Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.
 
 
 
 
 
 

469 rader
18 KiB

  1. # Copyright 2014-2016 OpenMarket Ltd
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. import logging
  15. import random
  16. from typing import TYPE_CHECKING, Optional, Union
  17. from synapse.api.errors import (
  18. AuthError,
  19. Codes,
  20. HttpResponseException,
  21. RequestSendFailed,
  22. StoreError,
  23. SynapseError,
  24. )
  25. from synapse.storage.databases.main.media_repository import LocalMedia, RemoteMedia
  26. from synapse.types import JsonDict, Requester, UserID, create_requester
  27. from synapse.util.caches.descriptors import cached
  28. from synapse.util.stringutils import parse_and_validate_mxc_uri
  29. if TYPE_CHECKING:
  30. from synapse.server import HomeServer
  31. logger = logging.getLogger(__name__)
  32. MAX_DISPLAYNAME_LEN = 256
  33. MAX_AVATAR_URL_LEN = 1000
  34. class ProfileHandler:
  35. """Handles fetching and updating user profile information.
  36. ProfileHandler can be instantiated directly on workers and will
  37. delegate to master when necessary.
  38. """
  39. def __init__(self, hs: "HomeServer"):
  40. self.store = hs.get_datastores().main
  41. self.clock = hs.get_clock()
  42. self.hs = hs
  43. self.federation = hs.get_federation_client()
  44. hs.get_federation_registry().register_query_handler(
  45. "profile", self.on_profile_query
  46. )
  47. self.user_directory_handler = hs.get_user_directory_handler()
  48. self.request_ratelimiter = hs.get_request_ratelimiter()
  49. self.max_avatar_size = hs.config.server.max_avatar_size
  50. self.allowed_avatar_mimetypes = hs.config.server.allowed_avatar_mimetypes
  51. self._is_mine_server_name = hs.is_mine_server_name
  52. self._third_party_rules = hs.get_module_api_callbacks().third_party_event_rules
  53. async def get_profile(self, user_id: str, ignore_backoff: bool = True) -> JsonDict:
  54. target_user = UserID.from_string(user_id)
  55. if self.hs.is_mine(target_user):
  56. profileinfo = await self.store.get_profileinfo(target_user)
  57. if profileinfo.display_name is None and profileinfo.avatar_url is None:
  58. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  59. return {
  60. "displayname": profileinfo.display_name,
  61. "avatar_url": profileinfo.avatar_url,
  62. }
  63. else:
  64. try:
  65. result = await self.federation.make_query(
  66. destination=target_user.domain,
  67. query_type="profile",
  68. args={"user_id": user_id},
  69. ignore_backoff=ignore_backoff,
  70. )
  71. return result
  72. except RequestSendFailed as e:
  73. raise SynapseError(502, "Failed to fetch profile") from e
  74. except HttpResponseException as e:
  75. if e.code < 500 and e.code != 404:
  76. # Other codes are not allowed in c2s API
  77. logger.info(
  78. "Server replied with wrong response: %s %s", e.code, e.msg
  79. )
  80. raise SynapseError(502, "Failed to fetch profile")
  81. raise e.to_synapse_error()
  82. async def get_displayname(self, target_user: UserID) -> Optional[str]:
  83. if self.hs.is_mine(target_user):
  84. try:
  85. displayname = await self.store.get_profile_displayname(target_user)
  86. except StoreError as e:
  87. if e.code == 404:
  88. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  89. raise
  90. return displayname
  91. else:
  92. try:
  93. result = await self.federation.make_query(
  94. destination=target_user.domain,
  95. query_type="profile",
  96. args={"user_id": target_user.to_string(), "field": "displayname"},
  97. ignore_backoff=True,
  98. )
  99. except RequestSendFailed as e:
  100. raise SynapseError(502, "Failed to fetch profile") from e
  101. except HttpResponseException as e:
  102. raise e.to_synapse_error()
  103. return result.get("displayname")
  104. async def set_displayname(
  105. self,
  106. target_user: UserID,
  107. requester: Requester,
  108. new_displayname: str,
  109. by_admin: bool = False,
  110. deactivation: bool = False,
  111. propagate: bool = True,
  112. ) -> None:
  113. """Set the displayname of a user
  114. Args:
  115. target_user: the user whose displayname is to be changed.
  116. requester: The user attempting to make this change.
  117. new_displayname: The displayname to give this user.
  118. by_admin: Whether this change was made by an administrator.
  119. deactivation: Whether this change was made while deactivating the user.
  120. propagate: Whether this change also applies to the user's membership events.
  121. """
  122. if not self.hs.is_mine(target_user):
  123. raise SynapseError(400, "User is not hosted on this homeserver")
  124. if not by_admin and target_user != requester.user:
  125. raise AuthError(400, "Cannot set another user's displayname")
  126. if not by_admin and not self.hs.config.registration.enable_set_displayname:
  127. profile = await self.store.get_profileinfo(target_user)
  128. if profile.display_name:
  129. raise SynapseError(
  130. 400,
  131. "Changing display name is disabled on this server",
  132. Codes.FORBIDDEN,
  133. )
  134. if not isinstance(new_displayname, str):
  135. raise SynapseError(
  136. 400, "'displayname' must be a string", errcode=Codes.INVALID_PARAM
  137. )
  138. if len(new_displayname) > MAX_DISPLAYNAME_LEN:
  139. raise SynapseError(
  140. 400, "Displayname is too long (max %i)" % (MAX_DISPLAYNAME_LEN,)
  141. )
  142. displayname_to_set: Optional[str] = new_displayname.strip()
  143. if new_displayname == "":
  144. displayname_to_set = None
  145. # If the admin changes the display name of a user, the requesting user cannot send
  146. # the join event to update the display name in the rooms.
  147. # This must be done by the target user themselves.
  148. if by_admin:
  149. requester = create_requester(
  150. target_user,
  151. authenticated_entity=requester.authenticated_entity,
  152. )
  153. await self.store.set_profile_displayname(target_user, displayname_to_set)
  154. profile = await self.store.get_profileinfo(target_user)
  155. await self.user_directory_handler.handle_local_profile_change(
  156. target_user.to_string(), profile
  157. )
  158. await self._third_party_rules.on_profile_update(
  159. target_user.to_string(), profile, by_admin, deactivation
  160. )
  161. if propagate:
  162. await self._update_join_states(requester, target_user)
  163. async def get_avatar_url(self, target_user: UserID) -> Optional[str]:
  164. if self.hs.is_mine(target_user):
  165. try:
  166. avatar_url = await self.store.get_profile_avatar_url(target_user)
  167. except StoreError as e:
  168. if e.code == 404:
  169. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  170. raise
  171. return avatar_url
  172. else:
  173. try:
  174. result = await self.federation.make_query(
  175. destination=target_user.domain,
  176. query_type="profile",
  177. args={"user_id": target_user.to_string(), "field": "avatar_url"},
  178. ignore_backoff=True,
  179. )
  180. except RequestSendFailed as e:
  181. raise SynapseError(502, "Failed to fetch profile") from e
  182. except HttpResponseException as e:
  183. raise e.to_synapse_error()
  184. return result.get("avatar_url")
  185. async def set_avatar_url(
  186. self,
  187. target_user: UserID,
  188. requester: Requester,
  189. new_avatar_url: str,
  190. by_admin: bool = False,
  191. deactivation: bool = False,
  192. propagate: bool = True,
  193. ) -> None:
  194. """Set a new avatar URL for a user.
  195. Args:
  196. target_user: the user whose avatar URL is to be changed.
  197. requester: The user attempting to make this change.
  198. new_avatar_url: The avatar URL to give this user.
  199. by_admin: Whether this change was made by an administrator.
  200. deactivation: Whether this change was made while deactivating the user.
  201. propagate: Whether this change also applies to the user's membership events.
  202. """
  203. if not self.hs.is_mine(target_user):
  204. raise SynapseError(400, "User is not hosted on this homeserver")
  205. if not by_admin and target_user != requester.user:
  206. raise AuthError(400, "Cannot set another user's avatar_url")
  207. if not by_admin and not self.hs.config.registration.enable_set_avatar_url:
  208. profile = await self.store.get_profileinfo(target_user)
  209. if profile.avatar_url:
  210. raise SynapseError(
  211. 400, "Changing avatar is disabled on this server", Codes.FORBIDDEN
  212. )
  213. if not isinstance(new_avatar_url, str):
  214. raise SynapseError(
  215. 400, "'avatar_url' must be a string", errcode=Codes.INVALID_PARAM
  216. )
  217. if len(new_avatar_url) > MAX_AVATAR_URL_LEN:
  218. raise SynapseError(
  219. 400, "Avatar URL is too long (max %i)" % (MAX_AVATAR_URL_LEN,)
  220. )
  221. if not await self.check_avatar_size_and_mime_type(new_avatar_url):
  222. raise SynapseError(403, "This avatar is not allowed", Codes.FORBIDDEN)
  223. avatar_url_to_set: Optional[str] = new_avatar_url
  224. if new_avatar_url == "":
  225. avatar_url_to_set = None
  226. # Same like set_displayname
  227. if by_admin:
  228. requester = create_requester(
  229. target_user, authenticated_entity=requester.authenticated_entity
  230. )
  231. await self.store.set_profile_avatar_url(target_user, avatar_url_to_set)
  232. profile = await self.store.get_profileinfo(target_user)
  233. await self.user_directory_handler.handle_local_profile_change(
  234. target_user.to_string(), profile
  235. )
  236. await self._third_party_rules.on_profile_update(
  237. target_user.to_string(), profile, by_admin, deactivation
  238. )
  239. if propagate:
  240. await self._update_join_states(requester, target_user)
  241. @cached()
  242. async def check_avatar_size_and_mime_type(self, mxc: str) -> bool:
  243. """Check that the size and content type of the avatar at the given MXC URI are
  244. within the configured limits.
  245. If the given `mxc` is empty, no checks are performed. (Users are always able to
  246. unset their avatar.)
  247. Args:
  248. mxc: The MXC URI at which the avatar can be found.
  249. Returns:
  250. A boolean indicating whether the file can be allowed to be set as an avatar.
  251. """
  252. if mxc == "":
  253. return True
  254. if not self.max_avatar_size and not self.allowed_avatar_mimetypes:
  255. return True
  256. host, port, media_id = parse_and_validate_mxc_uri(mxc)
  257. if port is not None:
  258. server_name = host + ":" + str(port)
  259. else:
  260. server_name = host
  261. if self._is_mine_server_name(server_name):
  262. media_info: Optional[
  263. Union[LocalMedia, RemoteMedia]
  264. ] = await self.store.get_local_media(media_id)
  265. else:
  266. media_info = await self.store.get_cached_remote_media(server_name, media_id)
  267. if media_info is None:
  268. # Both configuration options need to access the file's metadata, and
  269. # retrieving remote avatars just for this becomes a bit of a faff, especially
  270. # if e.g. the file is too big. It's also generally safe to assume most files
  271. # used as avatar are uploaded locally, or if the upload didn't happen as part
  272. # of a PUT request on /avatar_url that the file was at least previewed by the
  273. # user locally (and therefore downloaded to the remote media cache).
  274. logger.warning("Forbidding avatar change to %s: avatar not on server", mxc)
  275. return False
  276. if self.max_avatar_size:
  277. # Ensure avatar does not exceed max allowed avatar size
  278. if media_info.media_length > self.max_avatar_size:
  279. logger.warning(
  280. "Forbidding avatar change to %s: %d bytes is above the allowed size "
  281. "limit",
  282. mxc,
  283. media_info.media_length,
  284. )
  285. return False
  286. if self.allowed_avatar_mimetypes:
  287. # Ensure the avatar's file type is allowed
  288. if (
  289. self.allowed_avatar_mimetypes
  290. and media_info.media_type not in self.allowed_avatar_mimetypes
  291. ):
  292. logger.warning(
  293. "Forbidding avatar change to %s: mimetype %s not allowed",
  294. mxc,
  295. media_info.media_type,
  296. )
  297. return False
  298. return True
  299. async def on_profile_query(self, args: JsonDict) -> JsonDict:
  300. """Handles federation profile query requests."""
  301. if not self.hs.config.federation.allow_profile_lookup_over_federation:
  302. raise SynapseError(
  303. 403,
  304. "Profile lookup over federation is disabled on this homeserver",
  305. Codes.FORBIDDEN,
  306. )
  307. user = UserID.from_string(args["user_id"])
  308. if not self.hs.is_mine(user):
  309. raise SynapseError(400, "User is not hosted on this homeserver")
  310. just_field = args.get("field", None)
  311. response = {}
  312. try:
  313. if just_field is None or just_field == "displayname":
  314. response["displayname"] = await self.store.get_profile_displayname(user)
  315. if just_field is None or just_field == "avatar_url":
  316. response["avatar_url"] = await self.store.get_profile_avatar_url(user)
  317. except StoreError as e:
  318. if e.code == 404:
  319. raise SynapseError(404, "Profile was not found", Codes.NOT_FOUND)
  320. raise
  321. return response
  322. async def _update_join_states(
  323. self, requester: Requester, target_user: UserID
  324. ) -> None:
  325. if not self.hs.is_mine(target_user):
  326. return
  327. await self.request_ratelimiter.ratelimit(requester)
  328. # Do not actually update the room state for shadow-banned users.
  329. if requester.shadow_banned:
  330. # We randomly sleep a bit just to annoy the requester.
  331. await self.clock.sleep(random.randint(1, 10))
  332. return
  333. room_ids = await self.store.get_rooms_for_user(target_user.to_string())
  334. for room_id in room_ids:
  335. handler = self.hs.get_room_member_handler()
  336. try:
  337. # Assume the target_user isn't a guest,
  338. # because we don't let guests set profile or avatar data.
  339. await handler.update_membership(
  340. requester,
  341. target_user,
  342. room_id,
  343. "join", # We treat a profile update like a join.
  344. ratelimit=False, # Try to hide that these events aren't atomic.
  345. )
  346. except Exception as e:
  347. logger.warning(
  348. "Failed to update join event for room %s - %s", room_id, str(e)
  349. )
  350. async def check_profile_query_allowed(
  351. self, target_user: UserID, requester: Optional[UserID] = None
  352. ) -> None:
  353. """Checks whether a profile query is allowed. If the
  354. 'require_auth_for_profile_requests' config flag is set to True and a
  355. 'requester' is provided, the query is only allowed if the two users
  356. share a room.
  357. Args:
  358. target_user: The owner of the queried profile.
  359. requester: The user querying for the profile.
  360. Raises:
  361. SynapseError(403): The two users share no room, or ne user couldn't
  362. be found to be in any room the server is in, and therefore the query
  363. is denied.
  364. """
  365. # Implementation of MSC1301: don't allow looking up profiles if the
  366. # requester isn't in the same room as the target. We expect requester to
  367. # be None when this function is called outside of a profile query, e.g.
  368. # when building a membership event. In this case, we must allow the
  369. # lookup.
  370. if (
  371. not self.hs.config.server.limit_profile_requests_to_users_who_share_rooms
  372. or not requester
  373. ):
  374. return
  375. # Always allow the user to query their own profile.
  376. if target_user.to_string() == requester.to_string():
  377. return
  378. try:
  379. requester_rooms = await self.store.get_rooms_for_user(requester.to_string())
  380. target_user_rooms = await self.store.get_rooms_for_user(
  381. target_user.to_string()
  382. )
  383. # Check if the room lists have no elements in common.
  384. if requester_rooms.isdisjoint(target_user_rooms):
  385. raise SynapseError(403, "Profile isn't available", Codes.FORBIDDEN)
  386. except StoreError as e:
  387. if e.code == 404:
  388. # This likely means that one of the users doesn't exist,
  389. # so we act as if we couldn't find the profile.
  390. raise SynapseError(403, "Profile isn't available", Codes.FORBIDDEN)
  391. raise