263 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			263 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			Python
		
	
	
# Copyright 2014-2016 OpenMarket Ltd
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
import collections.abc
 | 
						|
from typing import Iterable, Union
 | 
						|
 | 
						|
import jsonschema
 | 
						|
 | 
						|
from synapse.api.constants import MAX_ALIAS_LENGTH, EventTypes, Membership
 | 
						|
from synapse.api.errors import Codes, SynapseError
 | 
						|
from synapse.api.room_versions import EventFormatVersions
 | 
						|
from synapse.config.homeserver import HomeServerConfig
 | 
						|
from synapse.events import EventBase
 | 
						|
from synapse.events.builder import EventBuilder
 | 
						|
from synapse.events.utils import (
 | 
						|
    CANONICALJSON_MAX_INT,
 | 
						|
    CANONICALJSON_MIN_INT,
 | 
						|
    validate_canonicaljson,
 | 
						|
)
 | 
						|
from synapse.federation.federation_server import server_matches_acl_event
 | 
						|
from synapse.types import EventID, JsonDict, RoomID, UserID
 | 
						|
 | 
						|
 | 
						|
class EventValidator:
 | 
						|
    def validate_new(self, event: EventBase, config: HomeServerConfig) -> None:
 | 
						|
        """Validates the event has roughly the right format
 | 
						|
 | 
						|
        Args:
 | 
						|
            event: The event to validate.
 | 
						|
            config: The homeserver's configuration.
 | 
						|
        """
 | 
						|
        self.validate_builder(event)
 | 
						|
 | 
						|
        if event.format_version == EventFormatVersions.V1:
 | 
						|
            EventID.from_string(event.event_id)
 | 
						|
 | 
						|
        required = [
 | 
						|
            "auth_events",
 | 
						|
            "content",
 | 
						|
            "hashes",
 | 
						|
            "origin",
 | 
						|
            "prev_events",
 | 
						|
            "sender",
 | 
						|
            "type",
 | 
						|
        ]
 | 
						|
 | 
						|
        for k in required:
 | 
						|
            if k not in event:
 | 
						|
                raise SynapseError(400, "Event does not have key %s" % (k,))
 | 
						|
 | 
						|
        # Check that the following keys have string values
 | 
						|
        event_strings = ["origin"]
 | 
						|
 | 
						|
        for s in event_strings:
 | 
						|
            if not isinstance(getattr(event, s), str):
 | 
						|
                raise SynapseError(400, "'%s' not a string type" % (s,))
 | 
						|
 | 
						|
        # Depending on the room version, ensure the data is spec compliant JSON.
 | 
						|
        if event.room_version.strict_canonicaljson:
 | 
						|
            # Note that only the client controlled portion of the event is
 | 
						|
            # checked, since we trust the portions of the event we created.
 | 
						|
            validate_canonicaljson(event.content)
 | 
						|
 | 
						|
        if event.type == EventTypes.Aliases:
 | 
						|
            if "aliases" in event.content:
 | 
						|
                for alias in event.content["aliases"]:
 | 
						|
                    if len(alias) > MAX_ALIAS_LENGTH:
 | 
						|
                        raise SynapseError(
 | 
						|
                            400,
 | 
						|
                            (
 | 
						|
                                "Can't create aliases longer than"
 | 
						|
                                " %d characters" % (MAX_ALIAS_LENGTH,)
 | 
						|
                            ),
 | 
						|
                            Codes.INVALID_PARAM,
 | 
						|
                        )
 | 
						|
 | 
						|
        if event.type == EventTypes.Retention:
 | 
						|
            self._validate_retention(event)
 | 
						|
 | 
						|
        if event.type == EventTypes.ServerACL:
 | 
						|
            if not server_matches_acl_event(config.server.server_name, event):
 | 
						|
                raise SynapseError(
 | 
						|
                    400, "Can't create an ACL event that denies the local server"
 | 
						|
                )
 | 
						|
 | 
						|
        if event.type == EventTypes.PowerLevels:
 | 
						|
            try:
 | 
						|
                jsonschema.validate(
 | 
						|
                    instance=event.content,
 | 
						|
                    schema=POWER_LEVELS_SCHEMA,
 | 
						|
                    cls=plValidator,
 | 
						|
                )
 | 
						|
            except jsonschema.ValidationError as e:
 | 
						|
                if e.path:
 | 
						|
                    # example: "users_default": '0' is not of type 'integer'
 | 
						|
                    message = '"' + e.path[-1] + '": ' + e.message  # noqa: B306
 | 
						|
                    # jsonschema.ValidationError.message is a valid attribute
 | 
						|
                else:
 | 
						|
                    # example: '0' is not of type 'integer'
 | 
						|
                    message = e.message  # noqa: B306
 | 
						|
                    # jsonschema.ValidationError.message is a valid attribute
 | 
						|
 | 
						|
                raise SynapseError(
 | 
						|
                    code=400,
 | 
						|
                    msg=message,
 | 
						|
                    errcode=Codes.BAD_JSON,
 | 
						|
                )
 | 
						|
 | 
						|
    def _validate_retention(self, event: EventBase) -> None:
 | 
						|
        """Checks that an event that defines the retention policy for a room respects the
 | 
						|
        format enforced by the spec.
 | 
						|
 | 
						|
        Args:
 | 
						|
            event: The event to validate.
 | 
						|
        """
 | 
						|
        if not event.is_state():
 | 
						|
            raise SynapseError(code=400, msg="must be a state event")
 | 
						|
 | 
						|
        min_lifetime = event.content.get("min_lifetime")
 | 
						|
        max_lifetime = event.content.get("max_lifetime")
 | 
						|
 | 
						|
        if min_lifetime is not None:
 | 
						|
            if not isinstance(min_lifetime, int):
 | 
						|
                raise SynapseError(
 | 
						|
                    code=400,
 | 
						|
                    msg="'min_lifetime' must be an integer",
 | 
						|
                    errcode=Codes.BAD_JSON,
 | 
						|
                )
 | 
						|
 | 
						|
        if max_lifetime is not None:
 | 
						|
            if not isinstance(max_lifetime, int):
 | 
						|
                raise SynapseError(
 | 
						|
                    code=400,
 | 
						|
                    msg="'max_lifetime' must be an integer",
 | 
						|
                    errcode=Codes.BAD_JSON,
 | 
						|
                )
 | 
						|
 | 
						|
        if (
 | 
						|
            min_lifetime is not None
 | 
						|
            and max_lifetime is not None
 | 
						|
            and min_lifetime > max_lifetime
 | 
						|
        ):
 | 
						|
            raise SynapseError(
 | 
						|
                code=400,
 | 
						|
                msg="'min_lifetime' can't be greater than 'max_lifetime",
 | 
						|
                errcode=Codes.BAD_JSON,
 | 
						|
            )
 | 
						|
 | 
						|
    def validate_builder(self, event: Union[EventBase, EventBuilder]) -> None:
 | 
						|
        """Validates that the builder/event has roughly the right format. Only
 | 
						|
        checks values that we expect a proto event to have, rather than all the
 | 
						|
        fields an event would have
 | 
						|
        """
 | 
						|
 | 
						|
        strings = ["room_id", "sender", "type"]
 | 
						|
 | 
						|
        if hasattr(event, "state_key"):
 | 
						|
            strings.append("state_key")
 | 
						|
 | 
						|
        for s in strings:
 | 
						|
            if not isinstance(getattr(event, s), str):
 | 
						|
                raise SynapseError(400, "Not '%s' a string type" % (s,))
 | 
						|
 | 
						|
        RoomID.from_string(event.room_id)
 | 
						|
        UserID.from_string(event.sender)
 | 
						|
 | 
						|
        if event.type == EventTypes.Message:
 | 
						|
            strings = ["body", "msgtype"]
 | 
						|
 | 
						|
            self._ensure_strings(event.content, strings)
 | 
						|
 | 
						|
        elif event.type == EventTypes.Topic:
 | 
						|
            self._ensure_strings(event.content, ["topic"])
 | 
						|
            self._ensure_state_event(event)
 | 
						|
        elif event.type == EventTypes.Name:
 | 
						|
            self._ensure_strings(event.content, ["name"])
 | 
						|
            self._ensure_state_event(event)
 | 
						|
        elif event.type == EventTypes.Member:
 | 
						|
            if "membership" not in event.content:
 | 
						|
                raise SynapseError(400, "Content has not membership key")
 | 
						|
 | 
						|
            if event.content["membership"] not in Membership.LIST:
 | 
						|
                raise SynapseError(400, "Invalid membership key")
 | 
						|
 | 
						|
            self._ensure_state_event(event)
 | 
						|
        elif event.type == EventTypes.Tombstone:
 | 
						|
            if "replacement_room" not in event.content:
 | 
						|
                raise SynapseError(400, "Content has no replacement_room key")
 | 
						|
 | 
						|
            if event.content["replacement_room"] == event.room_id:
 | 
						|
                raise SynapseError(
 | 
						|
                    400, "Tombstone cannot reference the room it was sent in"
 | 
						|
                )
 | 
						|
 | 
						|
            self._ensure_state_event(event)
 | 
						|
 | 
						|
    def _ensure_strings(self, d: JsonDict, keys: Iterable[str]) -> None:
 | 
						|
        for s in keys:
 | 
						|
            if s not in d:
 | 
						|
                raise SynapseError(400, "'%s' not in content" % (s,))
 | 
						|
            if not isinstance(d[s], str):
 | 
						|
                raise SynapseError(400, "'%s' not a string type" % (s,))
 | 
						|
 | 
						|
    def _ensure_state_event(self, event: Union[EventBase, EventBuilder]) -> None:
 | 
						|
        if not event.is_state():
 | 
						|
            raise SynapseError(400, "'%s' must be state events" % (event.type,))
 | 
						|
 | 
						|
 | 
						|
POWER_LEVELS_SCHEMA = {
 | 
						|
    "type": "object",
 | 
						|
    "properties": {
 | 
						|
        "ban": {"$ref": "#/definitions/int"},
 | 
						|
        "events": {"$ref": "#/definitions/objectOfInts"},
 | 
						|
        "events_default": {"$ref": "#/definitions/int"},
 | 
						|
        "invite": {"$ref": "#/definitions/int"},
 | 
						|
        "kick": {"$ref": "#/definitions/int"},
 | 
						|
        "notifications": {"$ref": "#/definitions/objectOfInts"},
 | 
						|
        "redact": {"$ref": "#/definitions/int"},
 | 
						|
        "state_default": {"$ref": "#/definitions/int"},
 | 
						|
        "users": {"$ref": "#/definitions/objectOfInts"},
 | 
						|
        "users_default": {"$ref": "#/definitions/int"},
 | 
						|
    },
 | 
						|
    "definitions": {
 | 
						|
        "int": {
 | 
						|
            "type": "integer",
 | 
						|
            "minimum": CANONICALJSON_MIN_INT,
 | 
						|
            "maximum": CANONICALJSON_MAX_INT,
 | 
						|
        },
 | 
						|
        "objectOfInts": {
 | 
						|
            "type": "object",
 | 
						|
            "additionalProperties": {"$ref": "#/definitions/int"},
 | 
						|
        },
 | 
						|
    },
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
# This could return something newer than Draft 7, but that's the current "latest"
 | 
						|
# validator.
 | 
						|
def _create_power_level_validator() -> jsonschema.Draft7Validator:
 | 
						|
    validator = jsonschema.validators.validator_for(POWER_LEVELS_SCHEMA)
 | 
						|
 | 
						|
    # by default jsonschema does not consider a frozendict to be an object so
 | 
						|
    # we need to use a custom type checker
 | 
						|
    # https://python-jsonschema.readthedocs.io/en/stable/validate/?highlight=object#validating-with-additional-types
 | 
						|
    type_checker = validator.TYPE_CHECKER.redefine(
 | 
						|
        "object", lambda checker, thing: isinstance(thing, collections.abc.Mapping)
 | 
						|
    )
 | 
						|
 | 
						|
    return jsonschema.validators.extend(validator, type_checker=type_checker)
 | 
						|
 | 
						|
 | 
						|
plValidator = _create_power_level_validator()
 |