mirror of
https://git.anonymousland.org/anonymousland/synapse.git
synced 2024-10-01 11:49:51 -04:00
Support expiry of refresh tokens and expiry of the overall session when refresh tokens are in use. (#11425)
This commit is contained in:
parent
e2c300e7e4
commit
1d8b80b334
1
changelog.d/11425.feature
Normal file
1
changelog.d/11425.feature
Normal file
@ -0,0 +1 @@
|
|||||||
|
Support expiry of refresh tokens and expiry of the overall session when refresh tokens are in use.
|
@ -113,14 +113,11 @@ class RegistrationConfig(Config):
|
|||||||
self.session_lifetime = session_lifetime
|
self.session_lifetime = session_lifetime
|
||||||
|
|
||||||
# The `refreshable_access_token_lifetime` applies for tokens that can be renewed
|
# The `refreshable_access_token_lifetime` applies for tokens that can be renewed
|
||||||
# using a refresh token, as per MSC2918. If it is `None`, the refresh
|
# using a refresh token, as per MSC2918.
|
||||||
# token mechanism is disabled.
|
# If it is `None`, the refresh token mechanism is disabled.
|
||||||
#
|
|
||||||
# Since it is incompatible with the `session_lifetime` mechanism, it is set to
|
|
||||||
# `None` by default if a `session_lifetime` is set.
|
|
||||||
refreshable_access_token_lifetime = config.get(
|
refreshable_access_token_lifetime = config.get(
|
||||||
"refreshable_access_token_lifetime",
|
"refreshable_access_token_lifetime",
|
||||||
"5m" if session_lifetime is None else None,
|
"5m",
|
||||||
)
|
)
|
||||||
if refreshable_access_token_lifetime is not None:
|
if refreshable_access_token_lifetime is not None:
|
||||||
refreshable_access_token_lifetime = self.parse_duration(
|
refreshable_access_token_lifetime = self.parse_duration(
|
||||||
@ -128,17 +125,10 @@ class RegistrationConfig(Config):
|
|||||||
)
|
)
|
||||||
self.refreshable_access_token_lifetime = refreshable_access_token_lifetime
|
self.refreshable_access_token_lifetime = refreshable_access_token_lifetime
|
||||||
|
|
||||||
if (
|
refresh_token_lifetime = config.get("refresh_token_lifetime")
|
||||||
session_lifetime is not None
|
if refresh_token_lifetime is not None:
|
||||||
and refreshable_access_token_lifetime is not None
|
refresh_token_lifetime = self.parse_duration(refresh_token_lifetime)
|
||||||
):
|
self.refresh_token_lifetime = refresh_token_lifetime
|
||||||
raise ConfigError(
|
|
||||||
"The refresh token mechanism is incompatible with the "
|
|
||||||
"`session_lifetime` option. Consider disabling the "
|
|
||||||
"`session_lifetime` option or disabling the refresh token "
|
|
||||||
"mechanism by removing the `refreshable_access_token_lifetime` "
|
|
||||||
"option."
|
|
||||||
)
|
|
||||||
|
|
||||||
# The fallback template used for authenticating using a registration token
|
# The fallback template used for authenticating using a registration token
|
||||||
self.registration_token_template = self.read_template("registration_token.html")
|
self.registration_token_template = self.read_template("registration_token.html")
|
||||||
|
@ -18,6 +18,7 @@ import time
|
|||||||
import unicodedata
|
import unicodedata
|
||||||
import urllib.parse
|
import urllib.parse
|
||||||
from binascii import crc32
|
from binascii import crc32
|
||||||
|
from http import HTTPStatus
|
||||||
from typing import (
|
from typing import (
|
||||||
TYPE_CHECKING,
|
TYPE_CHECKING,
|
||||||
Any,
|
Any,
|
||||||
@ -756,53 +757,109 @@ class AuthHandler:
|
|||||||
async def refresh_token(
|
async def refresh_token(
|
||||||
self,
|
self,
|
||||||
refresh_token: str,
|
refresh_token: str,
|
||||||
valid_until_ms: Optional[int],
|
access_token_valid_until_ms: Optional[int],
|
||||||
) -> Tuple[str, str]:
|
refresh_token_valid_until_ms: Optional[int],
|
||||||
|
) -> Tuple[str, str, Optional[int]]:
|
||||||
"""
|
"""
|
||||||
Consumes a refresh token and generate both a new access token and a new refresh token from it.
|
Consumes a refresh token and generate both a new access token and a new refresh token from it.
|
||||||
|
|
||||||
The consumed refresh token is considered invalid after the first use of the new access token or the new refresh token.
|
The consumed refresh token is considered invalid after the first use of the new access token or the new refresh token.
|
||||||
|
|
||||||
|
The lifetime of both the access token and refresh token will be capped so that they
|
||||||
|
do not exceed the session's ultimate expiry time, if applicable.
|
||||||
|
|
||||||
Args:
|
Args:
|
||||||
refresh_token: The token to consume.
|
refresh_token: The token to consume.
|
||||||
valid_until_ms: The expiration timestamp of the new access token.
|
access_token_valid_until_ms: The expiration timestamp of the new access token.
|
||||||
|
None if the access token does not expire.
|
||||||
|
refresh_token_valid_until_ms: The expiration timestamp of the new refresh token.
|
||||||
|
None if the refresh token does not expire.
|
||||||
Returns:
|
Returns:
|
||||||
A tuple containing the new access token and refresh token
|
A tuple containing:
|
||||||
|
- the new access token
|
||||||
|
- the new refresh token
|
||||||
|
- the actual expiry time of the access token, which may be earlier than
|
||||||
|
`access_token_valid_until_ms`.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
# Verify the token signature first before looking up the token
|
# Verify the token signature first before looking up the token
|
||||||
if not self._verify_refresh_token(refresh_token):
|
if not self._verify_refresh_token(refresh_token):
|
||||||
raise SynapseError(401, "invalid refresh token", Codes.UNKNOWN_TOKEN)
|
raise SynapseError(
|
||||||
|
HTTPStatus.UNAUTHORIZED, "invalid refresh token", Codes.UNKNOWN_TOKEN
|
||||||
|
)
|
||||||
|
|
||||||
existing_token = await self.store.lookup_refresh_token(refresh_token)
|
existing_token = await self.store.lookup_refresh_token(refresh_token)
|
||||||
if existing_token is None:
|
if existing_token is None:
|
||||||
raise SynapseError(401, "refresh token does not exist", Codes.UNKNOWN_TOKEN)
|
raise SynapseError(
|
||||||
|
HTTPStatus.UNAUTHORIZED,
|
||||||
|
"refresh token does not exist",
|
||||||
|
Codes.UNKNOWN_TOKEN,
|
||||||
|
)
|
||||||
|
|
||||||
if (
|
if (
|
||||||
existing_token.has_next_access_token_been_used
|
existing_token.has_next_access_token_been_used
|
||||||
or existing_token.has_next_refresh_token_been_refreshed
|
or existing_token.has_next_refresh_token_been_refreshed
|
||||||
):
|
):
|
||||||
raise SynapseError(
|
raise SynapseError(
|
||||||
403, "refresh token isn't valid anymore", Codes.FORBIDDEN
|
HTTPStatus.FORBIDDEN,
|
||||||
|
"refresh token isn't valid anymore",
|
||||||
|
Codes.FORBIDDEN,
|
||||||
|
)
|
||||||
|
|
||||||
|
now_ms = self._clock.time_msec()
|
||||||
|
|
||||||
|
if existing_token.expiry_ts is not None and existing_token.expiry_ts < now_ms:
|
||||||
|
|
||||||
|
raise SynapseError(
|
||||||
|
HTTPStatus.FORBIDDEN,
|
||||||
|
"The supplied refresh token has expired",
|
||||||
|
Codes.FORBIDDEN,
|
||||||
|
)
|
||||||
|
|
||||||
|
if existing_token.ultimate_session_expiry_ts is not None:
|
||||||
|
# This session has a bounded lifetime, even across refreshes.
|
||||||
|
|
||||||
|
if access_token_valid_until_ms is not None:
|
||||||
|
access_token_valid_until_ms = min(
|
||||||
|
access_token_valid_until_ms,
|
||||||
|
existing_token.ultimate_session_expiry_ts,
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
access_token_valid_until_ms = existing_token.ultimate_session_expiry_ts
|
||||||
|
|
||||||
|
if refresh_token_valid_until_ms is not None:
|
||||||
|
refresh_token_valid_until_ms = min(
|
||||||
|
refresh_token_valid_until_ms,
|
||||||
|
existing_token.ultimate_session_expiry_ts,
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
refresh_token_valid_until_ms = existing_token.ultimate_session_expiry_ts
|
||||||
|
if existing_token.ultimate_session_expiry_ts < now_ms:
|
||||||
|
raise SynapseError(
|
||||||
|
HTTPStatus.FORBIDDEN,
|
||||||
|
"The session has expired and can no longer be refreshed",
|
||||||
|
Codes.FORBIDDEN,
|
||||||
)
|
)
|
||||||
|
|
||||||
(
|
(
|
||||||
new_refresh_token,
|
new_refresh_token,
|
||||||
new_refresh_token_id,
|
new_refresh_token_id,
|
||||||
) = await self.create_refresh_token_for_user_id(
|
) = await self.create_refresh_token_for_user_id(
|
||||||
user_id=existing_token.user_id, device_id=existing_token.device_id
|
user_id=existing_token.user_id,
|
||||||
|
device_id=existing_token.device_id,
|
||||||
|
expiry_ts=refresh_token_valid_until_ms,
|
||||||
|
ultimate_session_expiry_ts=existing_token.ultimate_session_expiry_ts,
|
||||||
)
|
)
|
||||||
access_token = await self.create_access_token_for_user_id(
|
access_token = await self.create_access_token_for_user_id(
|
||||||
user_id=existing_token.user_id,
|
user_id=existing_token.user_id,
|
||||||
device_id=existing_token.device_id,
|
device_id=existing_token.device_id,
|
||||||
valid_until_ms=valid_until_ms,
|
valid_until_ms=access_token_valid_until_ms,
|
||||||
refresh_token_id=new_refresh_token_id,
|
refresh_token_id=new_refresh_token_id,
|
||||||
)
|
)
|
||||||
await self.store.replace_refresh_token(
|
await self.store.replace_refresh_token(
|
||||||
existing_token.token_id, new_refresh_token_id
|
existing_token.token_id, new_refresh_token_id
|
||||||
)
|
)
|
||||||
return access_token, new_refresh_token
|
return access_token, new_refresh_token, access_token_valid_until_ms
|
||||||
|
|
||||||
def _verify_refresh_token(self, token: str) -> bool:
|
def _verify_refresh_token(self, token: str) -> bool:
|
||||||
"""
|
"""
|
||||||
@ -836,6 +893,8 @@ class AuthHandler:
|
|||||||
self,
|
self,
|
||||||
user_id: str,
|
user_id: str,
|
||||||
device_id: str,
|
device_id: str,
|
||||||
|
expiry_ts: Optional[int],
|
||||||
|
ultimate_session_expiry_ts: Optional[int],
|
||||||
) -> Tuple[str, int]:
|
) -> Tuple[str, int]:
|
||||||
"""
|
"""
|
||||||
Creates a new refresh token for the user with the given user ID.
|
Creates a new refresh token for the user with the given user ID.
|
||||||
@ -843,6 +902,13 @@ class AuthHandler:
|
|||||||
Args:
|
Args:
|
||||||
user_id: canonical user ID
|
user_id: canonical user ID
|
||||||
device_id: the device ID to associate with the token.
|
device_id: the device ID to associate with the token.
|
||||||
|
expiry_ts (milliseconds since the epoch): Time after which the
|
||||||
|
refresh token cannot be used.
|
||||||
|
If None, the refresh token never expires until it has been used.
|
||||||
|
ultimate_session_expiry_ts (milliseconds since the epoch):
|
||||||
|
Time at which the session will end and can not be extended any
|
||||||
|
further.
|
||||||
|
If None, the session can be refreshed indefinitely.
|
||||||
|
|
||||||
Returns:
|
Returns:
|
||||||
The newly created refresh token and its ID in the database
|
The newly created refresh token and its ID in the database
|
||||||
@ -852,6 +918,8 @@ class AuthHandler:
|
|||||||
user_id=user_id,
|
user_id=user_id,
|
||||||
token=refresh_token,
|
token=refresh_token,
|
||||||
device_id=device_id,
|
device_id=device_id,
|
||||||
|
expiry_ts=expiry_ts,
|
||||||
|
ultimate_session_expiry_ts=ultimate_session_expiry_ts,
|
||||||
)
|
)
|
||||||
return refresh_token, refresh_token_id
|
return refresh_token, refresh_token_id
|
||||||
|
|
||||||
|
@ -119,6 +119,7 @@ class RegistrationHandler:
|
|||||||
self.refreshable_access_token_lifetime = (
|
self.refreshable_access_token_lifetime = (
|
||||||
hs.config.registration.refreshable_access_token_lifetime
|
hs.config.registration.refreshable_access_token_lifetime
|
||||||
)
|
)
|
||||||
|
self.refresh_token_lifetime = hs.config.registration.refresh_token_lifetime
|
||||||
|
|
||||||
init_counters_for_auth_provider("")
|
init_counters_for_auth_provider("")
|
||||||
|
|
||||||
@ -793,13 +794,13 @@ class RegistrationHandler:
|
|||||||
class and RegisterDeviceReplicationServlet.
|
class and RegisterDeviceReplicationServlet.
|
||||||
"""
|
"""
|
||||||
assert not self.hs.config.worker.worker_app
|
assert not self.hs.config.worker.worker_app
|
||||||
valid_until_ms = None
|
access_token_expiry = None
|
||||||
if self.session_lifetime is not None:
|
if self.session_lifetime is not None:
|
||||||
if is_guest:
|
if is_guest:
|
||||||
raise Exception(
|
raise Exception(
|
||||||
"session_lifetime is not currently implemented for guest access"
|
"session_lifetime is not currently implemented for guest access"
|
||||||
)
|
)
|
||||||
valid_until_ms = self.clock.time_msec() + self.session_lifetime
|
access_token_expiry = self.clock.time_msec() + self.session_lifetime
|
||||||
|
|
||||||
refresh_token = None
|
refresh_token = None
|
||||||
refresh_token_id = None
|
refresh_token_id = None
|
||||||
@ -808,25 +809,52 @@ class RegistrationHandler:
|
|||||||
user_id, device_id, initial_display_name
|
user_id, device_id, initial_display_name
|
||||||
)
|
)
|
||||||
if is_guest:
|
if is_guest:
|
||||||
assert valid_until_ms is None
|
assert access_token_expiry is None
|
||||||
access_token = self.macaroon_gen.generate_guest_access_token(user_id)
|
access_token = self.macaroon_gen.generate_guest_access_token(user_id)
|
||||||
else:
|
else:
|
||||||
if should_issue_refresh_token:
|
if should_issue_refresh_token:
|
||||||
|
now_ms = self.clock.time_msec()
|
||||||
|
|
||||||
|
# Set the expiry time of the refreshable access token
|
||||||
|
access_token_expiry = now_ms + self.refreshable_access_token_lifetime
|
||||||
|
|
||||||
|
# Set the refresh token expiry time (if configured)
|
||||||
|
refresh_token_expiry = None
|
||||||
|
if self.refresh_token_lifetime is not None:
|
||||||
|
refresh_token_expiry = now_ms + self.refresh_token_lifetime
|
||||||
|
|
||||||
|
# Set an ultimate session expiry time (if configured)
|
||||||
|
ultimate_session_expiry_ts = None
|
||||||
|
if self.session_lifetime is not None:
|
||||||
|
ultimate_session_expiry_ts = now_ms + self.session_lifetime
|
||||||
|
|
||||||
|
# Also ensure that the issued tokens don't outlive the
|
||||||
|
# session.
|
||||||
|
# (It would be weird to configure a homeserver with a shorter
|
||||||
|
# session lifetime than token lifetime, but may as well handle
|
||||||
|
# it.)
|
||||||
|
access_token_expiry = min(
|
||||||
|
access_token_expiry, ultimate_session_expiry_ts
|
||||||
|
)
|
||||||
|
if refresh_token_expiry is not None:
|
||||||
|
refresh_token_expiry = min(
|
||||||
|
refresh_token_expiry, ultimate_session_expiry_ts
|
||||||
|
)
|
||||||
|
|
||||||
(
|
(
|
||||||
refresh_token,
|
refresh_token,
|
||||||
refresh_token_id,
|
refresh_token_id,
|
||||||
) = await self._auth_handler.create_refresh_token_for_user_id(
|
) = await self._auth_handler.create_refresh_token_for_user_id(
|
||||||
user_id,
|
user_id,
|
||||||
device_id=registered_device_id,
|
device_id=registered_device_id,
|
||||||
)
|
expiry_ts=refresh_token_expiry,
|
||||||
valid_until_ms = (
|
ultimate_session_expiry_ts=ultimate_session_expiry_ts,
|
||||||
self.clock.time_msec() + self.refreshable_access_token_lifetime
|
|
||||||
)
|
)
|
||||||
|
|
||||||
access_token = await self._auth_handler.create_access_token_for_user_id(
|
access_token = await self._auth_handler.create_access_token_for_user_id(
|
||||||
user_id,
|
user_id,
|
||||||
device_id=registered_device_id,
|
device_id=registered_device_id,
|
||||||
valid_until_ms=valid_until_ms,
|
valid_until_ms=access_token_expiry,
|
||||||
is_appservice_ghost=is_appservice_ghost,
|
is_appservice_ghost=is_appservice_ghost,
|
||||||
refresh_token_id=refresh_token_id,
|
refresh_token_id=refresh_token_id,
|
||||||
)
|
)
|
||||||
@ -834,7 +862,7 @@ class RegistrationHandler:
|
|||||||
return {
|
return {
|
||||||
"device_id": registered_device_id,
|
"device_id": registered_device_id,
|
||||||
"access_token": access_token,
|
"access_token": access_token,
|
||||||
"valid_until_ms": valid_until_ms,
|
"valid_until_ms": access_token_expiry,
|
||||||
"refresh_token": refresh_token,
|
"refresh_token": refresh_token,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -14,7 +14,17 @@
|
|||||||
|
|
||||||
import logging
|
import logging
|
||||||
import re
|
import re
|
||||||
from typing import TYPE_CHECKING, Any, Awaitable, Callable, Dict, List, Optional, Tuple
|
from typing import (
|
||||||
|
TYPE_CHECKING,
|
||||||
|
Any,
|
||||||
|
Awaitable,
|
||||||
|
Callable,
|
||||||
|
Dict,
|
||||||
|
List,
|
||||||
|
Optional,
|
||||||
|
Tuple,
|
||||||
|
Union,
|
||||||
|
)
|
||||||
|
|
||||||
from typing_extensions import TypedDict
|
from typing_extensions import TypedDict
|
||||||
|
|
||||||
@ -458,6 +468,7 @@ class RefreshTokenServlet(RestServlet):
|
|||||||
self.refreshable_access_token_lifetime = (
|
self.refreshable_access_token_lifetime = (
|
||||||
hs.config.registration.refreshable_access_token_lifetime
|
hs.config.registration.refreshable_access_token_lifetime
|
||||||
)
|
)
|
||||||
|
self.refresh_token_lifetime = hs.config.registration.refresh_token_lifetime
|
||||||
|
|
||||||
async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
||||||
refresh_submission = parse_json_object_from_request(request)
|
refresh_submission = parse_json_object_from_request(request)
|
||||||
@ -467,21 +478,32 @@ class RefreshTokenServlet(RestServlet):
|
|||||||
if not isinstance(token, str):
|
if not isinstance(token, str):
|
||||||
raise SynapseError(400, "Invalid param: refresh_token", Codes.INVALID_PARAM)
|
raise SynapseError(400, "Invalid param: refresh_token", Codes.INVALID_PARAM)
|
||||||
|
|
||||||
valid_until_ms = (
|
now = self._clock.time_msec()
|
||||||
self._clock.time_msec() + self.refreshable_access_token_lifetime
|
access_valid_until_ms = None
|
||||||
|
if self.refreshable_access_token_lifetime is not None:
|
||||||
|
access_valid_until_ms = now + self.refreshable_access_token_lifetime
|
||||||
|
refresh_valid_until_ms = None
|
||||||
|
if self.refresh_token_lifetime is not None:
|
||||||
|
refresh_valid_until_ms = now + self.refresh_token_lifetime
|
||||||
|
|
||||||
|
(
|
||||||
|
access_token,
|
||||||
|
refresh_token,
|
||||||
|
actual_access_token_expiry,
|
||||||
|
) = await self._auth_handler.refresh_token(
|
||||||
|
token, access_valid_until_ms, refresh_valid_until_ms
|
||||||
)
|
)
|
||||||
access_token, refresh_token = await self._auth_handler.refresh_token(
|
|
||||||
token, valid_until_ms
|
response: Dict[str, Union[str, int]] = {
|
||||||
)
|
|
||||||
expires_in_ms = valid_until_ms - self._clock.time_msec()
|
|
||||||
return (
|
|
||||||
200,
|
|
||||||
{
|
|
||||||
"access_token": access_token,
|
"access_token": access_token,
|
||||||
"refresh_token": refresh_token,
|
"refresh_token": refresh_token,
|
||||||
"expires_in_ms": expires_in_ms,
|
}
|
||||||
},
|
|
||||||
)
|
# expires_in_ms is only present if the token expires
|
||||||
|
if actual_access_token_expiry is not None:
|
||||||
|
response["expires_in_ms"] = actual_access_token_expiry - now
|
||||||
|
|
||||||
|
return 200, response
|
||||||
|
|
||||||
|
|
||||||
class SsoRedirectServlet(RestServlet):
|
class SsoRedirectServlet(RestServlet):
|
||||||
|
@ -106,6 +106,15 @@ class RefreshTokenLookupResult:
|
|||||||
has_next_access_token_been_used: bool
|
has_next_access_token_been_used: bool
|
||||||
"""True if the next access token was already used at least once."""
|
"""True if the next access token was already used at least once."""
|
||||||
|
|
||||||
|
expiry_ts: Optional[int]
|
||||||
|
"""The time at which the refresh token expires and can not be used.
|
||||||
|
If None, the refresh token doesn't expire."""
|
||||||
|
|
||||||
|
ultimate_session_expiry_ts: Optional[int]
|
||||||
|
"""The time at which the session comes to an end and can no longer be
|
||||||
|
refreshed.
|
||||||
|
If None, the session can be refreshed indefinitely."""
|
||||||
|
|
||||||
|
|
||||||
class RegistrationWorkerStore(CacheInvalidationWorkerStore):
|
class RegistrationWorkerStore(CacheInvalidationWorkerStore):
|
||||||
def __init__(
|
def __init__(
|
||||||
@ -1626,8 +1635,10 @@ class RegistrationWorkerStore(CacheInvalidationWorkerStore):
|
|||||||
rt.user_id,
|
rt.user_id,
|
||||||
rt.device_id,
|
rt.device_id,
|
||||||
rt.next_token_id,
|
rt.next_token_id,
|
||||||
(nrt.next_token_id IS NOT NULL) has_next_refresh_token_been_refreshed,
|
(nrt.next_token_id IS NOT NULL) AS has_next_refresh_token_been_refreshed,
|
||||||
at.used has_next_access_token_been_used
|
at.used AS has_next_access_token_been_used,
|
||||||
|
rt.expiry_ts,
|
||||||
|
rt.ultimate_session_expiry_ts
|
||||||
FROM refresh_tokens rt
|
FROM refresh_tokens rt
|
||||||
LEFT JOIN refresh_tokens nrt ON rt.next_token_id = nrt.id
|
LEFT JOIN refresh_tokens nrt ON rt.next_token_id = nrt.id
|
||||||
LEFT JOIN access_tokens at ON at.refresh_token_id = nrt.id
|
LEFT JOIN access_tokens at ON at.refresh_token_id = nrt.id
|
||||||
@ -1648,6 +1659,8 @@ class RegistrationWorkerStore(CacheInvalidationWorkerStore):
|
|||||||
has_next_refresh_token_been_refreshed=row[4],
|
has_next_refresh_token_been_refreshed=row[4],
|
||||||
# This column is nullable, ensure it's a boolean
|
# This column is nullable, ensure it's a boolean
|
||||||
has_next_access_token_been_used=(row[5] or False),
|
has_next_access_token_been_used=(row[5] or False),
|
||||||
|
expiry_ts=row[6],
|
||||||
|
ultimate_session_expiry_ts=row[7],
|
||||||
)
|
)
|
||||||
|
|
||||||
return await self.db_pool.runInteraction(
|
return await self.db_pool.runInteraction(
|
||||||
@ -1915,6 +1928,8 @@ class RegistrationStore(StatsStore, RegistrationBackgroundUpdateStore):
|
|||||||
user_id: str,
|
user_id: str,
|
||||||
token: str,
|
token: str,
|
||||||
device_id: Optional[str],
|
device_id: Optional[str],
|
||||||
|
expiry_ts: Optional[int],
|
||||||
|
ultimate_session_expiry_ts: Optional[int],
|
||||||
) -> int:
|
) -> int:
|
||||||
"""Adds a refresh token for the given user.
|
"""Adds a refresh token for the given user.
|
||||||
|
|
||||||
@ -1922,6 +1937,13 @@ class RegistrationStore(StatsStore, RegistrationBackgroundUpdateStore):
|
|||||||
user_id: The user ID.
|
user_id: The user ID.
|
||||||
token: The new access token to add.
|
token: The new access token to add.
|
||||||
device_id: ID of the device to associate with the refresh token.
|
device_id: ID of the device to associate with the refresh token.
|
||||||
|
expiry_ts (milliseconds since the epoch): Time after which the
|
||||||
|
refresh token cannot be used.
|
||||||
|
If None, the refresh token never expires until it has been used.
|
||||||
|
ultimate_session_expiry_ts (milliseconds since the epoch):
|
||||||
|
Time at which the session will end and can not be extended any
|
||||||
|
further.
|
||||||
|
If None, the session can be refreshed indefinitely.
|
||||||
Raises:
|
Raises:
|
||||||
StoreError if there was a problem adding this.
|
StoreError if there was a problem adding this.
|
||||||
Returns:
|
Returns:
|
||||||
@ -1937,6 +1959,8 @@ class RegistrationStore(StatsStore, RegistrationBackgroundUpdateStore):
|
|||||||
"device_id": device_id,
|
"device_id": device_id,
|
||||||
"token": token,
|
"token": token,
|
||||||
"next_token_id": None,
|
"next_token_id": None,
|
||||||
|
"expiry_ts": expiry_ts,
|
||||||
|
"ultimate_session_expiry_ts": ultimate_session_expiry_ts,
|
||||||
},
|
},
|
||||||
desc="add_refresh_token_to_user",
|
desc="add_refresh_token_to_user",
|
||||||
)
|
)
|
||||||
|
@ -0,0 +1,28 @@
|
|||||||
|
/* Copyright 2021 The Matrix.org Foundation C.I.C
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
ALTER TABLE refresh_tokens
|
||||||
|
-- We add an expiry_ts column (in milliseconds since the Epoch) to refresh tokens.
|
||||||
|
-- They may not be used after they have expired.
|
||||||
|
-- If null, then the refresh token's lifetime is unlimited.
|
||||||
|
ADD COLUMN expiry_ts BIGINT DEFAULT NULL;
|
||||||
|
|
||||||
|
ALTER TABLE refresh_tokens
|
||||||
|
-- We also add an ultimate session expiry time (in milliseconds since the Epoch).
|
||||||
|
-- No matter how much the access and refresh tokens are refreshed, they cannot
|
||||||
|
-- be extended past this time.
|
||||||
|
-- If null, then the session length is unlimited.
|
||||||
|
ADD COLUMN ultimate_session_expiry_ts BIGINT DEFAULT NULL;
|
@ -12,6 +12,7 @@
|
|||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
from http import HTTPStatus
|
||||||
from typing import Optional, Union
|
from typing import Optional, Union
|
||||||
|
|
||||||
from twisted.internet.defer import succeed
|
from twisted.internet.defer import succeed
|
||||||
@ -513,6 +514,16 @@ class RefreshAuthTests(unittest.HomeserverTestCase):
|
|||||||
self.user_pass = "pass"
|
self.user_pass = "pass"
|
||||||
self.user = self.register_user("test", self.user_pass)
|
self.user = self.register_user("test", self.user_pass)
|
||||||
|
|
||||||
|
def use_refresh_token(self, refresh_token: str) -> FakeChannel:
|
||||||
|
"""
|
||||||
|
Helper that makes a request to use a refresh token.
|
||||||
|
"""
|
||||||
|
return self.make_request(
|
||||||
|
"POST",
|
||||||
|
"/_matrix/client/unstable/org.matrix.msc2918.refresh_token/refresh",
|
||||||
|
{"refresh_token": refresh_token},
|
||||||
|
)
|
||||||
|
|
||||||
def test_login_issue_refresh_token(self):
|
def test_login_issue_refresh_token(self):
|
||||||
"""
|
"""
|
||||||
A login response should include a refresh_token only if asked.
|
A login response should include a refresh_token only if asked.
|
||||||
@ -599,7 +610,7 @@ class RefreshAuthTests(unittest.HomeserverTestCase):
|
|||||||
)
|
)
|
||||||
|
|
||||||
@override_config({"refreshable_access_token_lifetime": "1m"})
|
@override_config({"refreshable_access_token_lifetime": "1m"})
|
||||||
def test_refresh_token_expiration(self):
|
def test_refreshable_access_token_expiration(self):
|
||||||
"""
|
"""
|
||||||
The access token should have some time as specified in the config.
|
The access token should have some time as specified in the config.
|
||||||
"""
|
"""
|
||||||
@ -623,6 +634,118 @@ class RefreshAuthTests(unittest.HomeserverTestCase):
|
|||||||
self.assertApproximates(
|
self.assertApproximates(
|
||||||
refresh_response.json_body["expires_in_ms"], 60 * 1000, 100
|
refresh_response.json_body["expires_in_ms"], 60 * 1000, 100
|
||||||
)
|
)
|
||||||
|
access_token = refresh_response.json_body["access_token"]
|
||||||
|
|
||||||
|
# Advance 59 seconds in the future (just shy of 1 minute, the time of expiry)
|
||||||
|
self.reactor.advance(59.0)
|
||||||
|
# Check that our token is valid
|
||||||
|
self.assertEqual(
|
||||||
|
self.make_request(
|
||||||
|
"GET", "/_matrix/client/v3/account/whoami", access_token=access_token
|
||||||
|
).code,
|
||||||
|
HTTPStatus.OK,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Advance 2 more seconds (just past the time of expiry)
|
||||||
|
self.reactor.advance(2.0)
|
||||||
|
# Check that our token is invalid
|
||||||
|
self.assertEqual(
|
||||||
|
self.make_request(
|
||||||
|
"GET", "/_matrix/client/v3/account/whoami", access_token=access_token
|
||||||
|
).code,
|
||||||
|
HTTPStatus.UNAUTHORIZED,
|
||||||
|
)
|
||||||
|
|
||||||
|
@override_config(
|
||||||
|
{"refreshable_access_token_lifetime": "1m", "refresh_token_lifetime": "2m"}
|
||||||
|
)
|
||||||
|
def test_refresh_token_expiry(self):
|
||||||
|
"""
|
||||||
|
The refresh token can be configured to have a limited lifetime.
|
||||||
|
When that lifetime has ended, the refresh token can no longer be used to
|
||||||
|
refresh the session.
|
||||||
|
"""
|
||||||
|
|
||||||
|
body = {"type": "m.login.password", "user": "test", "password": self.user_pass}
|
||||||
|
login_response = self.make_request(
|
||||||
|
"POST",
|
||||||
|
"/_matrix/client/r0/login?org.matrix.msc2918.refresh_token=true",
|
||||||
|
body,
|
||||||
|
)
|
||||||
|
self.assertEqual(login_response.code, HTTPStatus.OK, login_response.result)
|
||||||
|
refresh_token1 = login_response.json_body["refresh_token"]
|
||||||
|
|
||||||
|
# Advance 119 seconds in the future (just shy of 2 minutes)
|
||||||
|
self.reactor.advance(119.0)
|
||||||
|
|
||||||
|
# Refresh our session. The refresh token should still JUST be valid right now.
|
||||||
|
# By doing so, we get a new access token and a new refresh token.
|
||||||
|
refresh_response = self.use_refresh_token(refresh_token1)
|
||||||
|
self.assertEqual(refresh_response.code, HTTPStatus.OK, refresh_response.result)
|
||||||
|
self.assertIn(
|
||||||
|
"refresh_token",
|
||||||
|
refresh_response.json_body,
|
||||||
|
"No new refresh token returned after refresh.",
|
||||||
|
)
|
||||||
|
refresh_token2 = refresh_response.json_body["refresh_token"]
|
||||||
|
|
||||||
|
# Advance 121 seconds in the future (just a bit more than 2 minutes)
|
||||||
|
self.reactor.advance(121.0)
|
||||||
|
|
||||||
|
# Try to refresh our session, but instead notice that the refresh token is
|
||||||
|
# not valid (it just expired).
|
||||||
|
refresh_response = self.use_refresh_token(refresh_token2)
|
||||||
|
self.assertEqual(
|
||||||
|
refresh_response.code, HTTPStatus.FORBIDDEN, refresh_response.result
|
||||||
|
)
|
||||||
|
|
||||||
|
@override_config(
|
||||||
|
{
|
||||||
|
"refreshable_access_token_lifetime": "2m",
|
||||||
|
"refresh_token_lifetime": "2m",
|
||||||
|
"session_lifetime": "3m",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
def test_ultimate_session_expiry(self):
|
||||||
|
"""
|
||||||
|
The session can be configured to have an ultimate, limited lifetime.
|
||||||
|
"""
|
||||||
|
|
||||||
|
body = {"type": "m.login.password", "user": "test", "password": self.user_pass}
|
||||||
|
login_response = self.make_request(
|
||||||
|
"POST",
|
||||||
|
"/_matrix/client/r0/login?org.matrix.msc2918.refresh_token=true",
|
||||||
|
body,
|
||||||
|
)
|
||||||
|
self.assertEqual(login_response.code, 200, login_response.result)
|
||||||
|
refresh_token = login_response.json_body["refresh_token"]
|
||||||
|
|
||||||
|
# Advance shy of 2 minutes into the future
|
||||||
|
self.reactor.advance(119.0)
|
||||||
|
|
||||||
|
# Refresh our session. The refresh token should still be valid right now.
|
||||||
|
refresh_response = self.use_refresh_token(refresh_token)
|
||||||
|
self.assertEqual(refresh_response.code, 200, refresh_response.result)
|
||||||
|
self.assertIn(
|
||||||
|
"refresh_token",
|
||||||
|
refresh_response.json_body,
|
||||||
|
"No new refresh token returned after refresh.",
|
||||||
|
)
|
||||||
|
# Notice that our access token lifetime has been diminished to match the
|
||||||
|
# session lifetime.
|
||||||
|
# 3 minutes - 119 seconds = 61 seconds.
|
||||||
|
self.assertEqual(refresh_response.json_body["expires_in_ms"], 61_000)
|
||||||
|
refresh_token = refresh_response.json_body["refresh_token"]
|
||||||
|
|
||||||
|
# Advance 61 seconds into the future. Our session should have expired
|
||||||
|
# now, because we've had our 3 minutes.
|
||||||
|
self.reactor.advance(61.0)
|
||||||
|
|
||||||
|
# Try to issue a new, refreshed, access token.
|
||||||
|
# This should fail because the refresh token's lifetime has also been
|
||||||
|
# diminished as our session expired.
|
||||||
|
refresh_response = self.use_refresh_token(refresh_token)
|
||||||
|
self.assertEqual(refresh_response.code, 403, refresh_response.result)
|
||||||
|
|
||||||
def test_refresh_token_invalidation(self):
|
def test_refresh_token_invalidation(self):
|
||||||
"""Refresh tokens are invalidated after first use of the next token.
|
"""Refresh tokens are invalidated after first use of the next token.
|
||||||
|
Loading…
Reference in New Issue
Block a user