2015-02-19 09:16:53 -05:00
|
|
|
#
|
2023-11-21 15:29:58 -05:00
|
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
|
|
#
|
2024-01-23 06:26:48 -05:00
|
|
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2023-11-21 15:29:58 -05:00
|
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Affero General Public License as
|
|
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
|
|
# License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# See the GNU Affero General Public License for more details:
|
|
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
|
|
#
|
|
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
|
|
#
|
|
|
|
# [This file includes modifications made by New Vector Limited]
|
2015-02-19 09:16:53 -05:00
|
|
|
#
|
|
|
|
#
|
2021-12-01 07:28:23 -05:00
|
|
|
import argparse
|
2022-08-25 12:27:46 -04:00
|
|
|
from typing import Any, Dict, Optional
|
2015-02-19 09:16:53 -05:00
|
|
|
|
2020-06-30 15:41:36 -04:00
|
|
|
from synapse.api.constants import RoomCreationPreset
|
2022-08-25 12:27:46 -04:00
|
|
|
from synapse.config._base import Config, ConfigError, read_file
|
2022-04-11 12:07:23 -04:00
|
|
|
from synapse.types import JsonDict, RoomAlias, UserID
|
2021-01-15 10:59:20 -05:00
|
|
|
from synapse.util.stringutils import random_string_with_symbols, strtobool
|
2015-03-13 11:23:37 -04:00
|
|
|
|
2022-08-23 07:40:00 -04:00
|
|
|
NO_EMAIL_DELEGATE_ERROR = """\
|
|
|
|
Delegation of email verification to an identity server is no longer supported. To
|
2022-07-12 14:18:53 -04:00
|
|
|
continue to allow users to add email addresses to their accounts, and use them for
|
|
|
|
password resets, configure Synapse with an SMTP server via the `email` setting, and
|
|
|
|
remove `account_threepid_delegates.email`.
|
|
|
|
"""
|
|
|
|
|
2022-08-25 12:27:46 -04:00
|
|
|
CONFLICTING_SHARED_SECRET_OPTS_ERROR = """\
|
|
|
|
You have configured both `registration_shared_secret` and
|
|
|
|
`registration_shared_secret_path`. These are mutually incompatible.
|
|
|
|
"""
|
|
|
|
|
2015-02-19 09:16:53 -05:00
|
|
|
|
|
|
|
class RegistrationConfig(Config):
|
2019-10-10 04:39:35 -04:00
|
|
|
section = "registration"
|
|
|
|
|
2022-04-11 12:07:23 -04:00
|
|
|
def read_config(self, config: JsonDict, **kwargs: Any) -> None:
|
2021-01-15 10:59:20 -05:00
|
|
|
self.enable_registration = strtobool(
|
|
|
|
str(config.get("enable_registration", False))
|
2015-02-19 09:16:53 -05:00
|
|
|
)
|
2015-04-30 09:34:09 -04:00
|
|
|
if "disable_registration" in config:
|
2021-01-15 10:59:20 -05:00
|
|
|
self.enable_registration = not strtobool(
|
|
|
|
str(config["disable_registration"])
|
2015-04-30 09:34:09 -04:00
|
|
|
)
|
|
|
|
|
2022-03-25 13:11:01 -04:00
|
|
|
self.enable_registration_without_verification = strtobool(
|
|
|
|
str(config.get("enable_registration_without_verification", False))
|
|
|
|
)
|
|
|
|
|
2018-01-18 19:19:58 -05:00
|
|
|
self.registrations_require_3pid = config.get("registrations_require_3pid", [])
|
2018-01-19 10:33:55 -05:00
|
|
|
self.allowed_local_3pids = config.get("allowed_local_3pids", [])
|
2019-04-04 12:25:47 -04:00
|
|
|
self.enable_3pid_lookup = config.get("enable_3pid_lookup", True)
|
2021-08-21 17:14:43 -04:00
|
|
|
self.registration_requires_token = config.get(
|
|
|
|
"registration_requires_token", False
|
|
|
|
)
|
2022-05-05 07:11:52 -04:00
|
|
|
self.enable_registration_token_3pid_bypass = config.get(
|
|
|
|
"enable_registration_token_3pid_bypass", False
|
2022-04-27 08:57:53 -04:00
|
|
|
)
|
2022-08-25 12:27:46 -04:00
|
|
|
|
|
|
|
# read the shared secret, either inline or from an external file
|
2015-04-29 23:24:44 -04:00
|
|
|
self.registration_shared_secret = config.get("registration_shared_secret")
|
2022-08-25 12:27:46 -04:00
|
|
|
registration_shared_secret_path = config.get("registration_shared_secret_path")
|
|
|
|
if registration_shared_secret_path:
|
|
|
|
if self.registration_shared_secret:
|
|
|
|
raise ConfigError(CONFLICTING_SHARED_SECRET_OPTS_ERROR)
|
|
|
|
self.registration_shared_secret = read_file(
|
|
|
|
registration_shared_secret_path, ("registration_shared_secret_path",)
|
|
|
|
).strip()
|
2016-02-08 11:35:44 -05:00
|
|
|
|
2015-10-16 09:52:08 -04:00
|
|
|
self.bcrypt_rounds = config.get("bcrypt_rounds", 12)
|
2021-11-18 13:56:32 -05:00
|
|
|
|
2019-09-06 06:35:28 -04:00
|
|
|
account_threepid_delegates = config.get("account_threepid_delegates") or {}
|
2022-07-12 14:18:53 -04:00
|
|
|
if "email" in account_threepid_delegates:
|
2022-08-23 07:40:00 -04:00
|
|
|
raise ConfigError(NO_EMAIL_DELEGATE_ERROR)
|
2019-09-06 06:35:28 -04:00
|
|
|
self.account_threepid_delegate_msisdn = account_threepid_delegates.get("msisdn")
|
2018-12-05 08:38:58 -05:00
|
|
|
self.default_identity_server = config.get("default_identity_server")
|
2015-11-04 12:29:07 -05:00
|
|
|
self.allow_guest_access = config.get("allow_guest_access", False)
|
2015-04-29 23:24:44 -04:00
|
|
|
|
2019-07-05 11:47:58 -04:00
|
|
|
if config.get("invite_3pid_guest", False):
|
|
|
|
raise ConfigError("invite_3pid_guest is no longer supported")
|
2016-03-14 11:50:40 -04:00
|
|
|
|
2017-10-16 12:57:27 -04:00
|
|
|
self.auto_join_rooms = config.get("auto_join_rooms", [])
|
2018-10-12 13:17:36 -04:00
|
|
|
for room_alias in self.auto_join_rooms:
|
|
|
|
if not RoomAlias.is_valid(room_alias):
|
2019-06-20 05:32:02 -04:00
|
|
|
raise ConfigError("Invalid auto_join_rooms entry %s" % (room_alias,))
|
2020-06-30 15:41:36 -04:00
|
|
|
|
|
|
|
# Options for creating auto-join rooms if they do not exist yet.
|
2018-09-28 10:37:28 -04:00
|
|
|
self.autocreate_auto_join_rooms = config.get("autocreate_auto_join_rooms", True)
|
2020-06-30 15:41:36 -04:00
|
|
|
self.autocreate_auto_join_rooms_federated = config.get(
|
|
|
|
"autocreate_auto_join_rooms_federated", True
|
|
|
|
)
|
|
|
|
self.autocreate_auto_join_room_preset = (
|
|
|
|
config.get("autocreate_auto_join_room_preset")
|
|
|
|
or RoomCreationPreset.PUBLIC_CHAT
|
|
|
|
)
|
|
|
|
self.auto_join_room_requires_invite = self.autocreate_auto_join_room_preset in {
|
|
|
|
RoomCreationPreset.PRIVATE_CHAT,
|
|
|
|
RoomCreationPreset.TRUSTED_PRIVATE_CHAT,
|
|
|
|
}
|
|
|
|
|
2020-10-23 12:38:40 -04:00
|
|
|
# Pull the creator/inviter from the configuration, this gets used to
|
2020-06-30 15:41:36 -04:00
|
|
|
# send invites for invite-only rooms.
|
|
|
|
mxid_localpart = config.get("auto_join_mxid_localpart")
|
|
|
|
self.auto_join_user_id = None
|
|
|
|
if mxid_localpart:
|
|
|
|
# Convert the localpart to a full mxid.
|
|
|
|
self.auto_join_user_id = UserID(
|
2021-10-06 10:47:41 -04:00
|
|
|
mxid_localpart, self.root.server.server_name
|
2020-06-30 15:41:36 -04:00
|
|
|
).to_string()
|
|
|
|
|
|
|
|
if self.autocreate_auto_join_rooms:
|
|
|
|
# Ensure the preset is a known value.
|
|
|
|
if self.autocreate_auto_join_room_preset not in {
|
|
|
|
RoomCreationPreset.PUBLIC_CHAT,
|
|
|
|
RoomCreationPreset.PRIVATE_CHAT,
|
|
|
|
RoomCreationPreset.TRUSTED_PRIVATE_CHAT,
|
|
|
|
}:
|
|
|
|
raise ConfigError("Invalid value for autocreate_auto_join_room_preset")
|
|
|
|
# If the preset requires invitations to be sent, ensure there's a
|
|
|
|
# configured user to send them from.
|
|
|
|
if self.auto_join_room_requires_invite:
|
|
|
|
if not mxid_localpart:
|
|
|
|
raise ConfigError(
|
|
|
|
"The configuration option `auto_join_mxid_localpart` is required if "
|
|
|
|
"`autocreate_auto_join_room_preset` is set to private_chat or trusted_private_chat, such that "
|
|
|
|
"Synapse knows who to send invitations from. Please "
|
|
|
|
"configure `auto_join_mxid_localpart`."
|
|
|
|
)
|
|
|
|
|
2020-06-05 13:18:15 -04:00
|
|
|
self.auto_join_rooms_for_guests = config.get("auto_join_rooms_for_guests", True)
|
2017-10-16 12:57:27 -04:00
|
|
|
|
2020-03-27 15:15:23 -04:00
|
|
|
self.enable_set_displayname = config.get("enable_set_displayname", True)
|
|
|
|
self.enable_set_avatar_url = config.get("enable_set_avatar_url", True)
|
2023-08-22 10:47:59 -04:00
|
|
|
|
|
|
|
# The default value of enable_3pid_changes is True, unless msc3861 is enabled.
|
|
|
|
msc3861_enabled = (
|
|
|
|
(config.get("experimental_features") or {})
|
|
|
|
.get("msc3861", {})
|
|
|
|
.get("enabled", False)
|
|
|
|
)
|
|
|
|
self.enable_3pid_changes = config.get(
|
|
|
|
"enable_3pid_changes", not msc3861_enabled
|
|
|
|
)
|
2020-03-27 15:15:23 -04:00
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
self.disable_msisdn_registration = config.get(
|
|
|
|
"disable_msisdn_registration", False
|
2019-01-21 10:17:20 -05:00
|
|
|
)
|
2019-01-21 09:59:37 -05:00
|
|
|
|
2019-07-12 12:26:02 -04:00
|
|
|
session_lifetime = config.get("session_lifetime")
|
|
|
|
if session_lifetime is not None:
|
|
|
|
session_lifetime = self.parse_duration(session_lifetime)
|
|
|
|
self.session_lifetime = session_lifetime
|
|
|
|
|
2021-11-23 12:01:34 -05:00
|
|
|
# The `refreshable_access_token_lifetime` applies for tokens that can be renewed
|
2021-11-26 09:27:14 -05:00
|
|
|
# using a refresh token, as per MSC2918.
|
|
|
|
# If it is `None`, the refresh token mechanism is disabled.
|
2021-11-23 12:01:34 -05:00
|
|
|
refreshable_access_token_lifetime = config.get(
|
|
|
|
"refreshable_access_token_lifetime",
|
2021-11-26 09:27:14 -05:00
|
|
|
"5m",
|
2021-06-24 09:33:20 -04:00
|
|
|
)
|
2021-11-23 12:01:34 -05:00
|
|
|
if refreshable_access_token_lifetime is not None:
|
|
|
|
refreshable_access_token_lifetime = self.parse_duration(
|
|
|
|
refreshable_access_token_lifetime
|
|
|
|
)
|
2024-03-13 12:46:44 -04:00
|
|
|
self.refreshable_access_token_lifetime: Optional[int] = (
|
|
|
|
refreshable_access_token_lifetime
|
|
|
|
)
|
2021-06-24 09:33:20 -04:00
|
|
|
|
2021-12-03 11:42:44 -05:00
|
|
|
if (
|
|
|
|
self.session_lifetime is not None
|
|
|
|
and "refreshable_access_token_lifetime" in config
|
|
|
|
):
|
|
|
|
if self.session_lifetime < self.refreshable_access_token_lifetime:
|
|
|
|
raise ConfigError(
|
|
|
|
"Both `session_lifetime` and `refreshable_access_token_lifetime` "
|
|
|
|
"configuration options have been set, but `refreshable_access_token_lifetime` "
|
|
|
|
" exceeds `session_lifetime`!"
|
|
|
|
)
|
|
|
|
|
|
|
|
# The `nonrefreshable_access_token_lifetime` applies for tokens that can NOT be
|
|
|
|
# refreshed using a refresh token.
|
|
|
|
# If it is None, then these tokens last for the entire length of the session,
|
|
|
|
# which is infinite by default.
|
|
|
|
# The intention behind this configuration option is to help with requiring
|
|
|
|
# all clients to use refresh tokens, if the homeserver administrator requires.
|
|
|
|
nonrefreshable_access_token_lifetime = config.get(
|
|
|
|
"nonrefreshable_access_token_lifetime",
|
|
|
|
None,
|
|
|
|
)
|
|
|
|
if nonrefreshable_access_token_lifetime is not None:
|
|
|
|
nonrefreshable_access_token_lifetime = self.parse_duration(
|
|
|
|
nonrefreshable_access_token_lifetime
|
|
|
|
)
|
|
|
|
self.nonrefreshable_access_token_lifetime = nonrefreshable_access_token_lifetime
|
|
|
|
|
|
|
|
if (
|
|
|
|
self.session_lifetime is not None
|
|
|
|
and self.nonrefreshable_access_token_lifetime is not None
|
|
|
|
):
|
|
|
|
if self.session_lifetime < self.nonrefreshable_access_token_lifetime:
|
|
|
|
raise ConfigError(
|
|
|
|
"Both `session_lifetime` and `nonrefreshable_access_token_lifetime` "
|
|
|
|
"configuration options have been set, but `nonrefreshable_access_token_lifetime` "
|
|
|
|
" exceeds `session_lifetime`!"
|
|
|
|
)
|
|
|
|
|
2021-11-26 09:27:14 -05:00
|
|
|
refresh_token_lifetime = config.get("refresh_token_lifetime")
|
|
|
|
if refresh_token_lifetime is not None:
|
|
|
|
refresh_token_lifetime = self.parse_duration(refresh_token_lifetime)
|
2021-11-29 08:34:14 -05:00
|
|
|
self.refresh_token_lifetime: Optional[int] = refresh_token_lifetime
|
2021-06-24 09:33:20 -04:00
|
|
|
|
2021-12-03 11:42:44 -05:00
|
|
|
if (
|
|
|
|
self.session_lifetime is not None
|
|
|
|
and self.refresh_token_lifetime is not None
|
|
|
|
):
|
|
|
|
if self.session_lifetime < self.refresh_token_lifetime:
|
|
|
|
raise ConfigError(
|
|
|
|
"Both `session_lifetime` and `refresh_token_lifetime` "
|
|
|
|
"configuration options have been set, but `refresh_token_lifetime` "
|
|
|
|
" exceeds `session_lifetime`!"
|
|
|
|
)
|
|
|
|
|
2021-08-21 17:14:43 -04:00
|
|
|
# The fallback template used for authenticating using a registration token
|
|
|
|
self.registration_token_template = self.read_template("registration_token.html")
|
|
|
|
|
2020-10-02 06:15:53 -04:00
|
|
|
# The success template used during fallback auth.
|
2021-01-27 10:59:50 -05:00
|
|
|
self.fallback_success_template = self.read_template("auth_success.html")
|
2020-10-02 06:15:53 -04:00
|
|
|
|
2022-01-26 07:02:54 -05:00
|
|
|
self.inhibit_user_in_use_error = config.get("inhibit_user_in_use_error", False)
|
|
|
|
|
2024-02-13 08:23:03 -05:00
|
|
|
# List of user IDs not to send out device list updates for when they
|
|
|
|
# register new devices. This is useful to handle bot accounts.
|
|
|
|
#
|
|
|
|
# Note: This will still send out device list updates if the device is
|
|
|
|
# later updated, e.g. end to end keys are added.
|
|
|
|
dont_notify_new_devices_for = config.get("dont_notify_new_devices_for", [])
|
|
|
|
self.dont_notify_new_devices_for = frozenset(dont_notify_new_devices_for)
|
|
|
|
|
2022-04-11 12:07:23 -04:00
|
|
|
def generate_config_section(
|
|
|
|
self, generate_secrets: bool = False, **kwargs: Any
|
|
|
|
) -> str:
|
2018-12-21 10:04:57 -05:00
|
|
|
if generate_secrets:
|
|
|
|
registration_shared_secret = 'registration_shared_secret: "%s"' % (
|
|
|
|
random_string_with_symbols(50),
|
|
|
|
)
|
2022-06-14 10:53:42 -04:00
|
|
|
return registration_shared_secret
|
2018-12-21 10:04:57 -05:00
|
|
|
else:
|
2022-06-14 10:53:42 -04:00
|
|
|
return ""
|
2015-04-30 10:04:06 -04:00
|
|
|
|
2022-08-25 12:27:46 -04:00
|
|
|
def generate_files(self, config: Dict[str, Any], config_dir_path: str) -> None:
|
|
|
|
# if 'registration_shared_secret_path' is specified, and the target file
|
|
|
|
# does not exist, generate it.
|
|
|
|
registration_shared_secret_path = config.get("registration_shared_secret_path")
|
|
|
|
if registration_shared_secret_path and not self.path_exists(
|
|
|
|
registration_shared_secret_path
|
|
|
|
):
|
|
|
|
print(
|
|
|
|
"Generating registration shared secret file "
|
|
|
|
+ registration_shared_secret_path
|
|
|
|
)
|
|
|
|
secret = random_string_with_symbols(50)
|
|
|
|
with open(registration_shared_secret_path, "w") as f:
|
|
|
|
f.write(f"{secret}\n")
|
|
|
|
|
2019-07-15 08:15:34 -04:00
|
|
|
@staticmethod
|
2021-12-01 07:28:23 -05:00
|
|
|
def add_arguments(parser: argparse.ArgumentParser) -> None:
|
2015-04-30 10:04:06 -04:00
|
|
|
reg_group = parser.add_argument_group("registration")
|
|
|
|
reg_group.add_argument(
|
2019-06-20 05:32:02 -04:00
|
|
|
"--enable-registration",
|
|
|
|
action="store_true",
|
|
|
|
default=None,
|
|
|
|
help="Enable registration for new users.",
|
2015-04-30 10:04:06 -04:00
|
|
|
)
|
|
|
|
|
2021-12-01 07:28:23 -05:00
|
|
|
def read_arguments(self, args: argparse.Namespace) -> None:
|
2015-04-30 10:04:06 -04:00
|
|
|
if args.enable_registration is not None:
|
2021-05-14 05:58:57 -04:00
|
|
|
self.enable_registration = strtobool(str(args.enable_registration))
|