Skip to content
This repository was archived by the owner on Apr 12, 2024. It is now read-only.

Commit 32072dc

Browse files
committed
Strip "join_authorised_via_users_server" from join events which do not need it. (#10933)
This fixes a "Event not signed by authorising server" error when transition room member from join -> join, e.g. when updating a display name or avatar URL for restricted rooms.
1 parent 3412f5c commit 32072dc

File tree

11 files changed

+46
-25
lines changed

11 files changed

+46
-25
lines changed

changelog.d/10933.bugfix

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Fix a bug introduced in Synapse v1.40.0 where changing a user's display name or avatar in a restricted room would cause an authentication error.

synapse/api/constants.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,9 @@ class EventContentFields:
217217
# For "marker" events
218218
MSC2716_MARKER_INSERTION = "org.matrix.msc2716.marker.insertion"
219219

220+
# The authorising user for joining a restricted room.
221+
AUTHORISING_USER = "join_authorised_via_users_server"
222+
220223

221224
class RoomTypes:
222225
"""Understood values of the room_type field of m.room.create events."""

synapse/event_auth.py

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -115,11 +115,11 @@ def check(
115115
is_invite_via_allow_rule = (
116116
event.type == EventTypes.Member
117117
and event.membership == Membership.JOIN
118-
and "join_authorised_via_users_server" in event.content
118+
and EventContentFields.AUTHORISING_USER in event.content
119119
)
120120
if is_invite_via_allow_rule:
121121
authoriser_domain = get_domain_from_id(
122-
event.content["join_authorised_via_users_server"]
122+
event.content[EventContentFields.AUTHORISING_USER]
123123
)
124124
if not event.signatures.get(authoriser_domain):
125125
raise AuthError(403, "Event not signed by authorising server")
@@ -381,7 +381,9 @@ def _is_membership_change_allowed(
381381
# Note that if the caller is in the room or invited, then they do
382382
# not need to meet the allow rules.
383383
if not caller_in_room and not caller_invited:
384-
authorising_user = event.content.get("join_authorised_via_users_server")
384+
authorising_user = event.content.get(
385+
EventContentFields.AUTHORISING_USER
386+
)
385387

386388
if authorising_user is None:
387389
raise AuthError(403, "Join event is missing authorising user.")
@@ -836,10 +838,10 @@ def auth_types_for_event(
836838
auth_types.add(key)
837839

838840
if room_version.msc3083_join_rules and membership == Membership.JOIN:
839-
if "join_authorised_via_users_server" in event.content:
841+
if EventContentFields.AUTHORISING_USER in event.content:
840842
key = (
841843
EventTypes.Member,
842-
event.content["join_authorised_via_users_server"],
844+
event.content[EventContentFields.AUTHORISING_USER],
843845
)
844846
auth_types.add(key)
845847

synapse/events/utils.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ def add_fields(*fields):
105105
if event_type == EventTypes.Member:
106106
add_fields("membership")
107107
if room_version.msc3375_redaction_rules:
108-
add_fields("join_authorised_via_users_server")
108+
add_fields(EventContentFields.AUTHORISING_USER)
109109
elif event_type == EventTypes.Create:
110110
# MSC2176 rules state that create events cannot be redacted.
111111
if room_version.msc2176_redaction_rules:

synapse/federation/federation_base.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
import logging
1616
from collections import namedtuple
1717

18-
from synapse.api.constants import MAX_DEPTH, EventTypes, Membership
18+
from synapse.api.constants import MAX_DEPTH, EventContentFields, EventTypes, Membership
1919
from synapse.api.errors import Codes, SynapseError
2020
from synapse.api.room_versions import EventFormatVersions, RoomVersion
2121
from synapse.crypto.event_signing import check_event_content_hash
@@ -184,10 +184,10 @@ async def _check_sigs_on_pdu(
184184
room_version.msc3083_join_rules
185185
and pdu.type == EventTypes.Member
186186
and pdu.membership == Membership.JOIN
187-
and "join_authorised_via_users_server" in pdu.content
187+
and EventContentFields.AUTHORISING_USER in pdu.content
188188
):
189189
authorising_server = get_domain_from_id(
190-
pdu.content["join_authorised_via_users_server"]
190+
pdu.content[EventContentFields.AUTHORISING_USER]
191191
)
192192
try:
193193
await keyring.verify_event_for_server(

synapse/federation/federation_client.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@
3737
import attr
3838
from prometheus_client import Counter
3939

40-
from synapse.api.constants import EventTypes, Membership
40+
from synapse.api.constants import EventContentFields, EventTypes, Membership
4141
from synapse.api.errors import (
4242
CodeMessageException,
4343
Codes,
@@ -875,9 +875,9 @@ async def _execute(pdu: EventBase) -> None:
875875
# If the join is being authorised via allow rules, we need to send
876876
# the /send_join back to the same server that was originally used
877877
# with /make_join.
878-
if "join_authorised_via_users_server" in pdu.content:
878+
if EventContentFields.AUTHORISING_USER in pdu.content:
879879
destinations = [
880-
get_domain_from_id(pdu.content["join_authorised_via_users_server"])
880+
get_domain_from_id(pdu.content[EventContentFields.AUTHORISING_USER])
881881
]
882882

883883
return await self._try_destination_list(

synapse/federation/federation_server.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
from twisted.internet.abstract import isIPAddress
3535
from twisted.python import failure
3636

37-
from synapse.api.constants import EduTypes, EventTypes, Membership
37+
from synapse.api.constants import EduTypes, EventContentFields, EventTypes, Membership
3838
from synapse.api.errors import (
3939
AuthError,
4040
Codes,
@@ -765,11 +765,11 @@ async def _on_send_membership_event(
765765
if (
766766
room_version.msc3083_join_rules
767767
and event.membership == Membership.JOIN
768-
and "join_authorised_via_users_server" in event.content
768+
and EventContentFields.AUTHORISING_USER in event.content
769769
):
770770
# We can only authorise our own users.
771771
authorising_server = get_domain_from_id(
772-
event.content["join_authorised_via_users_server"]
772+
event.content[EventContentFields.AUTHORISING_USER]
773773
)
774774
if authorising_server != self.server_name:
775775
raise SynapseError(

synapse/handlers/federation.py

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,12 @@
2727
from twisted.internet import defer
2828

2929
from synapse import event_auth
30-
from synapse.api.constants import EventTypes, Membership, RejectedReason
30+
from synapse.api.constants import (
31+
EventContentFields,
32+
EventTypes,
33+
Membership,
34+
RejectedReason,
35+
)
3136
from synapse.api.errors import (
3237
AuthError,
3338
CodeMessageException,
@@ -712,7 +717,7 @@ async def on_make_join_request(
712717

713718
if include_auth_user_id:
714719
event_content[
715-
"join_authorised_via_users_server"
720+
EventContentFields.AUTHORISING_USER
716721
] = await self._event_auth_handler.get_user_which_could_invite(
717722
room_id,
718723
state_ids,

synapse/handlers/room_member.py

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -573,6 +573,14 @@ async def update_membership_locked(
573573
errcode=Codes.BAD_JSON,
574574
)
575575

576+
# The event content should *not* include the authorising user as
577+
# it won't be properly signed. Strip it out since it might come
578+
# back from a client updating a display name / avatar.
579+
#
580+
# This only applies to restricted rooms, but there should be no reason
581+
# for a client to include it. Unconditionally remove it.
582+
content.pop(EventContentFields.AUTHORISING_USER, None)
583+
576584
effective_membership_state = action
577585
if action in ["kick", "unban"]:
578586
effective_membership_state = "leave"
@@ -939,7 +947,7 @@ async def _should_perform_remote_join(
939947
# be included in the event content in order to efficiently validate
940948
# the event.
941949
content[
942-
"join_authorised_via_users_server"
950+
EventContentFields.AUTHORISING_USER
943951
] = await self.event_auth_handler.get_user_which_could_invite(
944952
room_id,
945953
current_state_ids,

tests/events/test_utils.py

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
# See the License for the specific language governing permissions and
1313
# limitations under the License.
1414

15+
from synapse.api.constants import EventContentFields
1516
from synapse.api.room_versions import RoomVersions
1617
from synapse.events import make_event_from_dict
1718
from synapse.events.utils import (
@@ -352,7 +353,7 @@ def test_member(self):
352353
"event_id": "$test:domain",
353354
"content": {
354355
"membership": "join",
355-
"join_authorised_via_users_server": "@user:domain",
356+
EventContentFields.AUTHORISING_USER: "@user:domain",
356357
"other_key": "stripped",
357358
},
358359
},
@@ -372,15 +373,15 @@ def test_member(self):
372373
"type": "m.room.member",
373374
"content": {
374375
"membership": "join",
375-
"join_authorised_via_users_server": "@user:domain",
376+
EventContentFields.AUTHORISING_USER: "@user:domain",
376377
"other_key": "stripped",
377378
},
378379
},
379380
{
380381
"type": "m.room.member",
381382
"content": {
382383
"membership": "join",
383-
"join_authorised_via_users_server": "@user:domain",
384+
EventContentFields.AUTHORISING_USER: "@user:domain",
384385
},
385386
"signatures": {},
386387
"unsigned": {},

0 commit comments

Comments
 (0)