mirror of
https://mau.dev/maunium/synapse.git
synced 2024-10-01 01:36:05 -04:00
dc8ddc6472
As part of the rollout of [MSC3916](https://github.com/matrix-org/matrix-spec-proposals/blob/main/proposals/3916-authentication-for-media.md) this PR adds support for designating authenticated media and ensuring that authenticated media is not served over unauthenticated endpoints.
143 lines
5.0 KiB
Python
143 lines
5.0 KiB
Python
#
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
#
|
|
# Copyright 2020-2021 The Matrix.org Foundation C.I.C.
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# See the GNU Affero General Public License for more details:
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
#
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
#
|
|
# [This file includes modifications made by New Vector Limited]
|
|
#
|
|
#
|
|
|
|
import logging
|
|
import re
|
|
from typing import TYPE_CHECKING
|
|
|
|
from synapse.http.server import set_corp_headers, set_cors_headers
|
|
from synapse.http.servlet import RestServlet, parse_integer, parse_string
|
|
from synapse.http.site import SynapseRequest
|
|
from synapse.media._base import (
|
|
DEFAULT_MAX_TIMEOUT_MS,
|
|
MAXIMUM_ALLOWED_MAX_TIMEOUT_MS,
|
|
respond_404,
|
|
)
|
|
from synapse.media.media_storage import MediaStorage
|
|
from synapse.media.thumbnailer import ThumbnailProvider
|
|
from synapse.util.stringutils import parse_and_validate_server_name
|
|
|
|
if TYPE_CHECKING:
|
|
from synapse.media.media_repository import MediaRepository
|
|
from synapse.server import HomeServer
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
class ThumbnailResource(RestServlet):
|
|
PATTERNS = [
|
|
re.compile(
|
|
"/_matrix/media/(r0|v3|v1)/thumbnail/(?P<server_name>[^/]*)/(?P<media_id>[^/]*)$"
|
|
)
|
|
]
|
|
|
|
def __init__(
|
|
self,
|
|
hs: "HomeServer",
|
|
media_repo: "MediaRepository",
|
|
media_storage: MediaStorage,
|
|
):
|
|
super().__init__()
|
|
|
|
self.store = hs.get_datastores().main
|
|
self.media_repo = media_repo
|
|
self.media_storage = media_storage
|
|
self._is_mine_server_name = hs.is_mine_server_name
|
|
self._server_name = hs.hostname
|
|
self.prevent_media_downloads_from = hs.config.media.prevent_media_downloads_from
|
|
self.dynamic_thumbnails = hs.config.media.dynamic_thumbnails
|
|
self.thumbnail_provider = ThumbnailProvider(hs, media_repo, media_storage)
|
|
|
|
async def on_GET(
|
|
self, request: SynapseRequest, server_name: str, media_id: str
|
|
) -> None:
|
|
# Validate the server name, raising if invalid
|
|
parse_and_validate_server_name(server_name)
|
|
|
|
set_cors_headers(request)
|
|
set_corp_headers(request)
|
|
width = parse_integer(request, "width", required=True)
|
|
height = parse_integer(request, "height", required=True)
|
|
method = parse_string(request, "method", "scale")
|
|
# TODO Parse the Accept header to get an prioritised list of thumbnail types.
|
|
m_type = "image/png"
|
|
max_timeout_ms = parse_integer(
|
|
request, "timeout_ms", default=DEFAULT_MAX_TIMEOUT_MS
|
|
)
|
|
max_timeout_ms = min(max_timeout_ms, MAXIMUM_ALLOWED_MAX_TIMEOUT_MS)
|
|
|
|
if self._is_mine_server_name(server_name):
|
|
if self.dynamic_thumbnails:
|
|
await self.thumbnail_provider.select_or_generate_local_thumbnail(
|
|
request,
|
|
media_id,
|
|
width,
|
|
height,
|
|
method,
|
|
m_type,
|
|
max_timeout_ms,
|
|
False,
|
|
allow_authenticated=False,
|
|
)
|
|
else:
|
|
await self.thumbnail_provider.respond_local_thumbnail(
|
|
request,
|
|
media_id,
|
|
width,
|
|
height,
|
|
method,
|
|
m_type,
|
|
max_timeout_ms,
|
|
False,
|
|
allow_authenticated=False,
|
|
)
|
|
self.media_repo.mark_recently_accessed(None, media_id)
|
|
else:
|
|
# Don't let users download media from configured domains, even if it
|
|
# is already downloaded. This is Trust & Safety tooling to make some
|
|
# media inaccessible to local users.
|
|
# See `prevent_media_downloads_from` config docs for more info.
|
|
if server_name in self.prevent_media_downloads_from:
|
|
respond_404(request)
|
|
return
|
|
|
|
ip_address = request.getClientAddress().host
|
|
remote_resp_function = (
|
|
self.thumbnail_provider.select_or_generate_remote_thumbnail
|
|
if self.dynamic_thumbnails
|
|
else self.thumbnail_provider.respond_remote_thumbnail
|
|
)
|
|
await remote_resp_function(
|
|
request,
|
|
server_name,
|
|
media_id,
|
|
width,
|
|
height,
|
|
method,
|
|
m_type,
|
|
max_timeout_ms,
|
|
ip_address,
|
|
use_federation=False,
|
|
allow_authenticated=False,
|
|
)
|
|
self.media_repo.mark_recently_accessed(server_name, media_id)
|