Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Commit

Permalink
Merge pull request #919 from matrix-org/erikj/auth_fix
Browse files Browse the repository at this point in the history
Various auth.py fixes.
  • Loading branch information
erikjohnston authored Jul 15, 2016
2 parents a3036ac + 9e1b43b commit bd7c519
Show file tree
Hide file tree
Showing 3 changed files with 35 additions and 5 deletions.
26 changes: 25 additions & 1 deletion synapse/api/auth.py
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ def __init__(self, hs):
"user_id = ",
])

def check(self, event, auth_events):
def check(self, event, auth_events, do_sig_check=True):
""" Checks if this event is correctly authed.
Args:
Expand All @@ -79,13 +79,26 @@ def check(self, event, auth_events):

if not hasattr(event, "room_id"):
raise AuthError(500, "Event has no room_id: %s" % event)

sender_domain = get_domain_from_id(event.sender)

# Check the sender's domain has signed the event
if do_sig_check and not event.signatures.get(sender_domain):
raise AuthError(403, "Event not signed by sending server")

if auth_events is None:
# Oh, we don't know what the state of the room was, so we
# are trusting that this is allowed (at least for now)
logger.warn("Trusting event: %s", event.event_id)
return True

if event.type == EventTypes.Create:
room_id_domain = get_domain_from_id(event.room_id)
if room_id_domain != sender_domain:
raise AuthError(
403,
"Creation event's room_id domain does not match sender's"
)
# FIXME
return True

Expand All @@ -108,6 +121,17 @@ def check(self, event, auth_events):

# FIXME: Temp hack
if event.type == EventTypes.Aliases:
if not event.state_key:
raise AuthError(
403,
"Alias event must have non-empty state_key"
)
sender_domain = get_domain_from_id(event.sender)
if event.state_key != sender_domain:
raise AuthError(
403,
"Alias event's state_key does not match sender's domain"
)
return True

logger.debug(
Expand Down
8 changes: 6 additions & 2 deletions synapse/handlers/federation.py
Original file line number Diff line number Diff line change
Expand Up @@ -688,7 +688,9 @@ def on_make_join_request(self, room_id, user_id):
logger.warn("Failed to create join %r because %s", event, e)
raise e

self.auth.check(event, auth_events=context.current_state)
# The remote hasn't signed it yet, obviously. We'll do the full checks
# when we get the event back in `on_send_join_request`
self.auth.check(event, auth_events=context.current_state, do_sig_check=False)

defer.returnValue(event)

Expand Down Expand Up @@ -918,7 +920,9 @@ def on_make_leave_request(self, room_id, user_id):
)

try:
self.auth.check(event, auth_events=context.current_state)
# The remote hasn't signed it yet, obviously. We'll do the full checks
# when we get the event back in `on_send_leave_request`
self.auth.check(event, auth_events=context.current_state, do_sig_check=False)
except AuthError as e:
logger.warn("Failed to create new leave %r because %s", event, e)
raise e
Expand Down
6 changes: 4 additions & 2 deletions synapse/state.py
Original file line number Diff line number Diff line change
Expand Up @@ -379,7 +379,8 @@ def _resolve_auth_events(self, events, auth_events):
try:
# FIXME: hs.get_auth() is bad style, but we need to do it to
# get around circular deps.
self.hs.get_auth().check(event, auth_events)
# The signatures have already been checked at this point
self.hs.get_auth().check(event, auth_events, do_sig_check=False)
prev_event = event
except AuthError:
return prev_event
Expand All @@ -391,7 +392,8 @@ def _resolve_normal_events(self, events, auth_events):
try:
# FIXME: hs.get_auth() is bad style, but we need to do it to
# get around circular deps.
self.hs.get_auth().check(event, auth_events)
# The signatures have already been checked at this point
self.hs.get_auth().check(event, auth_events, do_sig_check=False)
return event
except AuthError:
pass
Expand Down

0 comments on commit bd7c519

Please sign in to comment.