2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2014-08-12 16:10:52 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
import logging
|
|
|
|
import string
|
2023-02-11 00:29:00 +01:00
|
|
|
from typing import TYPE_CHECKING, Iterable, List, Optional, Sequence
|
2018-07-09 08:09:20 +02:00
|
|
|
|
2022-10-17 14:39:12 +02:00
|
|
|
from typing_extensions import Literal
|
|
|
|
|
2019-05-08 18:01:30 +02:00
|
|
|
from synapse.api.constants import MAX_ALIAS_LENGTH, EventTypes
|
2018-09-17 14:19:00 +02:00
|
|
|
from synapse.api.errors import (
|
|
|
|
AuthError,
|
|
|
|
CodeMessageException,
|
|
|
|
Codes,
|
|
|
|
NotFoundError,
|
2021-07-15 11:35:46 +02:00
|
|
|
RequestSendFailed,
|
2020-08-24 19:58:56 +02:00
|
|
|
ShadowBanError,
|
2018-09-17 14:19:00 +02:00
|
|
|
StoreError,
|
|
|
|
SynapseError,
|
|
|
|
)
|
2020-03-04 17:30:46 +01:00
|
|
|
from synapse.appservice import ApplicationService
|
2022-06-13 20:16:16 +02:00
|
|
|
from synapse.module_api import NOT_SPAM
|
2021-04-29 13:17:28 +02:00
|
|
|
from synapse.storage.databases.main.directory import RoomAliasMapping
|
2022-08-24 21:15:37 +02:00
|
|
|
from synapse.types import JsonDict, Requester, RoomAlias
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2021-10-08 13:44:43 +02:00
|
|
|
class DirectoryHandler:
|
2021-04-29 13:17:28 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2021-10-08 13:44:43 +02:00
|
|
|
self.auth = hs.get_auth()
|
|
|
|
self.hs = hs
|
2016-03-17 12:09:03 +01:00
|
|
|
self.state = hs.get_state_handler()
|
2016-05-31 14:53:48 +02:00
|
|
|
self.appservice_handler = hs.get_application_service_handler()
|
2018-01-15 17:52:07 +01:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2022-06-01 17:02:53 +02:00
|
|
|
self._storage_controllers = hs.get_storage_controllers()
|
2018-10-17 17:14:04 +02:00
|
|
|
self.config = hs.config
|
2021-09-24 13:25:21 +02:00
|
|
|
self.enable_room_list_search = hs.config.roomdirectory.enable_room_list_search
|
2021-09-29 12:44:15 +02:00
|
|
|
self.require_membership = hs.config.server.require_membership_for_aliases
|
2023-05-04 16:18:22 +02:00
|
|
|
self._third_party_event_rules = (
|
|
|
|
hs.get_module_api_callbacks().third_party_event_rules
|
|
|
|
)
|
2021-10-08 13:44:43 +02:00
|
|
|
self.server_name = hs.hostname
|
2016-03-17 12:09:03 +01:00
|
|
|
|
2018-03-13 14:26:52 +01:00
|
|
|
self.federation = hs.get_federation_client()
|
2018-03-12 17:17:08 +01:00
|
|
|
hs.get_federation_registry().register_query_handler(
|
2014-08-13 19:03:37 +02:00
|
|
|
"directory", self.on_directory_query
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-04-18 02:57:40 +02:00
|
|
|
self._spam_checker_module_callbacks = hs.get_module_api_callbacks().spam_checker
|
2017-10-04 11:47:54 +02:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
async def _create_association(
|
2020-03-04 17:30:46 +01:00
|
|
|
self,
|
|
|
|
room_alias: RoomAlias,
|
|
|
|
room_id: str,
|
|
|
|
servers: Optional[Iterable[str]] = None,
|
|
|
|
creator: Optional[str] = None,
|
2021-04-29 13:17:28 +02:00
|
|
|
) -> None:
|
2015-02-06 11:57:14 +01:00
|
|
|
# general association creation for both human users and app services
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2015-05-14 14:21:55 +02:00
|
|
|
for wchar in string.whitespace:
|
2019-01-30 11:53:17 +01:00
|
|
|
if wchar in room_alias.localpart:
|
|
|
|
raise SynapseError(400, "Invalid characters in room alias")
|
2015-05-14 14:21:55 +02:00
|
|
|
|
2022-05-18 13:46:06 +02:00
|
|
|
if ":" in room_alias.localpart:
|
|
|
|
raise SynapseError(400, "Invalid character in room alias localpart: ':'.")
|
|
|
|
|
2014-12-02 11:42:28 +01:00
|
|
|
if not self.hs.is_mine(room_alias):
|
2014-08-12 16:10:52 +02:00
|
|
|
raise SynapseError(400, "Room alias must be local")
|
|
|
|
# TODO(erikj): Change this.
|
|
|
|
|
|
|
|
# TODO(erikj): Add transactions.
|
|
|
|
# TODO(erikj): Check if there is a current association.
|
2014-09-03 17:04:21 +02:00
|
|
|
if not servers:
|
2022-11-01 16:02:39 +01:00
|
|
|
servers = await self._storage_controllers.state.get_current_hosts_in_room_or_partial_state_approximation(
|
2022-08-24 21:15:37 +02:00
|
|
|
room_id
|
|
|
|
)
|
2014-09-03 17:04:21 +02:00
|
|
|
|
|
|
|
if not servers:
|
|
|
|
raise SynapseError(400, "Failed to get server list")
|
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
await self.store.create_room_alias_association(
|
2019-06-20 11:32:02 +02:00
|
|
|
room_alias, room_id, servers, creator=creator
|
2014-11-18 16:03:01 +01:00
|
|
|
)
|
2014-09-05 22:35:56 +02:00
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
async def create_association(
|
2020-03-04 17:30:46 +01:00
|
|
|
self,
|
|
|
|
requester: Requester,
|
|
|
|
room_alias: RoomAlias,
|
|
|
|
room_id: str,
|
|
|
|
servers: Optional[List[str]] = None,
|
|
|
|
check_membership: bool = True,
|
2020-06-22 13:18:00 +02:00
|
|
|
) -> None:
|
2018-10-18 17:14:24 +02:00
|
|
|
"""Attempt to create a new alias
|
|
|
|
|
|
|
|
Args:
|
2020-03-04 17:30:46 +01:00
|
|
|
requester
|
|
|
|
room_alias
|
|
|
|
room_id
|
|
|
|
servers: Iterable of servers that others servers should try and join via
|
|
|
|
check_membership: Whether to check if the user is in the room
|
2019-05-02 10:21:29 +02:00
|
|
|
before the alias can be set (if the server's config requires it).
|
2018-10-18 17:14:24 +02:00
|
|
|
"""
|
|
|
|
|
|
|
|
user_id = requester.user.to_string()
|
2021-04-29 13:17:28 +02:00
|
|
|
room_alias_str = room_alias.to_string()
|
2018-10-18 17:14:24 +02:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
if len(room_alias_str) > MAX_ALIAS_LENGTH:
|
2019-05-02 10:21:29 +02:00
|
|
|
raise SynapseError(
|
|
|
|
400,
|
2019-05-08 18:01:30 +02:00
|
|
|
"Can't create aliases longer than %s characters" % MAX_ALIAS_LENGTH,
|
2019-05-02 10:21:29 +02:00
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
|
|
|
|
2018-10-18 17:14:24 +02:00
|
|
|
service = requester.app_service
|
|
|
|
if service:
|
2022-03-03 19:14:09 +01:00
|
|
|
if not service.is_room_alias_in_namespace(room_alias_str):
|
2018-10-18 17:14:24 +02:00
|
|
|
raise SynapseError(
|
2019-06-20 11:32:02 +02:00
|
|
|
400,
|
2019-11-21 13:00:14 +01:00
|
|
|
"This application service has not reserved this kind of alias.",
|
2019-06-20 11:32:02 +02:00
|
|
|
errcode=Codes.EXCLUSIVE,
|
2018-10-18 17:14:24 +02:00
|
|
|
)
|
|
|
|
else:
|
2020-04-01 14:27:05 +02:00
|
|
|
# Server admins are not subject to the same constraints as normal
|
|
|
|
# users when creating an alias (e.g. being in the room).
|
2022-08-22 15:17:59 +02:00
|
|
|
is_admin = await self.auth.is_server_admin(requester)
|
2020-04-01 14:27:05 +02:00
|
|
|
|
|
|
|
if (self.require_membership and check_membership) and not is_admin:
|
2020-05-01 16:15:36 +02:00
|
|
|
rooms_for_user = await self.store.get_rooms_for_user(user_id)
|
2019-05-02 10:21:29 +02:00
|
|
|
if room_id not in rooms_for_user:
|
|
|
|
raise AuthError(
|
2019-06-20 11:32:02 +02:00
|
|
|
403, "You must be in the room to create an alias for it"
|
2019-05-02 10:21:29 +02:00
|
|
|
)
|
|
|
|
|
2023-04-18 02:57:40 +02:00
|
|
|
spam_check = (
|
|
|
|
await self._spam_checker_module_callbacks.user_may_create_room_alias(
|
|
|
|
user_id, room_alias
|
|
|
|
)
|
2022-06-13 20:16:16 +02:00
|
|
|
)
|
2023-04-18 02:57:40 +02:00
|
|
|
if spam_check != self._spam_checker_module_callbacks.NOT_SPAM:
|
2022-06-13 20:16:16 +02:00
|
|
|
raise AuthError(
|
|
|
|
403,
|
|
|
|
"This user is not permitted to create this alias",
|
2022-07-11 18:52:10 +02:00
|
|
|
errcode=spam_check[0],
|
|
|
|
additional_fields=spam_check[1],
|
2022-06-13 20:16:16 +02:00
|
|
|
)
|
2015-02-06 11:57:14 +01:00
|
|
|
|
2021-09-24 13:25:21 +02:00
|
|
|
if not self.config.roomdirectory.is_alias_creation_allowed(
|
2021-04-29 13:17:28 +02:00
|
|
|
user_id, room_id, room_alias_str
|
2019-02-14 17:02:23 +01:00
|
|
|
):
|
2021-10-25 16:24:49 +02:00
|
|
|
# Let's just return a generic message, as there may be all sorts of
|
2018-10-17 17:14:04 +02:00
|
|
|
# reasons why we said no. TODO: Allow configurable error messages
|
|
|
|
# per alias creation rule?
|
2019-06-20 11:32:02 +02:00
|
|
|
raise SynapseError(403, "Not allowed to create alias")
|
2018-10-17 17:14:04 +02:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
can_create = self.can_modify_alias(room_alias, user_id=user_id)
|
2018-10-18 17:14:24 +02:00
|
|
|
if not can_create:
|
|
|
|
raise AuthError(
|
2019-06-20 11:32:02 +02:00
|
|
|
400,
|
|
|
|
"This alias is reserved by an application service.",
|
|
|
|
errcode=Codes.EXCLUSIVE,
|
2018-10-18 17:14:24 +02:00
|
|
|
)
|
2017-10-04 11:47:54 +02:00
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
await self._create_association(room_alias, room_id, servers, creator=user_id)
|
2015-02-06 11:57:14 +01:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
async def delete_association(
|
|
|
|
self, requester: Requester, room_alias: RoomAlias
|
|
|
|
) -> str:
|
2018-10-26 16:11:35 +02:00
|
|
|
"""Remove an alias from the directory
|
2014-09-05 22:35:56 +02:00
|
|
|
|
2018-10-26 16:11:35 +02:00
|
|
|
(this is only meant for human users; AS users should call
|
|
|
|
delete_appservice_association)
|
|
|
|
|
|
|
|
Args:
|
2020-03-04 17:30:46 +01:00
|
|
|
requester
|
|
|
|
room_alias
|
2018-10-26 16:11:35 +02:00
|
|
|
|
|
|
|
Returns:
|
2020-06-22 13:18:00 +02:00
|
|
|
room id that the alias used to point to
|
2018-10-26 16:11:35 +02:00
|
|
|
|
|
|
|
Raises:
|
|
|
|
NotFoundError: if the alias doesn't exist
|
|
|
|
|
|
|
|
AuthError: if the user doesn't have perms to delete the alias (ie, the user
|
|
|
|
is neither the creator of the alias, nor a server admin.
|
|
|
|
|
|
|
|
SynapseError: if the alias belongs to an AS
|
|
|
|
"""
|
2018-10-18 17:14:24 +02:00
|
|
|
user_id = requester.user.to_string()
|
|
|
|
|
2018-09-17 14:19:00 +02:00
|
|
|
try:
|
2022-08-22 15:17:59 +02:00
|
|
|
can_delete = await self._user_can_delete_alias(room_alias, requester)
|
2018-09-17 14:19:00 +02:00
|
|
|
except StoreError as e:
|
|
|
|
if e.code == 404:
|
|
|
|
raise NotFoundError("Unknown room alias")
|
|
|
|
raise
|
|
|
|
|
2016-03-01 15:46:31 +01:00
|
|
|
if not can_delete:
|
2019-06-20 11:32:02 +02:00
|
|
|
raise AuthError(403, "You don't have permission to delete the alias.")
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
can_delete = self.can_modify_alias(room_alias, user_id=user_id)
|
2015-02-09 16:01:28 +01:00
|
|
|
if not can_delete:
|
2015-02-05 17:29:56 +01:00
|
|
|
raise SynapseError(
|
2019-06-20 11:32:02 +02:00
|
|
|
400,
|
|
|
|
"This alias is reserved by an application service.",
|
|
|
|
errcode=Codes.EXCLUSIVE,
|
2015-02-05 17:29:56 +01:00
|
|
|
)
|
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
room_id = await self._delete_association(room_alias)
|
2021-11-12 20:56:00 +01:00
|
|
|
if room_id is None:
|
|
|
|
# It's possible someone else deleted the association after the
|
|
|
|
# checks above, but before we did the deletion.
|
|
|
|
raise NotFoundError("Unknown room alias")
|
2016-03-17 12:09:03 +01:00
|
|
|
|
|
|
|
try:
|
2020-05-01 16:15:36 +02:00
|
|
|
await self._update_canonical_alias(requester, user_id, room_id, room_alias)
|
2020-08-24 19:58:56 +02:00
|
|
|
except ShadowBanError as e:
|
|
|
|
logger.info("Failed to update alias events due to shadow-ban: %s", e)
|
2016-03-17 12:09:03 +01:00
|
|
|
except AuthError as e:
|
|
|
|
logger.info("Failed to update alias events: %s", e)
|
|
|
|
|
2019-07-23 15:00:55 +02:00
|
|
|
return room_id
|
2015-02-06 12:32:07 +01:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
async def delete_appservice_association(
|
2020-03-04 17:30:46 +01:00
|
|
|
self, service: ApplicationService, room_alias: RoomAlias
|
2021-04-29 13:17:28 +02:00
|
|
|
) -> None:
|
2022-03-03 19:14:09 +01:00
|
|
|
if not service.is_room_alias_in_namespace(room_alias.to_string()):
|
2015-02-06 12:32:07 +01:00
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"This application service has not reserved this kind of alias",
|
2019-06-20 11:32:02 +02:00
|
|
|
errcode=Codes.EXCLUSIVE,
|
2015-02-06 12:32:07 +01:00
|
|
|
)
|
2020-06-22 13:18:00 +02:00
|
|
|
await self._delete_association(room_alias)
|
2015-02-06 12:32:07 +01:00
|
|
|
|
2021-11-12 20:56:00 +01:00
|
|
|
async def _delete_association(self, room_alias: RoomAlias) -> Optional[str]:
|
2015-02-06 12:32:07 +01:00
|
|
|
if not self.hs.is_mine(room_alias):
|
|
|
|
raise SynapseError(400, "Room alias must be local")
|
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
room_id = await self.store.delete_room_alias(room_alias)
|
2014-09-05 22:35:56 +02:00
|
|
|
|
2019-07-23 15:00:55 +02:00
|
|
|
return room_id
|
2015-02-06 12:32:07 +01:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
async def get_association(self, room_alias: RoomAlias) -> JsonDict:
|
2014-08-12 16:10:52 +02:00
|
|
|
room_id = None
|
2014-12-02 11:42:28 +01:00
|
|
|
if self.hs.is_mine(room_alias):
|
2021-07-16 19:22:36 +02:00
|
|
|
result: Optional[
|
|
|
|
RoomAliasMapping
|
|
|
|
] = await self.get_association_from_room_alias(room_alias)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
if result:
|
|
|
|
room_id = result.room_id
|
|
|
|
servers = result.servers
|
2014-08-13 19:03:37 +02:00
|
|
|
else:
|
2014-11-21 16:11:48 +01:00
|
|
|
try:
|
2021-10-27 18:27:23 +02:00
|
|
|
fed_result: Optional[JsonDict] = await self.federation.make_query(
|
2014-11-21 16:11:48 +01:00
|
|
|
destination=room_alias.domain,
|
|
|
|
query_type="directory",
|
2019-06-20 11:32:02 +02:00
|
|
|
args={"room_alias": room_alias.to_string()},
|
2014-11-21 16:11:48 +01:00
|
|
|
retry_on_dns_fail=False,
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff=True,
|
2014-11-21 16:11:48 +01:00
|
|
|
)
|
2021-07-15 11:35:46 +02:00
|
|
|
except RequestSendFailed:
|
|
|
|
raise SynapseError(502, "Failed to fetch alias")
|
2014-11-21 16:11:48 +01:00
|
|
|
except CodeMessageException as e:
|
2019-11-01 13:03:44 +01:00
|
|
|
logging.warning("Error retrieving alias")
|
2014-11-21 16:11:48 +01:00
|
|
|
if e.code == 404:
|
2021-04-29 13:17:28 +02:00
|
|
|
fed_result = None
|
2014-11-21 16:11:48 +01:00
|
|
|
else:
|
2021-07-15 11:35:46 +02:00
|
|
|
raise SynapseError(502, "Failed to fetch alias")
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
if fed_result and "room_id" in fed_result and "servers" in fed_result:
|
|
|
|
room_id = fed_result["room_id"]
|
|
|
|
servers = fed_result["servers"]
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
if not room_id:
|
2014-11-21 16:11:48 +01:00
|
|
|
raise SynapseError(
|
|
|
|
404,
|
2015-02-24 16:00:12 +01:00
|
|
|
"Room alias %s not found" % (room_alias.to_string(),),
|
2019-06-20 11:32:02 +02:00
|
|
|
Codes.NOT_FOUND,
|
2014-11-21 16:11:48 +01:00
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2022-11-01 16:02:39 +01:00
|
|
|
extra_servers = await self._storage_controllers.state.get_current_hosts_in_room_or_partial_state_approximation(
|
2022-08-24 21:15:37 +02:00
|
|
|
room_id
|
|
|
|
)
|
2021-12-30 19:47:12 +01:00
|
|
|
servers_set = set(extra_servers) | set(servers)
|
2015-02-04 16:02:23 +01:00
|
|
|
|
|
|
|
# If this server is in the list of servers, return it first.
|
2021-12-30 19:47:12 +01:00
|
|
|
if self.server_name in servers_set:
|
|
|
|
servers = [self.server_name] + [
|
|
|
|
s for s in servers_set if s != self.server_name
|
|
|
|
]
|
2015-02-04 16:02:23 +01:00
|
|
|
else:
|
2021-12-30 19:47:12 +01:00
|
|
|
servers = list(servers_set)
|
2014-09-03 17:04:21 +02:00
|
|
|
|
2019-07-23 15:00:55 +02:00
|
|
|
return {"room_id": room_id, "servers": servers}
|
2014-08-13 19:03:37 +02:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
async def on_directory_query(self, args: JsonDict) -> JsonDict:
|
2015-01-23 14:21:58 +01:00
|
|
|
room_alias = RoomAlias.from_string(args["room_alias"])
|
2014-12-02 11:42:28 +01:00
|
|
|
if not self.hs.is_mine(room_alias):
|
2019-11-12 14:08:12 +01:00
|
|
|
raise SynapseError(400, "Room Alias is not hosted on this homeserver")
|
2014-08-13 19:03:37 +02:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
result = await self.get_association_from_room_alias(room_alias)
|
2014-08-13 19:03:37 +02:00
|
|
|
|
2014-11-19 18:14:14 +01:00
|
|
|
if result is not None:
|
2019-07-23 15:00:55 +02:00
|
|
|
return {"room_id": result.room_id, "servers": result.servers}
|
2014-11-19 18:14:14 +01:00
|
|
|
else:
|
2014-11-20 18:26:36 +01:00
|
|
|
raise SynapseError(
|
2014-11-21 16:11:48 +01:00
|
|
|
404,
|
|
|
|
"Room alias %r not found" % (room_alias.to_string(),),
|
2019-06-20 11:32:02 +02:00
|
|
|
Codes.NOT_FOUND,
|
2014-11-20 18:26:36 +01:00
|
|
|
)
|
2014-09-30 12:31:22 +02:00
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
async def _update_canonical_alias(
|
2020-03-04 17:30:46 +01:00
|
|
|
self, requester: Requester, user_id: str, room_id: str, room_alias: RoomAlias
|
2021-04-29 13:17:28 +02:00
|
|
|
) -> None:
|
2020-02-18 13:29:44 +01:00
|
|
|
"""
|
|
|
|
Send an updated canonical alias event if the removed alias was set as
|
|
|
|
the canonical alias or listed in the alt_aliases field.
|
2020-08-24 19:58:56 +02:00
|
|
|
|
|
|
|
Raises:
|
|
|
|
ShadowBanError if the requester has been shadow-banned.
|
2020-02-18 13:29:44 +01:00
|
|
|
"""
|
2022-06-06 10:24:12 +02:00
|
|
|
alias_event = await self._storage_controllers.state.get_current_state_event(
|
2016-03-17 12:09:03 +01:00
|
|
|
room_id, EventTypes.CanonicalAlias, ""
|
|
|
|
)
|
|
|
|
|
2020-02-18 13:29:44 +01:00
|
|
|
# There is no canonical alias, nothing to do.
|
|
|
|
if not alias_event:
|
2016-03-17 12:09:03 +01:00
|
|
|
return
|
|
|
|
|
2020-02-18 13:29:44 +01:00
|
|
|
# Obtain a mutable version of the event content.
|
|
|
|
content = dict(alias_event.content)
|
|
|
|
send_update = False
|
|
|
|
|
|
|
|
# Remove the alias property if it matches the removed alias.
|
|
|
|
alias_str = room_alias.to_string()
|
|
|
|
if alias_event.content.get("alias", "") == alias_str:
|
|
|
|
send_update = True
|
|
|
|
content.pop("alias", "")
|
|
|
|
|
2020-03-03 13:12:45 +01:00
|
|
|
# Filter the alt_aliases property for the removed alias. Note that the
|
|
|
|
# value is not modified if alt_aliases is of an unexpected form.
|
|
|
|
alt_aliases = content.get("alt_aliases")
|
|
|
|
if isinstance(alt_aliases, (list, tuple)) and alias_str in alt_aliases:
|
2020-02-18 13:29:44 +01:00
|
|
|
send_update = True
|
|
|
|
alt_aliases = [alias for alias in alt_aliases if alias != alias_str]
|
2020-03-03 13:12:45 +01:00
|
|
|
|
2020-02-18 13:29:44 +01:00
|
|
|
if alt_aliases:
|
|
|
|
content["alt_aliases"] = alt_aliases
|
2020-03-03 13:12:45 +01:00
|
|
|
else:
|
|
|
|
del content["alt_aliases"]
|
2020-02-18 13:29:44 +01:00
|
|
|
|
|
|
|
if send_update:
|
2020-05-01 16:15:36 +02:00
|
|
|
await self.event_creation_handler.create_and_send_nonmember_event(
|
2020-02-18 13:29:44 +01:00
|
|
|
requester,
|
|
|
|
{
|
|
|
|
"type": EventTypes.CanonicalAlias,
|
|
|
|
"state_key": "",
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": user_id,
|
|
|
|
"content": content,
|
|
|
|
},
|
|
|
|
ratelimit=False,
|
|
|
|
)
|
2016-03-17 12:09:03 +01:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
async def get_association_from_room_alias(
|
|
|
|
self, room_alias: RoomAlias
|
|
|
|
) -> Optional[RoomAliasMapping]:
|
2020-06-22 13:18:00 +02:00
|
|
|
result = await self.store.get_association_from_room_alias(room_alias)
|
2015-02-05 17:29:56 +01:00
|
|
|
if not result:
|
|
|
|
# Query AS to see if it exists
|
2016-05-31 14:53:48 +02:00
|
|
|
as_handler = self.appservice_handler
|
2020-06-22 13:18:00 +02:00
|
|
|
result = await as_handler.query_room_alias_exists(room_alias)
|
2019-07-23 15:00:55 +02:00
|
|
|
return result
|
2015-02-05 17:29:56 +01:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
def can_modify_alias(self, alias: RoomAlias, user_id: Optional[str] = None) -> bool:
|
2015-02-27 14:51:41 +01:00
|
|
|
# Any application service "interested" in an alias they are regexing on
|
|
|
|
# can modify the alias.
|
|
|
|
# Users can only modify the alias if ALL the interested services have
|
|
|
|
# non-exclusive locks on the alias (or there are no interested services)
|
2016-10-06 10:43:32 +02:00
|
|
|
services = self.store.get_app_services()
|
2015-02-05 17:29:56 +01:00
|
|
|
interested_services = [
|
2022-03-03 19:14:09 +01:00
|
|
|
s for s in services if s.is_room_alias_in_namespace(alias.to_string())
|
2015-02-05 17:29:56 +01:00
|
|
|
]
|
2015-02-27 14:51:41 +01:00
|
|
|
|
2015-02-09 16:01:28 +01:00
|
|
|
for service in interested_services:
|
|
|
|
if user_id == service.sender:
|
2015-02-27 14:51:41 +01:00
|
|
|
# this user IS the app service so they can do whatever they like
|
2020-06-22 13:18:00 +02:00
|
|
|
return True
|
2015-02-27 14:51:41 +01:00
|
|
|
elif service.is_exclusive_alias(alias.to_string()):
|
|
|
|
# another service has an exclusive lock on this alias.
|
2020-06-22 13:18:00 +02:00
|
|
|
return False
|
2015-02-27 14:51:41 +01:00
|
|
|
# either no interested services, or no service with an exclusive lock
|
2020-06-22 13:18:00 +02:00
|
|
|
return True
|
2016-03-01 15:46:31 +01:00
|
|
|
|
2022-08-22 15:17:59 +02:00
|
|
|
async def _user_can_delete_alias(
|
|
|
|
self, alias: RoomAlias, requester: Requester
|
|
|
|
) -> bool:
|
2020-03-04 17:30:46 +01:00
|
|
|
"""Determine whether a user can delete an alias.
|
|
|
|
|
|
|
|
One of the following must be true:
|
|
|
|
|
|
|
|
1. The user created the alias.
|
|
|
|
2. The user is a server administrator.
|
|
|
|
3. The user has a power-level sufficient to send a canonical alias event
|
|
|
|
for the current room.
|
|
|
|
|
|
|
|
"""
|
2020-05-01 16:15:36 +02:00
|
|
|
creator = await self.store.get_room_alias_creator(alias.to_string())
|
2016-03-01 15:46:31 +01:00
|
|
|
|
2022-08-22 15:17:59 +02:00
|
|
|
if creator == requester.user.to_string():
|
2019-07-23 15:00:55 +02:00
|
|
|
return True
|
2016-03-01 15:46:31 +01:00
|
|
|
|
2020-03-04 17:30:46 +01:00
|
|
|
# Resolve the alias to the corresponding room.
|
2020-05-01 16:15:36 +02:00
|
|
|
room_mapping = await self.get_association(alias)
|
2020-03-04 17:30:46 +01:00
|
|
|
room_id = room_mapping["room_id"]
|
|
|
|
if not room_id:
|
|
|
|
return False
|
|
|
|
|
2022-08-22 15:17:59 +02:00
|
|
|
return await self.auth.check_can_change_room_list(room_id, requester)
|
2016-03-21 15:03:20 +01:00
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
async def edit_published_room_list(
|
2022-10-17 14:39:12 +02:00
|
|
|
self,
|
|
|
|
requester: Requester,
|
|
|
|
room_id: str,
|
|
|
|
visibility: Literal["public", "private"],
|
2021-04-29 13:17:28 +02:00
|
|
|
) -> None:
|
2016-03-22 11:41:44 +01:00
|
|
|
"""Edit the entry of the room in the published room list.
|
|
|
|
|
|
|
|
requester
|
2020-03-04 17:30:46 +01:00
|
|
|
room_id
|
|
|
|
visibility: "public" or "private"
|
2016-03-22 11:41:44 +01:00
|
|
|
"""
|
2019-02-14 17:02:23 +01:00
|
|
|
user_id = requester.user.to_string()
|
|
|
|
|
2023-04-18 02:57:40 +02:00
|
|
|
spam_check = await self._spam_checker_module_callbacks.user_may_publish_room(
|
|
|
|
user_id, room_id
|
|
|
|
)
|
2022-06-13 20:16:16 +02:00
|
|
|
if spam_check != NOT_SPAM:
|
2017-10-04 15:29:33 +02:00
|
|
|
raise AuthError(
|
2022-06-13 20:16:16 +02:00
|
|
|
403,
|
|
|
|
"This user is not permitted to publish rooms to the room list",
|
2022-07-11 18:52:10 +02:00
|
|
|
errcode=spam_check[0],
|
|
|
|
additional_fields=spam_check[1],
|
2017-10-04 15:29:33 +02:00
|
|
|
)
|
|
|
|
|
2016-03-21 15:03:20 +01:00
|
|
|
if requester.is_guest:
|
|
|
|
raise AuthError(403, "Guests cannot edit the published room list")
|
|
|
|
|
2019-03-20 15:30:36 +01:00
|
|
|
if visibility == "public" and not self.enable_room_list_search:
|
|
|
|
# The room list has been disabled.
|
|
|
|
raise AuthError(
|
2019-06-20 11:32:02 +02:00
|
|
|
403, "This user is not permitted to publish rooms to the room list"
|
2019-03-20 15:30:36 +01:00
|
|
|
)
|
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
room = await self.store.get_room(room_id)
|
2016-03-21 15:03:20 +01:00
|
|
|
if room is None:
|
|
|
|
raise SynapseError(400, "Unknown room")
|
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
can_change_room_list = await self.auth.check_can_change_room_list(
|
2022-08-22 15:17:59 +02:00
|
|
|
room_id, requester
|
2020-03-04 17:30:46 +01:00
|
|
|
)
|
|
|
|
if not can_change_room_list:
|
|
|
|
raise AuthError(
|
|
|
|
403,
|
|
|
|
"This server requires you to be a moderator in the room to"
|
|
|
|
" edit its room list entry",
|
|
|
|
)
|
2016-03-21 15:03:20 +01:00
|
|
|
|
2019-02-14 17:02:23 +01:00
|
|
|
making_public = visibility == "public"
|
2019-02-14 19:08:09 +01:00
|
|
|
if making_public:
|
2020-05-01 16:15:36 +02:00
|
|
|
room_aliases = await self.store.get_aliases_for_room(room_id)
|
2022-06-01 17:02:53 +02:00
|
|
|
canonical_alias = (
|
|
|
|
await self._storage_controllers.state.get_canonical_alias_for_room(
|
|
|
|
room_id
|
|
|
|
)
|
|
|
|
)
|
2019-02-14 19:08:09 +01:00
|
|
|
if canonical_alias:
|
2023-02-09 16:56:02 +01:00
|
|
|
# Ensure we do not mutate room_aliases.
|
2023-02-11 00:29:00 +01:00
|
|
|
room_aliases = list(room_aliases) + [canonical_alias]
|
2019-02-14 19:08:09 +01:00
|
|
|
|
2021-09-24 13:25:21 +02:00
|
|
|
if not self.config.roomdirectory.is_publishing_room_allowed(
|
2019-06-20 11:32:02 +02:00
|
|
|
user_id, room_id, room_aliases
|
2019-02-14 19:08:09 +01:00
|
|
|
):
|
2021-10-25 16:24:49 +02:00
|
|
|
# Let's just return a generic message, as there may be all sorts of
|
2019-02-14 19:08:09 +01:00
|
|
|
# reasons why we said no. TODO: Allow configurable error messages
|
|
|
|
# per alias creation rule?
|
2019-06-20 11:32:02 +02:00
|
|
|
raise SynapseError(403, "Not allowed to publish room")
|
2019-02-14 17:02:23 +01:00
|
|
|
|
2020-10-05 15:57:46 +02:00
|
|
|
# Check if publishing is blocked by a third party module
|
2023-02-22 21:29:09 +01:00
|
|
|
allowed_by_third_party_rules = (
|
|
|
|
await (
|
2023-05-04 16:18:22 +02:00
|
|
|
self._third_party_event_rules.check_visibility_can_be_modified(
|
2023-02-22 21:29:09 +01:00
|
|
|
room_id, visibility
|
|
|
|
)
|
2020-10-05 15:57:46 +02:00
|
|
|
)
|
|
|
|
)
|
|
|
|
if not allowed_by_third_party_rules:
|
|
|
|
raise SynapseError(403, "Not allowed to publish room")
|
|
|
|
|
2020-05-01 16:15:36 +02:00
|
|
|
await self.store.set_room_is_public(room_id, making_public)
|
2016-12-06 11:43:48 +01:00
|
|
|
|
2020-06-22 13:18:00 +02:00
|
|
|
async def edit_published_appservice_room_list(
|
2022-10-17 14:39:12 +02:00
|
|
|
self,
|
|
|
|
appservice_id: str,
|
|
|
|
network_id: str,
|
|
|
|
room_id: str,
|
|
|
|
visibility: Literal["public", "private"],
|
2021-04-29 13:17:28 +02:00
|
|
|
) -> None:
|
2016-12-07 10:58:33 +01:00
|
|
|
"""Add or remove a room from the appservice/network specific public
|
|
|
|
room list.
|
|
|
|
|
|
|
|
Args:
|
2020-03-04 17:30:46 +01:00
|
|
|
appservice_id: ID of the appservice that owns the list
|
|
|
|
network_id: The ID of the network the list is associated with
|
|
|
|
room_id
|
|
|
|
visibility: either "public" or "private"
|
2016-12-06 11:43:48 +01:00
|
|
|
"""
|
2020-06-22 13:18:00 +02:00
|
|
|
await self.store.set_room_is_public_appservice(
|
2016-12-06 11:43:48 +01:00
|
|
|
room_id, appservice_id, network_id, visibility == "public"
|
|
|
|
)
|
2020-02-18 17:23:25 +01:00
|
|
|
|
|
|
|
async def get_aliases_for_room(
|
|
|
|
self, requester: Requester, room_id: str
|
2023-02-11 00:29:00 +01:00
|
|
|
) -> Sequence[str]:
|
2020-02-18 17:23:25 +01:00
|
|
|
"""
|
|
|
|
Get a list of the aliases that currently point to this room on this server
|
|
|
|
"""
|
|
|
|
# allow access to server admins and current members of the room
|
2022-08-22 15:17:59 +02:00
|
|
|
is_admin = await self.auth.is_server_admin(requester)
|
2020-02-18 17:23:25 +01:00
|
|
|
if not is_admin:
|
2022-08-22 15:17:59 +02:00
|
|
|
await self.auth.check_user_in_room_or_world_readable(room_id, requester)
|
2020-02-18 17:23:25 +01:00
|
|
|
|
2021-04-29 13:17:28 +02:00
|
|
|
return await self.store.get_aliases_for_room(room_id)
|