mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-22 11:41:38 +00:00
c7193e24d0
There are cases where a dendrite instance is unaware of a pseudo ID for a user, the user is not a member of that room. To represent this case, we currently use the 'zero' value, which is often not checked and so causes errors later down the line. To make this case more explict, and to be consistent with `QueryUserIDForSender`, this PR changes this to use a pointer (and `nil` to mean no sender ID). Signed-off-by: `Sam Wedgwood <sam@wedgwood.dev>`
415 lines
14 KiB
Go
415 lines
14 KiB
Go
// Copyright 2017 Vector Creations Ltd
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package threepid
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
|
"github.com/matrix-org/dendrite/roomserver/types"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
|
)
|
|
|
|
// MembershipRequest represents the body of an incoming POST request
|
|
// on /rooms/{roomID}/(join|kick|ban|unban|leave|invite)
|
|
type MembershipRequest struct {
|
|
UserID string `json:"user_id"`
|
|
Reason string `json:"reason"`
|
|
IDServer string `json:"id_server"`
|
|
Medium string `json:"medium"`
|
|
Address string `json:"address"`
|
|
}
|
|
|
|
// idServerLookupResponse represents the response described at https://matrix.org/docs/spec/client_server/r0.2.0.html#get-matrix-identity-api-v1-lookup
|
|
type idServerLookupResponse struct {
|
|
TS int64 `json:"ts"`
|
|
NotBefore int64 `json:"not_before"`
|
|
NotAfter int64 `json:"not_after"`
|
|
Medium string `json:"medium"`
|
|
Address string `json:"address"`
|
|
MXID string `json:"mxid"`
|
|
Signatures map[string]map[string]string `json:"signatures"`
|
|
}
|
|
|
|
// idServerLookupResponse represents the response described at https://matrix.org/docs/spec/client_server/r0.2.0.html#invitation-storage
|
|
type idServerStoreInviteResponse struct {
|
|
PublicKey string `json:"public_key"`
|
|
Token string `json:"token"`
|
|
DisplayName string `json:"display_name"`
|
|
PublicKeys []gomatrixserverlib.PublicKey `json:"public_keys"`
|
|
}
|
|
|
|
var (
|
|
errMissingParameter = fmt.Errorf("'address', 'id_server' and 'medium' must all be supplied")
|
|
errNotTrusted = fmt.Errorf("untrusted server")
|
|
)
|
|
|
|
// ErrMissingParameter is the error raised if a request for 3PID invite has
|
|
// an incomplete body
|
|
type ErrMissingParameter struct{}
|
|
|
|
func (e ErrMissingParameter) Error() string {
|
|
return errMissingParameter.Error()
|
|
}
|
|
|
|
func (e ErrMissingParameter) Unwrap() error {
|
|
return errMissingParameter
|
|
}
|
|
|
|
// ErrNotTrusted is the error raised if an identity server isn't in the list
|
|
// of trusted servers in the configuration file.
|
|
type ErrNotTrusted struct{}
|
|
|
|
func (e ErrNotTrusted) Error() string {
|
|
return errNotTrusted.Error()
|
|
}
|
|
|
|
func (e ErrNotTrusted) Unwrap() error {
|
|
return errNotTrusted
|
|
}
|
|
|
|
// CheckAndProcessInvite analyses the body of an incoming membership request.
|
|
// If the fields relative to a third-party-invite are all supplied, lookups the
|
|
// matching Matrix ID from the given identity server. If no Matrix ID is
|
|
// associated to the given 3PID, asks the identity server to store the invite
|
|
// and emit a "m.room.third_party_invite" event.
|
|
// Returns a representation of the HTTP response to send to the user.
|
|
// Returns a representation of a non-200 HTTP response if something went wrong
|
|
// in the process, or if some 3PID fields aren't supplied but others are.
|
|
// If none of the 3PID-specific fields are supplied, or if a Matrix ID is
|
|
// supplied by the identity server, returns nil to indicate that the request
|
|
// must be processed as a non-3PID membership request. In the latter case,
|
|
// fills the Matrix ID in the request body so a normal invite membership event
|
|
// can be emitted.
|
|
func CheckAndProcessInvite(
|
|
ctx context.Context,
|
|
device *userapi.Device, body *MembershipRequest, cfg *config.ClientAPI,
|
|
rsAPI api.ClientRoomserverAPI, db userapi.ClientUserAPI,
|
|
roomID string,
|
|
evTime time.Time,
|
|
) (inviteStoredOnIDServer bool, err error) {
|
|
if body.Address == "" && body.IDServer == "" && body.Medium == "" {
|
|
// If none of the 3PID-specific fields are supplied, it's a standard invite
|
|
// so return nil for it to be processed as such
|
|
return
|
|
} else if body.Address == "" || body.IDServer == "" || body.Medium == "" {
|
|
// If at least one of the 3PID-specific fields is supplied but not all
|
|
// of them, return an error
|
|
err = ErrMissingParameter{}
|
|
return
|
|
}
|
|
|
|
lookupRes, storeInviteRes, err := queryIDServer(ctx, db, cfg, device, body, roomID)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
if lookupRes.MXID == "" {
|
|
// No Matrix ID could be found for this 3PID, meaning that a
|
|
// "m.room.third_party_invite" have to be emitted from the data in
|
|
// storeInviteRes.
|
|
err = emit3PIDInviteEvent(
|
|
ctx, body, storeInviteRes, device, roomID, cfg, rsAPI, evTime,
|
|
)
|
|
inviteStoredOnIDServer = err == nil
|
|
|
|
return
|
|
}
|
|
|
|
// A Matrix ID have been found: set it in the body request and let the process
|
|
// continue to create a "m.room.member" event with an "invite" membership
|
|
body.UserID = lookupRes.MXID
|
|
|
|
return
|
|
}
|
|
|
|
// queryIDServer handles all the requests to the identity server, starting by
|
|
// looking up the given 3PID on the given identity server.
|
|
// If the lookup returned a Matrix ID, checks if the current time is within the
|
|
// time frame in which the 3PID-MXID association is known to be valid, and checks
|
|
// the response's signatures. If one of the checks fails, returns an error.
|
|
// If the lookup didn't return a Matrix ID, asks the identity server to store
|
|
// the invite and to respond with a token.
|
|
// Returns a representation of the response for both cases.
|
|
// Returns an error if a check or a request failed.
|
|
func queryIDServer(
|
|
ctx context.Context,
|
|
userAPI userapi.ClientUserAPI, cfg *config.ClientAPI, device *userapi.Device,
|
|
body *MembershipRequest, roomID string,
|
|
) (lookupRes *idServerLookupResponse, storeInviteRes *idServerStoreInviteResponse, err error) {
|
|
if err = isTrusted(body.IDServer, cfg); err != nil {
|
|
return
|
|
}
|
|
|
|
// Lookup the 3PID
|
|
lookupRes, err = queryIDServerLookup(ctx, body)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
if lookupRes.MXID == "" {
|
|
// No Matrix ID matches with the given 3PID, ask the server to store the
|
|
// invite and return a token
|
|
storeInviteRes, err = queryIDServerStoreInvite(ctx, userAPI, cfg, device, body, roomID)
|
|
return
|
|
}
|
|
|
|
// A Matrix ID matches with the given 3PID
|
|
// Get timestamp in milliseconds to compare it with the timestamps provided
|
|
// by the identity server
|
|
now := time.Now().UnixNano() / 1000000
|
|
if lookupRes.NotBefore > now || now > lookupRes.NotAfter {
|
|
// If the current timestamp isn't in the time frame in which the association
|
|
// is known to be valid, re-run the query
|
|
return queryIDServer(ctx, userAPI, cfg, device, body, roomID)
|
|
}
|
|
|
|
// Check the request signatures and send an error if one isn't valid
|
|
if err = checkIDServerSignatures(ctx, body, lookupRes); err != nil {
|
|
return
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// queryIDServerLookup sends a response to the identity server on /_matrix/identity/api/v1/lookup
|
|
// and returns the response as a structure.
|
|
// Returns an error if the request failed to send or if the response couldn't be parsed.
|
|
func queryIDServerLookup(ctx context.Context, body *MembershipRequest) (*idServerLookupResponse, error) {
|
|
address := url.QueryEscape(body.Address)
|
|
requestURL := fmt.Sprintf("https://%s/_matrix/identity/api/v1/lookup?medium=%s&address=%s", body.IDServer, body.Medium, address)
|
|
req, err := http.NewRequest(http.MethodGet, requestURL, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp, err := http.DefaultClient.Do(req.WithContext(ctx))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
// TODO: Log the error supplied with the identity server?
|
|
errMgs := fmt.Sprintf("Failed to ask %s to store an invite for %s", body.IDServer, body.Address)
|
|
return nil, errors.New(errMgs)
|
|
}
|
|
|
|
var res idServerLookupResponse
|
|
err = json.NewDecoder(resp.Body).Decode(&res)
|
|
return &res, err
|
|
}
|
|
|
|
// queryIDServerStoreInvite sends a response to the identity server on /_matrix/identity/api/v1/store-invite
|
|
// and returns the response as a structure.
|
|
// Returns an error if the request failed to send or if the response couldn't be parsed.
|
|
func queryIDServerStoreInvite(
|
|
ctx context.Context,
|
|
userAPI userapi.ClientUserAPI, cfg *config.ClientAPI, device *userapi.Device,
|
|
body *MembershipRequest, roomID string,
|
|
) (*idServerStoreInviteResponse, error) {
|
|
// Retrieve the sender's profile to get their display name
|
|
_, serverName, err := gomatrixserverlib.SplitID('@', device.UserID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var profile *authtypes.Profile
|
|
if cfg.Matrix.IsLocalServerName(serverName) {
|
|
profile, err = userAPI.QueryProfile(ctx, device.UserID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
} else {
|
|
profile = &authtypes.Profile{}
|
|
}
|
|
|
|
client := http.Client{}
|
|
|
|
data := url.Values{}
|
|
data.Add("medium", body.Medium)
|
|
data.Add("address", body.Address)
|
|
data.Add("room_id", roomID)
|
|
data.Add("sender", device.UserID)
|
|
data.Add("sender_display_name", profile.DisplayName)
|
|
// TODO: Also send:
|
|
// - The room name (room_name)
|
|
// - The room's avatar url (room_avatar_url)
|
|
// See https://github.com/matrix-org/sydent/blob/master/sydent/http/servlets/store_invite_servlet.py#L82-L91
|
|
// These can be easily retrieved by requesting the public rooms API
|
|
// server's database.
|
|
|
|
requestURL := fmt.Sprintf("https://%s/_matrix/identity/api/v1/store-invite", body.IDServer)
|
|
req, err := http.NewRequest(http.MethodPost, requestURL, strings.NewReader(data.Encode()))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
|
resp, err := client.Do(req.WithContext(ctx))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
errMsg := fmt.Sprintf("Identity server %s responded with a %d error code", body.IDServer, resp.StatusCode)
|
|
return nil, errors.New(errMsg)
|
|
}
|
|
|
|
var idResp idServerStoreInviteResponse
|
|
err = json.NewDecoder(resp.Body).Decode(&idResp)
|
|
return &idResp, err
|
|
}
|
|
|
|
// queryIDServerPubKey requests a public key identified with a given ID to the
|
|
// a given identity server and returns the matching base64-decoded public key.
|
|
// We assume that the ID server is trusted at this point.
|
|
// Returns an error if the request couldn't be sent, if its body couldn't be parsed
|
|
// or if the key couldn't be decoded from base64.
|
|
func queryIDServerPubKey(ctx context.Context, idServerName string, keyID string) ([]byte, error) {
|
|
requestURL := fmt.Sprintf("https://%s/_matrix/identity/api/v1/pubkey/%s", idServerName, keyID)
|
|
req, err := http.NewRequest(http.MethodGet, requestURL, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resp, err := http.DefaultClient.Do(req.WithContext(ctx))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var pubKeyRes struct {
|
|
PublicKey spec.Base64Bytes `json:"public_key"`
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
errMsg := fmt.Sprintf("Couldn't retrieve key %s from server %s", keyID, idServerName)
|
|
return nil, errors.New(errMsg)
|
|
}
|
|
|
|
err = json.NewDecoder(resp.Body).Decode(&pubKeyRes)
|
|
return pubKeyRes.PublicKey, err
|
|
}
|
|
|
|
// checkIDServerSignatures iterates over the signatures of a requests.
|
|
// If no signature can be found for the ID server's domain, returns an error, else
|
|
// iterates over the signature for the said domain, retrieves the matching public
|
|
// key, and verify it.
|
|
// We assume that the ID server is trusted at this point.
|
|
// Returns nil if all the verifications succeeded.
|
|
// Returns an error if something failed in the process.
|
|
func checkIDServerSignatures(
|
|
ctx context.Context, body *MembershipRequest, res *idServerLookupResponse,
|
|
) error {
|
|
// Mashall the body so we can give it to VerifyJSON
|
|
marshalledBody, err := json.Marshal(*res)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
signatures, ok := res.Signatures[body.IDServer]
|
|
if !ok {
|
|
return errors.New("No signature for domain " + body.IDServer)
|
|
}
|
|
|
|
for keyID := range signatures {
|
|
pubKey, err := queryIDServerPubKey(ctx, body.IDServer, keyID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err = gomatrixserverlib.VerifyJSON(body.IDServer, gomatrixserverlib.KeyID(keyID), pubKey, marshalledBody); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// emit3PIDInviteEvent builds and sends a "m.room.third_party_invite" event.
|
|
// Returns an error if something failed in the process.
|
|
func emit3PIDInviteEvent(
|
|
ctx context.Context,
|
|
body *MembershipRequest, res *idServerStoreInviteResponse,
|
|
device *userapi.Device, roomID string, cfg *config.ClientAPI,
|
|
rsAPI api.ClientRoomserverAPI,
|
|
evTime time.Time,
|
|
) error {
|
|
userID, err := spec.NewUserID(device.UserID, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
validRoomID, err := spec.NewRoomID(roomID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
sender, err := rsAPI.QuerySenderIDForUser(ctx, *validRoomID, *userID)
|
|
if err != nil {
|
|
return err
|
|
} else if sender == nil {
|
|
return fmt.Errorf("sender ID not found for %s in %s", *userID, *validRoomID)
|
|
}
|
|
proto := &gomatrixserverlib.ProtoEvent{
|
|
SenderID: string(*sender),
|
|
RoomID: roomID,
|
|
Type: "m.room.third_party_invite",
|
|
StateKey: &res.Token,
|
|
}
|
|
|
|
validityURL := fmt.Sprintf("https://%s/_matrix/identity/api/v1/pubkey/isvalid", body.IDServer)
|
|
content := gomatrixserverlib.ThirdPartyInviteContent{
|
|
DisplayName: res.DisplayName,
|
|
KeyValidityURL: validityURL,
|
|
PublicKey: res.PublicKey,
|
|
PublicKeys: res.PublicKeys,
|
|
}
|
|
|
|
if err = proto.SetContent(content); err != nil {
|
|
return err
|
|
}
|
|
|
|
identity, err := cfg.Matrix.SigningIdentityFor(device.UserDomain())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
queryRes := api.QueryLatestEventsAndStateResponse{}
|
|
event, err := eventutil.QueryAndBuildEvent(ctx, proto, identity, evTime, rsAPI, &queryRes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return api.SendEvents(
|
|
ctx, rsAPI,
|
|
api.KindNew,
|
|
[]*types.HeaderedEvent{
|
|
event,
|
|
},
|
|
device.UserDomain(),
|
|
cfg.Matrix.ServerName,
|
|
cfg.Matrix.ServerName,
|
|
nil,
|
|
false,
|
|
)
|
|
}
|