid_until_ms = None
|
||||
access_token_expiry = None
|
||||
if self.session_lifetime is not None:
|
||||
if is_guest:
|
||||
raise Exception(
|
||||
"session_lifetime is not currently implemented for guest access"
|
||||
)
|
||||
valid_until_ms = self.clock.time_msec() + self.session_lifetime
|
||||
access_token_expiry = self.clock.time_msec() + self.session_lifetime
|
||||
|
||||
refresh_token = None
|
||||
refresh_token_id = None
|
||||
|
@ -808,25 +809,52 @@ class RegistrationHandler:
|
|||
user_id, device_id, initial_display_name
|
||||
)
|
||||
if is_guest:
|
||||
assert valid_until_ms is None
|
||||
assert access_token_expiry is None
|
||||
access_token = self.macaroon_gen.generate_guest_access_token(user_id)
|
||||
else:
|
||||
if should_issue_refresh_token:
|
||||
now_ms = self.clock.time_msec()
|
||||
|
||||
# Set the expiry time of the refreshable access token
|
||||
access_token_expiry = now_ms + self.refreshable_access_token_lifetime
|
||||
|
||||
# Set the refresh token expiry time (if configured)
|
||||
refresh_token_expiry = None
|
||||
if self.refresh_token_lifetime is not None:
|
||||
refresh_token_expiry = now_ms + self.refresh_token_lifetime
|
||||
|
||||
# Set an ultimate session expiry time (if configured)
|
||||
ultimate_session_expiry_ts = None
|
||||
if self.session_lifetime is not None:
|
||||
ultimate_session_expiry_ts = now_ms + self.session_lifetime
|
||||
|
||||
# Also ensure that the issued tokens don't outlive the
|
||||
# session.
|
||||
# (It would be weird to configure a homeserver with a shorter
|
||||
# session lifetime than token lifetime, but may as well handle
|
||||
# it.)
|
||||
access_token_expiry = min(
|
||||
access_token_expiry, ultimate_session_expiry_ts
|
||||
)
|
||||
if refresh_token_expiry is not None:
|
||||
refresh_token_expiry = min(
|
||||
refresh_token_expiry, ultimate_session_expiry_ts
|
||||
)
|
||||
|
||||
(
|
||||
refresh_token,
|
||||
refresh_token_id,
|
||||
) = await self._auth_handler.create_refresh_token_for_user_id(
|
||||
user_id,
|
||||
device_id=registered_device_id,
|
||||
)
|
||||
valid_until_ms = (
|
||||
self.clock.time_msec() + self.refreshable_access_token_lifetime
|
||||
expiry_ts=refresh_token_expiry,
|
||||
ultimate_session_expiry_ts=ultimate_session_expiry_ts,
|
||||
)
|
||||
|
||||
access_token = await self._auth_handler.create_access_token_for_user_id(
|
||||
user_id,
|
||||
device_id=registered_device_id,
|
||||
valid_until_ms=valid_until_ms,
|
||||
valid_until_ms=access_token_expiry,
|
||||
is_appservice_ghost=is_appservice_ghost,
|
||||
refresh_token_id=refresh_token_id,
|
||||
)
|
||||
|
@ -834,7 +862,7 @@ class RegistrationHandler:
|
|||
return {
|
||||
"device_id": registered_device_id,
|
||||
"access_token": access_token,
|
||||
"valid_until_ms": valid_until_ms,
|
||||
"valid_until_ms": access_token_expiry,
|
||||
"refresh_token": refresh_token,
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue