2019-06-12 05:31:37 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2020-10-05 09:57:46 -04:00
|
|
|
from typing import Callable
|
2019-06-12 05:31:37 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
from synapse.events import EventBase
|
|
|
|
from synapse.events.snapshot import EventContext
|
2020-10-05 09:57:46 -04:00
|
|
|
from synapse.types import Requester, StateMap
|
2019-06-12 05:31:37 -04:00
|
|
|
|
|
|
|
|
2020-09-04 06:54:56 -04:00
|
|
|
class ThirdPartyEventRules:
|
2019-06-17 10:48:57 -04:00
|
|
|
"""Allows server admins to provide a Python module implementing an extra
|
|
|
|
set of rules to apply when processing events.
|
2019-06-12 05:31:37 -04:00
|
|
|
|
|
|
|
This is designed to help admins of closed federations with enforcing custom
|
|
|
|
behaviours.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
|
|
|
self.third_party_rules = None
|
|
|
|
|
|
|
|
self.store = hs.get_datastore()
|
|
|
|
|
|
|
|
module = None
|
|
|
|
config = None
|
|
|
|
if hs.config.third_party_event_rules:
|
|
|
|
module, config = hs.config.third_party_event_rules
|
|
|
|
|
|
|
|
if module is not None:
|
2019-06-17 11:27:47 -04:00
|
|
|
self.third_party_rules = module(
|
2020-10-07 07:03:26 -04:00
|
|
|
config=config, module_api=hs.get_module_api(),
|
2019-06-17 11:27:47 -04:00
|
|
|
)
|
2019-06-12 05:31:37 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
async def check_event_allowed(
|
|
|
|
self, event: EventBase, context: EventContext
|
|
|
|
) -> bool:
|
2019-06-12 05:31:37 -04:00
|
|
|
"""Check if a provided event should be allowed in the given context.
|
|
|
|
|
|
|
|
Args:
|
2020-07-27 13:40:22 -04:00
|
|
|
event: The event to be checked.
|
|
|
|
context: The context of the event.
|
2019-06-12 05:31:37 -04:00
|
|
|
|
|
|
|
Returns:
|
2020-07-27 13:40:22 -04:00
|
|
|
True if the event should be allowed, False if not.
|
2019-06-12 05:31:37 -04:00
|
|
|
"""
|
|
|
|
if self.third_party_rules is None:
|
2019-07-23 09:00:55 -04:00
|
|
|
return True
|
2019-06-12 05:31:37 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
prev_state_ids = await context.get_prev_state_ids()
|
2019-06-12 05:31:37 -04:00
|
|
|
|
|
|
|
# Retrieve the state events from the database.
|
2020-10-06 11:31:31 -04:00
|
|
|
events = await self.store.get_events(prev_state_ids.values())
|
|
|
|
state_events = {(ev.type, ev.state_key): ev for ev in events.values()}
|
2019-06-12 05:31:37 -04:00
|
|
|
|
2020-10-06 11:31:31 -04:00
|
|
|
# The module can modify the event slightly if it wants, but caution should be
|
|
|
|
# exercised, and it's likely to go very wrong if applied to events received over
|
|
|
|
# federation.
|
|
|
|
|
|
|
|
return await self.third_party_rules.check_event_allowed(event, state_events)
|
2019-06-17 10:48:57 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
async def on_create_room(
|
|
|
|
self, requester: Requester, config: dict, is_requester_admin: bool
|
|
|
|
) -> bool:
|
2019-06-17 10:48:57 -04:00
|
|
|
"""Intercept requests to create room to allow, deny or update the
|
|
|
|
request config.
|
|
|
|
|
|
|
|
Args:
|
2020-07-27 13:40:22 -04:00
|
|
|
requester
|
|
|
|
config: The creation config from the client.
|
|
|
|
is_requester_admin: If the requester is an admin
|
2019-06-17 10:48:57 -04:00
|
|
|
|
|
|
|
Returns:
|
2020-07-27 13:40:22 -04:00
|
|
|
Whether room creation is allowed or denied.
|
2019-06-17 10:48:57 -04:00
|
|
|
"""
|
|
|
|
|
|
|
|
if self.third_party_rules is None:
|
2020-02-06 09:15:29 -05:00
|
|
|
return True
|
2019-06-17 10:48:57 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
ret = await self.third_party_rules.on_create_room(
|
2019-06-17 10:48:57 -04:00
|
|
|
requester, config, is_requester_admin
|
|
|
|
)
|
2020-02-06 09:15:29 -05:00
|
|
|
return ret
|
2019-06-17 11:27:47 -04:00
|
|
|
|
2020-07-27 13:40:22 -04:00
|
|
|
async def check_threepid_can_be_invited(
|
|
|
|
self, medium: str, address: str, room_id: str
|
|
|
|
) -> bool:
|
2019-06-17 11:27:47 -04:00
|
|
|
"""Check if a provided 3PID can be invited in the given room.
|
|
|
|
|
|
|
|
Args:
|
2020-07-27 13:40:22 -04:00
|
|
|
medium: The 3PID's medium.
|
|
|
|
address: The 3PID's address.
|
|
|
|
room_id: The room we want to invite the threepid to.
|
2019-06-17 11:27:47 -04:00
|
|
|
|
|
|
|
Returns:
|
2020-07-27 13:40:22 -04:00
|
|
|
True if the 3PID can be invited, False if not.
|
2019-06-17 11:27:47 -04:00
|
|
|
"""
|
|
|
|
|
|
|
|
if self.third_party_rules is None:
|
2019-07-23 09:00:55 -04:00
|
|
|
return True
|
2019-06-17 11:27:47 -04:00
|
|
|
|
2020-10-05 09:57:46 -04:00
|
|
|
state_events = await self._get_state_map_for_room(room_id)
|
|
|
|
|
|
|
|
ret = await self.third_party_rules.check_threepid_can_be_invited(
|
|
|
|
medium, address, state_events
|
|
|
|
)
|
|
|
|
return ret
|
|
|
|
|
|
|
|
async def check_visibility_can_be_modified(
|
|
|
|
self, room_id: str, new_visibility: str
|
|
|
|
) -> bool:
|
|
|
|
"""Check if a room is allowed to be published to, or removed from, the public room
|
|
|
|
list.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room_id: The ID of the room.
|
|
|
|
new_visibility: The new visibility state. Either "public" or "private".
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
True if the room's visibility can be modified, False if not.
|
|
|
|
"""
|
|
|
|
if self.third_party_rules is None:
|
|
|
|
return True
|
|
|
|
|
2020-10-05 15:27:14 -04:00
|
|
|
check_func = getattr(
|
|
|
|
self.third_party_rules, "check_visibility_can_be_modified", None
|
|
|
|
)
|
2020-10-05 09:57:46 -04:00
|
|
|
if not check_func or not isinstance(check_func, Callable):
|
|
|
|
return True
|
|
|
|
|
|
|
|
state_events = await self._get_state_map_for_room(room_id)
|
|
|
|
|
|
|
|
return await check_func(room_id, state_events, new_visibility)
|
|
|
|
|
|
|
|
async def _get_state_map_for_room(self, room_id: str) -> StateMap[EventBase]:
|
|
|
|
"""Given a room ID, return the state events of that room.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room_id: The ID of the room.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A dict mapping (event type, state key) to state event.
|
|
|
|
"""
|
2020-07-27 13:40:22 -04:00
|
|
|
state_ids = await self.store.get_filtered_current_state_ids(room_id)
|
|
|
|
room_state_events = await self.store.get_events(state_ids.values())
|
2019-06-17 11:27:47 -04:00
|
|
|
|
|
|
|
state_events = {}
|
|
|
|
for key, event_id in state_ids.items():
|
|
|
|
state_events[key] = room_state_events[event_id]
|
|
|
|
|
2020-10-05 09:57:46 -04:00
|
|
|
return state_events
|