room_member.py 38 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2016 OpenMarket Ltd
  3. # Copyright 2018 New Vector Ltd
  4. # Copyright 2019 The Matrix.org Foundation C.I.C.
  5. #
  6. # Licensed under the Apache License, Version 2.0 (the "License");
  7. # you may not use this file except in compliance with the License.
  8. # You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing, software
  13. # distributed under the License is distributed on an "AS IS" BASIS,
  14. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. # See the License for the specific language governing permissions and
  16. # limitations under the License.
  17. import abc
  18. import logging
  19. from six.moves import http_client
  20. from signedjson.key import decode_verify_key_bytes
  21. from signedjson.sign import verify_signed_json
  22. from unpaddedbase64 import decode_base64
  23. from twisted.internet import defer
  24. import synapse.server
  25. import synapse.types
  26. from synapse.api.constants import EventTypes, Membership
  27. from synapse.api.errors import AuthError, Codes, HttpResponseException, SynapseError
  28. from synapse.types import RoomID, UserID
  29. from synapse.util.async_helpers import Linearizer
  30. from synapse.util.distributor import user_joined_room, user_left_room
  31. from ._base import BaseHandler
  32. logger = logging.getLogger(__name__)
  33. id_server_scheme = "https://"
  34. class RoomMemberHandler(object):
  35. # TODO(paul): This handler currently contains a messy conflation of
  36. # low-level API that works on UserID objects and so on, and REST-level
  37. # API that takes ID strings and returns pagination chunks. These concerns
  38. # ought to be separated out a lot better.
  39. __metaclass__ = abc.ABCMeta
  40. def __init__(self, hs):
  41. """
  42. Args:
  43. hs (synapse.server.HomeServer):
  44. """
  45. self.hs = hs
  46. self.store = hs.get_datastore()
  47. self.auth = hs.get_auth()
  48. self.state_handler = hs.get_state_handler()
  49. self.config = hs.config
  50. self.simple_http_client = hs.get_simple_http_client()
  51. self.federation_handler = hs.get_handlers().federation_handler
  52. self.directory_handler = hs.get_handlers().directory_handler
  53. self.registration_handler = hs.get_registration_handler()
  54. self.profile_handler = hs.get_profile_handler()
  55. self.event_creation_handler = hs.get_event_creation_handler()
  56. self.member_linearizer = Linearizer(name="member")
  57. self.clock = hs.get_clock()
  58. self.spam_checker = hs.get_spam_checker()
  59. self.third_party_event_rules = hs.get_third_party_event_rules()
  60. self._server_notices_mxid = self.config.server_notices_mxid
  61. self._enable_lookup = hs.config.enable_3pid_lookup
  62. self.allow_per_room_profiles = self.config.allow_per_room_profiles
  63. # This is only used to get at ratelimit function, and
  64. # maybe_kick_guest_users. It's fine there are multiple of these as
  65. # it doesn't store state.
  66. self.base_handler = BaseHandler(hs)
  67. @abc.abstractmethod
  68. def _remote_join(self, requester, remote_room_hosts, room_id, user, content):
  69. """Try and join a room that this server is not in
  70. Args:
  71. requester (Requester)
  72. remote_room_hosts (list[str]): List of servers that can be used
  73. to join via.
  74. room_id (str): Room that we are trying to join
  75. user (UserID): User who is trying to join
  76. content (dict): A dict that should be used as the content of the
  77. join event.
  78. Returns:
  79. Deferred
  80. """
  81. raise NotImplementedError()
  82. @abc.abstractmethod
  83. def _remote_reject_invite(self, remote_room_hosts, room_id, target):
  84. """Attempt to reject an invite for a room this server is not in. If we
  85. fail to do so we locally mark the invite as rejected.
  86. Args:
  87. requester (Requester)
  88. remote_room_hosts (list[str]): List of servers to use to try and
  89. reject invite
  90. room_id (str)
  91. target (UserID): The user rejecting the invite
  92. Returns:
  93. Deferred[dict]: A dictionary to be returned to the client, may
  94. include event_id etc, or nothing if we locally rejected
  95. """
  96. raise NotImplementedError()
  97. @abc.abstractmethod
  98. def _user_joined_room(self, target, room_id):
  99. """Notifies distributor on master process that the user has joined the
  100. room.
  101. Args:
  102. target (UserID)
  103. room_id (str)
  104. Returns:
  105. Deferred|None
  106. """
  107. raise NotImplementedError()
  108. @abc.abstractmethod
  109. def _user_left_room(self, target, room_id):
  110. """Notifies distributor on master process that the user has left the
  111. room.
  112. Args:
  113. target (UserID)
  114. room_id (str)
  115. Returns:
  116. Deferred|None
  117. """
  118. raise NotImplementedError()
  119. @defer.inlineCallbacks
  120. def _local_membership_update(
  121. self,
  122. requester,
  123. target,
  124. room_id,
  125. membership,
  126. prev_events_and_hashes,
  127. txn_id=None,
  128. ratelimit=True,
  129. content=None,
  130. require_consent=True,
  131. ):
  132. user_id = target.to_string()
  133. if content is None:
  134. content = {}
  135. content["membership"] = membership
  136. if requester.is_guest:
  137. content["kind"] = "guest"
  138. event, context = yield self.event_creation_handler.create_event(
  139. requester,
  140. {
  141. "type": EventTypes.Member,
  142. "content": content,
  143. "room_id": room_id,
  144. "sender": requester.user.to_string(),
  145. "state_key": user_id,
  146. # For backwards compatibility:
  147. "membership": membership,
  148. },
  149. token_id=requester.access_token_id,
  150. txn_id=txn_id,
  151. prev_events_and_hashes=prev_events_and_hashes,
  152. require_consent=require_consent,
  153. )
  154. # Check if this event matches the previous membership event for the user.
  155. duplicate = yield self.event_creation_handler.deduplicate_state_event(
  156. event, context
  157. )
  158. if duplicate is not None:
  159. # Discard the new event since this membership change is a no-op.
  160. return duplicate
  161. yield self.event_creation_handler.handle_new_client_event(
  162. requester, event, context, extra_users=[target], ratelimit=ratelimit
  163. )
  164. prev_state_ids = yield context.get_prev_state_ids(self.store)
  165. prev_member_event_id = prev_state_ids.get((EventTypes.Member, user_id), None)
  166. if event.membership == Membership.JOIN:
  167. # Only fire user_joined_room if the user has actually joined the
  168. # room. Don't bother if the user is just changing their profile
  169. # info.
  170. newly_joined = True
  171. if prev_member_event_id:
  172. prev_member_event = yield self.store.get_event(prev_member_event_id)
  173. newly_joined = prev_member_event.membership != Membership.JOIN
  174. if newly_joined:
  175. yield self._user_joined_room(target, room_id)
  176. # Copy over direct message status and room tags if this is a join
  177. # on an upgraded room
  178. # Check if this is an upgraded room
  179. predecessor = yield self.store.get_room_predecessor(room_id)
  180. if predecessor:
  181. # It is an upgraded room. Copy over old tags
  182. self.copy_room_tags_and_direct_to_room(
  183. predecessor["room_id"], room_id, user_id
  184. )
  185. # Move over old push rules
  186. self.store.move_push_rules_from_room_to_room_for_user(
  187. predecessor["room_id"], room_id, user_id
  188. )
  189. elif event.membership == Membership.LEAVE:
  190. if prev_member_event_id:
  191. prev_member_event = yield self.store.get_event(prev_member_event_id)
  192. if prev_member_event.membership == Membership.JOIN:
  193. yield self._user_left_room(target, room_id)
  194. return event
  195. @defer.inlineCallbacks
  196. def copy_room_tags_and_direct_to_room(self, old_room_id, new_room_id, user_id):
  197. """Copies the tags and direct room state from one room to another.
  198. Args:
  199. old_room_id (str)
  200. new_room_id (str)
  201. user_id (str)
  202. Returns:
  203. Deferred[None]
  204. """
  205. # Retrieve user account data for predecessor room
  206. user_account_data, _ = yield self.store.get_account_data_for_user(user_id)
  207. # Copy direct message state if applicable
  208. direct_rooms = user_account_data.get("m.direct", {})
  209. # Check which key this room is under
  210. if isinstance(direct_rooms, dict):
  211. for key, room_id_list in direct_rooms.items():
  212. if old_room_id in room_id_list and new_room_id not in room_id_list:
  213. # Add new room_id to this key
  214. direct_rooms[key].append(new_room_id)
  215. # Save back to user's m.direct account data
  216. yield self.store.add_account_data_for_user(
  217. user_id, "m.direct", direct_rooms
  218. )
  219. break
  220. # Copy room tags if applicable
  221. room_tags = yield self.store.get_tags_for_room(user_id, old_room_id)
  222. # Copy each room tag to the new room
  223. for tag, tag_content in room_tags.items():
  224. yield self.store.add_tag_to_room(user_id, new_room_id, tag, tag_content)
  225. @defer.inlineCallbacks
  226. def update_membership(
  227. self,
  228. requester,
  229. target,
  230. room_id,
  231. action,
  232. txn_id=None,
  233. remote_room_hosts=None,
  234. third_party_signed=None,
  235. ratelimit=True,
  236. content=None,
  237. require_consent=True,
  238. ):
  239. key = (room_id,)
  240. with (yield self.member_linearizer.queue(key)):
  241. result = yield self._update_membership(
  242. requester,
  243. target,
  244. room_id,
  245. action,
  246. txn_id=txn_id,
  247. remote_room_hosts=remote_room_hosts,
  248. third_party_signed=third_party_signed,
  249. ratelimit=ratelimit,
  250. content=content,
  251. require_consent=require_consent,
  252. )
  253. return result
  254. @defer.inlineCallbacks
  255. def _update_membership(
  256. self,
  257. requester,
  258. target,
  259. room_id,
  260. action,
  261. txn_id=None,
  262. remote_room_hosts=None,
  263. third_party_signed=None,
  264. ratelimit=True,
  265. content=None,
  266. require_consent=True,
  267. ):
  268. content_specified = bool(content)
  269. if content is None:
  270. content = {}
  271. else:
  272. # We do a copy here as we potentially change some keys
  273. # later on.
  274. content = dict(content)
  275. if not self.allow_per_room_profiles:
  276. # Strip profile data, knowing that new profile data will be added to the
  277. # event's content in event_creation_handler.create_event() using the target's
  278. # global profile.
  279. content.pop("displayname", None)
  280. content.pop("avatar_url", None)
  281. effective_membership_state = action
  282. if action in ["kick", "unban"]:
  283. effective_membership_state = "leave"
  284. # if this is a join with a 3pid signature, we may need to turn a 3pid
  285. # invite into a normal invite before we can handle the join.
  286. if third_party_signed is not None:
  287. yield self.federation_handler.exchange_third_party_invite(
  288. third_party_signed["sender"],
  289. target.to_string(),
  290. room_id,
  291. third_party_signed,
  292. )
  293. if not remote_room_hosts:
  294. remote_room_hosts = []
  295. if effective_membership_state not in ("leave", "ban"):
  296. is_blocked = yield self.store.is_room_blocked(room_id)
  297. if is_blocked:
  298. raise SynapseError(403, "This room has been blocked on this server")
  299. if effective_membership_state == Membership.INVITE:
  300. # block any attempts to invite the server notices mxid
  301. if target.to_string() == self._server_notices_mxid:
  302. raise SynapseError(http_client.FORBIDDEN, "Cannot invite this user")
  303. block_invite = False
  304. if (
  305. self._server_notices_mxid is not None
  306. and requester.user.to_string() == self._server_notices_mxid
  307. ):
  308. # allow the server notices mxid to send invites
  309. is_requester_admin = True
  310. else:
  311. is_requester_admin = yield self.auth.is_server_admin(requester.user)
  312. if not is_requester_admin:
  313. if self.config.block_non_admin_invites:
  314. logger.info(
  315. "Blocking invite: user is not admin and non-admin "
  316. "invites disabled"
  317. )
  318. block_invite = True
  319. if not self.spam_checker.user_may_invite(
  320. requester.user.to_string(), target.to_string(), room_id
  321. ):
  322. logger.info("Blocking invite due to spam checker")
  323. block_invite = True
  324. if block_invite:
  325. raise SynapseError(403, "Invites have been disabled on this server")
  326. prev_events_and_hashes = yield self.store.get_prev_events_for_room(room_id)
  327. latest_event_ids = (event_id for (event_id, _, _) in prev_events_and_hashes)
  328. current_state_ids = yield self.state_handler.get_current_state_ids(
  329. room_id, latest_event_ids=latest_event_ids
  330. )
  331. # TODO: Refactor into dictionary of explicitly allowed transitions
  332. # between old and new state, with specific error messages for some
  333. # transitions and generic otherwise
  334. old_state_id = current_state_ids.get((EventTypes.Member, target.to_string()))
  335. if old_state_id:
  336. old_state = yield self.store.get_event(old_state_id, allow_none=True)
  337. old_membership = old_state.content.get("membership") if old_state else None
  338. if action == "unban" and old_membership != "ban":
  339. raise SynapseError(
  340. 403,
  341. "Cannot unban user who was not banned"
  342. " (membership=%s)" % old_membership,
  343. errcode=Codes.BAD_STATE,
  344. )
  345. if old_membership == "ban" and action != "unban":
  346. raise SynapseError(
  347. 403,
  348. "Cannot %s user who was banned" % (action,),
  349. errcode=Codes.BAD_STATE,
  350. )
  351. if old_state:
  352. same_content = content == old_state.content
  353. same_membership = old_membership == effective_membership_state
  354. same_sender = requester.user.to_string() == old_state.sender
  355. if same_sender and same_membership and same_content:
  356. return old_state
  357. if old_membership in ["ban", "leave"] and action == "kick":
  358. raise AuthError(403, "The target user is not in the room")
  359. # we don't allow people to reject invites to the server notice
  360. # room, but they can leave it once they are joined.
  361. if (
  362. old_membership == Membership.INVITE
  363. and effective_membership_state == Membership.LEAVE
  364. ):
  365. is_blocked = yield self._is_server_notice_room(room_id)
  366. if is_blocked:
  367. raise SynapseError(
  368. http_client.FORBIDDEN,
  369. "You cannot reject this invite",
  370. errcode=Codes.CANNOT_LEAVE_SERVER_NOTICE_ROOM,
  371. )
  372. else:
  373. if action == "kick":
  374. raise AuthError(403, "The target user is not in the room")
  375. is_host_in_room = yield self._is_host_in_room(current_state_ids)
  376. if effective_membership_state == Membership.JOIN:
  377. if requester.is_guest:
  378. guest_can_join = yield self._can_guest_join(current_state_ids)
  379. if not guest_can_join:
  380. # This should be an auth check, but guests are a local concept,
  381. # so don't really fit into the general auth process.
  382. raise AuthError(403, "Guest access not allowed")
  383. if not is_host_in_room:
  384. inviter = yield self._get_inviter(target.to_string(), room_id)
  385. if inviter and not self.hs.is_mine(inviter):
  386. remote_room_hosts.append(inviter.domain)
  387. content["membership"] = Membership.JOIN
  388. profile = self.profile_handler
  389. if not content_specified:
  390. content["displayname"] = yield profile.get_displayname(target)
  391. content["avatar_url"] = yield profile.get_avatar_url(target)
  392. if requester.is_guest:
  393. content["kind"] = "guest"
  394. ret = yield self._remote_join(
  395. requester, remote_room_hosts, room_id, target, content
  396. )
  397. return ret
  398. elif effective_membership_state == Membership.LEAVE:
  399. if not is_host_in_room:
  400. # perhaps we've been invited
  401. inviter = yield self._get_inviter(target.to_string(), room_id)
  402. if not inviter:
  403. raise SynapseError(404, "Not a known room")
  404. if self.hs.is_mine(inviter):
  405. # the inviter was on our server, but has now left. Carry on
  406. # with the normal rejection codepath.
  407. #
  408. # This is a bit of a hack, because the room might still be
  409. # active on other servers.
  410. pass
  411. else:
  412. # send the rejection to the inviter's HS.
  413. remote_room_hosts = remote_room_hosts + [inviter.domain]
  414. res = yield self._remote_reject_invite(
  415. requester, remote_room_hosts, room_id, target
  416. )
  417. return res
  418. res = yield self._local_membership_update(
  419. requester=requester,
  420. target=target,
  421. room_id=room_id,
  422. membership=effective_membership_state,
  423. txn_id=txn_id,
  424. ratelimit=ratelimit,
  425. prev_events_and_hashes=prev_events_and_hashes,
  426. content=content,
  427. require_consent=require_consent,
  428. )
  429. return res
  430. @defer.inlineCallbacks
  431. def send_membership_event(
  432. self, requester, event, context, remote_room_hosts=None, ratelimit=True
  433. ):
  434. """
  435. Change the membership status of a user in a room.
  436. Args:
  437. requester (Requester): The local user who requested the membership
  438. event. If None, certain checks, like whether this homeserver can
  439. act as the sender, will be skipped.
  440. event (SynapseEvent): The membership event.
  441. context: The context of the event.
  442. is_guest (bool): Whether the sender is a guest.
  443. room_hosts ([str]): Homeservers which are likely to already be in
  444. the room, and could be danced with in order to join this
  445. homeserver for the first time.
  446. ratelimit (bool): Whether to rate limit this request.
  447. Raises:
  448. SynapseError if there was a problem changing the membership.
  449. """
  450. remote_room_hosts = remote_room_hosts or []
  451. target_user = UserID.from_string(event.state_key)
  452. room_id = event.room_id
  453. if requester is not None:
  454. sender = UserID.from_string(event.sender)
  455. assert (
  456. sender == requester.user
  457. ), "Sender (%s) must be same as requester (%s)" % (sender, requester.user)
  458. assert self.hs.is_mine(sender), "Sender must be our own: %s" % (sender,)
  459. else:
  460. requester = synapse.types.create_requester(target_user)
  461. prev_event = yield self.event_creation_handler.deduplicate_state_event(
  462. event, context
  463. )
  464. if prev_event is not None:
  465. return
  466. prev_state_ids = yield context.get_prev_state_ids(self.store)
  467. if event.membership == Membership.JOIN:
  468. if requester.is_guest:
  469. guest_can_join = yield self._can_guest_join(prev_state_ids)
  470. if not guest_can_join:
  471. # This should be an auth check, but guests are a local concept,
  472. # so don't really fit into the general auth process.
  473. raise AuthError(403, "Guest access not allowed")
  474. if event.membership not in (Membership.LEAVE, Membership.BAN):
  475. is_blocked = yield self.store.is_room_blocked(room_id)
  476. if is_blocked:
  477. raise SynapseError(403, "This room has been blocked on this server")
  478. yield self.event_creation_handler.handle_new_client_event(
  479. requester, event, context, extra_users=[target_user], ratelimit=ratelimit
  480. )
  481. prev_member_event_id = prev_state_ids.get(
  482. (EventTypes.Member, event.state_key), None
  483. )
  484. if event.membership == Membership.JOIN:
  485. # Only fire user_joined_room if the user has actually joined the
  486. # room. Don't bother if the user is just changing their profile
  487. # info.
  488. newly_joined = True
  489. if prev_member_event_id:
  490. prev_member_event = yield self.store.get_event(prev_member_event_id)
  491. newly_joined = prev_member_event.membership != Membership.JOIN
  492. if newly_joined:
  493. yield self._user_joined_room(target_user, room_id)
  494. elif event.membership == Membership.LEAVE:
  495. if prev_member_event_id:
  496. prev_member_event = yield self.store.get_event(prev_member_event_id)
  497. if prev_member_event.membership == Membership.JOIN:
  498. yield self._user_left_room(target_user, room_id)
  499. @defer.inlineCallbacks
  500. def _can_guest_join(self, current_state_ids):
  501. """
  502. Returns whether a guest can join a room based on its current state.
  503. """
  504. guest_access_id = current_state_ids.get((EventTypes.GuestAccess, ""), None)
  505. if not guest_access_id:
  506. return False
  507. guest_access = yield self.store.get_event(guest_access_id)
  508. return (
  509. guest_access
  510. and guest_access.content
  511. and "guest_access" in guest_access.content
  512. and guest_access.content["guest_access"] == "can_join"
  513. )
  514. @defer.inlineCallbacks
  515. def lookup_room_alias(self, room_alias):
  516. """
  517. Get the room ID associated with a room alias.
  518. Args:
  519. room_alias (RoomAlias): The alias to look up.
  520. Returns:
  521. A tuple of:
  522. The room ID as a RoomID object.
  523. Hosts likely to be participating in the room ([str]).
  524. Raises:
  525. SynapseError if room alias could not be found.
  526. """
  527. directory_handler = self.directory_handler
  528. mapping = yield directory_handler.get_association(room_alias)
  529. if not mapping:
  530. raise SynapseError(404, "No such room alias")
  531. room_id = mapping["room_id"]
  532. servers = mapping["servers"]
  533. # put the server which owns the alias at the front of the server list.
  534. if room_alias.domain in servers:
  535. servers.remove(room_alias.domain)
  536. servers.insert(0, room_alias.domain)
  537. return (RoomID.from_string(room_id), servers)
  538. @defer.inlineCallbacks
  539. def _get_inviter(self, user_id, room_id):
  540. invite = yield self.store.get_invite_for_user_in_room(
  541. user_id=user_id, room_id=room_id
  542. )
  543. if invite:
  544. return UserID.from_string(invite.sender)
  545. @defer.inlineCallbacks
  546. def do_3pid_invite(
  547. self, room_id, inviter, medium, address, id_server, requester, txn_id
  548. ):
  549. if self.config.block_non_admin_invites:
  550. is_requester_admin = yield self.auth.is_server_admin(requester.user)
  551. if not is_requester_admin:
  552. raise SynapseError(
  553. 403, "Invites have been disabled on this server", Codes.FORBIDDEN
  554. )
  555. # We need to rate limit *before* we send out any 3PID invites, so we
  556. # can't just rely on the standard ratelimiting of events.
  557. yield self.base_handler.ratelimit(requester)
  558. can_invite = yield self.third_party_event_rules.check_threepid_can_be_invited(
  559. medium, address, room_id
  560. )
  561. if not can_invite:
  562. raise SynapseError(
  563. 403,
  564. "This third-party identifier can not be invited in this room",
  565. Codes.FORBIDDEN,
  566. )
  567. invitee = yield self._lookup_3pid(id_server, medium, address)
  568. if invitee:
  569. yield self.update_membership(
  570. requester, UserID.from_string(invitee), room_id, "invite", txn_id=txn_id
  571. )
  572. else:
  573. yield self._make_and_store_3pid_invite(
  574. requester, id_server, medium, address, room_id, inviter, txn_id=txn_id
  575. )
  576. @defer.inlineCallbacks
  577. def _lookup_3pid(self, id_server, medium, address):
  578. """Looks up a 3pid in the passed identity server.
  579. Args:
  580. id_server (str): The server name (including port, if required)
  581. of the identity server to use.
  582. medium (str): The type of the third party identifier (e.g. "email").
  583. address (str): The third party identifier (e.g. "foo@example.com").
  584. Returns:
  585. str: the matrix ID of the 3pid, or None if it is not recognized.
  586. """
  587. if not self._enable_lookup:
  588. raise SynapseError(
  589. 403, "Looking up third-party identifiers is denied from this server"
  590. )
  591. try:
  592. data = yield self.simple_http_client.get_json(
  593. "%s%s/_matrix/identity/api/v1/lookup" % (id_server_scheme, id_server),
  594. {"medium": medium, "address": address},
  595. )
  596. if "mxid" in data:
  597. if "signatures" not in data:
  598. raise AuthError(401, "No signatures on 3pid binding")
  599. yield self._verify_any_signature(data, id_server)
  600. return data["mxid"]
  601. except IOError as e:
  602. logger.warn("Error from identity server lookup: %s" % (e,))
  603. return None
  604. @defer.inlineCallbacks
  605. def _verify_any_signature(self, data, server_hostname):
  606. if server_hostname not in data["signatures"]:
  607. raise AuthError(401, "No signature from server %s" % (server_hostname,))
  608. for key_name, signature in data["signatures"][server_hostname].items():
  609. key_data = yield self.simple_http_client.get_json(
  610. "%s%s/_matrix/identity/api/v1/pubkey/%s"
  611. % (id_server_scheme, server_hostname, key_name)
  612. )
  613. if "public_key" not in key_data:
  614. raise AuthError(
  615. 401, "No public key named %s from %s" % (key_name, server_hostname)
  616. )
  617. verify_signed_json(
  618. data,
  619. server_hostname,
  620. decode_verify_key_bytes(
  621. key_name, decode_base64(key_data["public_key"])
  622. ),
  623. )
  624. return
  625. @defer.inlineCallbacks
  626. def _make_and_store_3pid_invite(
  627. self, requester, id_server, medium, address, room_id, user, txn_id
  628. ):
  629. room_state = yield self.state_handler.get_current_state(room_id)
  630. inviter_display_name = ""
  631. inviter_avatar_url = ""
  632. member_event = room_state.get((EventTypes.Member, user.to_string()))
  633. if member_event:
  634. inviter_display_name = member_event.content.get("displayname", "")
  635. inviter_avatar_url = member_event.content.get("avatar_url", "")
  636. # if user has no display name, default to their MXID
  637. if not inviter_display_name:
  638. inviter_display_name = user.to_string()
  639. canonical_room_alias = ""
  640. canonical_alias_event = room_state.get((EventTypes.CanonicalAlias, ""))
  641. if canonical_alias_event:
  642. canonical_room_alias = canonical_alias_event.content.get("alias", "")
  643. room_name = ""
  644. room_name_event = room_state.get((EventTypes.Name, ""))
  645. if room_name_event:
  646. room_name = room_name_event.content.get("name", "")
  647. room_join_rules = ""
  648. join_rules_event = room_state.get((EventTypes.JoinRules, ""))
  649. if join_rules_event:
  650. room_join_rules = join_rules_event.content.get("join_rule", "")
  651. room_avatar_url = ""
  652. room_avatar_event = room_state.get((EventTypes.RoomAvatar, ""))
  653. if room_avatar_event:
  654. room_avatar_url = room_avatar_event.content.get("url", "")
  655. token, public_keys, fallback_public_key, display_name = (
  656. yield self._ask_id_server_for_third_party_invite(
  657. requester=requester,
  658. id_server=id_server,
  659. medium=medium,
  660. address=address,
  661. room_id=room_id,
  662. inviter_user_id=user.to_string(),
  663. room_alias=canonical_room_alias,
  664. room_avatar_url=room_avatar_url,
  665. room_join_rules=room_join_rules,
  666. room_name=room_name,
  667. inviter_display_name=inviter_display_name,
  668. inviter_avatar_url=inviter_avatar_url,
  669. )
  670. )
  671. yield self.event_creation_handler.create_and_send_nonmember_event(
  672. requester,
  673. {
  674. "type": EventTypes.ThirdPartyInvite,
  675. "content": {
  676. "display_name": display_name,
  677. "public_keys": public_keys,
  678. # For backwards compatibility:
  679. "key_validity_url": fallback_public_key["key_validity_url"],
  680. "public_key": fallback_public_key["public_key"],
  681. },
  682. "room_id": room_id,
  683. "sender": user.to_string(),
  684. "state_key": token,
  685. },
  686. ratelimit=False,
  687. txn_id=txn_id,
  688. )
  689. @defer.inlineCallbacks
  690. def _ask_id_server_for_third_party_invite(
  691. self,
  692. requester,
  693. id_server,
  694. medium,
  695. address,
  696. room_id,
  697. inviter_user_id,
  698. room_alias,
  699. room_avatar_url,
  700. room_join_rules,
  701. room_name,
  702. inviter_display_name,
  703. inviter_avatar_url,
  704. ):
  705. """
  706. Asks an identity server for a third party invite.
  707. Args:
  708. requester (Requester)
  709. id_server (str): hostname + optional port for the identity server.
  710. medium (str): The literal string "email".
  711. address (str): The third party address being invited.
  712. room_id (str): The ID of the room to which the user is invited.
  713. inviter_user_id (str): The user ID of the inviter.
  714. room_alias (str): An alias for the room, for cosmetic notifications.
  715. room_avatar_url (str): The URL of the room's avatar, for cosmetic
  716. notifications.
  717. room_join_rules (str): The join rules of the email (e.g. "public").
  718. room_name (str): The m.room.name of the room.
  719. inviter_display_name (str): The current display name of the
  720. inviter.
  721. inviter_avatar_url (str): The URL of the inviter's avatar.
  722. Returns:
  723. A deferred tuple containing:
  724. token (str): The token which must be signed to prove authenticity.
  725. public_keys ([{"public_key": str, "key_validity_url": str}]):
  726. public_key is a base64-encoded ed25519 public key.
  727. fallback_public_key: One element from public_keys.
  728. display_name (str): A user-friendly name to represent the invited
  729. user.
  730. """
  731. is_url = "%s%s/_matrix/identity/api/v1/store-invite" % (
  732. id_server_scheme,
  733. id_server,
  734. )
  735. invite_config = {
  736. "medium": medium,
  737. "address": address,
  738. "room_id": room_id,
  739. "room_alias": room_alias,
  740. "room_avatar_url": room_avatar_url,
  741. "room_join_rules": room_join_rules,
  742. "room_name": room_name,
  743. "sender": inviter_user_id,
  744. "sender_display_name": inviter_display_name,
  745. "sender_avatar_url": inviter_avatar_url,
  746. }
  747. try:
  748. data = yield self.simple_http_client.post_json_get_json(
  749. is_url, invite_config
  750. )
  751. except HttpResponseException as e:
  752. # Some identity servers may only support application/x-www-form-urlencoded
  753. # types. This is especially true with old instances of Sydent, see
  754. # https://github.com/matrix-org/sydent/pull/170
  755. logger.info(
  756. "Failed to POST %s with JSON, falling back to urlencoded form: %s",
  757. is_url,
  758. e,
  759. )
  760. data = yield self.simple_http_client.post_urlencoded_get_json(
  761. is_url, invite_config
  762. )
  763. # TODO: Check for success
  764. token = data["token"]
  765. public_keys = data.get("public_keys", [])
  766. if "public_key" in data:
  767. fallback_public_key = {
  768. "public_key": data["public_key"],
  769. "key_validity_url": "%s%s/_matrix/identity/api/v1/pubkey/isvalid"
  770. % (id_server_scheme, id_server),
  771. }
  772. else:
  773. fallback_public_key = public_keys[0]
  774. if not public_keys:
  775. public_keys.append(fallback_public_key)
  776. display_name = data["display_name"]
  777. return (token, public_keys, fallback_public_key, display_name)
  778. @defer.inlineCallbacks
  779. def _is_host_in_room(self, current_state_ids):
  780. # Have we just created the room, and is this about to be the very
  781. # first member event?
  782. create_event_id = current_state_ids.get(("m.room.create", ""))
  783. if len(current_state_ids) == 1 and create_event_id:
  784. # We can only get here if we're in the process of creating the room
  785. return True
  786. for etype, state_key in current_state_ids:
  787. if etype != EventTypes.Member or not self.hs.is_mine_id(state_key):
  788. continue
  789. event_id = current_state_ids[(etype, state_key)]
  790. event = yield self.store.get_event(event_id, allow_none=True)
  791. if not event:
  792. continue
  793. if event.membership == Membership.JOIN:
  794. return True
  795. return False
  796. @defer.inlineCallbacks
  797. def _is_server_notice_room(self, room_id):
  798. if self._server_notices_mxid is None:
  799. return False
  800. user_ids = yield self.store.get_users_in_room(room_id)
  801. return self._server_notices_mxid in user_ids
  802. class RoomMemberMasterHandler(RoomMemberHandler):
  803. def __init__(self, hs):
  804. super(RoomMemberMasterHandler, self).__init__(hs)
  805. self.distributor = hs.get_distributor()
  806. self.distributor.declare("user_joined_room")
  807. self.distributor.declare("user_left_room")
  808. @defer.inlineCallbacks
  809. def _remote_join(self, requester, remote_room_hosts, room_id, user, content):
  810. """Implements RoomMemberHandler._remote_join
  811. """
  812. # filter ourselves out of remote_room_hosts: do_invite_join ignores it
  813. # and if it is the only entry we'd like to return a 404 rather than a
  814. # 500.
  815. remote_room_hosts = [
  816. host for host in remote_room_hosts if host != self.hs.hostname
  817. ]
  818. if len(remote_room_hosts) == 0:
  819. raise SynapseError(404, "No known servers")
  820. # We don't do an auth check if we are doing an invite
  821. # join dance for now, since we're kinda implicitly checking
  822. # that we are allowed to join when we decide whether or not we
  823. # need to do the invite/join dance.
  824. yield self.federation_handler.do_invite_join(
  825. remote_room_hosts, room_id, user.to_string(), content
  826. )
  827. yield self._user_joined_room(user, room_id)
  828. @defer.inlineCallbacks
  829. def _remote_reject_invite(self, requester, remote_room_hosts, room_id, target):
  830. """Implements RoomMemberHandler._remote_reject_invite
  831. """
  832. fed_handler = self.federation_handler
  833. try:
  834. ret = yield fed_handler.do_remotely_reject_invite(
  835. remote_room_hosts, room_id, target.to_string()
  836. )
  837. return ret
  838. except Exception as e:
  839. # if we were unable to reject the exception, just mark
  840. # it as rejected on our end and plough ahead.
  841. #
  842. # The 'except' clause is very broad, but we need to
  843. # capture everything from DNS failures upwards
  844. #
  845. logger.warn("Failed to reject invite: %s", e)
  846. yield self.store.locally_reject_invite(target.to_string(), room_id)
  847. return {}
  848. def _user_joined_room(self, target, room_id):
  849. """Implements RoomMemberHandler._user_joined_room
  850. """
  851. return user_joined_room(self.distributor, target, room_id)
  852. def _user_left_room(self, target, room_id):
  853. """Implements RoomMemberHandler._user_left_room
  854. """
  855. return user_left_room(self.distributor, target, room_id)
  856. @defer.inlineCallbacks
  857. def forget(self, user, room_id):
  858. user_id = user.to_string()
  859. member = yield self.state_handler.get_current_state(
  860. room_id=room_id, event_type=EventTypes.Member, state_key=user_id
  861. )
  862. membership = member.membership if member else None
  863. if membership is not None and membership not in [
  864. Membership.LEAVE,
  865. Membership.BAN,
  866. ]:
  867. raise SynapseError(400, "User %s in room %s" % (user_id, room_id))
  868. if membership:
  869. yield self.store.forget(user_id, room_id)