consolidate and parallelize api/server access check prologues
Signed-off-by: Jason Volk <jason@zemos.net>
This commit is contained in:
parent
7fcc6d11a4
commit
e49aee61c1
9 changed files with 123 additions and 123 deletions
|
@ -213,7 +213,7 @@ features = [
|
||||||
[workspace.dependencies.futures]
|
[workspace.dependencies.futures]
|
||||||
version = "0.3.30"
|
version = "0.3.30"
|
||||||
default-features = false
|
default-features = false
|
||||||
features = ["std"]
|
features = ["std", "async-await"]
|
||||||
|
|
||||||
[workspace.dependencies.tokio]
|
[workspace.dependencies.tokio]
|
||||||
version = "1.40.0"
|
version = "1.40.0"
|
||||||
|
|
|
@ -2,13 +2,13 @@ use std::cmp;
|
||||||
|
|
||||||
use axum::extract::State;
|
use axum::extract::State;
|
||||||
use conduit::{
|
use conduit::{
|
||||||
is_equal_to,
|
|
||||||
utils::{IterStream, ReadyExt},
|
utils::{IterStream, ReadyExt},
|
||||||
Err, PduCount, Result,
|
PduCount, Result,
|
||||||
};
|
};
|
||||||
use futures::{FutureExt, StreamExt};
|
use futures::{FutureExt, StreamExt};
|
||||||
use ruma::{api::federation::backfill::get_backfill, uint, user_id, MilliSecondsSinceUnixEpoch};
|
use ruma::{api::federation::backfill::get_backfill, uint, user_id, MilliSecondsSinceUnixEpoch};
|
||||||
|
|
||||||
|
use super::AccessCheck;
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `GET /_matrix/federation/v1/backfill/<room_id>`
|
/// # `GET /_matrix/federation/v1/backfill/<room_id>`
|
||||||
|
@ -18,24 +18,14 @@ use crate::Ruma;
|
||||||
pub(crate) async fn get_backfill_route(
|
pub(crate) async fn get_backfill_route(
|
||||||
State(services): State<crate::State>, body: Ruma<get_backfill::v1::Request>,
|
State(services): State<crate::State>, body: Ruma<get_backfill::v1::Request>,
|
||||||
) -> Result<get_backfill::v1::Response> {
|
) -> Result<get_backfill::v1::Response> {
|
||||||
services
|
AccessCheck {
|
||||||
.rooms
|
services: &services,
|
||||||
.event_handler
|
origin: body.origin(),
|
||||||
.acl_check(body.origin(), &body.room_id)
|
room_id: &body.room_id,
|
||||||
.await?;
|
event_id: None,
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(&body.room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), &body.room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err!(Request(Forbidden("Server is not in room.")));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
let until = body
|
let until = body
|
||||||
.v
|
.v
|
||||||
|
@ -70,7 +60,6 @@ pub(crate) async fn get_backfill_route(
|
||||||
.state_accessor
|
.state_accessor
|
||||||
.server_can_see_event(origin, &pdu.room_id, &pdu.event_id)
|
.server_can_see_event(origin, &pdu.room_id, &pdu.event_id)
|
||||||
.await
|
.await
|
||||||
.is_ok_and(is_equal_to!(true))
|
|
||||||
{
|
{
|
||||||
return None;
|
return None;
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,8 @@
|
||||||
use axum::extract::State;
|
use axum::extract::State;
|
||||||
use conduit::{err, Err, Result};
|
use conduit::{err, Result};
|
||||||
use ruma::{api::federation::event::get_event, MilliSecondsSinceUnixEpoch, RoomId};
|
use ruma::{api::federation::event::get_event, MilliSecondsSinceUnixEpoch, RoomId};
|
||||||
|
|
||||||
|
use super::AccessCheck;
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `GET /_matrix/federation/v1/event/{eventId}`
|
/// # `GET /_matrix/federation/v1/event/{eventId}`
|
||||||
|
@ -20,35 +21,21 @@ pub(crate) async fn get_event_route(
|
||||||
.await
|
.await
|
||||||
.map_err(|_| err!(Request(NotFound("Event not found."))))?;
|
.map_err(|_| err!(Request(NotFound("Event not found."))))?;
|
||||||
|
|
||||||
let room_id_str = event
|
let room_id: &RoomId = event
|
||||||
.get("room_id")
|
.get("room_id")
|
||||||
.and_then(|val| val.as_str())
|
.and_then(|val| val.as_str())
|
||||||
.ok_or_else(|| err!(Database("Invalid event in database.")))?;
|
.ok_or_else(|| err!(Database("Invalid event in database.")))?
|
||||||
|
.try_into()
|
||||||
|
.map_err(|_| err!(Database("Invalid room_id in event in database.")))?;
|
||||||
|
|
||||||
let room_id =
|
AccessCheck {
|
||||||
<&RoomId>::try_from(room_id_str).map_err(|_| err!(Database("Invalid room_id in event in database.")))?;
|
services: &services,
|
||||||
|
origin: body.origin(),
|
||||||
if !services
|
room_id,
|
||||||
.rooms
|
event_id: Some(&body.event_id),
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err!(Request(Forbidden("Server is not in room.")));
|
|
||||||
}
|
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.server_can_see_event(body.origin(), room_id, &body.event_id)
|
|
||||||
.await?
|
|
||||||
{
|
|
||||||
return Err!(Request(Forbidden("Server is not allowed to see event.")));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
Ok(get_event::v1::Response {
|
Ok(get_event::v1::Response {
|
||||||
origin: services.globals.server_name().to_owned(),
|
origin: services.globals.server_name().to_owned(),
|
||||||
|
|
|
@ -8,6 +8,7 @@ use ruma::{
|
||||||
RoomId,
|
RoomId,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
use super::AccessCheck;
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `GET /_matrix/federation/v1/event_auth/{roomId}/{eventId}`
|
/// # `GET /_matrix/federation/v1/event_auth/{roomId}/{eventId}`
|
||||||
|
@ -18,24 +19,14 @@ use crate::Ruma;
|
||||||
pub(crate) async fn get_event_authorization_route(
|
pub(crate) async fn get_event_authorization_route(
|
||||||
State(services): State<crate::State>, body: Ruma<get_event_authorization::v1::Request>,
|
State(services): State<crate::State>, body: Ruma<get_event_authorization::v1::Request>,
|
||||||
) -> Result<get_event_authorization::v1::Response> {
|
) -> Result<get_event_authorization::v1::Response> {
|
||||||
services
|
AccessCheck {
|
||||||
.rooms
|
services: &services,
|
||||||
.event_handler
|
origin: body.origin(),
|
||||||
.acl_check(body.origin(), &body.room_id)
|
room_id: &body.room_id,
|
||||||
.await?;
|
event_id: None,
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(&body.room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), &body.room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err(Error::BadRequest(ErrorKind::forbidden(), "Server is not in room."));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
let event = services
|
let event = services
|
||||||
.rooms
|
.rooms
|
||||||
|
|
|
@ -5,6 +5,7 @@ use ruma::{
|
||||||
CanonicalJsonValue, EventId, RoomId,
|
CanonicalJsonValue, EventId, RoomId,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
use super::AccessCheck;
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `POST /_matrix/federation/v1/get_missing_events/{roomId}`
|
/// # `POST /_matrix/federation/v1/get_missing_events/{roomId}`
|
||||||
|
@ -13,29 +14,16 @@ use crate::Ruma;
|
||||||
pub(crate) async fn get_missing_events_route(
|
pub(crate) async fn get_missing_events_route(
|
||||||
State(services): State<crate::State>, body: Ruma<get_missing_events::v1::Request>,
|
State(services): State<crate::State>, body: Ruma<get_missing_events::v1::Request>,
|
||||||
) -> Result<get_missing_events::v1::Response> {
|
) -> Result<get_missing_events::v1::Response> {
|
||||||
services
|
AccessCheck {
|
||||||
.rooms
|
services: &services,
|
||||||
.event_handler
|
origin: body.origin(),
|
||||||
.acl_check(body.origin(), &body.room_id)
|
room_id: &body.room_id,
|
||||||
.await?;
|
event_id: None,
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(&body.room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), &body.room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err(Error::BadRequest(ErrorKind::forbidden(), "Server is not in room"));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
let limit = body
|
let limit = body.limit.try_into()?;
|
||||||
.limit
|
|
||||||
.try_into()
|
|
||||||
.expect("UInt could not be converted to usize");
|
|
||||||
|
|
||||||
let mut queued_events = body.latest_events.clone();
|
let mut queued_events = body.latest_events.clone();
|
||||||
// the vec will never have more entries the limit
|
// the vec will never have more entries the limit
|
||||||
|
@ -70,7 +58,7 @@ pub(crate) async fn get_missing_events_route(
|
||||||
.rooms
|
.rooms
|
||||||
.state_accessor
|
.state_accessor
|
||||||
.server_can_see_event(body.origin(), &body.room_id, &queued_events[i])
|
.server_can_see_event(body.origin(), &body.room_id, &queued_events[i])
|
||||||
.await?
|
.await
|
||||||
{
|
{
|
||||||
i = i.saturating_add(1);
|
i = i.saturating_add(1);
|
||||||
continue;
|
continue;
|
||||||
|
|
|
@ -41,3 +41,6 @@ pub(super) use state_ids::*;
|
||||||
pub(super) use user::*;
|
pub(super) use user::*;
|
||||||
pub(super) use version::*;
|
pub(super) use version::*;
|
||||||
pub(super) use well_known::*;
|
pub(super) use well_known::*;
|
||||||
|
|
||||||
|
mod utils;
|
||||||
|
use utils::AccessCheck;
|
||||||
|
|
|
@ -1,10 +1,11 @@
|
||||||
use std::borrow::Borrow;
|
use std::borrow::Borrow;
|
||||||
|
|
||||||
use axum::extract::State;
|
use axum::extract::State;
|
||||||
use conduit::{err, result::LogErr, utils::IterStream, Err, Result};
|
use conduit::{err, result::LogErr, utils::IterStream, Result};
|
||||||
use futures::{FutureExt, StreamExt, TryStreamExt};
|
use futures::{FutureExt, StreamExt, TryStreamExt};
|
||||||
use ruma::api::federation::event::get_room_state;
|
use ruma::api::federation::event::get_room_state;
|
||||||
|
|
||||||
|
use super::AccessCheck;
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `GET /_matrix/federation/v1/state/{roomId}`
|
/// # `GET /_matrix/federation/v1/state/{roomId}`
|
||||||
|
@ -13,24 +14,14 @@ use crate::Ruma;
|
||||||
pub(crate) async fn get_room_state_route(
|
pub(crate) async fn get_room_state_route(
|
||||||
State(services): State<crate::State>, body: Ruma<get_room_state::v1::Request>,
|
State(services): State<crate::State>, body: Ruma<get_room_state::v1::Request>,
|
||||||
) -> Result<get_room_state::v1::Response> {
|
) -> Result<get_room_state::v1::Response> {
|
||||||
services
|
AccessCheck {
|
||||||
.rooms
|
services: &services,
|
||||||
.event_handler
|
origin: body.origin(),
|
||||||
.acl_check(body.origin(), &body.room_id)
|
room_id: &body.room_id,
|
||||||
.await?;
|
event_id: None,
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(&body.room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), &body.room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err!(Request(Forbidden("Server is not in room.")));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
let shortstatehash = services
|
let shortstatehash = services
|
||||||
.rooms
|
.rooms
|
||||||
|
|
|
@ -1,11 +1,12 @@
|
||||||
use std::borrow::Borrow;
|
use std::borrow::Borrow;
|
||||||
|
|
||||||
use axum::extract::State;
|
use axum::extract::State;
|
||||||
use conduit::{err, Err};
|
use conduit::{err, Result};
|
||||||
use futures::StreamExt;
|
use futures::StreamExt;
|
||||||
use ruma::api::federation::event::get_room_state_ids;
|
use ruma::api::federation::event::get_room_state_ids;
|
||||||
|
|
||||||
use crate::{Result, Ruma};
|
use super::AccessCheck;
|
||||||
|
use crate::Ruma;
|
||||||
|
|
||||||
/// # `GET /_matrix/federation/v1/state_ids/{roomId}`
|
/// # `GET /_matrix/federation/v1/state_ids/{roomId}`
|
||||||
///
|
///
|
||||||
|
@ -14,24 +15,14 @@ use crate::{Result, Ruma};
|
||||||
pub(crate) async fn get_room_state_ids_route(
|
pub(crate) async fn get_room_state_ids_route(
|
||||||
State(services): State<crate::State>, body: Ruma<get_room_state_ids::v1::Request>,
|
State(services): State<crate::State>, body: Ruma<get_room_state_ids::v1::Request>,
|
||||||
) -> Result<get_room_state_ids::v1::Response> {
|
) -> Result<get_room_state_ids::v1::Response> {
|
||||||
services
|
AccessCheck {
|
||||||
.rooms
|
services: &services,
|
||||||
.event_handler
|
origin: body.origin(),
|
||||||
.acl_check(body.origin(), &body.room_id)
|
room_id: &body.room_id,
|
||||||
.await?;
|
event_id: None,
|
||||||
|
|
||||||
if !services
|
|
||||||
.rooms
|
|
||||||
.state_accessor
|
|
||||||
.is_world_readable(&body.room_id)
|
|
||||||
.await && !services
|
|
||||||
.rooms
|
|
||||||
.state_cache
|
|
||||||
.server_in_room(body.origin(), &body.room_id)
|
|
||||||
.await
|
|
||||||
{
|
|
||||||
return Err!(Request(Forbidden("Server is not in room.")));
|
|
||||||
}
|
}
|
||||||
|
.check()
|
||||||
|
.await?;
|
||||||
|
|
||||||
let shortstatehash = services
|
let shortstatehash = services
|
||||||
.rooms
|
.rooms
|
||||||
|
|
60
src/api/server/utils.rs
Normal file
60
src/api/server/utils.rs
Normal file
|
@ -0,0 +1,60 @@
|
||||||
|
use conduit::{implement, is_false, Err, Result};
|
||||||
|
use conduit_service::Services;
|
||||||
|
use futures::{future::OptionFuture, join, FutureExt};
|
||||||
|
use ruma::{EventId, RoomId, ServerName};
|
||||||
|
|
||||||
|
pub(super) struct AccessCheck<'a> {
|
||||||
|
pub(super) services: &'a Services,
|
||||||
|
pub(super) origin: &'a ServerName,
|
||||||
|
pub(super) room_id: &'a RoomId,
|
||||||
|
pub(super) event_id: Option<&'a EventId>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[implement(AccessCheck, params = "<'_>")]
|
||||||
|
pub(super) async fn check(&self) -> Result {
|
||||||
|
let acl_check = self
|
||||||
|
.services
|
||||||
|
.rooms
|
||||||
|
.event_handler
|
||||||
|
.acl_check(self.origin, self.room_id)
|
||||||
|
.map(|result| result.is_ok());
|
||||||
|
|
||||||
|
let world_readable = self
|
||||||
|
.services
|
||||||
|
.rooms
|
||||||
|
.state_accessor
|
||||||
|
.is_world_readable(self.room_id);
|
||||||
|
|
||||||
|
let server_in_room = self
|
||||||
|
.services
|
||||||
|
.rooms
|
||||||
|
.state_cache
|
||||||
|
.server_in_room(self.origin, self.room_id);
|
||||||
|
|
||||||
|
let server_can_see: OptionFuture<_> = self
|
||||||
|
.event_id
|
||||||
|
.map(|event_id| {
|
||||||
|
self.services
|
||||||
|
.rooms
|
||||||
|
.state_accessor
|
||||||
|
.server_can_see_event(self.origin, self.room_id, event_id)
|
||||||
|
})
|
||||||
|
.into();
|
||||||
|
|
||||||
|
let (world_readable, server_in_room, server_can_see, acl_check) =
|
||||||
|
join!(world_readable, server_in_room, server_can_see, acl_check);
|
||||||
|
|
||||||
|
if !acl_check {
|
||||||
|
return Err!(Request(Forbidden("Server access denied.")));
|
||||||
|
}
|
||||||
|
|
||||||
|
if !world_readable && !server_in_room {
|
||||||
|
return Err!(Request(Forbidden("Server is not in room.")));
|
||||||
|
}
|
||||||
|
|
||||||
|
if server_can_see.is_some_and(is_false!()) {
|
||||||
|
return Err!(Request(Forbidden("Server is not allowed to see event.")));
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue