0
0
Fork 0
mirror of https://github.com/matrix-construct/construct synced 2024-11-18 16:00:57 +01:00
construct/modules/m_room_redaction.cc

231 lines
5.5 KiB
C++
Raw Normal View History

// Matrix Construct
//
// Copyright (C) Matrix Construct Developers, Authors & Contributors
// Copyright (C) 2016-2019 Jason Volk <jason@zemos.net>
//
// Permission to use, copy, modify, and/or distribute this software for any
// purpose with or without fee is hereby granted, provided that the above
// copyright notice and this permission notice is present in all copies. The
// full license for this software is available in the LICENSE file.
namespace ircd::m
{
static void redaction_handle_fetch(const event &, vm::eval &);
extern conf::item<bool> redaction_fetch_enable;
extern conf::item<seconds> redaction_fetch_timeout;
extern hookfn<vm::eval &> redaction_fetch_hook;
static void auth_room_redaction(const event &, room::auth::hookdata &);
extern hookfn<room::auth::hookdata &> auth_room_redaction_hookfn;
}
ircd::mapi::header
IRCD_MODULE
{
"Matrix m.room.redaction"
};
decltype(ircd::m::auth_room_redaction_hookfn)
ircd::m::auth_room_redaction_hookfn
{
auth_room_redaction,
{
{ "_site", "room.auth" },
{ "type", "m.room.redaction" },
}
};
void
ircd::m::auth_room_redaction(const m::event &event,
room::auth::hookdata &data)
{
using FAIL = room::auth::FAIL;
// 11. If type is m.room.redaction:
assert(json::get<"type"_>(event) == "m.room.redaction");
const m::event::prev prev{event};
const m::room::power power
{
data.auth_power? *data.auth_power : m::event{}, *data.auth_create
};
// a. If the sender's power level is greater than or equal to the
// redact level, allow.
if(power(at<"sender"_>(event), "redact"))
{
data.allow = true;
return;
}
// b. If the domain of the event_id of the event being redacted is the
// same as the domain of the event_id of the m.room.redaction, allow.
//
//if(event::id(json::get<"redacts"_>(event)).host() == user::id(at<"sender"_>(event)).host())
// return {};
//
// In past room versions, redactions were only permitted to enter the
// DAG if the sender's domain matched the domain in the event ID
// being redacted, or the sender had appropriate permissions per the
// power levels. Due to servers now not being able to determine where
// an event came from during event authorization, redaction events
// are always accepted (provided the event is allowed by events and
// events_default in the power levels). However, servers should not
// apply or send redactions to clients until both the redaction event
// and original event have been seen, and are valid. Servers should
// only apply redactions to events where the sender's domains match,
// or the sender of the redaction has the appropriate permissions per
// the power levels.
const auto redact_target_idx
{
m::index(std::nothrow, at<"redacts"_>(event))
};
if(!redact_target_idx)
throw FAIL
{
"m.room.redaction redacts target is unknown."
};
const auto target_in_room
{
[&event](const string_view &room_id)
{
return room_id == at<"room_id"_>(event);
}
};
if(!m::query(std::nothrow, redact_target_idx, "room_id", target_in_room))
throw FAIL
{
"m.room.redaction redacts target is not in room."
};
const auto sender_domain_match
{
[&event](const string_view &tgt)
{
return tgt? user::id(tgt).host() == user::id(at<"sender"_>(event)).host(): false;
}
};
if(m::query(std::nothrow, redact_target_idx, "sender", sender_domain_match))
{
data.allow = true;
return;
}
// c. Otherwise, reject.
throw FAIL
{
"m.room.redaction fails authorization."
};
}
decltype(ircd::m::redaction_fetch_enable)
ircd::m::redaction_fetch_enable
{
{ "name", "ircd.m.room.redaction.fetch.enable" },
{ "default", true },
};
decltype(ircd::m::redaction_fetch_timeout)
ircd::m::redaction_fetch_timeout
{
{ "name", "ircd.m.room.redaction.fetch.timeout" },
{ "default", 5L },
};
decltype(ircd::m::redaction_fetch_hook)
ircd::m::redaction_fetch_hook
{
redaction_handle_fetch,
{
{ "_site", "vm.fetch.auth" },
{ "type", "m.room.redaction" },
}
};
void
ircd::m::redaction_handle_fetch(const event &event,
vm::eval &eval)
try
{
assert(eval.opts);
const auto &opts{*eval.opts};
if(!opts.fetch || !redaction_fetch_enable)
return;
assert(json::get<"room_id"_>(event));
assert(json::get<"type"_>(event) == "m.room.redaction");
if(my(event))
return;
const m::event::id &redacts
{
json::get<"redacts"_>(event)
};
if(likely(m::exists(redacts)))
return;
log::dwarning
{
log, "%s in %s by %s redacts missing %s; fetching...",
string_view(event.event_id),
string_view(at<"room_id"_>(event)),
string_view(at<"sender"_>(event)),
string_view(redacts),
};
m::fetch::opts fetch_opts;
fetch_opts.op = m::fetch::op::event;
fetch_opts.room_id = at<"room_id"_>(event);
fetch_opts.event_id = redacts;
auto request
{
m::fetch::start(fetch_opts)
};
const auto response
{
request.get(seconds(redaction_fetch_timeout))
};
const json::object pdus
{
json::object(response).get("pdus")
};
if(pdus.empty())
return;
const m::event result
{
json::object(pdus.at(0)), redacts
};
auto eval_opts(opts);
eval_opts.phase.set(vm::phase::FETCH_PREV, false);
eval_opts.phase.set(vm::phase::FETCH_STATE, false);
eval_opts.node_id = response.origin;
vm::eval
{
result, eval_opts
};
}
catch(const ctx::interrupted &)
{
throw;
}
catch(const std::exception &e)
{
log::derror
{
log, "Failed to fetch redaction target for %s in %s :%s",
string_view(event.event_id),
string_view(json::get<"room_id"_>(event)),
e.what(),
};
}