Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Do checks on aliases for incoming m.room.aliases events #5128

Merged
merged 14 commits into from
May 8, 2019
1 change: 1 addition & 0 deletions changelog.d/5128.bugfix
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Add some missing limitations to room alias creation.
3 changes: 3 additions & 0 deletions synapse/api/constants.py
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@
# the "depth" field on events is limited to 2**63 - 1
MAX_DEPTH = 2**63 - 1

# the maximum length for a room alias is 255 characters
MAX_ALIAS_LENGTH = 255


class Membership(object):

Expand Down
7 changes: 3 additions & 4 deletions synapse/handlers/directory.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@

from twisted.internet import defer

from synapse.api.constants import EventTypes
from synapse.api.constants import MAX_ALIAS_LENGTH, EventTypes
from synapse.api.errors import (
AuthError,
CodeMessageException,
Expand All @@ -36,7 +36,6 @@


class DirectoryHandler(BaseHandler):
MAX_ALIAS_LENGTH = 255

def __init__(self, hs):
super(DirectoryHandler, self).__init__(hs)
Expand Down Expand Up @@ -105,10 +104,10 @@ def create_association(self, requester, room_alias, room_id, servers=None,

user_id = requester.user.to_string()

if len(room_alias.to_string()) > self.MAX_ALIAS_LENGTH:
if len(room_alias.to_string()) > MAX_ALIAS_LENGTH:
raise SynapseError(
400,
"Can't create aliases longer than %s characters" % self.MAX_ALIAS_LENGTH,
"Can't create aliases longer than %s characters" % MAX_ALIAS_LENGTH,
Codes.INVALID_PARAM,
)

Expand Down
22 changes: 21 additions & 1 deletion synapse/handlers/message.py
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@
from twisted.internet import defer
from twisted.internet.defer import succeed

from synapse.api.constants import EventTypes, Membership
from synapse.api.constants import MAX_ALIAS_LENGTH, EventTypes, Membership
from synapse.api.errors import (
AuthError,
Codes,
Expand Down Expand Up @@ -228,6 +228,7 @@ def __init__(self, hs):
self.ratelimiter = hs.get_ratelimiter()
self.notifier = hs.get_notifier()
self.config = hs.config
self.require_membership_for_aliases = hs.config.require_membership_for_aliases

self.send_event_to_master = ReplicationSendEventRestServlet.make_client(hs)

Expand Down Expand Up @@ -320,6 +321,25 @@ def create_event(self, requester, event_dict, token_id=None, txn_id=None,
target, e
)

if builder.type == EventTypes.Aliases:
if "aliases" in builder.content:
for alias in builder.content["aliases"]:
if len(alias) > MAX_ALIAS_LENGTH:
babolivier marked this conversation as resolved.
Show resolved Hide resolved
raise SynapseError(
400,
("Can't create aliases longer than"
" %s characters" % MAX_ALIAS_LENGTH),
Codes.INVALID_PARAM,
)

if self.require_membership_for_aliases:
babolivier marked this conversation as resolved.
Show resolved Hide resolved
rooms_for_user = yield self.store.get_rooms_for_user(builder.sender)
babolivier marked this conversation as resolved.
Show resolved Hide resolved
if builder.room_id not in rooms_for_user:
raise AuthError(
403,
"You must be in the room to create an alias for it",
)

is_exempt = yield self._is_exempt_from_privacy_policy(builder, requester)
if require_consent and not is_exempt:
yield self.assert_accepted_privacy_policy(requester)
Expand Down
168 changes: 168 additions & 0 deletions tests/rest/client/v1/test_directory.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,168 @@
# -*- coding: utf-8 -*-
# Copyright 2019 New Vector Ltd
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

import json

from synapse.rest.client.v1 import admin, directory, login, room
from synapse.types import RoomAlias
from synapse.util.stringutils import random_string

from tests import unittest


class DirectoryTestCase(unittest.HomeserverTestCase):

servlets = [
admin.register_servlets,
babolivier marked this conversation as resolved.
Show resolved Hide resolved
directory.register_servlets,
login.register_servlets,
room.register_servlets,
]

def make_homeserver(self, reactor, clock):
config = self.default_config()
config.require_membership_for_aliases = True

self.hs = self.setup_test_homeserver(config=config)

return self.hs

def prepare(self, reactor, clock, homeserver):
self.room_owner = self.register_user("room_owner", "test")
self.room_owner_tok = self.login("room_owner", "test")

self.room_id = self.helper.create_room_as(
self.room_owner, tok=self.room_owner_tok,
)

self.user = self.register_user("user", "test")
self.user_tok = self.login("user", "test")

def test_state_event_not_in_room(self):
self.ensure_user_left_room()
self.set_alias_via_state_event(403)

def test_directory_endpoint_not_in_room(self):
self.ensure_user_left_room()
self.set_alias_via_directory(403)

def test_state_event_in_room_too_long(self):
self.ensure_user_joined_room()
self.set_alias_via_state_event(400, alias_length=256)

def test_directory_in_room_too_long(self):
self.ensure_user_joined_room()
self.set_alias_via_directory(400, alias_length=256)

def test_state_event_in_room(self):
self.ensure_user_joined_room()
self.set_alias_via_state_event(200)

def test_directory_in_room(self):
self.ensure_user_joined_room()
self.set_alias_via_directory(200)

def test_room_creation_too_long(self):
url = "/_matrix/client/r0/createRoom"

# We use deliberately a localpart under the length threshold so
# that we can make sure that the check is done on the whole alias.
data = {
"room_alias_name": random_string(256 - len(self.hs.hostname)),
}
request_data = json.dumps(data)
request, channel = self.make_request(
"POST", url, request_data, access_token=self.user_tok,
)
self.render(request)
self.assertEqual(channel.code, 400, channel.result)

def test_room_creation(self):
url = "/_matrix/client/r0/createRoom"

# Check with an alias of allowed length. There should already be
# a test that ensures it works in test_register.py, but let's be
# as cautious as possible here.
data = {
"room_alias_name": random_string(5),
}
request_data = json.dumps(data)
request, channel = self.make_request(
"POST", url, request_data, access_token=self.user_tok,
)
self.render(request)
self.assertEqual(channel.code, 200, channel.result)

def set_alias_via_state_event(self, expected_code, alias_length=5):
url = ("/_matrix/client/r0/rooms/%s/state/m.room.aliases/%s"
% (self.room_id, self.hs.hostname))

data = {
"aliases": [
self.random_alias(alias_length),
],
}
request_data = json.dumps(data)

request, channel = self.make_request(
"PUT", url, request_data, access_token=self.user_tok,
)
self.render(request)
self.assertEqual(channel.code, expected_code, channel.result)

def set_alias_via_directory(self, expected_code, alias_length=5):
url = "/_matrix/client/r0/directory/room/%s" % self.random_alias(alias_length)
data = {
"room_id": self.room_id,
}
request_data = json.dumps(data)

request, channel = self.make_request(
"PUT", url, request_data, access_token=self.user_tok,
)
self.render(request)
self.assertEqual(channel.code, expected_code, channel.result)

def random_alias(self, length):
return RoomAlias(
random_string(length),
self.hs.hostname,
).to_string()

def ensure_user_left_room(self):
self.ensure_membership("leave")

def ensure_user_joined_room(self):
self.ensure_membership("join")

def ensure_membership(self, membership):
try:
if membership == "leave":
self.helper.leave(
room=self.room_id,
user=self.user,
tok=self.user_tok,
)
if membership == "join":
self.helper.join(
room=self.room_id,
user=self.user,
tok=self.user_tok,
)
except AssertionError:
# We don't care whether the leave request didn't return a 200 (e.g.
# if the user isn't already in the room), because we only want to
# make sure the user isn't in the room.
pass