diff options
author | Kegan Dougal <kegan@matrix.org> | 2015-02-05 15:00:33 +0000 |
---|---|---|
committer | Kegan Dougal <kegan@matrix.org> | 2015-02-05 15:00:33 +0000 |
commit | c163357f387788afa8fc1d4160e806eccbc5220a (patch) | |
tree | 3250488ade12b7ede760009a8639f8cc9a5360c4 | |
parent | Merge branch 'develop' into application-services (diff) | |
download | synapse-c163357f387788afa8fc1d4160e806eccbc5220a.tar.xz |
Add CS extension for masquerading as users within the namespaces specified by the AS.
-rw-r--r-- | synapse/api/auth.py | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/synapse/api/auth.py b/synapse/api/auth.py index 7105ee21dc..86f963c190 100644 --- a/synapse/api/auth.py +++ b/synapse/api/auth.py @@ -299,6 +299,29 @@ class Auth(object): # Can optionally look elsewhere in the request (e.g. headers) try: access_token = request.args["access_token"][0] + + # Check for application service tokens with a user_id override + try: + masquerade_user_id = request.args["user_id"][0] + app_service = yield self.store.get_app_service_by_token( + access_token + ) + if not app_service: + raise AuthError( + 403, "Invalid application service access token" + ) + if not app_service.is_interested_in_user(masquerade_user_id): + raise AuthError( + 403, + "Application service cannot masquerade as this user." + ) + defer.returnValue( + (UserID.from_string(masquerade_user_id), ClientInfo("", "")) + ) + return + except KeyError: + pass # normal users won't have this query parameter set + user_info = yield self.get_user_by_token(access_token) user = user_info["user"] device_id = user_info["device_id"] |