2024-09-19 12:23:52 +00:00
|
|
|
import requests
|
2024-09-14 18:17:43 +00:00
|
|
|
import json
|
2024-09-14 18:37:38 +00:00
|
|
|
import time
|
2024-09-18 19:02:28 +00:00
|
|
|
import os
|
2024-11-04 00:16:19 +00:00
|
|
|
import treq
|
2024-09-19 12:23:52 +00:00
|
|
|
from twisted.internet.defer import inlineCallbacks, returnValue
|
2024-09-14 17:12:42 +00:00
|
|
|
from synapse.module_api import ModuleApi, errors
|
|
|
|
from synapse.types import UserID
|
|
|
|
import logging
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
class InviteCheckerConfig:
|
|
|
|
def __init__(self, config):
|
2024-09-14 18:17:43 +00:00
|
|
|
self.use_allowlist = config.get("use_allowlist", True)
|
|
|
|
self.use_blocklist = config.get("use_blocklist", True)
|
|
|
|
self.blocklist_allowlist_url = config.get("blocklist_allowlist_url", None)
|
2024-09-14 19:44:46 +00:00
|
|
|
self.blocklist_rooms = config.get("blocklist_rooms", []) # Blocklist for room names
|
2024-09-14 21:16:32 +00:00
|
|
|
self.policy_room_ids = config.get("policy_room_ids", []) # List of policy room IDs
|
2024-09-16 17:55:11 +00:00
|
|
|
self.public_baseurl = config.get("public_baseurl") # Fetch public_baseurl from the config
|
|
|
|
self.access_token = config.get("access_token") # Fetch access token from config
|
|
|
|
self.announcement_room_id = config.get("announcement_room_id") # Fetch announcement room ID
|
2024-09-16 17:57:05 +00:00
|
|
|
self.enable_announcement = config.get("enable_announcement", False) # New option to enable/disable announcements
|
2024-09-14 17:12:42 +00:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def parse_config(config):
|
|
|
|
return InviteCheckerConfig(config)
|
|
|
|
|
|
|
|
class InviteChecker:
|
|
|
|
def __init__(self, config, api: ModuleApi):
|
|
|
|
self.api = api
|
|
|
|
self.config = InviteCheckerConfig.parse_config(config)
|
|
|
|
|
2024-09-14 18:17:43 +00:00
|
|
|
self.use_allowlist = self.config.use_allowlist
|
|
|
|
self.use_blocklist = self.config.use_blocklist
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-14 22:20:42 +00:00
|
|
|
self.cache_expiry_time = 60
|
2024-09-14 19:44:46 +00:00
|
|
|
self.cache_timestamp = 0
|
2024-09-14 18:17:43 +00:00
|
|
|
self.blocklist = set()
|
|
|
|
self.allowlist = set()
|
2024-09-14 19:44:46 +00:00
|
|
|
self.allow_all_invites_on_error = False
|
|
|
|
|
|
|
|
self.room_id_cache = {}
|
|
|
|
self.blocklist_room_ids = set()
|
2024-09-14 17:12:42 +00:00
|
|
|
|
|
|
|
self.api.register_spam_checker_callbacks(user_may_invite=self.user_may_invite)
|
|
|
|
logger.info("InviteChecker initialized")
|
|
|
|
|
|
|
|
def fetch_json(self, url):
|
2024-09-14 18:17:43 +00:00
|
|
|
logger.info(f"Fetching JSON data from: {url}")
|
2024-09-18 19:02:28 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
# Read proxy configuration from the environment variable 'https_proxy', if set
|
|
|
|
https_proxy = os.getenv('https_proxy', None)
|
|
|
|
proxies = {}
|
2024-09-18 19:02:28 +00:00
|
|
|
|
|
|
|
if https_proxy:
|
2024-09-18 20:48:26 +00:00
|
|
|
# Mask credentials in the proxy URL
|
|
|
|
if '@' in https_proxy:
|
|
|
|
masked_proxy = '****:****@' + https_proxy.split('@')[1]
|
2024-09-18 19:02:28 +00:00
|
|
|
else:
|
2024-09-18 20:48:26 +00:00
|
|
|
masked_proxy = https_proxy
|
2024-09-18 19:02:28 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
proxies = {
|
|
|
|
"https": https_proxy
|
|
|
|
}
|
|
|
|
logger.info(f"Using HTTPS proxy: {masked_proxy}")
|
2024-09-18 19:02:28 +00:00
|
|
|
else:
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.info("No proxy configured, making direct request")
|
2024-09-18 19:02:28 +00:00
|
|
|
|
2024-09-14 17:12:42 +00:00
|
|
|
try:
|
2024-09-18 20:48:26 +00:00
|
|
|
# Make the request with the proxy if set, otherwise direct
|
|
|
|
response = requests.get(url, proxies=proxies, timeout=10)
|
|
|
|
|
|
|
|
# Log the response status code
|
|
|
|
logger.info(f"Received response with status code: {response.status_code}")
|
2024-09-18 19:02:28 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
# Check for a successful response
|
|
|
|
if response.status_code == 200:
|
|
|
|
data = response.json() # Parse the JSON data
|
2024-09-18 19:02:28 +00:00
|
|
|
logger.debug(f"Received JSON data: {data}")
|
2024-09-18 20:48:26 +00:00
|
|
|
return data
|
2024-09-14 17:12:42 +00:00
|
|
|
else:
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.error(f"Non-200 response code: {response.status_code}, Response body: {response.text}")
|
|
|
|
return None
|
2024-09-14 17:12:42 +00:00
|
|
|
except Exception as e:
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.error(f"Error while fetching JSON: {str(e)} - {type(e).__name__}")
|
|
|
|
return None
|
2024-09-18 19:02:28 +00:00
|
|
|
|
2024-09-14 21:16:32 +00:00
|
|
|
@inlineCallbacks
|
|
|
|
def fetch_policy_room_banlist(self):
|
|
|
|
"""Fetches the ban lists from multiple policy rooms using Synapse API."""
|
|
|
|
if not self.config.policy_room_ids:
|
|
|
|
return set() # No policy rooms configured, return an empty set
|
|
|
|
|
|
|
|
logger.info(f"Fetching ban lists from policy rooms: {self.config.policy_room_ids}")
|
|
|
|
banned_entities = set()
|
|
|
|
banned_entities_by_room = set()
|
|
|
|
for room_id in self.config.policy_room_ids:
|
|
|
|
logger.info(f"Fetching ban list from policy room: {room_id}")
|
|
|
|
|
|
|
|
try:
|
|
|
|
# Fetch all state events from the policy room
|
|
|
|
state_events = yield self.api.get_room_state(room_id)
|
|
|
|
|
|
|
|
if isinstance(state_events, dict):
|
|
|
|
logger.info(f"Received state events in dict format from room {room_id} with {len(state_events)} entries.")
|
|
|
|
|
|
|
|
# Loop over the dictionary of state events
|
|
|
|
for key, event in state_events.items():
|
|
|
|
event_type = event.get("type", "")
|
|
|
|
content = event.get("content", {})
|
|
|
|
|
|
|
|
# Check for ban events of type 'm.policy.rule.user' and 'm.policy.rule.server'
|
|
|
|
if event_type in ["m.policy.rule.user", "m.policy.rule.server"]:
|
|
|
|
entity = content.get('entity', '')
|
|
|
|
if entity:
|
|
|
|
banned_entities_by_room.add(entity)
|
|
|
|
|
|
|
|
logger.info(f"Fetched {len(banned_entities_by_room)} banned entities from policy room {room_id}.")
|
|
|
|
banned_entities = banned_entities_by_room.union(banned_entities)
|
|
|
|
banned_entities_by_room = set()
|
|
|
|
|
|
|
|
else:
|
|
|
|
logger.error(f"Unexpected response format from room {room_id}: {type(state_events)}")
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
logger.error(f"Failed to fetch policy room ban list from room {room_id}. Error: {str(e)}")
|
2024-09-16 17:55:11 +00:00
|
|
|
|
2024-09-14 21:16:32 +00:00
|
|
|
logger.info(f"Total banned entities from all policy rooms: {len(banned_entities)}")
|
|
|
|
return banned_entities
|
|
|
|
|
2024-09-14 17:12:42 +00:00
|
|
|
@inlineCallbacks
|
2024-09-14 18:17:43 +00:00
|
|
|
def update_blocklist_allowlist(self):
|
2024-09-14 21:16:32 +00:00
|
|
|
"""Fetch and update the blocklist, allowlist, and blocklisted room IDs."""
|
2024-09-14 19:44:46 +00:00
|
|
|
logger.info("Updating blocklist, allowlist, and room blocklist")
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
json_data = self.fetch_json(self.config.blocklist_allowlist_url)
|
2024-09-14 17:12:42 +00:00
|
|
|
|
|
|
|
if json_data:
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.debug(f"Fetched JSON data: {json_data}") # Log the full JSON data for verification
|
2024-09-14 19:44:46 +00:00
|
|
|
self.allow_all_invites_on_error = False
|
2024-09-14 18:17:43 +00:00
|
|
|
self.use_allowlist = json_data.get('use_allowlist', True)
|
|
|
|
self.use_blocklist = json_data.get('use_blocklist', True)
|
|
|
|
self.blocklist = set(json_data.get('blocklist', []))
|
|
|
|
self.allowlist = set(json_data.get('allowlist', []))
|
2024-09-18 20:48:26 +00:00
|
|
|
|
|
|
|
logger.debug(f"Blocklist: {self.blocklist}")
|
|
|
|
logger.debug(f"Allowlist: {self.allowlist}")
|
2024-09-14 21:16:32 +00:00
|
|
|
|
2024-09-14 22:19:00 +00:00
|
|
|
# Fetch and cache the policy room ban lists
|
2024-09-14 21:16:32 +00:00
|
|
|
policy_banlist = yield self.fetch_policy_room_banlist()
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.debug(f"Fetched policy banlist: {policy_banlist}")
|
2024-09-14 22:19:00 +00:00
|
|
|
self.blocklist.update(policy_banlist) # Merge policy bans into blocklist
|
2024-09-14 21:16:32 +00:00
|
|
|
|
|
|
|
self.blocklist_room_ids = set()
|
|
|
|
for room_entry in json_data.get('blocklist_rooms', []):
|
2024-09-14 19:44:46 +00:00
|
|
|
if room_entry.startswith('!'):
|
|
|
|
logger.info(f"Blocklisting room ID directly: {room_entry}")
|
|
|
|
self.blocklist_room_ids.add(room_entry)
|
|
|
|
else:
|
2024-09-14 21:16:32 +00:00
|
|
|
room_id = yield self.resolve_room_id(room_entry)
|
|
|
|
if room_id:
|
|
|
|
logger.info(f"Blocklisting room: {room_entry} -> {room_id}")
|
|
|
|
self.blocklist_room_ids.add(room_id)
|
|
|
|
else:
|
|
|
|
logger.error(f"Failed to blocklist room: {room_entry}")
|
|
|
|
|
2024-09-14 22:19:00 +00:00
|
|
|
# Update the cache timestamp
|
|
|
|
self.cache_timestamp = time.time()
|
|
|
|
|
2024-09-14 21:16:32 +00:00
|
|
|
logger.info(f"Updated blocklist with {len(self.blocklist)} entries and {len(self.blocklist_room_ids)} room IDs.")
|
|
|
|
else:
|
|
|
|
logger.error("Failed to update allowlist/blocklist due to missing JSON data.")
|
|
|
|
self.allow_all_invites_on_error = True
|
|
|
|
|
|
|
|
@inlineCallbacks
|
2024-09-16 17:55:11 +00:00
|
|
|
def send_message_to_room(self, message_content):
|
|
|
|
"""Send a message to the announcement room if announcements are enabled."""
|
|
|
|
if not self.config.enable_announcement:
|
|
|
|
logger.info("Announcements are disabled, skipping message.")
|
|
|
|
return
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-16 17:55:11 +00:00
|
|
|
content = {
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": message_content
|
|
|
|
}
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-16 17:55:11 +00:00
|
|
|
# Replace '!' with '%21' for room ID encoding
|
|
|
|
encoded_room_id = self.config.announcement_room_id.replace('!', '%21')
|
2024-09-14 19:44:46 +00:00
|
|
|
|
2024-09-16 17:55:11 +00:00
|
|
|
# Use the public_baseurl from the config
|
|
|
|
public_baseurl = self.config.public_baseurl
|
|
|
|
access_token = self.config.access_token
|
2024-09-14 18:37:38 +00:00
|
|
|
|
2024-09-16 17:55:11 +00:00
|
|
|
# URL to send the message to the room
|
|
|
|
send_url = f"{public_baseurl}/_matrix/client/r0/rooms/{encoded_room_id}/send/m.room.message/{int(time.time())}"
|
|
|
|
|
|
|
|
headers = {
|
|
|
|
"Authorization": f"Bearer {access_token}",
|
|
|
|
"Content-Type": "application/json"
|
|
|
|
}
|
|
|
|
|
|
|
|
try:
|
|
|
|
send_response = yield treq.put(send_url, headers=headers, json=content)
|
2024-11-04 00:16:19 +00:00
|
|
|
response_body = yield send_response.text()
|
2024-09-16 17:55:11 +00:00
|
|
|
if send_response.code == 200:
|
|
|
|
logger.info(f"Message sent to room {self.config.announcement_room_id}: {message_content}")
|
|
|
|
else:
|
|
|
|
logger.error(f"Failed to send message to room {self.config.announcement_room_id}. Status code: {send_response.code}, Response: {response_body}")
|
|
|
|
except Exception as e:
|
|
|
|
logger.error(f"Error sending message to room {self.config.announcement_room_id}: {e}")
|
2024-09-14 17:12:42 +00:00
|
|
|
|
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def user_may_invite(self, inviter: str, invitee: str, room_id: str):
|
2024-09-16 19:45:26 +00:00
|
|
|
logger.debug(f"Checking invite from {inviter} to {invitee} for room {room_id}")
|
2024-09-14 17:12:42 +00:00
|
|
|
if self.allow_all_invites_on_error:
|
|
|
|
logger.info(f"Allowing invite from {inviter} to {invitee} due to previous JSON fetch failure.")
|
2024-09-14 19:44:46 +00:00
|
|
|
returnValue("NOT_SPAM")
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
try:
|
|
|
|
blocklist, allowlist, blocklist_room_ids = yield self.get_blocklist_allowlist()
|
|
|
|
inviter_domain = UserID.from_string(inviter).domain
|
2024-09-14 17:12:42 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
logger.debug(f"Blocklist: {blocklist}, Allowlist: {allowlist}, Blocklist Room IDs: {blocklist_room_ids}")
|
2024-09-14 18:17:43 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
if self.use_allowlist and (inviter_domain in allowlist or inviter in allowlist):
|
|
|
|
returnValue("NOT_SPAM")
|
2024-09-14 22:11:33 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
if room_id in blocklist_room_ids:
|
|
|
|
logger.info(f"Invite blocked: room {room_id} is blocklisted")
|
|
|
|
yield self.send_message_to_room(f"Invite from {inviter} to {invitee} blocked in room {room_id}. Reason: Blocklisted room.")
|
|
|
|
returnValue(errors.Codes.FORBIDDEN)
|
2024-09-16 17:55:11 +00:00
|
|
|
|
2024-09-18 20:48:26 +00:00
|
|
|
if self.use_blocklist and (inviter_domain in blocklist or inviter in blocklist):
|
|
|
|
logger.info(f"Invite blocked: {inviter} is blocklisted")
|
|
|
|
yield self.send_message_to_room(f"Invite from {inviter} to {invitee} blocked. Reason: Blocklisted.")
|
|
|
|
returnValue(errors.Codes.FORBIDDEN)
|
|
|
|
|
|
|
|
logger.info(f"Invite allowed by {inviter} for {invitee} in room {room_id}")
|
|
|
|
returnValue("NOT_SPAM")
|
|
|
|
except Exception as e:
|
|
|
|
logger.error(f"Error during invite check: {str(e)} - {type(e).__name__}")
|
|
|
|
returnValue("NOT_SPAM") # Fallback to allow the invite if an error occurs
|
2024-09-16 17:55:11 +00:00
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def get_blocklist_allowlist(self):
|
|
|
|
current_time = time.time()
|
|
|
|
|
|
|
|
# Update cache if expired
|
|
|
|
if current_time - self.cache_timestamp > self.cache_expiry_time:
|
2024-09-19 15:27:41 +00:00
|
|
|
self.allow_all_invites_on_error = False
|
2024-09-16 17:55:11 +00:00
|
|
|
yield self.update_blocklist_allowlist()
|
|
|
|
|
|
|
|
if self.allow_all_invites_on_error:
|
|
|
|
logger.info("Skipping allowlist/blocklist checks because of previous JSON fetch failure.")
|
2024-09-19 15:27:41 +00:00
|
|
|
self.allow_all_invites_on_error = False
|
2024-09-16 17:55:11 +00:00
|
|
|
returnValue((set(), set(), set()))
|
|
|
|
|
|
|
|
# Return cached blocklist, allowlist, and blocklist room IDs
|
|
|
|
returnValue((self.blocklist, self.allowlist, self.blocklist_room_ids))
|