1
0
mirror of https://github.com/matrix-org/matrix-authentication-service.git synced 2025-08-06 06:02:40 +03:00

Also make all the GraphQL mutations available for admins

This commit is contained in:
Quentin Gliech
2023-08-10 17:42:52 +02:00
parent ca86e5a39e
commit c7153b08e3
6 changed files with 70 additions and 41 deletions

View File

@@ -26,7 +26,6 @@
clippy::unused_async clippy::unused_async
)] )]
use anyhow::Context;
use async_graphql::EmptySubscription; use async_graphql::EmptySubscription;
use mas_data_model::{BrowserSession, Session, User}; use mas_data_model::{BrowserSession, Session, User};
use ulid::Ulid; use ulid::Ulid;

View File

@@ -12,7 +12,6 @@
// See the License for the specific language governing permissions and // See the License for the specific language governing permissions and
// limitations under the License. // limitations under the License.
use anyhow::Context as _;
use async_graphql::{Context, Enum, InputObject, Object, ID}; use async_graphql::{Context, Enum, InputObject, Object, ID};
use mas_storage::RepositoryAccess; use mas_storage::RepositoryAccess;
@@ -80,18 +79,17 @@ impl BrowserSessionMutations {
NodeType::BrowserSession.extract_ulid(&input.browser_session_id)?; NodeType::BrowserSession.extract_ulid(&input.browser_session_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let clock = state.clock(); let clock = state.clock();
let session = repo.browser_session().lookup(browser_session_id).await?; let session = repo.browser_session().lookup(browser_session_id).await?;
let Some(session) = session else { let Some(session) = session else {
return Ok(EndBrowserSessionPayload::NotFound); return Ok(EndBrowserSessionPayload::NotFound);
}; };
if session.user.id != user.id { if !requester.is_owner_or_admin(&session) {
return Err(async_graphql::Error::new("Unauthorized")); return Ok(EndBrowserSessionPayload::NotFound);
} }
let session = repo.browser_session().finish(&clock, session).await?; let session = repo.browser_session().finish(&clock, session).await?;

View File

@@ -84,8 +84,6 @@ impl CompatSessionMutations {
let compat_session_id = NodeType::CompatSession.extract_ulid(&input.compat_session_id)?; let compat_session_id = NodeType::CompatSession.extract_ulid(&input.compat_session_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let clock = state.clock(); let clock = state.clock();
@@ -94,13 +92,19 @@ impl CompatSessionMutations {
return Ok(EndCompatSessionPayload::NotFound); return Ok(EndCompatSessionPayload::NotFound);
}; };
if session.user_id != user.id { if !requester.is_owner_or_admin(&session) {
return Err(async_graphql::Error::new("Unauthorized")); return Ok(EndCompatSessionPayload::NotFound);
} }
let user = repo
.user()
.lookup(session.user_id)
.await?
.context("Could not load user")?;
// Schedule a job to delete the device. // Schedule a job to delete the device.
repo.job() repo.job()
.schedule_job(DeleteDeviceJob::new(user, &session.device)) .schedule_job(DeleteDeviceJob::new(&user, &session.device))
.await?; .await?;
let session = repo.compat_session().finish(&clock, session).await?; let session = repo.compat_session().finish(&clock, session).await?;

View File

@@ -18,6 +18,7 @@ use async_graphql::{Context, Description, Enum, InputObject, Object, ID};
use crate::{ use crate::{
model::{NodeType, User}, model::{NodeType, User},
state::ContextExt, state::ContextExt,
UserId,
}; };
#[derive(Default)] #[derive(Default)]
@@ -82,12 +83,18 @@ impl MatrixMutations {
let id = NodeType::User.extract_ulid(&input.user_id)?; let id = NodeType::User.extract_ulid(&input.user_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?; if !requester.is_owner_or_admin(&UserId(id)) {
if user.id != id {
return Err(async_graphql::Error::new("Unauthorized")); return Err(async_graphql::Error::new("Unauthorized"));
} }
let mut repo = state.repository().await?;
let user = repo
.user()
.lookup(id)
.await?
.context("Failed to lookup user")?;
repo.cancel().await?;
let conn = state.homeserver_connection(); let conn = state.homeserver_connection();
let mxid = conn.mxid(&user.username); let mxid = conn.mxid(&user.username);

View File

@@ -84,8 +84,6 @@ impl OAuth2SessionMutations {
let oauth2_session_id = NodeType::OAuth2Session.extract_ulid(&input.oauth2_session_id)?; let oauth2_session_id = NodeType::OAuth2Session.extract_ulid(&input.oauth2_session_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let clock = state.clock(); let clock = state.clock();
@@ -94,14 +92,15 @@ impl OAuth2SessionMutations {
return Ok(EndOAuth2SessionPayload::NotFound); return Ok(EndOAuth2SessionPayload::NotFound);
}; };
// XXX: again, the user_id should be directly stored in the session.
let user_session = repo let user_session = repo
.browser_session() .browser_session()
.lookup(session.user_session_id) .lookup(session.user_session_id)
.await? .await?
.context("Browser session not found")?; .context("Could not load user session")?;
if user_session.user.id != user.id { if !requester.is_owner_or_admin(&user_session) {
return Err(async_graphql::Error::new("Unauthorized")); return Ok(EndOAuth2SessionPayload::NotFound);
} }
// Scan the scopes of the session to find if there is any device that should be // Scan the scopes of the session to find if there is any device that should be

View File

@@ -23,6 +23,7 @@ use mas_storage::{
use crate::{ use crate::{
model::{NodeType, User, UserEmail}, model::{NodeType, User, UserEmail},
state::ContextExt, state::ContextExt,
UserId,
}; };
#[derive(Default)] #[derive(Default)]
@@ -361,14 +362,18 @@ impl UserEmailMutations {
let id = NodeType::User.extract_ulid(&input.user_id)?; let id = NodeType::User.extract_ulid(&input.user_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?; if !requester.is_owner_or_admin(&UserId(id)) {
if user.id != id {
return Err(async_graphql::Error::new("Unauthorized")); return Err(async_graphql::Error::new("Unauthorized"));
} }
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let user = repo
.user()
.lookup(id)
.await?
.context("Failed to load user")?;
// XXX: this logic should be extracted somewhere else, since most of it is // XXX: this logic should be extracted somewhere else, since most of it is
// duplicated in mas_handlers // duplicated in mas_handlers
@@ -378,7 +383,7 @@ impl UserEmailMutations {
} }
// Find an existing email address // Find an existing email address
let existing_user_email = repo.user_email().find(user, &input.email).await?; let existing_user_email = repo.user_email().find(&user, &input.email).await?;
let (added, user_email) = if let Some(user_email) = existing_user_email { let (added, user_email) = if let Some(user_email) = existing_user_email {
(false, user_email) (false, user_email)
} else { } else {
@@ -387,7 +392,7 @@ impl UserEmailMutations {
let user_email = repo let user_email = repo
.user_email() .user_email()
.add(&mut rng, &clock, user, input.email) .add(&mut rng, &clock, &user, input.email)
.await?; .await?;
(true, user_email) (true, user_email)
@@ -419,7 +424,6 @@ impl UserEmailMutations {
let state = ctx.state(); let state = ctx.state();
let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?; let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
@@ -429,8 +433,8 @@ impl UserEmailMutations {
.await? .await?
.context("User email not found")?; .context("User email not found")?;
if user_email.user_id != user.id { if !requester.is_owner_or_admin(&user_email) {
return Err(async_graphql::Error::new("Unauthorized")); return Err(async_graphql::Error::new("User email not found"));
} }
// Schedule a job to verify the email address if needed // Schedule a job to verify the email address if needed
@@ -461,8 +465,6 @@ impl UserEmailMutations {
let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?; let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let clock = state.clock(); let clock = state.clock();
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
@@ -472,8 +474,8 @@ impl UserEmailMutations {
.await? .await?
.context("User email not found")?; .context("User email not found")?;
if user_email.user_id != user.id { if !requester.is_owner_or_admin(&user_email) {
return Err(async_graphql::Error::new("Unauthorized")); return Err(async_graphql::Error::new("User email not found"));
} }
if user_email.confirmed_at.is_some() { if user_email.confirmed_at.is_some() {
@@ -500,6 +502,12 @@ impl UserEmailMutations {
.consume_verification_code(&clock, verification) .consume_verification_code(&clock, verification)
.await?; .await?;
let user = repo
.user()
.lookup(user_email.user_id)
.await?
.context("Failed to load user")?;
// XXX: is this the right place to do this? // XXX: is this the right place to do this?
if user.primary_user_email_id.is_none() { if user.primary_user_email_id.is_none() {
repo.user_email().set_as_primary(&user_email).await?; repo.user_email().set_as_primary(&user_email).await?;
@@ -510,7 +518,9 @@ impl UserEmailMutations {
.mark_as_verified(&clock, user_email) .mark_as_verified(&clock, user_email)
.await?; .await?;
repo.job().schedule_job(ProvisionUserJob::new(user)).await?; repo.job()
.schedule_job(ProvisionUserJob::new(&user))
.await?;
repo.save().await?; repo.save().await?;
@@ -527,8 +537,6 @@ impl UserEmailMutations {
let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?; let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let user_email = repo.user_email().lookup(user_email_id).await?; let user_email = repo.user_email().lookup(user_email_id).await?;
@@ -536,10 +544,16 @@ impl UserEmailMutations {
return Ok(RemoveEmailPayload::NotFound); return Ok(RemoveEmailPayload::NotFound);
}; };
if user_email.user_id != user.id { if !requester.is_owner_or_admin(&user_email) {
return Err(async_graphql::Error::new("Unauthorized")); return Ok(RemoveEmailPayload::NotFound);
} }
let user = repo
.user()
.lookup(user_email.user_id)
.await?
.context("Failed to load user")?;
if user.primary_user_email_id == Some(user_email.id) { if user.primary_user_email_id == Some(user_email.id) {
// Prevent removing the primary email address // Prevent removing the primary email address
return Ok(RemoveEmailPayload::Primary(user_email)); return Ok(RemoveEmailPayload::Primary(user_email));
@@ -547,6 +561,11 @@ impl UserEmailMutations {
repo.user_email().remove(user_email.clone()).await?; repo.user_email().remove(user_email.clone()).await?;
// Schedule a job to update the user
repo.job()
.schedule_job(ProvisionUserJob::new(&user))
.await?;
repo.save().await?; repo.save().await?;
Ok(RemoveEmailPayload::Removed(user_email)) Ok(RemoveEmailPayload::Removed(user_email))
@@ -562,8 +581,6 @@ impl UserEmailMutations {
let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?; let user_email_id = NodeType::UserEmail.extract_ulid(&input.user_email_id)?;
let requester = ctx.requester(); let requester = ctx.requester();
let user = requester.user().context("Unauthorized")?;
let mut repo = state.repository().await?; let mut repo = state.repository().await?;
let user_email = repo.user_email().lookup(user_email_id).await?; let user_email = repo.user_email().lookup(user_email_id).await?;
@@ -571,7 +588,7 @@ impl UserEmailMutations {
return Ok(SetPrimaryEmailPayload::NotFound); return Ok(SetPrimaryEmailPayload::NotFound);
}; };
if user_email.user_id != user.id { if !requester.is_owner_or_admin(&user_email) {
return Err(async_graphql::Error::new("Unauthorized")); return Err(async_graphql::Error::new("Unauthorized"));
} }
@@ -581,10 +598,15 @@ impl UserEmailMutations {
repo.user_email().set_as_primary(&user_email).await?; repo.user_email().set_as_primary(&user_email).await?;
// The user primary email should already be up to date
let user = repo
.user()
.lookup(user_email.user_id)
.await?
.context("Failed to load user")?;
repo.save().await?; repo.save().await?;
let mut user = user.clone();
user.primary_user_email_id = Some(user_email.id);
Ok(SetPrimaryEmailPayload::Set(user)) Ok(SetPrimaryEmailPayload::Set(user))
} }
} }