filtering.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492
  1. # Copyright 2015, 2016 OpenMarket Ltd
  2. # Copyright 2017 Vector Creations Ltd
  3. # Copyright 2018-2019 New Vector Ltd
  4. # Copyright 2019-2021 The Matrix.org Foundation C.I.C.
  5. #
  6. # Licensed under the Apache License, Version 2.0 (the "License");
  7. # you may not use this file except in compliance with the License.
  8. # You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing, software
  13. # distributed under the License is distributed on an "AS IS" BASIS,
  14. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. # See the License for the specific language governing permissions and
  16. # limitations under the License.
  17. import json
  18. from typing import (
  19. TYPE_CHECKING,
  20. Awaitable,
  21. Callable,
  22. Collection,
  23. Dict,
  24. Iterable,
  25. List,
  26. Mapping,
  27. Optional,
  28. Set,
  29. TypeVar,
  30. Union,
  31. )
  32. import jsonschema
  33. from jsonschema import FormatChecker
  34. from synapse.api.constants import EduTypes, EventContentFields
  35. from synapse.api.errors import SynapseError
  36. from synapse.api.presence import UserPresenceState
  37. from synapse.events import EventBase
  38. from synapse.types import JsonDict, RoomID, UserID
  39. if TYPE_CHECKING:
  40. from synapse.server import HomeServer
  41. FILTER_SCHEMA = {
  42. "additionalProperties": False,
  43. "type": "object",
  44. "properties": {
  45. "limit": {"type": "number"},
  46. "senders": {"$ref": "#/definitions/user_id_array"},
  47. "not_senders": {"$ref": "#/definitions/user_id_array"},
  48. # TODO: We don't limit event type values but we probably should...
  49. # check types are valid event types
  50. "types": {"type": "array", "items": {"type": "string"}},
  51. "not_types": {"type": "array", "items": {"type": "string"}},
  52. },
  53. }
  54. ROOM_FILTER_SCHEMA = {
  55. "additionalProperties": False,
  56. "type": "object",
  57. "properties": {
  58. "not_rooms": {"$ref": "#/definitions/room_id_array"},
  59. "rooms": {"$ref": "#/definitions/room_id_array"},
  60. "ephemeral": {"$ref": "#/definitions/room_event_filter"},
  61. "include_leave": {"type": "boolean"},
  62. "state": {"$ref": "#/definitions/room_event_filter"},
  63. "timeline": {"$ref": "#/definitions/room_event_filter"},
  64. "account_data": {"$ref": "#/definitions/room_event_filter"},
  65. },
  66. }
  67. ROOM_EVENT_FILTER_SCHEMA = {
  68. "additionalProperties": False,
  69. "type": "object",
  70. "properties": {
  71. "limit": {"type": "number"},
  72. "senders": {"$ref": "#/definitions/user_id_array"},
  73. "not_senders": {"$ref": "#/definitions/user_id_array"},
  74. "types": {"type": "array", "items": {"type": "string"}},
  75. "not_types": {"type": "array", "items": {"type": "string"}},
  76. "rooms": {"$ref": "#/definitions/room_id_array"},
  77. "not_rooms": {"$ref": "#/definitions/room_id_array"},
  78. "contains_url": {"type": "boolean"},
  79. "lazy_load_members": {"type": "boolean"},
  80. "include_redundant_members": {"type": "boolean"},
  81. # Include or exclude events with the provided labels.
  82. # cf https://github.com/matrix-org/matrix-doc/pull/2326
  83. "org.matrix.labels": {"type": "array", "items": {"type": "string"}},
  84. "org.matrix.not_labels": {"type": "array", "items": {"type": "string"}},
  85. # MSC3440, filtering by event relations.
  86. "related_by_senders": {"type": "array", "items": {"type": "string"}},
  87. "related_by_rel_types": {"type": "array", "items": {"type": "string"}},
  88. },
  89. }
  90. USER_ID_ARRAY_SCHEMA = {
  91. "type": "array",
  92. "items": {"type": "string", "format": "matrix_user_id"},
  93. }
  94. ROOM_ID_ARRAY_SCHEMA = {
  95. "type": "array",
  96. "items": {"type": "string", "format": "matrix_room_id"},
  97. }
  98. USER_FILTER_SCHEMA = {
  99. "$schema": "http://json-schema.org/draft-04/schema#",
  100. "description": "schema for a Sync filter",
  101. "type": "object",
  102. "definitions": {
  103. "room_id_array": ROOM_ID_ARRAY_SCHEMA,
  104. "user_id_array": USER_ID_ARRAY_SCHEMA,
  105. "filter": FILTER_SCHEMA,
  106. "room_filter": ROOM_FILTER_SCHEMA,
  107. "room_event_filter": ROOM_EVENT_FILTER_SCHEMA,
  108. },
  109. "properties": {
  110. "presence": {"$ref": "#/definitions/filter"},
  111. "account_data": {"$ref": "#/definitions/filter"},
  112. "room": {"$ref": "#/definitions/room_filter"},
  113. "event_format": {"type": "string", "enum": ["client", "federation"]},
  114. "event_fields": {
  115. "type": "array",
  116. "items": {
  117. "type": "string",
  118. # Don't allow '\\' in event field filters. This makes matching
  119. # events a lot easier as we can then use a negative lookbehind
  120. # assertion to split '\.' If we allowed \\ then it would
  121. # incorrectly split '\\.' See synapse.events.utils.serialize_event
  122. #
  123. # Note that because this is a regular expression, we have to escape
  124. # each backslash in the pattern.
  125. "pattern": r"^((?!\\\\).)*$",
  126. },
  127. },
  128. },
  129. "additionalProperties": False,
  130. }
  131. @FormatChecker.cls_checks("matrix_room_id")
  132. def matrix_room_id_validator(room_id_str: str) -> RoomID:
  133. return RoomID.from_string(room_id_str)
  134. @FormatChecker.cls_checks("matrix_user_id")
  135. def matrix_user_id_validator(user_id_str: str) -> UserID:
  136. return UserID.from_string(user_id_str)
  137. class Filtering:
  138. def __init__(self, hs: "HomeServer"):
  139. self._hs = hs
  140. self.store = hs.get_datastores().main
  141. self.DEFAULT_FILTER_COLLECTION = FilterCollection(hs, {})
  142. async def get_user_filter(
  143. self, user_localpart: str, filter_id: Union[int, str]
  144. ) -> "FilterCollection":
  145. result = await self.store.get_user_filter(user_localpart, filter_id)
  146. return FilterCollection(self._hs, result)
  147. def add_user_filter(
  148. self, user_localpart: str, user_filter: JsonDict
  149. ) -> Awaitable[int]:
  150. self.check_valid_filter(user_filter)
  151. return self.store.add_user_filter(user_localpart, user_filter)
  152. # TODO(paul): surely we should probably add a delete_user_filter or
  153. # replace_user_filter at some point? There's no REST API specified for
  154. # them however
  155. def check_valid_filter(self, user_filter_json: JsonDict) -> None:
  156. """Check if the provided filter is valid.
  157. This inspects all definitions contained within the filter.
  158. Args:
  159. user_filter_json: The filter
  160. Raises:
  161. SynapseError: If the filter is not valid.
  162. """
  163. # NB: Filters are the complete json blobs. "Definitions" are an
  164. # individual top-level key e.g. public_user_data. Filters are made of
  165. # many definitions.
  166. try:
  167. jsonschema.validate(
  168. user_filter_json, USER_FILTER_SCHEMA, format_checker=FormatChecker()
  169. )
  170. except jsonschema.ValidationError as e:
  171. raise SynapseError(400, str(e))
  172. # Filters work across events, presence EDUs, and account data.
  173. FilterEvent = TypeVar("FilterEvent", EventBase, UserPresenceState, JsonDict)
  174. class FilterCollection:
  175. def __init__(self, hs: "HomeServer", filter_json: JsonDict):
  176. self._filter_json = filter_json
  177. room_filter_json = self._filter_json.get("room", {})
  178. self._room_filter = Filter(
  179. hs,
  180. {k: v for k, v in room_filter_json.items() if k in ("rooms", "not_rooms")},
  181. )
  182. self._room_timeline_filter = Filter(hs, room_filter_json.get("timeline", {}))
  183. self._room_state_filter = Filter(hs, room_filter_json.get("state", {}))
  184. self._room_ephemeral_filter = Filter(hs, room_filter_json.get("ephemeral", {}))
  185. self._room_account_data = Filter(hs, room_filter_json.get("account_data", {}))
  186. self._presence_filter = Filter(hs, filter_json.get("presence", {}))
  187. self._account_data = Filter(hs, filter_json.get("account_data", {}))
  188. self.include_leave = filter_json.get("room", {}).get("include_leave", False)
  189. self.event_fields = filter_json.get("event_fields", [])
  190. self.event_format = filter_json.get("event_format", "client")
  191. def __repr__(self) -> str:
  192. return "<FilterCollection %s>" % (json.dumps(self._filter_json),)
  193. def get_filter_json(self) -> JsonDict:
  194. return self._filter_json
  195. def timeline_limit(self) -> int:
  196. return self._room_timeline_filter.limit
  197. def presence_limit(self) -> int:
  198. return self._presence_filter.limit
  199. def ephemeral_limit(self) -> int:
  200. return self._room_ephemeral_filter.limit
  201. def lazy_load_members(self) -> bool:
  202. return self._room_state_filter.lazy_load_members
  203. def include_redundant_members(self) -> bool:
  204. return self._room_state_filter.include_redundant_members
  205. async def filter_presence(
  206. self, events: Iterable[UserPresenceState]
  207. ) -> List[UserPresenceState]:
  208. return await self._presence_filter.filter(events)
  209. async def filter_account_data(self, events: Iterable[JsonDict]) -> List[JsonDict]:
  210. return await self._account_data.filter(events)
  211. async def filter_room_state(self, events: Iterable[EventBase]) -> List[EventBase]:
  212. return await self._room_state_filter.filter(
  213. await self._room_filter.filter(events)
  214. )
  215. async def filter_room_timeline(
  216. self, events: Iterable[EventBase]
  217. ) -> List[EventBase]:
  218. return await self._room_timeline_filter.filter(
  219. await self._room_filter.filter(events)
  220. )
  221. async def filter_room_ephemeral(self, events: Iterable[JsonDict]) -> List[JsonDict]:
  222. return await self._room_ephemeral_filter.filter(
  223. await self._room_filter.filter(events)
  224. )
  225. async def filter_room_account_data(
  226. self, events: Iterable[JsonDict]
  227. ) -> List[JsonDict]:
  228. return await self._room_account_data.filter(
  229. await self._room_filter.filter(events)
  230. )
  231. def blocks_all_presence(self) -> bool:
  232. return (
  233. self._presence_filter.filters_all_types()
  234. or self._presence_filter.filters_all_senders()
  235. )
  236. def blocks_all_room_ephemeral(self) -> bool:
  237. return (
  238. self._room_ephemeral_filter.filters_all_types()
  239. or self._room_ephemeral_filter.filters_all_senders()
  240. or self._room_ephemeral_filter.filters_all_rooms()
  241. )
  242. def blocks_all_room_timeline(self) -> bool:
  243. return (
  244. self._room_timeline_filter.filters_all_types()
  245. or self._room_timeline_filter.filters_all_senders()
  246. or self._room_timeline_filter.filters_all_rooms()
  247. )
  248. class Filter:
  249. def __init__(self, hs: "HomeServer", filter_json: JsonDict):
  250. self._hs = hs
  251. self._store = hs.get_datastores().main
  252. self.filter_json = filter_json
  253. self.limit = filter_json.get("limit", 10)
  254. self.lazy_load_members = filter_json.get("lazy_load_members", False)
  255. self.include_redundant_members = filter_json.get(
  256. "include_redundant_members", False
  257. )
  258. self.types = filter_json.get("types", None)
  259. self.not_types = filter_json.get("not_types", [])
  260. self.rooms = filter_json.get("rooms", None)
  261. self.not_rooms = filter_json.get("not_rooms", [])
  262. self.senders = filter_json.get("senders", None)
  263. self.not_senders = filter_json.get("not_senders", [])
  264. self.contains_url = filter_json.get("contains_url", None)
  265. self.labels = filter_json.get("org.matrix.labels", None)
  266. self.not_labels = filter_json.get("org.matrix.not_labels", [])
  267. self.related_by_senders = self.filter_json.get("related_by_senders", None)
  268. self.related_by_rel_types = self.filter_json.get("related_by_rel_types", None)
  269. def filters_all_types(self) -> bool:
  270. return "*" in self.not_types
  271. def filters_all_senders(self) -> bool:
  272. return "*" in self.not_senders
  273. def filters_all_rooms(self) -> bool:
  274. return "*" in self.not_rooms
  275. def _check(self, event: FilterEvent) -> bool:
  276. """Checks whether the filter matches the given event.
  277. Args:
  278. event: The event, account data, or presence to check against this
  279. filter.
  280. Returns:
  281. True if the event matches the filter.
  282. """
  283. # We usually get the full "events" as dictionaries coming through,
  284. # except for presence which actually gets passed around as its own type.
  285. if isinstance(event, UserPresenceState):
  286. user_id = event.user_id
  287. field_matchers = {
  288. "senders": lambda v: user_id == v,
  289. "types": lambda v: EduTypes.PRESENCE == v,
  290. }
  291. return self._check_fields(field_matchers)
  292. else:
  293. content = event.get("content")
  294. # Content is assumed to be a mapping below, so ensure it is. This should
  295. # always be true for events, but account_data has been allowed to
  296. # have non-dict content.
  297. if not isinstance(content, Mapping):
  298. content = {}
  299. sender = event.get("sender", None)
  300. if not sender:
  301. # Presence events had their 'sender' in content.user_id, but are
  302. # now handled above. We don't know if anything else uses this
  303. # form. TODO: Check this and probably remove it.
  304. sender = content.get("user_id")
  305. room_id = event.get("room_id", None)
  306. ev_type = event.get("type", None)
  307. # check if there is a string url field in the content for filtering purposes
  308. labels = content.get(EventContentFields.LABELS, [])
  309. field_matchers = {
  310. "rooms": lambda v: room_id == v,
  311. "senders": lambda v: sender == v,
  312. "types": lambda v: _matches_wildcard(ev_type, v),
  313. "labels": lambda v: v in labels,
  314. }
  315. result = self._check_fields(field_matchers)
  316. if not result:
  317. return result
  318. contains_url_filter = self.contains_url
  319. if contains_url_filter is not None:
  320. contains_url = isinstance(content.get("url"), str)
  321. if contains_url_filter != contains_url:
  322. return False
  323. return True
  324. def _check_fields(self, field_matchers: Dict[str, Callable[[str], bool]]) -> bool:
  325. """Checks whether the filter matches the given event fields.
  326. Args:
  327. field_matchers: A map of attribute name to callable to use for checking
  328. particular fields.
  329. The attribute name and an inverse (not_<attribute name>) must
  330. exist on the Filter.
  331. The callable should return true if the event's value matches the
  332. filter's value.
  333. Returns:
  334. True if the event fields match
  335. """
  336. for name, match_func in field_matchers.items():
  337. # If the event matches one of the disallowed values, reject it.
  338. not_name = "not_%s" % (name,)
  339. disallowed_values = getattr(self, not_name)
  340. if any(map(match_func, disallowed_values)):
  341. return False
  342. # Other the event does not match at least one of the allowed values,
  343. # reject it.
  344. allowed_values = getattr(self, name)
  345. if allowed_values is not None:
  346. if not any(map(match_func, allowed_values)):
  347. return False
  348. # Otherwise, accept it.
  349. return True
  350. def filter_rooms(self, room_ids: Iterable[str]) -> Set[str]:
  351. """Apply the 'rooms' filter to a given list of rooms.
  352. Args:
  353. room_ids: A list of room_ids.
  354. Returns:
  355. A list of room_ids that match the filter
  356. """
  357. room_ids = set(room_ids)
  358. disallowed_rooms = set(self.not_rooms)
  359. room_ids -= disallowed_rooms
  360. allowed_rooms = self.rooms
  361. if allowed_rooms is not None:
  362. room_ids &= set(allowed_rooms)
  363. return room_ids
  364. async def _check_event_relations(
  365. self, events: Collection[FilterEvent]
  366. ) -> List[FilterEvent]:
  367. # The event IDs to check, mypy doesn't understand the isinstance check.
  368. event_ids = [event.event_id for event in events if isinstance(event, EventBase)] # type: ignore[attr-defined]
  369. event_ids_to_keep = set(
  370. await self._store.events_have_relations(
  371. event_ids, self.related_by_senders, self.related_by_rel_types
  372. )
  373. )
  374. return [
  375. event
  376. for event in events
  377. if not isinstance(event, EventBase) or event.event_id in event_ids_to_keep
  378. ]
  379. async def filter(self, events: Iterable[FilterEvent]) -> List[FilterEvent]:
  380. result = [event for event in events if self._check(event)]
  381. if self.related_by_senders or self.related_by_rel_types:
  382. return await self._check_event_relations(result)
  383. return result
  384. def with_room_ids(self, room_ids: Iterable[str]) -> "Filter":
  385. """Returns a new filter with the given room IDs appended.
  386. Args:
  387. room_ids: The room_ids to add
  388. Returns:
  389. filter: A new filter including the given rooms and the old
  390. filter's rooms.
  391. """
  392. newFilter = Filter(self._hs, self.filter_json)
  393. newFilter.rooms += room_ids
  394. return newFilter
  395. def _matches_wildcard(actual_value: Optional[str], filter_value: str) -> bool:
  396. if filter_value.endswith("*") and isinstance(actual_value, str):
  397. type_prefix = filter_value[:-1]
  398. return actual_value.startswith(type_prefix)
  399. else:
  400. return actual_value == filter_value