|
|
|
|
@ -1,26 +1,36 @@
|
|
|
|
|
use std::{borrow::Borrow, collections::BTreeSet};
|
|
|
|
|
|
|
|
|
|
use ed25519_dalek::{Verifier, VerifyingKey};
|
|
|
|
|
use futures::{
|
|
|
|
|
Future,
|
|
|
|
|
future::{OptionFuture, join, join3},
|
|
|
|
|
};
|
|
|
|
|
use itertools::Itertools;
|
|
|
|
|
use ruma::{
|
|
|
|
|
Int, OwnedUserId, RoomVersionId, UserId,
|
|
|
|
|
CanonicalJsonObject, Int, OwnedUserId, RoomVersionId, UserId,
|
|
|
|
|
canonical_json::to_canonical_value,
|
|
|
|
|
events::room::{
|
|
|
|
|
create::RoomCreateEventContent,
|
|
|
|
|
join_rules::{JoinRule, RoomJoinRulesEventContent},
|
|
|
|
|
member::{MembershipState, ThirdPartyInvite},
|
|
|
|
|
power_levels::RoomPowerLevelsEventContent,
|
|
|
|
|
third_party_invite::RoomThirdPartyInviteEventContent,
|
|
|
|
|
third_party_invite::{PublicKey, RoomThirdPartyInviteEventContent},
|
|
|
|
|
},
|
|
|
|
|
int,
|
|
|
|
|
serde::{Base64, Raw},
|
|
|
|
|
serde::{
|
|
|
|
|
Base64, Base64DecodeError, Raw,
|
|
|
|
|
base64::{Standard, UrlSafe},
|
|
|
|
|
},
|
|
|
|
|
signatures::{ParseError, VerificationError},
|
|
|
|
|
};
|
|
|
|
|
use serde::{
|
|
|
|
|
Deserialize,
|
|
|
|
|
de::{Error as _, IgnoredAny},
|
|
|
|
|
};
|
|
|
|
|
use serde_json::{from_str as from_json_str, value::RawValue as RawJsonValue};
|
|
|
|
|
use serde_json::{
|
|
|
|
|
from_str as from_json_str, to_value,
|
|
|
|
|
value::{RawValue as RawJsonValue, to_raw_value},
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
use super::{
|
|
|
|
|
Error, Event, Result, StateEventType, StateKey, TimelineEventType,
|
|
|
|
|
@ -30,7 +40,7 @@ use super::{
|
|
|
|
|
},
|
|
|
|
|
room_version::RoomVersion,
|
|
|
|
|
};
|
|
|
|
|
use crate::{debug, error, trace, warn};
|
|
|
|
|
use crate::{debug, error, trace, utils::to_canonical_object, warn};
|
|
|
|
|
|
|
|
|
|
// FIXME: field extracting could be bundled for `content`
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
|
@ -157,15 +167,14 @@ pub fn auth_types_for_event(
|
|
|
|
|
pub async fn auth_check<E, F, Fut>(
|
|
|
|
|
room_version: &RoomVersion,
|
|
|
|
|
incoming_event: &E,
|
|
|
|
|
current_third_party_invite: Option<&E>,
|
|
|
|
|
fetch_state: F,
|
|
|
|
|
create_event: &E,
|
|
|
|
|
) -> Result<bool, Error>
|
|
|
|
|
where
|
|
|
|
|
F: Fn(&StateEventType, &str) -> Fut + Send,
|
|
|
|
|
F: Fn(&StateEventType, &str) -> Fut + Send + Sync,
|
|
|
|
|
Fut: Future<Output = Option<E>> + Send,
|
|
|
|
|
E: Event + Send + Sync,
|
|
|
|
|
for<'a> &'a E: Event + Send,
|
|
|
|
|
for<'a> &'a E: Event + Send + Sync,
|
|
|
|
|
{
|
|
|
|
|
debug!(
|
|
|
|
|
event_id = %incoming_event.event_id(),
|
|
|
|
|
@ -415,13 +424,15 @@ where
|
|
|
|
|
sender,
|
|
|
|
|
sender_member_event.as_ref(),
|
|
|
|
|
incoming_event,
|
|
|
|
|
current_third_party_invite,
|
|
|
|
|
power_levels_event.as_ref(),
|
|
|
|
|
join_rules_event.as_ref(),
|
|
|
|
|
user_for_join_auth.as_deref(),
|
|
|
|
|
&user_for_join_auth_membership,
|
|
|
|
|
&room_create_event,
|
|
|
|
|
)? {
|
|
|
|
|
&fetch_state,
|
|
|
|
|
)
|
|
|
|
|
.await?
|
|
|
|
|
{
|
|
|
|
|
return Ok(false);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@ -658,23 +669,25 @@ where
|
|
|
|
|
/// event and the current State.
|
|
|
|
|
#[allow(clippy::too_many_arguments)]
|
|
|
|
|
#[allow(clippy::cognitive_complexity)]
|
|
|
|
|
fn valid_membership_change<E>(
|
|
|
|
|
async fn valid_membership_change<F, Fut, E>(
|
|
|
|
|
room_version: &RoomVersion,
|
|
|
|
|
target_user: &UserId,
|
|
|
|
|
target_user_membership_event: Option<&E>,
|
|
|
|
|
sender: &UserId,
|
|
|
|
|
sender_membership_event: Option<&E>,
|
|
|
|
|
current_event: &E,
|
|
|
|
|
current_third_party_invite: Option<&E>,
|
|
|
|
|
power_levels_event: Option<&E>,
|
|
|
|
|
join_rules_event: Option<&E>,
|
|
|
|
|
user_for_join_auth: Option<&UserId>,
|
|
|
|
|
user_for_join_auth_membership: &MembershipState,
|
|
|
|
|
create_room: &E,
|
|
|
|
|
fetch_state: &F,
|
|
|
|
|
) -> Result<bool>
|
|
|
|
|
where
|
|
|
|
|
F: Fn(&StateEventType, &str) -> Fut + Send + Sync,
|
|
|
|
|
Fut: Future<Output = Option<E>> + Send,
|
|
|
|
|
E: Event + Send + Sync,
|
|
|
|
|
for<'a> &'a E: Event + Send,
|
|
|
|
|
for<'a> &'a E: Event + Send + Sync,
|
|
|
|
|
{
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
|
struct GetThirdPartyInvite {
|
|
|
|
|
@ -950,68 +963,62 @@ where
|
|
|
|
|
| MembershipState::Invite => {
|
|
|
|
|
// If content has third_party_invite key
|
|
|
|
|
trace!("starting target_membership=invite check");
|
|
|
|
|
match third_party_invite.and_then(|i| i.deserialize().ok()) {
|
|
|
|
|
| Some(tp_id) =>
|
|
|
|
|
if target_user_current_membership == MembershipState::Ban {
|
|
|
|
|
warn!(?target_user_membership_event_id, "Can't invite banned user");
|
|
|
|
|
false
|
|
|
|
|
} else {
|
|
|
|
|
let allow = verify_third_party_invite(
|
|
|
|
|
Some(target_user),
|
|
|
|
|
sender,
|
|
|
|
|
&tp_id,
|
|
|
|
|
current_third_party_invite,
|
|
|
|
|
);
|
|
|
|
|
if !allow {
|
|
|
|
|
warn!("Third party invite invalid");
|
|
|
|
|
}
|
|
|
|
|
allow
|
|
|
|
|
},
|
|
|
|
|
| _ =>
|
|
|
|
|
if !sender_is_joined {
|
|
|
|
|
warn!(
|
|
|
|
|
%sender,
|
|
|
|
|
?sender_membership_event_id,
|
|
|
|
|
?sender_membership,
|
|
|
|
|
"sender cannot produce an invite without being joined to the room",
|
|
|
|
|
);
|
|
|
|
|
false
|
|
|
|
|
} else if matches!(
|
|
|
|
|
target_user_current_membership,
|
|
|
|
|
MembershipState::Join | MembershipState::Ban
|
|
|
|
|
) {
|
|
|
|
|
warn!(
|
|
|
|
|
?target_user_membership_event_id,
|
|
|
|
|
?target_user_current_membership,
|
|
|
|
|
"cannot invite a user who is banned or already joined",
|
|
|
|
|
);
|
|
|
|
|
false
|
|
|
|
|
} else {
|
|
|
|
|
let allow = sender_creator
|
|
|
|
|
|| sender_power
|
|
|
|
|
.filter(|&p| p >= &power_levels.invite)
|
|
|
|
|
.is_some();
|
|
|
|
|
if !allow {
|
|
|
|
|
warn!(
|
|
|
|
|
%sender,
|
|
|
|
|
has=?sender_power,
|
|
|
|
|
required=?power_levels.invite,
|
|
|
|
|
"sender does not have enough power to produce invites",
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
trace!(
|
|
|
|
|
%sender,
|
|
|
|
|
?sender_membership_event_id,
|
|
|
|
|
?sender_membership,
|
|
|
|
|
?target_user_membership_event_id,
|
|
|
|
|
?target_user_current_membership,
|
|
|
|
|
sender_pl=?sender_power,
|
|
|
|
|
required_pl=?power_levels.invite,
|
|
|
|
|
"allowing invite"
|
|
|
|
|
);
|
|
|
|
|
allow
|
|
|
|
|
},
|
|
|
|
|
if let Some(third_party_invite) = third_party_invite {
|
|
|
|
|
let allow = verify_third_party_invite(
|
|
|
|
|
target_user_current_membership,
|
|
|
|
|
&serde_json::to_value(third_party_invite)?,
|
|
|
|
|
target_user,
|
|
|
|
|
current_event,
|
|
|
|
|
fetch_state,
|
|
|
|
|
)
|
|
|
|
|
.await;
|
|
|
|
|
if !allow {
|
|
|
|
|
warn!("Third party invite invalid");
|
|
|
|
|
}
|
|
|
|
|
return Ok(allow);
|
|
|
|
|
}
|
|
|
|
|
if !sender_is_joined {
|
|
|
|
|
warn!(
|
|
|
|
|
%sender,
|
|
|
|
|
?sender_membership_event_id,
|
|
|
|
|
?sender_membership,
|
|
|
|
|
"sender cannot produce an invite without being joined to the room",
|
|
|
|
|
);
|
|
|
|
|
return Ok(false);
|
|
|
|
|
} else if matches!(
|
|
|
|
|
target_user_current_membership,
|
|
|
|
|
MembershipState::Join | MembershipState::Ban
|
|
|
|
|
) {
|
|
|
|
|
warn!(
|
|
|
|
|
?target_user_membership_event_id,
|
|
|
|
|
?target_user_current_membership,
|
|
|
|
|
"cannot invite a user who is banned or already joined",
|
|
|
|
|
);
|
|
|
|
|
return Ok(false);
|
|
|
|
|
}
|
|
|
|
|
let allow = sender_creator
|
|
|
|
|
|| sender_power
|
|
|
|
|
.filter(|&p| p >= &power_levels.invite)
|
|
|
|
|
.is_some();
|
|
|
|
|
if !allow {
|
|
|
|
|
warn!(
|
|
|
|
|
%sender,
|
|
|
|
|
has=?sender_power,
|
|
|
|
|
required=?power_levels.invite,
|
|
|
|
|
"sender does not have enough power to produce invites",
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
trace!(
|
|
|
|
|
%sender,
|
|
|
|
|
?sender_membership_event_id,
|
|
|
|
|
?sender_membership,
|
|
|
|
|
?target_user_membership_event_id,
|
|
|
|
|
?target_user_current_membership,
|
|
|
|
|
sender_pl=?sender_power,
|
|
|
|
|
required_pl=?power_levels.invite,
|
|
|
|
|
"allowing invite"
|
|
|
|
|
);
|
|
|
|
|
return Ok(allow);
|
|
|
|
|
},
|
|
|
|
|
| MembershipState::Leave => {
|
|
|
|
|
let can_unban = if target_user_current_membership == MembershipState::Ban {
|
|
|
|
|
@ -1499,399 +1506,187 @@ fn get_send_level(
|
|
|
|
|
.unwrap_or_else(|| if state_key.is_some() { int!(50) } else { int!(0) })
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn verify_third_party_invite(
|
|
|
|
|
target_user: Option<&UserId>,
|
|
|
|
|
sender: &UserId,
|
|
|
|
|
tp_id: &ThirdPartyInvite,
|
|
|
|
|
current_third_party_invite: Option<&impl Event>,
|
|
|
|
|
) -> bool {
|
|
|
|
|
// 1. Check for user being banned happens before this is called
|
|
|
|
|
// checking for mxid and token keys is done by ruma when deserializing
|
|
|
|
|
fn verify_payload(pk: &[u8], sig: &[u8], c: &[u8]) -> Result<(), ruma::signatures::Error> {
|
|
|
|
|
VerifyingKey::from_bytes(
|
|
|
|
|
pk.try_into()
|
|
|
|
|
.map_err(|_| ParseError::PublicKey(ed25519_dalek::SignatureError::new()))?,
|
|
|
|
|
)
|
|
|
|
|
.map_err(ParseError::PublicKey)?
|
|
|
|
|
.verify(c, &sig.try_into().map_err(ParseError::Signature)?)
|
|
|
|
|
.map_err(VerificationError::Signature)
|
|
|
|
|
.map_err(ruma::signatures::Error::from)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// The state key must match the invitee
|
|
|
|
|
if target_user != Some(&tp_id.signed.mxid) {
|
|
|
|
|
/// Decodes a base64 string as either URL-safe or standard base64, as per the
|
|
|
|
|
/// spec. It attempts to decode urlsafe first.
|
|
|
|
|
fn decode_base64(content: &str) -> Result<Vec<u8>, Base64DecodeError> {
|
|
|
|
|
if let Ok(decoded) = Base64::<UrlSafe>::parse(content) {
|
|
|
|
|
Ok(decoded.as_bytes().to_vec())
|
|
|
|
|
} else {
|
|
|
|
|
Base64::<Standard>::parse(content).map(|v| v.as_bytes().to_vec())
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn get_public_keys(event: &CanonicalJsonObject) -> Vec<Vec<u8>> {
|
|
|
|
|
let mut public_keys = Vec::new();
|
|
|
|
|
if let Some(public_key) = event.get("public_key").and_then(|v| v.as_str()) {
|
|
|
|
|
if let Ok(v) = decode_base64(public_key) {
|
|
|
|
|
trace!(
|
|
|
|
|
encoded = public_key,
|
|
|
|
|
decoded = ?v,
|
|
|
|
|
"found public key in public_key property of m.room.third_party_invite event",
|
|
|
|
|
);
|
|
|
|
|
public_keys.push(v);
|
|
|
|
|
} else {
|
|
|
|
|
warn!("m.room.third_party_invite event has invalid public_key");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if let Some(keys) = event.get("public_keys").and_then(|v| v.as_array()) {
|
|
|
|
|
for key in keys {
|
|
|
|
|
if let Some(key_obj) = key.as_object() {
|
|
|
|
|
if let Some(public_key) = key_obj.get("public_key").and_then(|v| v.as_str()) {
|
|
|
|
|
if let Ok(v) = decode_base64(public_key) {
|
|
|
|
|
trace!(
|
|
|
|
|
encoded = public_key,
|
|
|
|
|
decoded = ?v,
|
|
|
|
|
"found public key in public_keys list of m.room.third_party_invite \
|
|
|
|
|
event",
|
|
|
|
|
);
|
|
|
|
|
public_keys.push(v);
|
|
|
|
|
} else {
|
|
|
|
|
warn!(
|
|
|
|
|
"m.room.third_party_invite event has invalid public_key in \
|
|
|
|
|
public_keys list"
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
warn!(
|
|
|
|
|
"m.room.third_party_invite event has entry in public_keys list missing \
|
|
|
|
|
public_key property"
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
warn!(
|
|
|
|
|
"m.room.third_party_invite event has invalid entry in public_keys list, \
|
|
|
|
|
expected object"
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
public_keys
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Checks a third-party invite is valid.
|
|
|
|
|
async fn verify_third_party_invite<F, Fut, E>(
|
|
|
|
|
target_current_membership: MembershipState,
|
|
|
|
|
raw_third_party_invite: &serde_json::Value,
|
|
|
|
|
target: &UserId,
|
|
|
|
|
event: &E,
|
|
|
|
|
fetch_state: &F,
|
|
|
|
|
) -> bool
|
|
|
|
|
where
|
|
|
|
|
F: Fn(&StateEventType, &str) -> Fut + Send + Sync,
|
|
|
|
|
Fut: Future<Output = Option<E>> + Send,
|
|
|
|
|
E: Event + Send + Sync,
|
|
|
|
|
for<'a> &'a E: Event + Send + Sync,
|
|
|
|
|
{
|
|
|
|
|
// 4.1.1: If target user is banned, reject.
|
|
|
|
|
if target_current_membership == MembershipState::Ban {
|
|
|
|
|
warn!("invite target is banned");
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
// 4.1.2: If content.third_party_invite does not have a signed property, reject.
|
|
|
|
|
let Some(signed) = raw_third_party_invite.get("signed") else {
|
|
|
|
|
warn!("invite event third_party_invite missing signed property");
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
// 4.2.3: If signed does not have mxid and token properties, reject.
|
|
|
|
|
let Some(mxid) = signed.get("mxid").and_then(|v| v.as_str()) else {
|
|
|
|
|
warn!("invite event third_party_invite signed missing/invalid mxid property");
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
let Some(token) = signed.get("token").and_then(|v| v.as_str()) else {
|
|
|
|
|
warn!("invite event third_party_invite signed missing token property");
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
// 4.2.4: If mxid does not match state_key, reject.
|
|
|
|
|
if mxid != target.as_str() {
|
|
|
|
|
warn!("invite event third_party_invite signed mxid does not match state_key");
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
// 4.2.5: If there is no m.room.third_party_invite event in the room
|
|
|
|
|
// state matching the token, reject.
|
|
|
|
|
let Some(third_party_invite_event) =
|
|
|
|
|
fetch_state(&StateEventType::RoomThirdPartyInvite, token).await
|
|
|
|
|
else {
|
|
|
|
|
warn!("invite event third_party_invite token has no matching m.room.third_party_invite");
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
// 4.2.6: If sender does not match sender of the m.room.third_party_invite,
|
|
|
|
|
// reject.
|
|
|
|
|
if third_party_invite_event.sender() != event.sender() {
|
|
|
|
|
warn!("invite event sender does not match m.room.third_party_invite sender");
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
// 4.2.7: If any signature in signed matches any public key in the
|
|
|
|
|
// m.room.third_party_invite event, allow. The public keys are in
|
|
|
|
|
// content of m.room.third_party_invite as:
|
|
|
|
|
// 1. A single public key in the public_key property.
|
|
|
|
|
// 2. A list of public keys in the public_keys property.
|
|
|
|
|
debug!(
|
|
|
|
|
"Fetching signatures in third-party-invite event {}",
|
|
|
|
|
third_party_invite_event.event_id()
|
|
|
|
|
);
|
|
|
|
|
trace!("third-party-invite event content: {}", third_party_invite_event.content().get());
|
|
|
|
|
|
|
|
|
|
// If there is no m.room.third_party_invite event in the current room state with
|
|
|
|
|
// state_key matching token, reject
|
|
|
|
|
#[allow(clippy::manual_let_else)]
|
|
|
|
|
let current_tpid = match current_third_party_invite {
|
|
|
|
|
| Some(id) => id,
|
|
|
|
|
| None => return false,
|
|
|
|
|
let Some(signatures) = signed.get("signatures").and_then(|v| v.as_object()) else {
|
|
|
|
|
warn!("invite event third_party_invite signed missing/invalid signatures");
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if current_tpid.state_key() != Some(&tp_id.signed.token) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if sender != current_tpid.sender() {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If any signature in signed matches any public key in the
|
|
|
|
|
// m.room.third_party_invite event, allow
|
|
|
|
|
#[allow(clippy::manual_let_else)]
|
|
|
|
|
let tpid_ev =
|
|
|
|
|
match from_json_str::<RoomThirdPartyInviteEventContent>(current_tpid.content().get()) {
|
|
|
|
|
| Ok(ev) => ev,
|
|
|
|
|
| Err(_) => return false,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
#[allow(clippy::manual_let_else)]
|
|
|
|
|
let decoded_invite_token = match Base64::parse(&tp_id.signed.token) {
|
|
|
|
|
| Ok(tok) => tok,
|
|
|
|
|
// FIXME: Log a warning?
|
|
|
|
|
| Err(_) => return false,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// A list of public keys in the public_keys field
|
|
|
|
|
for key in tpid_ev.public_keys.unwrap_or_default() {
|
|
|
|
|
if key.public_key == decoded_invite_token {
|
|
|
|
|
return true;
|
|
|
|
|
for pk in get_public_keys(
|
|
|
|
|
&to_canonical_object(third_party_invite_event.content())
|
|
|
|
|
.expect("m.room.third_party_invite event content is not a JSON object"),
|
|
|
|
|
) {
|
|
|
|
|
// signatures -> { server_name: { ed25519:N: signature } }
|
|
|
|
|
for (server_name, server_sigs) in signatures {
|
|
|
|
|
trace!("Searching for signatures from {}", server_name);
|
|
|
|
|
if let Some(server_sigs) = server_sigs.as_object() {
|
|
|
|
|
for (key_id, signature_value) in server_sigs {
|
|
|
|
|
trace!("Checking signature with key id {}", key_id);
|
|
|
|
|
if let Some(signature_str) = signature_value.as_str() {
|
|
|
|
|
if let Ok(signature) = decode_base64(signature_str) {
|
|
|
|
|
debug!(
|
|
|
|
|
%server_name,
|
|
|
|
|
%key_id,
|
|
|
|
|
"verifying third-party invite signature",
|
|
|
|
|
);
|
|
|
|
|
match verify_payload(
|
|
|
|
|
&pk,
|
|
|
|
|
&signature,
|
|
|
|
|
serde_json::to_string(&to_canonical_value(signed).unwrap())
|
|
|
|
|
.unwrap()
|
|
|
|
|
.as_bytes(),
|
|
|
|
|
) {
|
|
|
|
|
| Ok(()) => {
|
|
|
|
|
debug!("valid third-party invite signature found");
|
|
|
|
|
return true;
|
|
|
|
|
},
|
|
|
|
|
| Err(e) => {
|
|
|
|
|
warn!(
|
|
|
|
|
%server_name,
|
|
|
|
|
%key_id,
|
|
|
|
|
"invalid third-party invite signature: {e}",
|
|
|
|
|
);
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// A single public key in the public_key field
|
|
|
|
|
tpid_ev.public_key == decoded_invite_token
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
|
mod tests {
|
|
|
|
|
use ruma::events::{
|
|
|
|
|
StateEventType, TimelineEventType,
|
|
|
|
|
room::{
|
|
|
|
|
join_rules::{
|
|
|
|
|
AllowRule, JoinRule, Restricted, RoomJoinRulesEventContent, RoomMembership,
|
|
|
|
|
},
|
|
|
|
|
member::{MembershipState, RoomMemberEventContent},
|
|
|
|
|
},
|
|
|
|
|
};
|
|
|
|
|
use serde_json::value::to_raw_value as to_raw_json_value;
|
|
|
|
|
|
|
|
|
|
use crate::{
|
|
|
|
|
matrix::{Event, EventTypeExt, Pdu as PduEvent},
|
|
|
|
|
state_res::{
|
|
|
|
|
RoomVersion, StateMap,
|
|
|
|
|
event_auth::valid_membership_change,
|
|
|
|
|
test_utils::{
|
|
|
|
|
INITIAL_EVENTS, INITIAL_EVENTS_CREATE_ROOM, alice, charlie, ella, event_id,
|
|
|
|
|
member_content_ban, member_content_join, room_id, to_pdu_event,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_ban_pass() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let events = INITIAL_EVENTS();
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
alice(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(charlie().as_str()),
|
|
|
|
|
member_content_ban(),
|
|
|
|
|
&[],
|
|
|
|
|
&["IMC"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = charlie();
|
|
|
|
|
let sender = alice();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
valid_membership_change(
|
|
|
|
|
&RoomVersion::V6,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
None,
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_join_non_creator() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let events = INITIAL_EVENTS_CREATE_ROOM();
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
charlie(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(charlie().as_str()),
|
|
|
|
|
member_content_join(),
|
|
|
|
|
&["CREATE"],
|
|
|
|
|
&["CREATE"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = charlie();
|
|
|
|
|
let sender = charlie();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
!valid_membership_change(
|
|
|
|
|
&RoomVersion::V6,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
None,
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_join_creator() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let events = INITIAL_EVENTS_CREATE_ROOM();
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
alice(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(alice().as_str()),
|
|
|
|
|
member_content_join(),
|
|
|
|
|
&["CREATE"],
|
|
|
|
|
&["CREATE"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = alice();
|
|
|
|
|
let sender = alice();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
valid_membership_change(
|
|
|
|
|
&RoomVersion::V6,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
None,
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_ban_fail() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let events = INITIAL_EVENTS();
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
charlie(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(alice().as_str()),
|
|
|
|
|
member_content_ban(),
|
|
|
|
|
&[],
|
|
|
|
|
&["IMC"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = alice();
|
|
|
|
|
let sender = charlie();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
!valid_membership_change(
|
|
|
|
|
&RoomVersion::V6,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
None,
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_restricted_join_rule() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let mut events = INITIAL_EVENTS();
|
|
|
|
|
*events.get_mut(&event_id("IJR")).unwrap() = to_pdu_event(
|
|
|
|
|
"IJR",
|
|
|
|
|
alice(),
|
|
|
|
|
TimelineEventType::RoomJoinRules,
|
|
|
|
|
Some(""),
|
|
|
|
|
to_raw_json_value(&RoomJoinRulesEventContent::new(JoinRule::Restricted(
|
|
|
|
|
Restricted::new(vec![AllowRule::RoomMembership(RoomMembership::new(
|
|
|
|
|
room_id().to_owned(),
|
|
|
|
|
))]),
|
|
|
|
|
)))
|
|
|
|
|
.unwrap(),
|
|
|
|
|
&["CREATE", "IMA", "IPOWER"],
|
|
|
|
|
&["IPOWER"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let mut member = RoomMemberEventContent::new(MembershipState::Join);
|
|
|
|
|
member.join_authorized_via_users_server = Some(alice().to_owned());
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
ella(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(ella().as_str()),
|
|
|
|
|
to_raw_json_value(&RoomMemberEventContent::new(MembershipState::Join)).unwrap(),
|
|
|
|
|
&["CREATE", "IJR", "IPOWER", "new"],
|
|
|
|
|
&["new"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = ella();
|
|
|
|
|
let sender = ella();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
valid_membership_change(
|
|
|
|
|
&RoomVersion::V9,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
Some(alice()),
|
|
|
|
|
&MembershipState::Join,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
!valid_membership_change(
|
|
|
|
|
&RoomVersion::V9,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
Some(ella()),
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_knock() {
|
|
|
|
|
let _ = tracing::subscriber::set_default(
|
|
|
|
|
tracing_subscriber::fmt().with_test_writer().finish(),
|
|
|
|
|
);
|
|
|
|
|
let mut events = INITIAL_EVENTS();
|
|
|
|
|
*events.get_mut(&event_id("IJR")).unwrap() = to_pdu_event(
|
|
|
|
|
"IJR",
|
|
|
|
|
alice(),
|
|
|
|
|
TimelineEventType::RoomJoinRules,
|
|
|
|
|
Some(""),
|
|
|
|
|
to_raw_json_value(&RoomJoinRulesEventContent::new(JoinRule::Knock)).unwrap(),
|
|
|
|
|
&["CREATE", "IMA", "IPOWER"],
|
|
|
|
|
&["IPOWER"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let auth_events = events
|
|
|
|
|
.values()
|
|
|
|
|
.map(|ev| (ev.event_type().with_state_key(ev.state_key().unwrap()), ev.clone()))
|
|
|
|
|
.collect::<StateMap<_>>();
|
|
|
|
|
|
|
|
|
|
let requester = to_pdu_event(
|
|
|
|
|
"HELLO",
|
|
|
|
|
ella(),
|
|
|
|
|
TimelineEventType::RoomMember,
|
|
|
|
|
Some(ella().as_str()),
|
|
|
|
|
to_raw_json_value(&RoomMemberEventContent::new(MembershipState::Knock)).unwrap(),
|
|
|
|
|
&[],
|
|
|
|
|
&["IMC"],
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
let fetch_state = |ty, key| auth_events.get(&(ty, key)).cloned();
|
|
|
|
|
let target_user = ella();
|
|
|
|
|
let sender = ella();
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
valid_membership_change(
|
|
|
|
|
&RoomVersion::V7,
|
|
|
|
|
target_user,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, target_user.as_str().into()).as_ref(),
|
|
|
|
|
sender,
|
|
|
|
|
fetch_state(StateEventType::RoomMember, sender.as_str().into()).as_ref(),
|
|
|
|
|
&requester,
|
|
|
|
|
None::<&PduEvent>,
|
|
|
|
|
fetch_state(StateEventType::RoomPowerLevels, "".into()).as_ref(),
|
|
|
|
|
fetch_state(StateEventType::RoomJoinRules, "".into()).as_ref(),
|
|
|
|
|
None,
|
|
|
|
|
&MembershipState::Leave,
|
|
|
|
|
&fetch_state(StateEventType::RoomCreate, "".into()).unwrap(),
|
|
|
|
|
)
|
|
|
|
|
.unwrap()
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
warn!("no valid signature found for third-party invite");
|
|
|
|
|
false
|
|
|
|
|
}
|
|
|
|
|
|