profile.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471
  1. # Copyright 2014-2016 OpenMarket Ltd
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. import logging
  15. import random
  16. from typing import TYPE_CHECKING, Optional
  17. from synapse.api.errors import (
  18. AuthError,
  19. Codes,
  20. HttpResponseException,
  21. RequestSendFailed,
  22. StoreError,
  23. SynapseError,
  24. )
  25. from synapse.types import JsonDict, Requester, UserID, create_requester
  26. from synapse.util.caches.descriptors import cached
  27. from synapse.util.stringutils import parse_and_validate_mxc_uri
  28. if TYPE_CHECKING:
  29. from synapse.server import HomeServer
  30. logger = logging.getLogger(__name__)
  31. MAX_DISPLAYNAME_LEN = 256
  32. MAX_AVATAR_URL_LEN = 1000
  33. class ProfileHandler:
  34. """Handles fetching and updating user profile information.
  35. ProfileHandler can be instantiated directly on workers and will
  36. delegate to master when necessary.
  37. """
  38. def __init__(self, hs: "HomeServer"):
  39. self.store = hs.get_datastores().main
  40. self.clock = hs.get_clock()
  41. self.hs = hs
  42. self.federation = hs.get_federation_client()
  43. hs.get_federation_registry().register_query_handler(
  44. "profile", self.on_profile_query
  45. )
  46. self.user_directory_handler = hs.get_user_directory_handler()
  47. self.request_ratelimiter = hs.get_request_ratelimiter()
  48. self.max_avatar_size = hs.config.server.max_avatar_size
  49. self.allowed_avatar_mimetypes = hs.config.server.allowed_avatar_mimetypes
  50. self.server_name = hs.config.server.server_name
  51. self._third_party_rules = hs.get_third_party_event_rules()
  52. async def get_profile(self, user_id: str) -> JsonDict:
  53. target_user = UserID.from_string(user_id)
  54. if self.hs.is_mine(target_user):
  55. profileinfo = await self.store.get_profileinfo(target_user.localpart)
  56. if profileinfo.display_name is None:
  57. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  58. return {
  59. "displayname": profileinfo.display_name,
  60. "avatar_url": profileinfo.avatar_url,
  61. }
  62. else:
  63. try:
  64. result = await self.federation.make_query(
  65. destination=target_user.domain,
  66. query_type="profile",
  67. args={"user_id": user_id},
  68. ignore_backoff=True,
  69. )
  70. return result
  71. except RequestSendFailed as e:
  72. raise SynapseError(502, "Failed to fetch profile") from e
  73. except HttpResponseException as e:
  74. if e.code < 500 and e.code != 404:
  75. # Other codes are not allowed in c2s API
  76. logger.info(
  77. "Server replied with wrong response: %s %s", e.code, e.msg
  78. )
  79. raise SynapseError(502, "Failed to fetch profile")
  80. raise e.to_synapse_error()
  81. async def get_displayname(self, target_user: UserID) -> Optional[str]:
  82. if self.hs.is_mine(target_user):
  83. try:
  84. displayname = await self.store.get_profile_displayname(
  85. target_user.localpart
  86. )
  87. except StoreError as e:
  88. if e.code == 404:
  89. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  90. raise
  91. return displayname
  92. else:
  93. try:
  94. result = await self.federation.make_query(
  95. destination=target_user.domain,
  96. query_type="profile",
  97. args={"user_id": target_user.to_string(), "field": "displayname"},
  98. ignore_backoff=True,
  99. )
  100. except RequestSendFailed as e:
  101. raise SynapseError(502, "Failed to fetch profile") from e
  102. except HttpResponseException as e:
  103. raise e.to_synapse_error()
  104. return result.get("displayname")
  105. async def set_displayname(
  106. self,
  107. target_user: UserID,
  108. requester: Requester,
  109. new_displayname: str,
  110. by_admin: bool = False,
  111. deactivation: bool = False,
  112. ) -> None:
  113. """Set the displayname of a user
  114. Args:
  115. target_user: the user whose displayname is to be changed.
  116. requester: The user attempting to make this change.
  117. new_displayname: The displayname to give this user.
  118. by_admin: Whether this change was made by an administrator.
  119. deactivation: Whether this change was made while deactivating the user.
  120. """
  121. if not self.hs.is_mine(target_user):
  122. raise SynapseError(400, "User is not hosted on this homeserver")
  123. if not by_admin and target_user != requester.user:
  124. raise AuthError(400, "Cannot set another user's displayname")
  125. if not by_admin and not self.hs.config.registration.enable_set_displayname:
  126. profile = await self.store.get_profileinfo(target_user.localpart)
  127. if profile.display_name:
  128. raise SynapseError(
  129. 400,
  130. "Changing display name is disabled on this server",
  131. Codes.FORBIDDEN,
  132. )
  133. if not isinstance(new_displayname, str):
  134. raise SynapseError(
  135. 400, "'displayname' must be a string", errcode=Codes.INVALID_PARAM
  136. )
  137. if len(new_displayname) > MAX_DISPLAYNAME_LEN:
  138. raise SynapseError(
  139. 400, "Displayname is too long (max %i)" % (MAX_DISPLAYNAME_LEN,)
  140. )
  141. displayname_to_set: Optional[str] = new_displayname
  142. if new_displayname == "":
  143. displayname_to_set = None
  144. # If the admin changes the display name of a user, the requesting user cannot send
  145. # the join event to update the displayname in the rooms.
  146. # This must be done by the target user himself.
  147. if by_admin:
  148. requester = create_requester(
  149. target_user,
  150. authenticated_entity=requester.authenticated_entity,
  151. )
  152. await self.store.set_profile_displayname(
  153. target_user.localpart, displayname_to_set
  154. )
  155. profile = await self.store.get_profileinfo(target_user.localpart)
  156. await self.user_directory_handler.handle_local_profile_change(
  157. target_user.to_string(), profile
  158. )
  159. await self._third_party_rules.on_profile_update(
  160. target_user.to_string(), profile, by_admin, deactivation
  161. )
  162. await self._update_join_states(requester, target_user)
  163. async def get_avatar_url(self, target_user: UserID) -> Optional[str]:
  164. if self.hs.is_mine(target_user):
  165. try:
  166. avatar_url = await self.store.get_profile_avatar_url(
  167. target_user.localpart
  168. )
  169. except StoreError as e:
  170. if e.code == 404:
  171. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  172. raise
  173. return avatar_url
  174. else:
  175. try:
  176. result = await self.federation.make_query(
  177. destination=target_user.domain,
  178. query_type="profile",
  179. args={"user_id": target_user.to_string(), "field": "avatar_url"},
  180. ignore_backoff=True,
  181. )
  182. except RequestSendFailed as e:
  183. raise SynapseError(502, "Failed to fetch profile") from e
  184. except HttpResponseException as e:
  185. raise e.to_synapse_error()
  186. return result.get("avatar_url")
  187. async def set_avatar_url(
  188. self,
  189. target_user: UserID,
  190. requester: Requester,
  191. new_avatar_url: str,
  192. by_admin: bool = False,
  193. deactivation: bool = False,
  194. ) -> None:
  195. """Set a new avatar URL for a user.
  196. Args:
  197. target_user: the user whose avatar URL is to be changed.
  198. requester: The user attempting to make this change.
  199. new_avatar_url: The avatar URL to give this user.
  200. by_admin: Whether this change was made by an administrator.
  201. deactivation: Whether this change was made while deactivating the user.
  202. """
  203. if not self.hs.is_mine(target_user):
  204. raise SynapseError(400, "User is not hosted on this homeserver")
  205. if not by_admin and target_user != requester.user:
  206. raise AuthError(400, "Cannot set another user's avatar_url")
  207. if not by_admin and not self.hs.config.registration.enable_set_avatar_url:
  208. profile = await self.store.get_profileinfo(target_user.localpart)
  209. if profile.avatar_url:
  210. raise SynapseError(
  211. 400, "Changing avatar is disabled on this server", Codes.FORBIDDEN
  212. )
  213. if not isinstance(new_avatar_url, str):
  214. raise SynapseError(
  215. 400, "'avatar_url' must be a string", errcode=Codes.INVALID_PARAM
  216. )
  217. if len(new_avatar_url) > MAX_AVATAR_URL_LEN:
  218. raise SynapseError(
  219. 400, "Avatar URL is too long (max %i)" % (MAX_AVATAR_URL_LEN,)
  220. )
  221. if not await self.check_avatar_size_and_mime_type(new_avatar_url):
  222. raise SynapseError(403, "This avatar is not allowed", Codes.FORBIDDEN)
  223. avatar_url_to_set: Optional[str] = new_avatar_url
  224. if new_avatar_url == "":
  225. avatar_url_to_set = None
  226. # Same like set_displayname
  227. if by_admin:
  228. requester = create_requester(
  229. target_user, authenticated_entity=requester.authenticated_entity
  230. )
  231. await self.store.set_profile_avatar_url(
  232. target_user.localpart, avatar_url_to_set
  233. )
  234. profile = await self.store.get_profileinfo(target_user.localpart)
  235. await self.user_directory_handler.handle_local_profile_change(
  236. target_user.to_string(), profile
  237. )
  238. await self._third_party_rules.on_profile_update(
  239. target_user.to_string(), profile, by_admin, deactivation
  240. )
  241. await self._update_join_states(requester, target_user)
  242. @cached()
  243. async def check_avatar_size_and_mime_type(self, mxc: str) -> bool:
  244. """Check that the size and content type of the avatar at the given MXC URI are
  245. within the configured limits.
  246. If the given `mxc` is empty, no checks are performed. (Users are always able to
  247. unset their avatar.)
  248. Args:
  249. mxc: The MXC URI at which the avatar can be found.
  250. Returns:
  251. A boolean indicating whether the file can be allowed to be set as an avatar.
  252. """
  253. if mxc == "":
  254. return True
  255. if not self.max_avatar_size and not self.allowed_avatar_mimetypes:
  256. return True
  257. host, port, media_id = parse_and_validate_mxc_uri(mxc)
  258. if port is not None:
  259. server_name = host + ":" + str(port)
  260. else:
  261. server_name = host
  262. if server_name == self.server_name:
  263. media_info = await self.store.get_local_media(media_id)
  264. else:
  265. media_info = await self.store.get_cached_remote_media(server_name, media_id)
  266. if media_info is None:
  267. # Both configuration options need to access the file's metadata, and
  268. # retrieving remote avatars just for this becomes a bit of a faff, especially
  269. # if e.g. the file is too big. It's also generally safe to assume most files
  270. # used as avatar are uploaded locally, or if the upload didn't happen as part
  271. # of a PUT request on /avatar_url that the file was at least previewed by the
  272. # user locally (and therefore downloaded to the remote media cache).
  273. logger.warning("Forbidding avatar change to %s: avatar not on server", mxc)
  274. return False
  275. if self.max_avatar_size:
  276. # Ensure avatar does not exceed max allowed avatar size
  277. if media_info["media_length"] > self.max_avatar_size:
  278. logger.warning(
  279. "Forbidding avatar change to %s: %d bytes is above the allowed size "
  280. "limit",
  281. mxc,
  282. media_info["media_length"],
  283. )
  284. return False
  285. if self.allowed_avatar_mimetypes:
  286. # Ensure the avatar's file type is allowed
  287. if (
  288. self.allowed_avatar_mimetypes
  289. and media_info["media_type"] not in self.allowed_avatar_mimetypes
  290. ):
  291. logger.warning(
  292. "Forbidding avatar change to %s: mimetype %s not allowed",
  293. mxc,
  294. media_info["media_type"],
  295. )
  296. return False
  297. return True
  298. async def on_profile_query(self, args: JsonDict) -> JsonDict:
  299. """Handles federation profile query requests."""
  300. if not self.hs.config.federation.allow_profile_lookup_over_federation:
  301. raise SynapseError(
  302. 403,
  303. "Profile lookup over federation is disabled on this homeserver",
  304. Codes.FORBIDDEN,
  305. )
  306. user = UserID.from_string(args["user_id"])
  307. if not self.hs.is_mine(user):
  308. raise SynapseError(400, "User is not hosted on this homeserver")
  309. just_field = args.get("field", None)
  310. response = {}
  311. try:
  312. if just_field is None or just_field == "displayname":
  313. response["displayname"] = await self.store.get_profile_displayname(
  314. user.localpart
  315. )
  316. if just_field is None or just_field == "avatar_url":
  317. response["avatar_url"] = await self.store.get_profile_avatar_url(
  318. user.localpart
  319. )
  320. except StoreError as e:
  321. if e.code == 404:
  322. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  323. raise
  324. return response
  325. async def _update_join_states(
  326. self, requester: Requester, target_user: UserID
  327. ) -> None:
  328. if not self.hs.is_mine(target_user):
  329. return
  330. await self.request_ratelimiter.ratelimit(requester)
  331. # Do not actually update the room state for shadow-banned users.
  332. if requester.shadow_banned:
  333. # We randomly sleep a bit just to annoy the requester.
  334. await self.clock.sleep(random.randint(1, 10))
  335. return
  336. room_ids = await self.store.get_rooms_for_user(target_user.to_string())
  337. for room_id in room_ids:
  338. handler = self.hs.get_room_member_handler()
  339. try:
  340. # Assume the target_user isn't a guest,
  341. # because we don't let guests set profile or avatar data.
  342. await handler.update_membership(
  343. requester,
  344. target_user,
  345. room_id,
  346. "join", # We treat a profile update like a join.
  347. ratelimit=False, # Try to hide that these events aren't atomic.
  348. )
  349. except Exception as e:
  350. logger.warning(
  351. "Failed to update join event for room %s - %s", room_id, str(e)
  352. )
  353. async def check_profile_query_allowed(
  354. self, target_user: UserID, requester: Optional[UserID] = None
  355. ) -> None:
  356. """Checks whether a profile query is allowed. If the
  357. 'require_auth_for_profile_requests' config flag is set to True and a
  358. 'requester' is provided, the query is only allowed if the two users
  359. share a room.
  360. Args:
  361. target_user: The owner of the queried profile.
  362. requester: The user querying for the profile.
  363. Raises:
  364. SynapseError(403): The two users share no room, or ne user couldn't
  365. be found to be in any room the server is in, and therefore the query
  366. is denied.
  367. """
  368. # Implementation of MSC1301: don't allow looking up profiles if the
  369. # requester isn't in the same room as the target. We expect requester to
  370. # be None when this function is called outside of a profile query, e.g.
  371. # when building a membership event. In this case, we must allow the
  372. # lookup.
  373. if (
  374. not self.hs.config.server.limit_profile_requests_to_users_who_share_rooms
  375. or not requester
  376. ):
  377. return
  378. # Always allow the user to query their own profile.
  379. if target_user.to_string() == requester.to_string():
  380. return
  381. try:
  382. requester_rooms = await self.store.get_rooms_for_user(requester.to_string())
  383. target_user_rooms = await self.store.get_rooms_for_user(
  384. target_user.to_string()
  385. )
  386. # Check if the room lists have no elements in common.
  387. if requester_rooms.isdisjoint(target_user_rooms):
  388. raise SynapseError(403, "Profile isn't available", Codes.FORBIDDEN)
  389. except StoreError as e:
  390. if e.code == 404:
  391. # This likely means that one of the users doesn't exist,
  392. # so we act as if we couldn't find the profile.
  393. raise SynapseError(403, "Profile isn't available", Codes.FORBIDDEN)
  394. raise