consolidate and parallelize api/server access check prologues

Signed-off-by: Jason Volk <jason@zemos.net>
This commit is contained in:
Jason Volk 2024-10-30 07:01:50 +00:00
parent 7fcc6d11a4
commit e49aee61c1
9 changed files with 123 additions and 123 deletions

View file

@ -213,7 +213,7 @@ features = [
[workspace.dependencies.futures] [workspace.dependencies.futures]
version = "0.3.30" version = "0.3.30"
default-features = false default-features = false
features = ["std"] features = ["std", "async-await"]
[workspace.dependencies.tokio] [workspace.dependencies.tokio]
version = "1.40.0" version = "1.40.0"

View file

@ -2,13 +2,13 @@ use std::cmp;
use axum::extract::State; use axum::extract::State;
use conduit::{ use conduit::{
is_equal_to,
utils::{IterStream, ReadyExt}, utils::{IterStream, ReadyExt},
Err, PduCount, Result, PduCount, Result,
}; };
use futures::{FutureExt, StreamExt}; use futures::{FutureExt, StreamExt};
use ruma::{api::federation::backfill::get_backfill, uint, user_id, MilliSecondsSinceUnixEpoch}; use ruma::{api::federation::backfill::get_backfill, uint, user_id, MilliSecondsSinceUnixEpoch};
use super::AccessCheck;
use crate::Ruma; use crate::Ruma;
/// # `GET /_matrix/federation/v1/backfill/<room_id>` /// # `GET /_matrix/federation/v1/backfill/<room_id>`
@ -18,24 +18,14 @@ use crate::Ruma;
pub(crate) async fn get_backfill_route( pub(crate) async fn get_backfill_route(
State(services): State<crate::State>, body: Ruma<get_backfill::v1::Request>, State(services): State<crate::State>, body: Ruma<get_backfill::v1::Request>,
) -> Result<get_backfill::v1::Response> { ) -> Result<get_backfill::v1::Response> {
services AccessCheck {
.rooms services: &services,
.event_handler origin: body.origin(),
.acl_check(body.origin(), &body.room_id) room_id: &body.room_id,
.await?; event_id: None,
if !services
.rooms
.state_accessor
.is_world_readable(&body.room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), &body.room_id)
.await
{
return Err!(Request(Forbidden("Server is not in room.")));
} }
.check()
.await?;
let until = body let until = body
.v .v
@ -70,7 +60,6 @@ pub(crate) async fn get_backfill_route(
.state_accessor .state_accessor
.server_can_see_event(origin, &pdu.room_id, &pdu.event_id) .server_can_see_event(origin, &pdu.room_id, &pdu.event_id)
.await .await
.is_ok_and(is_equal_to!(true))
{ {
return None; return None;
} }

View file

@ -1,7 +1,8 @@
use axum::extract::State; use axum::extract::State;
use conduit::{err, Err, Result}; use conduit::{err, Result};
use ruma::{api::federation::event::get_event, MilliSecondsSinceUnixEpoch, RoomId}; use ruma::{api::federation::event::get_event, MilliSecondsSinceUnixEpoch, RoomId};
use super::AccessCheck;
use crate::Ruma; use crate::Ruma;
/// # `GET /_matrix/federation/v1/event/{eventId}` /// # `GET /_matrix/federation/v1/event/{eventId}`
@ -20,35 +21,21 @@ pub(crate) async fn get_event_route(
.await .await
.map_err(|_| err!(Request(NotFound("Event not found."))))?; .map_err(|_| err!(Request(NotFound("Event not found."))))?;
let room_id_str = event let room_id: &RoomId = event
.get("room_id") .get("room_id")
.and_then(|val| val.as_str()) .and_then(|val| val.as_str())
.ok_or_else(|| err!(Database("Invalid event in database.")))?; .ok_or_else(|| err!(Database("Invalid event in database.")))?
.try_into()
.map_err(|_| err!(Database("Invalid room_id in event in database.")))?;
let room_id = AccessCheck {
<&RoomId>::try_from(room_id_str).map_err(|_| err!(Database("Invalid room_id in event in database.")))?; services: &services,
origin: body.origin(),
if !services room_id,
.rooms event_id: Some(&body.event_id),
.state_accessor
.is_world_readable(room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), room_id)
.await
{
return Err!(Request(Forbidden("Server is not in room.")));
}
if !services
.rooms
.state_accessor
.server_can_see_event(body.origin(), room_id, &body.event_id)
.await?
{
return Err!(Request(Forbidden("Server is not allowed to see event.")));
} }
.check()
.await?;
Ok(get_event::v1::Response { Ok(get_event::v1::Response {
origin: services.globals.server_name().to_owned(), origin: services.globals.server_name().to_owned(),

View file

@ -8,6 +8,7 @@ use ruma::{
RoomId, RoomId,
}; };
use super::AccessCheck;
use crate::Ruma; use crate::Ruma;
/// # `GET /_matrix/federation/v1/event_auth/{roomId}/{eventId}` /// # `GET /_matrix/federation/v1/event_auth/{roomId}/{eventId}`
@ -18,24 +19,14 @@ use crate::Ruma;
pub(crate) async fn get_event_authorization_route( pub(crate) async fn get_event_authorization_route(
State(services): State<crate::State>, body: Ruma<get_event_authorization::v1::Request>, State(services): State<crate::State>, body: Ruma<get_event_authorization::v1::Request>,
) -> Result<get_event_authorization::v1::Response> { ) -> Result<get_event_authorization::v1::Response> {
services AccessCheck {
.rooms services: &services,
.event_handler origin: body.origin(),
.acl_check(body.origin(), &body.room_id) room_id: &body.room_id,
.await?; event_id: None,
if !services
.rooms
.state_accessor
.is_world_readable(&body.room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), &body.room_id)
.await
{
return Err(Error::BadRequest(ErrorKind::forbidden(), "Server is not in room."));
} }
.check()
.await?;
let event = services let event = services
.rooms .rooms

View file

@ -5,6 +5,7 @@ use ruma::{
CanonicalJsonValue, EventId, RoomId, CanonicalJsonValue, EventId, RoomId,
}; };
use super::AccessCheck;
use crate::Ruma; use crate::Ruma;
/// # `POST /_matrix/federation/v1/get_missing_events/{roomId}` /// # `POST /_matrix/federation/v1/get_missing_events/{roomId}`
@ -13,29 +14,16 @@ use crate::Ruma;
pub(crate) async fn get_missing_events_route( pub(crate) async fn get_missing_events_route(
State(services): State<crate::State>, body: Ruma<get_missing_events::v1::Request>, State(services): State<crate::State>, body: Ruma<get_missing_events::v1::Request>,
) -> Result<get_missing_events::v1::Response> { ) -> Result<get_missing_events::v1::Response> {
services AccessCheck {
.rooms services: &services,
.event_handler origin: body.origin(),
.acl_check(body.origin(), &body.room_id) room_id: &body.room_id,
event_id: None,
}
.check()
.await?; .await?;
if !services let limit = body.limit.try_into()?;
.rooms
.state_accessor
.is_world_readable(&body.room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), &body.room_id)
.await
{
return Err(Error::BadRequest(ErrorKind::forbidden(), "Server is not in room"));
}
let limit = body
.limit
.try_into()
.expect("UInt could not be converted to usize");
let mut queued_events = body.latest_events.clone(); let mut queued_events = body.latest_events.clone();
// the vec will never have more entries the limit // the vec will never have more entries the limit
@ -70,7 +58,7 @@ pub(crate) async fn get_missing_events_route(
.rooms .rooms
.state_accessor .state_accessor
.server_can_see_event(body.origin(), &body.room_id, &queued_events[i]) .server_can_see_event(body.origin(), &body.room_id, &queued_events[i])
.await? .await
{ {
i = i.saturating_add(1); i = i.saturating_add(1);
continue; continue;

View file

@ -41,3 +41,6 @@ pub(super) use state_ids::*;
pub(super) use user::*; pub(super) use user::*;
pub(super) use version::*; pub(super) use version::*;
pub(super) use well_known::*; pub(super) use well_known::*;
mod utils;
use utils::AccessCheck;

View file

@ -1,10 +1,11 @@
use std::borrow::Borrow; use std::borrow::Borrow;
use axum::extract::State; use axum::extract::State;
use conduit::{err, result::LogErr, utils::IterStream, Err, Result}; use conduit::{err, result::LogErr, utils::IterStream, Result};
use futures::{FutureExt, StreamExt, TryStreamExt}; use futures::{FutureExt, StreamExt, TryStreamExt};
use ruma::api::federation::event::get_room_state; use ruma::api::federation::event::get_room_state;
use super::AccessCheck;
use crate::Ruma; use crate::Ruma;
/// # `GET /_matrix/federation/v1/state/{roomId}` /// # `GET /_matrix/federation/v1/state/{roomId}`
@ -13,24 +14,14 @@ use crate::Ruma;
pub(crate) async fn get_room_state_route( pub(crate) async fn get_room_state_route(
State(services): State<crate::State>, body: Ruma<get_room_state::v1::Request>, State(services): State<crate::State>, body: Ruma<get_room_state::v1::Request>,
) -> Result<get_room_state::v1::Response> { ) -> Result<get_room_state::v1::Response> {
services AccessCheck {
.rooms services: &services,
.event_handler origin: body.origin(),
.acl_check(body.origin(), &body.room_id) room_id: &body.room_id,
.await?; event_id: None,
if !services
.rooms
.state_accessor
.is_world_readable(&body.room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), &body.room_id)
.await
{
return Err!(Request(Forbidden("Server is not in room.")));
} }
.check()
.await?;
let shortstatehash = services let shortstatehash = services
.rooms .rooms

View file

@ -1,11 +1,12 @@
use std::borrow::Borrow; use std::borrow::Borrow;
use axum::extract::State; use axum::extract::State;
use conduit::{err, Err}; use conduit::{err, Result};
use futures::StreamExt; use futures::StreamExt;
use ruma::api::federation::event::get_room_state_ids; use ruma::api::federation::event::get_room_state_ids;
use crate::{Result, Ruma}; use super::AccessCheck;
use crate::Ruma;
/// # `GET /_matrix/federation/v1/state_ids/{roomId}` /// # `GET /_matrix/federation/v1/state_ids/{roomId}`
/// ///
@ -14,24 +15,14 @@ use crate::{Result, Ruma};
pub(crate) async fn get_room_state_ids_route( pub(crate) async fn get_room_state_ids_route(
State(services): State<crate::State>, body: Ruma<get_room_state_ids::v1::Request>, State(services): State<crate::State>, body: Ruma<get_room_state_ids::v1::Request>,
) -> Result<get_room_state_ids::v1::Response> { ) -> Result<get_room_state_ids::v1::Response> {
services AccessCheck {
.rooms services: &services,
.event_handler origin: body.origin(),
.acl_check(body.origin(), &body.room_id) room_id: &body.room_id,
.await?; event_id: None,
if !services
.rooms
.state_accessor
.is_world_readable(&body.room_id)
.await && !services
.rooms
.state_cache
.server_in_room(body.origin(), &body.room_id)
.await
{
return Err!(Request(Forbidden("Server is not in room.")));
} }
.check()
.await?;
let shortstatehash = services let shortstatehash = services
.rooms .rooms

60
src/api/server/utils.rs Normal file
View file

@ -0,0 +1,60 @@
use conduit::{implement, is_false, Err, Result};
use conduit_service::Services;
use futures::{future::OptionFuture, join, FutureExt};
use ruma::{EventId, RoomId, ServerName};
pub(super) struct AccessCheck<'a> {
pub(super) services: &'a Services,
pub(super) origin: &'a ServerName,
pub(super) room_id: &'a RoomId,
pub(super) event_id: Option<&'a EventId>,
}
#[implement(AccessCheck, params = "<'_>")]
pub(super) async fn check(&self) -> Result {
let acl_check = self
.services
.rooms
.event_handler
.acl_check(self.origin, self.room_id)
.map(|result| result.is_ok());
let world_readable = self
.services
.rooms
.state_accessor
.is_world_readable(self.room_id);
let server_in_room = self
.services
.rooms
.state_cache
.server_in_room(self.origin, self.room_id);
let server_can_see: OptionFuture<_> = self
.event_id
.map(|event_id| {
self.services
.rooms
.state_accessor
.server_can_see_event(self.origin, self.room_id, event_id)
})
.into();
let (world_readable, server_in_room, server_can_see, acl_check) =
join!(world_readable, server_in_room, server_can_see, acl_check);
if !acl_check {
return Err!(Request(Forbidden("Server access denied.")));
}
if !world_readable && !server_in_room {
return Err!(Request(Forbidden("Server is not in room.")));
}
if server_can_see.is_some_and(is_false!()) {
return Err!(Request(Forbidden("Server is not allowed to see event.")));
}
Ok(())
}