2018-05-09 09:40:18 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2018 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
from synapse.config._base import ConfigError
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2018-05-11 07:47:58 -04:00
|
|
|
class DomainRuleChecker(object):
|
|
|
|
"""
|
|
|
|
A re-implementation of the SpamChecker that prevents users in one domain from
|
|
|
|
inviting users in other domains to rooms, based on a configuration.
|
2018-05-09 09:40:18 -04:00
|
|
|
|
2018-05-11 07:47:58 -04:00
|
|
|
Takes a config in the format:
|
2018-05-09 10:11:19 -04:00
|
|
|
|
2018-05-11 07:47:58 -04:00
|
|
|
spam_checker:
|
|
|
|
module: "rulecheck.DomainRuleChecker"
|
|
|
|
config:
|
|
|
|
domain_mapping:
|
|
|
|
"inviter_domain": [ "invitee_domain_permitted", "other_domain_permitted" ]
|
|
|
|
"other_inviter_domain": [ "invitee_domain_permitted" ]
|
|
|
|
default: False
|
2019-03-18 11:45:27 -04:00
|
|
|
|
|
|
|
# Only let local users join rooms if they were explicitly invited.
|
|
|
|
can_only_join_rooms_with_invite: false
|
|
|
|
|
|
|
|
# Only let local users create rooms if they are inviting only one
|
|
|
|
# other user, and that user matches the rules above.
|
|
|
|
can_only_create_one_to_one_rooms: false
|
|
|
|
|
|
|
|
# Only let local users invite during room creation, regardless of the
|
|
|
|
# domain mapping rules above.
|
|
|
|
can_only_invite_during_room_creation: false
|
2018-05-09 10:11:19 -04:00
|
|
|
|
2019-04-16 11:41:01 -04:00
|
|
|
# Prevent local users from inviting users from certain domains to
|
|
|
|
# rooms published in the room directory.
|
|
|
|
domains_prevented_from_being_invited_to_published_rooms: []
|
|
|
|
|
2019-03-21 08:11:40 -04:00
|
|
|
# Allow third party invites
|
|
|
|
can_invite_by_third_party_id: true
|
|
|
|
|
2018-05-11 07:47:58 -04:00
|
|
|
Don't forget to consider if you can invite users from your own domain.
|
|
|
|
"""
|
2018-05-09 09:40:18 -04:00
|
|
|
|
|
|
|
def __init__(self, config):
|
|
|
|
self.domain_mapping = config["domain_mapping"] or {}
|
|
|
|
self.default = config["default"]
|
|
|
|
|
2019-03-18 11:45:27 -04:00
|
|
|
self.can_only_join_rooms_with_invite = config.get(
|
|
|
|
"can_only_join_rooms_with_invite", False,
|
|
|
|
)
|
|
|
|
self.can_only_create_one_to_one_rooms = config.get(
|
|
|
|
"can_only_create_one_to_one_rooms", False,
|
|
|
|
)
|
|
|
|
self.can_only_invite_during_room_creation = config.get(
|
|
|
|
"can_only_invite_during_room_creation", False,
|
|
|
|
)
|
2019-03-21 08:11:40 -04:00
|
|
|
self.can_invite_by_third_party_id = config.get(
|
|
|
|
"can_invite_by_third_party_id", True,
|
|
|
|
)
|
2019-04-16 11:41:01 -04:00
|
|
|
self.domains_prevented_from_being_invited_to_published_rooms = config.get(
|
|
|
|
"domains_prevented_from_being_invited_to_published_rooms", [],
|
|
|
|
)
|
2019-03-18 11:45:27 -04:00
|
|
|
|
2018-05-09 09:40:18 -04:00
|
|
|
def check_event_for_spam(self, event):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.check_event_for_spam
|
|
|
|
"""
|
2018-05-09 09:40:18 -04:00
|
|
|
return False
|
|
|
|
|
2019-03-21 08:25:33 -04:00
|
|
|
def user_may_invite(self, inviter_userid, invitee_userid, third_party_invite,
|
2019-04-16 11:41:01 -04:00
|
|
|
room_id, new_room, published_room=False):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.user_may_invite
|
|
|
|
"""
|
2019-03-18 11:45:27 -04:00
|
|
|
if self.can_only_invite_during_room_creation and not new_room:
|
|
|
|
return False
|
|
|
|
|
2019-03-21 08:25:33 -04:00
|
|
|
if not self.can_invite_by_third_party_id and third_party_invite:
|
|
|
|
return False
|
|
|
|
|
2019-03-21 11:31:31 -04:00
|
|
|
# This is a third party invite (without a bound mxid), so unless we have
|
|
|
|
# banned all third party invites (above) we allow it.
|
|
|
|
if not invitee_userid:
|
2019-03-21 08:25:33 -04:00
|
|
|
return True
|
|
|
|
|
2018-05-09 09:40:18 -04:00
|
|
|
inviter_domain = self._get_domain_from_id(inviter_userid)
|
|
|
|
invitee_domain = self._get_domain_from_id(invitee_userid)
|
|
|
|
|
2018-05-11 07:47:58 -04:00
|
|
|
if inviter_domain not in self.domain_mapping:
|
2018-05-09 09:40:18 -04:00
|
|
|
return self.default
|
|
|
|
|
2019-04-16 11:41:01 -04:00
|
|
|
if (
|
|
|
|
published_room and
|
|
|
|
invitee_domain in self.domains_prevented_from_being_invited_to_published_rooms
|
|
|
|
):
|
|
|
|
return False
|
|
|
|
|
2018-05-18 11:12:22 -04:00
|
|
|
return invitee_domain in self.domain_mapping[inviter_domain]
|
2018-05-09 09:40:18 -04:00
|
|
|
|
2019-03-21 08:11:40 -04:00
|
|
|
def user_may_create_room(self, userid, invite_list, third_party_invite_list,
|
|
|
|
cloning):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.user_may_create_room
|
|
|
|
"""
|
2019-03-18 11:45:27 -04:00
|
|
|
|
|
|
|
if cloning:
|
|
|
|
return True
|
|
|
|
|
2019-03-21 08:11:40 -04:00
|
|
|
if not self.can_invite_by_third_party_id and third_party_invite_list:
|
|
|
|
return False
|
|
|
|
|
|
|
|
number_of_invites = len(invite_list) + len(third_party_invite_list)
|
|
|
|
|
|
|
|
if self.can_only_create_one_to_one_rooms and number_of_invites != 1:
|
2019-03-18 11:45:27 -04:00
|
|
|
return False
|
|
|
|
|
2018-05-09 09:40:18 -04:00
|
|
|
return True
|
|
|
|
|
|
|
|
def user_may_create_room_alias(self, userid, room_alias):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.user_may_create_room_alias
|
|
|
|
"""
|
2018-05-09 09:40:18 -04:00
|
|
|
return True
|
|
|
|
|
|
|
|
def user_may_publish_room(self, userid, room_id):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.user_may_publish_room
|
|
|
|
"""
|
2018-05-09 09:40:18 -04:00
|
|
|
return True
|
|
|
|
|
2019-03-18 11:45:27 -04:00
|
|
|
def user_may_join_room(self, userid, room_id, is_invited):
|
2019-03-18 09:17:49 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.user_may_join_room
|
|
|
|
"""
|
2019-03-18 11:45:27 -04:00
|
|
|
if self.can_only_join_rooms_with_invite and not is_invited:
|
|
|
|
return False
|
|
|
|
|
2019-03-18 09:17:49 -04:00
|
|
|
return True
|
|
|
|
|
2018-05-09 09:40:18 -04:00
|
|
|
@staticmethod
|
|
|
|
def parse_config(config):
|
2018-05-18 11:12:22 -04:00
|
|
|
"""Implements synapse.events.SpamChecker.parse_config
|
|
|
|
"""
|
2018-05-09 09:40:18 -04:00
|
|
|
if "default" in config:
|
|
|
|
return config
|
|
|
|
else:
|
|
|
|
raise ConfigError("No default set for spam_config DomainRuleChecker")
|
|
|
|
|
|
|
|
@staticmethod
|
2018-05-18 11:12:22 -04:00
|
|
|
def _get_domain_from_id(mxid):
|
|
|
|
"""Parses a string and returns the domain part of the mxid.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
mxid (str): a valid mxid
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
str: the domain part of the mxid
|
|
|
|
|
|
|
|
"""
|
|
|
|
idx = mxid.find(":")
|
2018-05-09 09:40:18 -04:00
|
|
|
if idx == -1:
|
2018-05-18 11:12:22 -04:00
|
|
|
raise Exception("Invalid ID: %r" % (mxid,))
|
|
|
|
return mxid[idx + 1:]
|