Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.
 
 
 
 
 
 

537 строки
20 KiB

  1. # Copyright 2015, 2016 OpenMarket Ltd
  2. # Copyright 2017 Vector Creations Ltd
  3. # Copyright 2018-2019 New Vector Ltd
  4. # Copyright 2019-2021 The Matrix.org Foundation C.I.C.
  5. #
  6. # Licensed under the Apache License, Version 2.0 (the "License");
  7. # you may not use this file except in compliance with the License.
  8. # You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing, software
  13. # distributed under the License is distributed on an "AS IS" BASIS,
  14. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. # See the License for the specific language governing permissions and
  16. # limitations under the License.
  17. import json
  18. from typing import (
  19. TYPE_CHECKING,
  20. Awaitable,
  21. Callable,
  22. Collection,
  23. Dict,
  24. Iterable,
  25. List,
  26. Mapping,
  27. Optional,
  28. Set,
  29. TypeVar,
  30. Union,
  31. )
  32. import jsonschema
  33. from jsonschema import FormatChecker
  34. from synapse.api.constants import EduTypes, EventContentFields
  35. from synapse.api.errors import SynapseError
  36. from synapse.api.presence import UserPresenceState
  37. from synapse.events import EventBase, relation_from_event
  38. from synapse.types import JsonDict, JsonMapping, RoomID, UserID
  39. if TYPE_CHECKING:
  40. from synapse.server import HomeServer
  41. FILTER_SCHEMA = {
  42. "additionalProperties": True, # Allow new fields for forward compatibility
  43. "type": "object",
  44. "properties": {
  45. "limit": {"type": "number"},
  46. "senders": {"$ref": "#/definitions/user_id_array"},
  47. "not_senders": {"$ref": "#/definitions/user_id_array"},
  48. # TODO: We don't limit event type values but we probably should...
  49. # check types are valid event types
  50. "types": {"type": "array", "items": {"type": "string"}},
  51. "not_types": {"type": "array", "items": {"type": "string"}},
  52. # MSC3874, filtering /messages.
  53. "org.matrix.msc3874.rel_types": {"type": "array", "items": {"type": "string"}},
  54. "org.matrix.msc3874.not_rel_types": {
  55. "type": "array",
  56. "items": {"type": "string"},
  57. },
  58. },
  59. }
  60. ROOM_FILTER_SCHEMA = {
  61. "additionalProperties": True, # Allow new fields for forward compatibility
  62. "type": "object",
  63. "properties": {
  64. "not_rooms": {"$ref": "#/definitions/room_id_array"},
  65. "rooms": {"$ref": "#/definitions/room_id_array"},
  66. "ephemeral": {"$ref": "#/definitions/room_event_filter"},
  67. "include_leave": {"type": "boolean"},
  68. "state": {"$ref": "#/definitions/room_event_filter"},
  69. "timeline": {"$ref": "#/definitions/room_event_filter"},
  70. "account_data": {"$ref": "#/definitions/room_event_filter"},
  71. },
  72. }
  73. ROOM_EVENT_FILTER_SCHEMA = {
  74. "additionalProperties": True, # Allow new fields for forward compatibility
  75. "type": "object",
  76. "properties": {
  77. "limit": {"type": "number"},
  78. "senders": {"$ref": "#/definitions/user_id_array"},
  79. "not_senders": {"$ref": "#/definitions/user_id_array"},
  80. "types": {"type": "array", "items": {"type": "string"}},
  81. "not_types": {"type": "array", "items": {"type": "string"}},
  82. "rooms": {"$ref": "#/definitions/room_id_array"},
  83. "not_rooms": {"$ref": "#/definitions/room_id_array"},
  84. "contains_url": {"type": "boolean"},
  85. "lazy_load_members": {"type": "boolean"},
  86. "include_redundant_members": {"type": "boolean"},
  87. "unread_thread_notifications": {"type": "boolean"},
  88. "org.matrix.msc3773.unread_thread_notifications": {"type": "boolean"},
  89. # Include or exclude events with the provided labels.
  90. # cf https://github.com/matrix-org/matrix-doc/pull/2326
  91. "org.matrix.labels": {"type": "array", "items": {"type": "string"}},
  92. "org.matrix.not_labels": {"type": "array", "items": {"type": "string"}},
  93. # MSC3440, filtering by event relations.
  94. "related_by_senders": {"type": "array", "items": {"type": "string"}},
  95. "related_by_rel_types": {"type": "array", "items": {"type": "string"}},
  96. },
  97. }
  98. USER_ID_ARRAY_SCHEMA = {
  99. "type": "array",
  100. "items": {"type": "string", "format": "matrix_user_id"},
  101. }
  102. ROOM_ID_ARRAY_SCHEMA = {
  103. "type": "array",
  104. "items": {"type": "string", "format": "matrix_room_id"},
  105. }
  106. USER_FILTER_SCHEMA = {
  107. "$schema": "http://json-schema.org/draft-04/schema#",
  108. "description": "schema for a Sync filter",
  109. "type": "object",
  110. "definitions": {
  111. "room_id_array": ROOM_ID_ARRAY_SCHEMA,
  112. "user_id_array": USER_ID_ARRAY_SCHEMA,
  113. "filter": FILTER_SCHEMA,
  114. "room_filter": ROOM_FILTER_SCHEMA,
  115. "room_event_filter": ROOM_EVENT_FILTER_SCHEMA,
  116. },
  117. "properties": {
  118. "presence": {"$ref": "#/definitions/filter"},
  119. "account_data": {"$ref": "#/definitions/filter"},
  120. "room": {"$ref": "#/definitions/room_filter"},
  121. "event_format": {"type": "string", "enum": ["client", "federation"]},
  122. "event_fields": {"type": "array", "items": {"type": "string"}},
  123. },
  124. "additionalProperties": True, # Allow new fields for forward compatibility
  125. }
  126. @FormatChecker.cls_checks("matrix_room_id")
  127. def matrix_room_id_validator(room_id: object) -> bool:
  128. return isinstance(room_id, str) and RoomID.is_valid(room_id)
  129. @FormatChecker.cls_checks("matrix_user_id")
  130. def matrix_user_id_validator(user_id: object) -> bool:
  131. return isinstance(user_id, str) and UserID.is_valid(user_id)
  132. class Filtering:
  133. def __init__(self, hs: "HomeServer"):
  134. self._hs = hs
  135. self.store = hs.get_datastores().main
  136. self.DEFAULT_FILTER_COLLECTION = FilterCollection(hs, {})
  137. async def get_user_filter(
  138. self, user_id: UserID, filter_id: Union[int, str]
  139. ) -> "FilterCollection":
  140. result = await self.store.get_user_filter(user_id, filter_id)
  141. return FilterCollection(self._hs, result)
  142. def add_user_filter(self, user_id: UserID, user_filter: JsonDict) -> Awaitable[int]:
  143. self.check_valid_filter(user_filter)
  144. return self.store.add_user_filter(user_id, user_filter)
  145. # TODO(paul): surely we should probably add a delete_user_filter or
  146. # replace_user_filter at some point? There's no REST API specified for
  147. # them however
  148. def check_valid_filter(self, user_filter_json: JsonDict) -> None:
  149. """Check if the provided filter is valid.
  150. This inspects all definitions contained within the filter.
  151. Args:
  152. user_filter_json: The filter
  153. Raises:
  154. SynapseError: If the filter is not valid.
  155. """
  156. # NB: Filters are the complete json blobs. "Definitions" are an
  157. # individual top-level key e.g. public_user_data. Filters are made of
  158. # many definitions.
  159. try:
  160. jsonschema.validate(
  161. user_filter_json, USER_FILTER_SCHEMA, format_checker=FormatChecker()
  162. )
  163. except jsonschema.ValidationError as e:
  164. raise SynapseError(400, str(e))
  165. # Filters work across events, presence EDUs, and account data.
  166. FilterEvent = TypeVar("FilterEvent", EventBase, UserPresenceState, JsonDict)
  167. class FilterCollection:
  168. def __init__(self, hs: "HomeServer", filter_json: JsonMapping):
  169. self._filter_json = filter_json
  170. room_filter_json = self._filter_json.get("room", {})
  171. self._room_filter = Filter(
  172. hs,
  173. {k: v for k, v in room_filter_json.items() if k in ("rooms", "not_rooms")},
  174. )
  175. self._room_timeline_filter = Filter(hs, room_filter_json.get("timeline", {}))
  176. self._room_state_filter = Filter(hs, room_filter_json.get("state", {}))
  177. self._room_ephemeral_filter = Filter(hs, room_filter_json.get("ephemeral", {}))
  178. self._room_account_data_filter = Filter(
  179. hs, room_filter_json.get("account_data", {})
  180. )
  181. self._presence_filter = Filter(hs, filter_json.get("presence", {}))
  182. self._global_account_data_filter = Filter(
  183. hs, filter_json.get("account_data", {})
  184. )
  185. self.include_leave = filter_json.get("room", {}).get("include_leave", False)
  186. self.event_fields = filter_json.get("event_fields", [])
  187. self.event_format = filter_json.get("event_format", "client")
  188. def __repr__(self) -> str:
  189. return "<FilterCollection %s>" % (json.dumps(self._filter_json),)
  190. def get_filter_json(self) -> JsonMapping:
  191. return self._filter_json
  192. def timeline_limit(self) -> int:
  193. return self._room_timeline_filter.limit
  194. def presence_limit(self) -> int:
  195. return self._presence_filter.limit
  196. def ephemeral_limit(self) -> int:
  197. return self._room_ephemeral_filter.limit
  198. def lazy_load_members(self) -> bool:
  199. return self._room_state_filter.lazy_load_members
  200. def include_redundant_members(self) -> bool:
  201. return self._room_state_filter.include_redundant_members
  202. def unread_thread_notifications(self) -> bool:
  203. return self._room_timeline_filter.unread_thread_notifications
  204. async def filter_presence(
  205. self, presence_states: Iterable[UserPresenceState]
  206. ) -> List[UserPresenceState]:
  207. return await self._presence_filter.filter(presence_states)
  208. async def filter_global_account_data(
  209. self, events: Iterable[JsonDict]
  210. ) -> List[JsonDict]:
  211. return await self._global_account_data_filter.filter(events)
  212. async def filter_room_state(self, events: Iterable[EventBase]) -> List[EventBase]:
  213. return await self._room_state_filter.filter(
  214. await self._room_filter.filter(events)
  215. )
  216. async def filter_room_timeline(
  217. self, events: Iterable[EventBase]
  218. ) -> List[EventBase]:
  219. return await self._room_timeline_filter.filter(
  220. await self._room_filter.filter(events)
  221. )
  222. async def filter_room_ephemeral(self, events: Iterable[JsonDict]) -> List[JsonDict]:
  223. return await self._room_ephemeral_filter.filter(
  224. await self._room_filter.filter(events)
  225. )
  226. async def filter_room_account_data(
  227. self, events: Iterable[JsonDict]
  228. ) -> List[JsonDict]:
  229. return await self._room_account_data_filter.filter(
  230. await self._room_filter.filter(events)
  231. )
  232. def blocks_all_rooms(self) -> bool:
  233. return self._room_filter.filters_all_rooms()
  234. def blocks_all_presence(self) -> bool:
  235. return (
  236. self._presence_filter.filters_all_types()
  237. or self._presence_filter.filters_all_senders()
  238. )
  239. def blocks_all_global_account_data(self) -> bool:
  240. """True if all global acount data will be filtered out."""
  241. return (
  242. self._global_account_data_filter.filters_all_types()
  243. or self._global_account_data_filter.filters_all_senders()
  244. )
  245. def blocks_all_room_ephemeral(self) -> bool:
  246. return (
  247. self._room_ephemeral_filter.filters_all_types()
  248. or self._room_ephemeral_filter.filters_all_senders()
  249. or self._room_ephemeral_filter.filters_all_rooms()
  250. )
  251. def blocks_all_room_account_data(self) -> bool:
  252. return (
  253. self._room_account_data_filter.filters_all_types()
  254. or self._room_account_data_filter.filters_all_senders()
  255. or self._room_account_data_filter.filters_all_rooms()
  256. )
  257. def blocks_all_room_timeline(self) -> bool:
  258. return (
  259. self._room_timeline_filter.filters_all_types()
  260. or self._room_timeline_filter.filters_all_senders()
  261. or self._room_timeline_filter.filters_all_rooms()
  262. )
  263. class Filter:
  264. def __init__(self, hs: "HomeServer", filter_json: JsonMapping):
  265. self._hs = hs
  266. self._store = hs.get_datastores().main
  267. self.filter_json = filter_json
  268. self.limit = filter_json.get("limit", 10)
  269. self.lazy_load_members = filter_json.get("lazy_load_members", False)
  270. self.include_redundant_members = filter_json.get(
  271. "include_redundant_members", False
  272. )
  273. self.unread_thread_notifications: bool = filter_json.get(
  274. "unread_thread_notifications", False
  275. )
  276. if (
  277. not self.unread_thread_notifications
  278. and hs.config.experimental.msc3773_enabled
  279. ):
  280. self.unread_thread_notifications = filter_json.get(
  281. "org.matrix.msc3773.unread_thread_notifications", False
  282. )
  283. self.types = filter_json.get("types", None)
  284. self.not_types = filter_json.get("not_types", [])
  285. self.rooms = filter_json.get("rooms", None)
  286. self.not_rooms = filter_json.get("not_rooms", [])
  287. self.senders = filter_json.get("senders", None)
  288. self.not_senders = filter_json.get("not_senders", [])
  289. self.contains_url = filter_json.get("contains_url", None)
  290. self.labels = filter_json.get("org.matrix.labels", None)
  291. self.not_labels = filter_json.get("org.matrix.not_labels", [])
  292. self.related_by_senders = filter_json.get("related_by_senders", None)
  293. self.related_by_rel_types = filter_json.get("related_by_rel_types", None)
  294. # For compatibility with _check_fields.
  295. self.rel_types = None
  296. self.not_rel_types = []
  297. if hs.config.experimental.msc3874_enabled:
  298. self.rel_types = filter_json.get("org.matrix.msc3874.rel_types", None)
  299. self.not_rel_types = filter_json.get("org.matrix.msc3874.not_rel_types", [])
  300. def filters_all_types(self) -> bool:
  301. return self.types == [] or "*" in self.not_types
  302. def filters_all_senders(self) -> bool:
  303. return self.senders == [] or "*" in self.not_senders
  304. def filters_all_rooms(self) -> bool:
  305. return self.rooms == [] or "*" in self.not_rooms
  306. def _check(self, event: FilterEvent) -> bool:
  307. """Checks whether the filter matches the given event.
  308. Args:
  309. event: The event, account data, or presence to check against this
  310. filter.
  311. Returns:
  312. True if the event matches the filter.
  313. """
  314. # We usually get the full "events" as dictionaries coming through,
  315. # except for presence which actually gets passed around as its own type.
  316. if isinstance(event, UserPresenceState):
  317. user_id = event.user_id
  318. field_matchers = {
  319. "senders": lambda v: user_id == v,
  320. "types": lambda v: EduTypes.PRESENCE == v,
  321. }
  322. return self._check_fields(field_matchers)
  323. else:
  324. content = event.get("content")
  325. # Content is assumed to be a mapping below, so ensure it is. This should
  326. # always be true for events, but account_data has been allowed to
  327. # have non-dict content.
  328. if not isinstance(content, Mapping):
  329. content = {}
  330. sender = event.get("sender", None)
  331. if not sender:
  332. # Presence events had their 'sender' in content.user_id, but are
  333. # now handled above. We don't know if anything else uses this
  334. # form. TODO: Check this and probably remove it.
  335. sender = content.get("user_id")
  336. room_id = event.get("room_id", None)
  337. ev_type = event.get("type", None)
  338. # check if there is a string url field in the content for filtering purposes
  339. labels = content.get(EventContentFields.LABELS, [])
  340. # Check if the event has a relation.
  341. rel_type = None
  342. if isinstance(event, EventBase):
  343. relation = relation_from_event(event)
  344. if relation:
  345. rel_type = relation.rel_type
  346. field_matchers = {
  347. "rooms": lambda v: room_id == v,
  348. "senders": lambda v: sender == v,
  349. "types": lambda v: _matches_wildcard(ev_type, v),
  350. "labels": lambda v: v in labels,
  351. "rel_types": lambda v: rel_type == v,
  352. }
  353. result = self._check_fields(field_matchers)
  354. if not result:
  355. return result
  356. contains_url_filter = self.contains_url
  357. if contains_url_filter is not None:
  358. contains_url = isinstance(content.get("url"), str)
  359. if contains_url_filter != contains_url:
  360. return False
  361. return True
  362. def _check_fields(self, field_matchers: Dict[str, Callable[[str], bool]]) -> bool:
  363. """Checks whether the filter matches the given event fields.
  364. Args:
  365. field_matchers: A map of attribute name to callable to use for checking
  366. particular fields.
  367. The attribute name and an inverse (not_<attribute name>) must
  368. exist on the Filter.
  369. The callable should return true if the event's value matches the
  370. filter's value.
  371. Returns:
  372. True if the event fields match
  373. """
  374. for name, match_func in field_matchers.items():
  375. # If the event matches one of the disallowed values, reject it.
  376. not_name = "not_%s" % (name,)
  377. disallowed_values = getattr(self, not_name)
  378. if any(map(match_func, disallowed_values)):
  379. return False
  380. # Otherwise if the event does not match at least one of the allowed
  381. # values, reject it.
  382. allowed_values = getattr(self, name)
  383. if allowed_values is not None:
  384. if not any(map(match_func, allowed_values)):
  385. return False
  386. # Otherwise, accept it.
  387. return True
  388. def filter_rooms(self, room_ids: Iterable[str]) -> Set[str]:
  389. """Apply the 'rooms' filter to a given list of rooms.
  390. Args:
  391. room_ids: A list of room_ids.
  392. Returns:
  393. A list of room_ids that match the filter
  394. """
  395. room_ids = set(room_ids)
  396. disallowed_rooms = set(self.not_rooms)
  397. room_ids -= disallowed_rooms
  398. allowed_rooms = self.rooms
  399. if allowed_rooms is not None:
  400. room_ids &= set(allowed_rooms)
  401. return room_ids
  402. async def _check_event_relations(
  403. self, events: Collection[FilterEvent]
  404. ) -> List[FilterEvent]:
  405. # The event IDs to check, mypy doesn't understand the isinstance check.
  406. event_ids = [event.event_id for event in events if isinstance(event, EventBase)] # type: ignore[attr-defined]
  407. event_ids_to_keep = set(
  408. await self._store.events_have_relations(
  409. event_ids, self.related_by_senders, self.related_by_rel_types
  410. )
  411. )
  412. return [
  413. event
  414. for event in events
  415. if not isinstance(event, EventBase) or event.event_id in event_ids_to_keep
  416. ]
  417. async def filter(self, events: Iterable[FilterEvent]) -> List[FilterEvent]:
  418. result = [event for event in events if self._check(event)]
  419. if self.related_by_senders or self.related_by_rel_types:
  420. return await self._check_event_relations(result)
  421. return result
  422. def with_room_ids(self, room_ids: Iterable[str]) -> "Filter":
  423. """Returns a new filter with the given room IDs appended.
  424. Args:
  425. room_ids: The room_ids to add
  426. Returns:
  427. filter: A new filter including the given rooms and the old
  428. filter's rooms.
  429. """
  430. newFilter = Filter(self._hs, self.filter_json)
  431. newFilter.rooms += room_ids
  432. return newFilter
  433. def _matches_wildcard(actual_value: Optional[str], filter_value: str) -> bool:
  434. if filter_value.endswith("*") and isinstance(actual_value, str):
  435. type_prefix = filter_value[:-1]
  436. return actual_value.startswith(type_prefix)
  437. else:
  438. return actual_value == filter_value