2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2021-12-01 07:28:23 -05:00
|
|
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
2015-03-31 04:22:31 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
import logging
|
2022-04-11 12:07:23 -04:00
|
|
|
from typing import Any, Dict, List
|
2020-06-16 08:51:47 -04:00
|
|
|
from urllib import parse as urlparse
|
2016-05-17 06:28:58 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
import yaml
|
2018-06-28 15:31:53 -04:00
|
|
|
from netaddr import IPSet
|
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
from synapse.appservice import ApplicationService
|
2021-12-01 07:28:23 -05:00
|
|
|
from synapse.types import JsonDict, UserID
|
2016-05-17 06:28:58 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
from ._base import Config, ConfigError
|
2018-04-06 18:37:36 -04:00
|
|
|
|
2016-05-17 06:28:58 -04:00
|
|
|
logger = logging.getLogger(__name__)
|
2015-03-31 04:22:31 -04:00
|
|
|
|
|
|
|
|
|
|
|
class AppServiceConfig(Config):
|
2019-10-10 04:39:35 -04:00
|
|
|
section = "appservice"
|
|
|
|
|
2022-04-11 12:07:23 -04:00
|
|
|
def read_config(self, config: JsonDict, **kwargs: Any) -> None:
|
2015-04-29 23:24:44 -04:00
|
|
|
self.app_service_config_files = config.get("app_service_config_files", [])
|
2023-04-12 07:28:46 -04:00
|
|
|
if not isinstance(self.app_service_config_files, list) or not all(
|
|
|
|
type(x) is str for x in self.app_service_config_files
|
|
|
|
):
|
|
|
|
raise ConfigError(
|
|
|
|
"Expected '%s' to be a list of AS config files:"
|
|
|
|
% (self.app_service_config_files),
|
2023-05-18 05:58:13 -04:00
|
|
|
("app_service_config_files",),
|
2023-04-12 07:28:46 -04:00
|
|
|
)
|
|
|
|
|
2018-12-04 06:44:41 -05:00
|
|
|
self.track_appservice_user_ips = config.get("track_appservice_user_ips", False)
|
2023-08-03 14:43:51 -04:00
|
|
|
self.use_appservice_legacy_authorization = config.get(
|
|
|
|
"use_appservice_legacy_authorization", False
|
|
|
|
)
|
|
|
|
if self.use_appservice_legacy_authorization:
|
|
|
|
logger.warning(
|
|
|
|
"The use of appservice legacy authorization via query params is deprecated"
|
|
|
|
" and should be considered insecure."
|
|
|
|
)
|
2015-03-31 04:22:31 -04:00
|
|
|
|
2016-05-17 06:28:58 -04:00
|
|
|
|
2021-12-01 07:28:23 -05:00
|
|
|
def load_appservices(
|
|
|
|
hostname: str, config_files: List[str]
|
|
|
|
) -> List[ApplicationService]:
|
2016-05-17 06:28:58 -04:00
|
|
|
"""Returns a list of Application Services from the config files."""
|
|
|
|
|
|
|
|
# Dicts of value -> filename
|
2021-07-15 06:02:43 -04:00
|
|
|
seen_as_tokens: Dict[str, str] = {}
|
|
|
|
seen_ids: Dict[str, str] = {}
|
2016-05-17 06:28:58 -04:00
|
|
|
|
|
|
|
appservices = []
|
|
|
|
|
|
|
|
for config_file in config_files:
|
|
|
|
try:
|
2021-07-19 10:28:05 -04:00
|
|
|
with open(config_file) as f:
|
2019-06-20 05:32:02 -04:00
|
|
|
appservice = _load_appservice(hostname, yaml.safe_load(f), config_file)
|
2016-05-17 06:28:58 -04:00
|
|
|
if appservice.id in seen_ids:
|
|
|
|
raise ConfigError(
|
|
|
|
"Cannot reuse ID across application services: "
|
2019-06-20 05:32:02 -04:00
|
|
|
"%s (files: %s, %s)"
|
|
|
|
% (appservice.id, config_file, seen_ids[appservice.id])
|
2016-05-17 06:28:58 -04:00
|
|
|
)
|
|
|
|
seen_ids[appservice.id] = config_file
|
|
|
|
if appservice.token in seen_as_tokens:
|
|
|
|
raise ConfigError(
|
|
|
|
"Cannot reuse as_token across application services: "
|
2019-06-20 05:32:02 -04:00
|
|
|
"%s (files: %s, %s)"
|
|
|
|
% (
|
2016-05-17 06:28:58 -04:00
|
|
|
appservice.token,
|
|
|
|
config_file,
|
|
|
|
seen_as_tokens[appservice.token],
|
|
|
|
)
|
|
|
|
)
|
|
|
|
seen_as_tokens[appservice.token] = config_file
|
|
|
|
logger.info("Loaded application service: %s", appservice)
|
|
|
|
appservices.append(appservice)
|
|
|
|
except Exception as e:
|
|
|
|
logger.error("Failed to load appservice from '%s'", config_file)
|
|
|
|
logger.exception(e)
|
|
|
|
raise
|
|
|
|
return appservices
|
|
|
|
|
|
|
|
|
2021-12-01 07:28:23 -05:00
|
|
|
def _load_appservice(
|
|
|
|
hostname: str, as_info: JsonDict, config_filename: str
|
|
|
|
) -> ApplicationService:
|
2019-06-20 05:32:02 -04:00
|
|
|
required_string_fields = ["id", "as_token", "hs_token", "sender_localpart"]
|
2016-05-17 06:28:58 -04:00
|
|
|
for field in required_string_fields:
|
2020-06-16 08:51:47 -04:00
|
|
|
if not isinstance(as_info.get(field), str):
|
2019-06-20 05:32:02 -04:00
|
|
|
raise KeyError(
|
|
|
|
"Required string field: '%s' (%s)" % (field, config_filename)
|
|
|
|
)
|
2016-05-17 06:28:58 -04:00
|
|
|
|
2016-08-30 12:16:00 -04:00
|
|
|
# 'url' must either be a string or explicitly null, not missing
|
|
|
|
# to avoid accidentally turning off push for ASes.
|
2020-06-16 08:51:47 -04:00
|
|
|
if not isinstance(as_info.get("url"), str) and as_info.get("url", "") is not None:
|
2016-08-30 12:16:00 -04:00
|
|
|
raise KeyError(
|
|
|
|
"Required string field or explicit null: 'url' (%s)" % (config_filename,)
|
|
|
|
)
|
|
|
|
|
2016-05-17 06:28:58 -04:00
|
|
|
localpart = as_info["sender_localpart"]
|
2018-04-15 11:15:16 -04:00
|
|
|
if urlparse.quote(localpart) != localpart:
|
2019-06-20 05:32:02 -04:00
|
|
|
raise ValueError("sender_localpart needs characters which are not URL encoded.")
|
2016-05-17 06:28:58 -04:00
|
|
|
user = UserID(localpart, hostname)
|
|
|
|
user_id = user.to_string()
|
|
|
|
|
2016-10-18 12:04:09 -04:00
|
|
|
# Rate limiting for users of this AS is on by default (excludes sender)
|
2021-12-01 07:28:23 -05:00
|
|
|
rate_limited = as_info.get("rate_limited")
|
|
|
|
if not isinstance(rate_limited, bool):
|
|
|
|
rate_limited = True
|
2016-10-18 12:04:09 -04:00
|
|
|
|
2016-05-17 06:28:58 -04:00
|
|
|
# namespace checks
|
|
|
|
if not isinstance(as_info.get("namespaces"), dict):
|
|
|
|
raise KeyError("Requires 'namespaces' object.")
|
|
|
|
for ns in ApplicationService.NS_LIST:
|
|
|
|
# specific namespaces are optional
|
|
|
|
if ns in as_info["namespaces"]:
|
|
|
|
# expect a list of dicts with exclusive and regex keys
|
|
|
|
for regex_obj in as_info["namespaces"][ns]:
|
|
|
|
if not isinstance(regex_obj, dict):
|
|
|
|
raise ValueError(
|
2019-11-21 07:00:14 -05:00
|
|
|
"Expected namespace entry in %s to be an object, but got %s",
|
2019-06-20 05:32:02 -04:00
|
|
|
ns,
|
|
|
|
regex_obj,
|
2016-05-17 06:28:58 -04:00
|
|
|
)
|
2020-06-16 08:51:47 -04:00
|
|
|
if not isinstance(regex_obj.get("regex"), str):
|
2019-06-20 05:32:02 -04:00
|
|
|
raise ValueError("Missing/bad type 'regex' key in %s", regex_obj)
|
2016-05-17 06:28:58 -04:00
|
|
|
if not isinstance(regex_obj.get("exclusive"), bool):
|
|
|
|
raise ValueError(
|
|
|
|
"Missing/bad type 'exclusive' key in %s", regex_obj
|
|
|
|
)
|
2016-08-18 09:56:02 -04:00
|
|
|
# protocols check
|
|
|
|
protocols = as_info.get("protocols")
|
|
|
|
if protocols:
|
2021-12-14 12:02:46 -05:00
|
|
|
if not isinstance(protocols, list):
|
2016-08-18 09:56:02 -04:00
|
|
|
raise KeyError("Optional 'protocols' must be a list if present.")
|
|
|
|
for p in protocols:
|
|
|
|
if not isinstance(p, str):
|
|
|
|
raise KeyError("Bad value for 'protocols' item")
|
2016-08-30 11:21:16 -04:00
|
|
|
|
2016-08-30 12:20:31 -04:00
|
|
|
if as_info["url"] is None:
|
2016-08-30 11:21:16 -04:00
|
|
|
logger.info(
|
2016-08-30 12:16:00 -04:00
|
|
|
"(%s) Explicitly empty 'url' provided. This application service"
|
|
|
|
" will not receive events or queries.",
|
2016-08-30 11:21:16 -04:00
|
|
|
config_filename,
|
|
|
|
)
|
2018-06-28 15:31:53 -04:00
|
|
|
|
2018-06-28 15:56:07 -04:00
|
|
|
ip_range_whitelist = None
|
2019-06-20 05:32:02 -04:00
|
|
|
if as_info.get("ip_range_whitelist"):
|
|
|
|
ip_range_whitelist = IPSet(as_info.get("ip_range_whitelist"))
|
2018-06-28 15:31:53 -04:00
|
|
|
|
2020-10-15 12:33:28 -04:00
|
|
|
supports_ephemeral = as_info.get("de.sorunome.msc2409.push_ephemeral", False)
|
|
|
|
|
2022-02-24 12:55:45 -05:00
|
|
|
# Opt-in flag for the MSC3202-specific transactional behaviour.
|
|
|
|
# When enabled, appservice transactions contain the following information:
|
|
|
|
# - device One-Time Key counts
|
|
|
|
# - device unused fallback key usage states
|
2022-03-30 09:39:27 -04:00
|
|
|
# - device list changes
|
2022-02-24 12:55:45 -05:00
|
|
|
msc3202_transaction_extensions = as_info.get("org.matrix.msc3202", False)
|
|
|
|
if not isinstance(msc3202_transaction_extensions, bool):
|
|
|
|
raise ValueError(
|
|
|
|
"The `org.matrix.msc3202` option should be true or false if specified."
|
|
|
|
)
|
|
|
|
|
2016-05-17 06:28:58 -04:00
|
|
|
return ApplicationService(
|
|
|
|
token=as_info["as_token"],
|
|
|
|
url=as_info["url"],
|
|
|
|
namespaces=as_info["namespaces"],
|
|
|
|
hs_token=as_info["hs_token"],
|
|
|
|
sender=user_id,
|
|
|
|
id=as_info["id"],
|
2016-08-18 09:56:02 -04:00
|
|
|
protocols=protocols,
|
2018-06-28 15:31:53 -04:00
|
|
|
rate_limited=rate_limited,
|
|
|
|
ip_range_whitelist=ip_range_whitelist,
|
2022-02-24 12:55:45 -05:00
|
|
|
supports_ephemeral=supports_ephemeral,
|
|
|
|
msc3202_transaction_extensions=msc3202_transaction_extensions,
|
2016-05-17 06:28:58 -04:00
|
|
|
)
|