2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2015-03-31 02:22:31 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
import logging
|
2019-10-02 06:29:01 -06:00
|
|
|
from typing import Dict
|
2016-05-17 04:28:58 -06:00
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
from six import string_types
|
|
|
|
from six.moves.urllib import parse as urlparse
|
2016-05-17 04:28:58 -06:00
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
import yaml
|
2018-06-28 13:31:53 -06:00
|
|
|
from netaddr import IPSet
|
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
from synapse.appservice import ApplicationService
|
|
|
|
from synapse.types import UserID
|
2016-05-17 04:28:58 -06:00
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
from ._base import Config, ConfigError
|
2018-04-06 16:37:36 -06:00
|
|
|
|
2016-05-17 04:28:58 -06:00
|
|
|
logger = logging.getLogger(__name__)
|
2015-03-31 02:22:31 -06:00
|
|
|
|
|
|
|
|
|
|
|
class AppServiceConfig(Config):
|
2019-10-10 02:39:35 -06:00
|
|
|
section = "appservice"
|
|
|
|
|
2019-06-24 04:34:45 -06:00
|
|
|
def read_config(self, config, **kwargs):
|
2015-04-29 21:24:44 -06:00
|
|
|
self.app_service_config_files = config.get("app_service_config_files", [])
|
2016-08-18 07:59:55 -06:00
|
|
|
self.notify_appservices = config.get("notify_appservices", True)
|
2018-12-04 04:44:41 -07:00
|
|
|
self.track_appservice_user_ips = config.get("track_appservice_user_ips", False)
|
2015-03-31 02:22:31 -06:00
|
|
|
|
2019-06-21 17:00:20 -06:00
|
|
|
def generate_config_section(cls, **kwargs):
|
2015-04-29 21:24:44 -06:00
|
|
|
return """\
|
2019-03-19 04:06:40 -06:00
|
|
|
# A list of application service config files to use
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
2019-03-19 04:06:40 -06:00
|
|
|
#app_service_config_files:
|
|
|
|
# - app_service_1.yaml
|
|
|
|
# - app_service_2.yaml
|
2018-12-04 04:44:41 -07:00
|
|
|
|
2019-03-19 04:06:40 -06:00
|
|
|
# Uncomment to enable tracking of application service IP addresses. Implicitly
|
2018-12-04 04:44:41 -07:00
|
|
|
# enables MAU tracking for application service users.
|
2019-02-19 06:54:29 -07:00
|
|
|
#
|
2019-10-23 06:22:54 -06:00
|
|
|
#track_appservice_user_ips: true
|
2015-04-29 21:24:44 -06:00
|
|
|
"""
|
2016-05-17 04:28:58 -06:00
|
|
|
|
|
|
|
|
|
|
|
def load_appservices(hostname, config_files):
|
|
|
|
"""Returns a list of Application Services from the config files."""
|
|
|
|
if not isinstance(config_files, list):
|
2019-06-20 03:32:02 -06:00
|
|
|
logger.warning("Expected %s to be a list of AS config files.", config_files)
|
2016-05-17 04:28:58 -06:00
|
|
|
return []
|
|
|
|
|
|
|
|
# Dicts of value -> filename
|
2019-10-02 06:29:01 -06:00
|
|
|
seen_as_tokens = {} # type: Dict[str, str]
|
|
|
|
seen_ids = {} # type: Dict[str, str]
|
2016-05-17 04:28:58 -06:00
|
|
|
|
|
|
|
appservices = []
|
|
|
|
|
|
|
|
for config_file in config_files:
|
|
|
|
try:
|
2019-06-20 03:32:02 -06:00
|
|
|
with open(config_file, "r") as f:
|
|
|
|
appservice = _load_appservice(hostname, yaml.safe_load(f), config_file)
|
2016-05-17 04:28:58 -06:00
|
|
|
if appservice.id in seen_ids:
|
|
|
|
raise ConfigError(
|
|
|
|
"Cannot reuse ID across application services: "
|
2019-06-20 03:32:02 -06:00
|
|
|
"%s (files: %s, %s)"
|
|
|
|
% (appservice.id, config_file, seen_ids[appservice.id])
|
2016-05-17 04:28:58 -06:00
|
|
|
)
|
|
|
|
seen_ids[appservice.id] = config_file
|
|
|
|
if appservice.token in seen_as_tokens:
|
|
|
|
raise ConfigError(
|
|
|
|
"Cannot reuse as_token across application services: "
|
2019-06-20 03:32:02 -06:00
|
|
|
"%s (files: %s, %s)"
|
|
|
|
% (
|
2016-05-17 04:28:58 -06:00
|
|
|
appservice.token,
|
|
|
|
config_file,
|
|
|
|
seen_as_tokens[appservice.token],
|
|
|
|
)
|
|
|
|
)
|
|
|
|
seen_as_tokens[appservice.token] = config_file
|
|
|
|
logger.info("Loaded application service: %s", appservice)
|
|
|
|
appservices.append(appservice)
|
|
|
|
except Exception as e:
|
|
|
|
logger.error("Failed to load appservice from '%s'", config_file)
|
|
|
|
logger.exception(e)
|
|
|
|
raise
|
|
|
|
return appservices
|
|
|
|
|
|
|
|
|
|
|
|
def _load_appservice(hostname, as_info, config_filename):
|
2019-06-20 03:32:02 -06:00
|
|
|
required_string_fields = ["id", "as_token", "hs_token", "sender_localpart"]
|
2016-05-17 04:28:58 -06:00
|
|
|
for field in required_string_fields:
|
2018-04-06 16:37:36 -06:00
|
|
|
if not isinstance(as_info.get(field), string_types):
|
2019-06-20 03:32:02 -06:00
|
|
|
raise KeyError(
|
|
|
|
"Required string field: '%s' (%s)" % (field, config_filename)
|
|
|
|
)
|
2016-05-17 04:28:58 -06:00
|
|
|
|
2016-08-30 10:16:00 -06:00
|
|
|
# 'url' must either be a string or explicitly null, not missing
|
|
|
|
# to avoid accidentally turning off push for ASes.
|
2019-06-20 03:32:02 -06:00
|
|
|
if (
|
|
|
|
not isinstance(as_info.get("url"), string_types)
|
|
|
|
and as_info.get("url", "") is not None
|
|
|
|
):
|
2016-08-30 10:16:00 -06:00
|
|
|
raise KeyError(
|
|
|
|
"Required string field or explicit null: 'url' (%s)" % (config_filename,)
|
|
|
|
)
|
|
|
|
|
2016-05-17 04:28:58 -06:00
|
|
|
localpart = as_info["sender_localpart"]
|
2018-04-15 09:15:16 -06:00
|
|
|
if urlparse.quote(localpart) != localpart:
|
2019-06-20 03:32:02 -06:00
|
|
|
raise ValueError("sender_localpart needs characters which are not URL encoded.")
|
2016-05-17 04:28:58 -06:00
|
|
|
user = UserID(localpart, hostname)
|
|
|
|
user_id = user.to_string()
|
|
|
|
|
2016-10-18 10:04:09 -06:00
|
|
|
# Rate limiting for users of this AS is on by default (excludes sender)
|
|
|
|
rate_limited = True
|
|
|
|
if isinstance(as_info.get("rate_limited"), bool):
|
|
|
|
rate_limited = as_info.get("rate_limited")
|
|
|
|
|
2016-05-17 04:28:58 -06:00
|
|
|
# namespace checks
|
|
|
|
if not isinstance(as_info.get("namespaces"), dict):
|
|
|
|
raise KeyError("Requires 'namespaces' object.")
|
|
|
|
for ns in ApplicationService.NS_LIST:
|
|
|
|
# specific namespaces are optional
|
|
|
|
if ns in as_info["namespaces"]:
|
|
|
|
# expect a list of dicts with exclusive and regex keys
|
|
|
|
for regex_obj in as_info["namespaces"][ns]:
|
|
|
|
if not isinstance(regex_obj, dict):
|
|
|
|
raise ValueError(
|
2019-06-20 03:32:02 -06:00
|
|
|
"Expected namespace entry in %s to be an object," " but got %s",
|
|
|
|
ns,
|
|
|
|
regex_obj,
|
2016-05-17 04:28:58 -06:00
|
|
|
)
|
2018-04-06 16:37:36 -06:00
|
|
|
if not isinstance(regex_obj.get("regex"), string_types):
|
2019-06-20 03:32:02 -06:00
|
|
|
raise ValueError("Missing/bad type 'regex' key in %s", regex_obj)
|
2016-05-17 04:28:58 -06:00
|
|
|
if not isinstance(regex_obj.get("exclusive"), bool):
|
|
|
|
raise ValueError(
|
|
|
|
"Missing/bad type 'exclusive' key in %s", regex_obj
|
|
|
|
)
|
2016-08-18 07:56:02 -06:00
|
|
|
# protocols check
|
|
|
|
protocols = as_info.get("protocols")
|
|
|
|
if protocols:
|
|
|
|
# Because strings are lists in python
|
|
|
|
if isinstance(protocols, str) or not isinstance(protocols, list):
|
|
|
|
raise KeyError("Optional 'protocols' must be a list if present.")
|
|
|
|
for p in protocols:
|
|
|
|
if not isinstance(p, str):
|
|
|
|
raise KeyError("Bad value for 'protocols' item")
|
2016-08-30 09:21:16 -06:00
|
|
|
|
2016-08-30 10:20:31 -06:00
|
|
|
if as_info["url"] is None:
|
2016-08-30 09:21:16 -06:00
|
|
|
logger.info(
|
2016-08-30 10:16:00 -06:00
|
|
|
"(%s) Explicitly empty 'url' provided. This application service"
|
|
|
|
" will not receive events or queries.",
|
2016-08-30 09:21:16 -06:00
|
|
|
config_filename,
|
|
|
|
)
|
2018-06-28 13:31:53 -06:00
|
|
|
|
2018-06-28 13:56:07 -06:00
|
|
|
ip_range_whitelist = None
|
2019-06-20 03:32:02 -06:00
|
|
|
if as_info.get("ip_range_whitelist"):
|
|
|
|
ip_range_whitelist = IPSet(as_info.get("ip_range_whitelist"))
|
2018-06-28 13:31:53 -06:00
|
|
|
|
2016-05-17 04:28:58 -06:00
|
|
|
return ApplicationService(
|
|
|
|
token=as_info["as_token"],
|
2017-11-16 10:54:27 -07:00
|
|
|
hostname=hostname,
|
2016-05-17 04:28:58 -06:00
|
|
|
url=as_info["url"],
|
|
|
|
namespaces=as_info["namespaces"],
|
|
|
|
hs_token=as_info["hs_token"],
|
|
|
|
sender=user_id,
|
|
|
|
id=as_info["id"],
|
2016-08-18 07:56:02 -06:00
|
|
|
protocols=protocols,
|
2018-06-28 13:31:53 -06:00
|
|
|
rate_limited=rate_limited,
|
|
|
|
ip_range_whitelist=ip_range_whitelist,
|
2016-05-17 04:28:58 -06:00
|
|
|
)
|