Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Matrix
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Container Registry
Model registry
Operate
Environments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
TeDomum
Matrix
Commits
d897be6a
Commit
d897be6a
authored
6 years ago
by
Richard van der Hoff
Browse files
Options
Downloads
Patches
Plain Diff
Fix visibility of events from erased users over federation
parent
9c04b4ab
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
synapse/visibility.py
+67
-56
67 additions, 56 deletions
synapse/visibility.py
tests/test_visibility.py
+63
-0
63 additions, 0 deletions
tests/test_visibility.py
with
130 additions
and
56 deletions
synapse/visibility.py
+
67
−
56
View file @
d897be6a
...
...
@@ -232,7 +232,57 @@ def filter_events_for_client(store, user_id, events, is_peeking=False,
@defer.inlineCallbacks
def
filter_events_for_server
(
store
,
server_name
,
events
):
# First lets check to see if all the events have a history visibility
# Whatever else we do, we need to check for senders which have requested
# erasure of their data.
erased_senders
=
yield
store
.
are_users_erased
(
e
.
sender
for
e
in
events
,
)
def
redact_disallowed
(
event
,
state
):
# if the sender has been gdpr17ed, always return a redacted
# copy of the event.
if
erased_senders
[
event
.
sender
]:
logger
.
info
(
"
Sender of %s has been erased, redacting
"
,
event
.
event_id
,
)
return
prune_event
(
event
)
if
not
state
:
return
event
history
=
state
.
get
((
EventTypes
.
RoomHistoryVisibility
,
''
),
None
)
if
history
:
visibility
=
history
.
content
.
get
(
"
history_visibility
"
,
"
shared
"
)
if
visibility
in
[
"
invited
"
,
"
joined
"
]:
# We now loop through all state events looking for
# membership states for the requesting server to determine
# if the server is either in the room or has been invited
# into the room.
for
ev
in
state
.
itervalues
():
if
ev
.
type
!=
EventTypes
.
Member
:
continue
try
:
domain
=
get_domain_from_id
(
ev
.
state_key
)
except
Exception
:
continue
if
domain
!=
server_name
:
continue
memtype
=
ev
.
membership
if
memtype
==
Membership
.
JOIN
:
return
event
elif
memtype
==
Membership
.
INVITE
:
if
visibility
==
"
invited
"
:
return
event
else
:
# server has no users in the room: redact
return
prune_event
(
event
)
return
event
# Next lets check to see if all the events have a history visibility
# of "shared" or "world_readable". If thats the case then we don't
# need to check membership (as we know the server is in the room).
event_to_state_ids
=
yield
store
.
get_state_ids_for_events
(
...
...
@@ -251,15 +301,24 @@ def filter_events_for_server(store, server_name, events):
# If we failed to find any history visibility events then the default
# is "shared" visiblity.
if
not
visibility_ids
:
defer
.
returnValue
(
events
)
event_map
=
yield
store
.
get_events
(
visibility_ids
)
all_open
=
all
(
e
.
content
.
get
(
"
history_visibility
"
)
in
(
None
,
"
shared
"
,
"
world_readable
"
)
for
e
in
event_map
.
itervalues
()
)
all_open
=
True
else
:
event_map
=
yield
store
.
get_events
(
visibility_ids
)
all_open
=
all
(
e
.
content
.
get
(
"
history_visibility
"
)
in
(
None
,
"
shared
"
,
"
world_readable
"
)
for
e
in
event_map
.
itervalues
()
)
if
all_open
:
# all the history_visibility state affecting these events is open, so
# we don't need to filter by membership state. We *do* need to check
# for user erasure, though.
if
erased_senders
:
events
=
[
redact_disallowed
(
e
,
None
)
for
e
in
events
]
defer
.
returnValue
(
events
)
# Ok, so we're dealing with events that have non-trivial visibility
...
...
@@ -314,54 +373,6 @@ def filter_events_for_server(store, server_name, events):
for
e_id
,
key_to_eid
in
event_to_state_ids
.
iteritems
()
}
erased_senders
=
yield
store
.
are_users_erased
(
e
.
sender
for
e
in
events
,
)
def
redact_disallowed
(
event
,
state
):
# if the sender has been gdpr17ed, always return a redacted
# copy of the event.
if
erased_senders
[
event
.
sender
]:
logger
.
info
(
"
Sender of %s has been erased, redacting
"
,
event
.
event_id
,
)
return
prune_event
(
event
)
if
not
state
:
return
event
history
=
state
.
get
((
EventTypes
.
RoomHistoryVisibility
,
''
),
None
)
if
history
:
visibility
=
history
.
content
.
get
(
"
history_visibility
"
,
"
shared
"
)
if
visibility
in
[
"
invited
"
,
"
joined
"
]:
# We now loop through all state events looking for
# membership states for the requesting server to determine
# if the server is either in the room or has been invited
# into the room.
for
ev
in
state
.
itervalues
():
if
ev
.
type
!=
EventTypes
.
Member
:
continue
try
:
domain
=
get_domain_from_id
(
ev
.
state_key
)
except
Exception
:
continue
if
domain
!=
server_name
:
continue
memtype
=
ev
.
membership
if
memtype
==
Membership
.
JOIN
:
return
event
elif
memtype
==
Membership
.
INVITE
:
if
visibility
==
"
invited
"
:
return
event
else
:
# server has no users in the room: redact
return
prune_event
(
event
)
return
event
defer
.
returnValue
([
redact_disallowed
(
e
,
event_to_state
[
e
.
event_id
])
for
e
in
events
...
...
This diff is collapsed.
Click to expand it.
tests/test_visibility.py
+
63
−
0
View file @
d897be6a
...
...
@@ -73,6 +73,51 @@ class FilterEventsForServerTestCase(tests.unittest.TestCase):
self
.
assertEqual
(
events_to_filter
[
i
].
event_id
,
filtered
[
i
].
event_id
)
self
.
assertEqual
(
filtered
[
i
].
content
[
"
a
"
],
"
b
"
)
@tests.unittest.DEBUG
@defer.inlineCallbacks
def
test_erased_user
(
self
):
# 4 message events, from erased and unerased users, with a membership
# change in the middle of them.
events_to_filter
=
[]
evt
=
yield
self
.
inject_message
(
"
@unerased:local_hs
"
)
events_to_filter
.
append
(
evt
)
evt
=
yield
self
.
inject_message
(
"
@erased:local_hs
"
)
events_to_filter
.
append
(
evt
)
evt
=
yield
self
.
inject_room_member
(
"
@joiner:remote_hs
"
)
events_to_filter
.
append
(
evt
)
evt
=
yield
self
.
inject_message
(
"
@unerased:local_hs
"
)
events_to_filter
.
append
(
evt
)
evt
=
yield
self
.
inject_message
(
"
@erased:local_hs
"
)
events_to_filter
.
append
(
evt
)
# the erasey user gets erased
self
.
hs
.
get_datastore
().
mark_user_erased
(
"
@erased:local_hs
"
)
# ... and the filtering happens.
filtered
=
yield
filter_events_for_server
(
self
.
store
,
"
test_server
"
,
events_to_filter
,
)
for
i
in
range
(
0
,
len
(
events_to_filter
)):
self
.
assertEqual
(
events_to_filter
[
i
].
event_id
,
filtered
[
i
].
event_id
,
"
Unexpected event at result position %i
"
%
(
i
,
)
)
for
i
in
(
0
,
3
):
self
.
assertEqual
(
events_to_filter
[
i
].
content
[
"
body
"
],
filtered
[
i
].
content
[
"
body
"
],
"
Unexpected event content at result position %i
"
%
(
i
,)
)
for
i
in
(
1
,
4
):
self
.
assertNotIn
(
"
body
"
,
filtered
[
i
].
content
)
@defer.inlineCallbacks
def
inject_visibility
(
self
,
user_id
,
visibility
):
content
=
{
"
history_visibility
"
:
visibility
}
...
...
@@ -109,6 +154,24 @@ class FilterEventsForServerTestCase(tests.unittest.TestCase):
yield
self
.
hs
.
get_datastore
().
persist_event
(
event
,
context
)
defer
.
returnValue
(
event
)
@defer.inlineCallbacks
def
inject_message
(
self
,
user_id
,
content
=
None
):
if
content
is
None
:
content
=
{
"
body
"
:
"
testytest
"
}
builder
=
self
.
event_builder_factory
.
new
({
"
type
"
:
"
m.room.message
"
,
"
sender
"
:
user_id
,
"
room_id
"
:
TEST_ROOM_ID
,
"
content
"
:
content
,
})
event
,
context
=
yield
self
.
event_creation_handler
.
create_new_client_event
(
builder
)
yield
self
.
hs
.
get_datastore
().
persist_event
(
event
,
context
)
defer
.
returnValue
(
event
)
@defer.inlineCallbacks
def
test_large_room
(
self
):
# see what happens when we have a large room with hundreds of thousands
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment