Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 52c7a51

Browse files
Merge pull request from GHSA-3x4c-pq33-4w3q
* Add some tests to characterise the problem Some failing. Current states: RoomsMemberListTestCase test_get_member_list ... [OK] test_get_member_list_mixed_memberships ... [OK] test_get_member_list_no_permission ... [OK] test_get_member_list_no_permission_former_member ... [OK] test_get_member_list_no_permission_former_member_with_at_token ... [FAIL] test_get_member_list_no_room ... [OK] test_get_member_list_no_permission_with_at_token ... [FAIL] * Correct the tests * Check user is/was member before divulging room membership * Pull out only the 1 membership event we want. * Update tests/rest/client/v1/test_rooms.py Co-authored-by: Erik Johnston <erik@matrix.org> * Fixup tests (following apply review suggestion) Co-authored-by: Erik Johnston <erik@matrix.org>
1 parent 8f98260 commit 52c7a51

File tree

2 files changed

+103
-4
lines changed

2 files changed

+103
-4
lines changed

synapse/handlers/message.py

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -183,20 +183,37 @@ async def get_state_events(
183183

184184
if not last_events:
185185
raise NotFoundError("Can't find event for token %s" % (at_token,))
186+
last_event = last_events[0]
187+
188+
# check whether the user is in the room at that time to determine
189+
# whether they should be treated as peeking.
190+
state_map = await self.state_store.get_state_for_event(
191+
last_event.event_id,
192+
StateFilter.from_types([(EventTypes.Member, user_id)]),
193+
)
194+
195+
joined = False
196+
membership_event = state_map.get((EventTypes.Member, user_id))
197+
if membership_event:
198+
joined = membership_event.membership == Membership.JOIN
199+
200+
is_peeking = not joined
186201

187202
visible_events = await filter_events_for_client(
188203
self.storage,
189204
user_id,
190205
last_events,
191206
filter_send_to_client=False,
207+
is_peeking=is_peeking,
192208
)
193209

194-
event = last_events[0]
195210
if visible_events:
196211
room_state_events = await self.state_store.get_state_for_events(
197-
[event.event_id], state_filter=state_filter
212+
[last_event.event_id], state_filter=state_filter
198213
)
199-
room_state: Mapping[Any, EventBase] = room_state_events[event.event_id]
214+
room_state: Mapping[Any, EventBase] = room_state_events[
215+
last_event.event_id
216+
]
200217
else:
201218
raise AuthError(
202219
403,

tests/rest/client/v1/test_rooms.py

Lines changed: 83 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
from synapse.api.errors import HttpResponseException
3030
from synapse.handlers.pagination import PurgeStatus
3131
from synapse.rest import admin
32-
from synapse.rest.client import account, directory, login, profile, room
32+
from synapse.rest.client import account, directory, login, profile, room, sync
3333
from synapse.types import JsonDict, RoomAlias, UserID, create_requester
3434
from synapse.util.stringutils import random_string
3535

@@ -381,6 +381,8 @@ def test_leave_permissions(self):
381381
class RoomsMemberListTestCase(RoomBase):
382382
"""Tests /rooms/$room_id/members/list REST events."""
383383

384+
servlets = RoomBase.servlets + [sync.register_servlets]
385+
384386
user_id = "@sid1:red"
385387

386388
def test_get_member_list(self):
@@ -397,6 +399,86 @@ def test_get_member_list_no_permission(self):
397399
channel = self.make_request("GET", "/rooms/%s/members" % room_id)
398400
self.assertEquals(403, channel.code, msg=channel.result["body"])
399401

402+
def test_get_member_list_no_permission_with_at_token(self):
403+
"""
404+
Tests that a stranger to the room cannot get the member list
405+
(in the case that they use an at token).
406+
"""
407+
room_id = self.helper.create_room_as("@someone.else:red")
408+
409+
# first sync to get an at token
410+
channel = self.make_request("GET", "/sync")
411+
self.assertEquals(200, channel.code)
412+
sync_token = channel.json_body["next_batch"]
413+
414+
# check that permission is denied for @sid1:red to get the
415+
# memberships of @someone.else:red's room.
416+
channel = self.make_request(
417+
"GET",
418+
f"/rooms/{room_id}/members?at={sync_token}",
419+
)
420+
self.assertEquals(403, channel.code, msg=channel.result["body"])
421+
422+
def test_get_member_list_no_permission_former_member(self):
423+
"""
424+
Tests that a former member of the room can not get the member list.
425+
"""
426+
# create a room, invite the user and the user joins
427+
room_id = self.helper.create_room_as("@alice:red")
428+
self.helper.invite(room_id, "@alice:red", self.user_id)
429+
self.helper.join(room_id, self.user_id)
430+
431+
# check that the user can see the member list to start with
432+
channel = self.make_request("GET", "/rooms/%s/members" % room_id)
433+
self.assertEquals(200, channel.code, msg=channel.result["body"])
434+
435+
# ban the user
436+
self.helper.change_membership(room_id, "@alice:red", self.user_id, "ban")
437+
438+
# check the user can no longer see the member list
439+
channel = self.make_request("GET", "/rooms/%s/members" % room_id)
440+
self.assertEquals(403, channel.code, msg=channel.result["body"])
441+
442+
def test_get_member_list_no_permission_former_member_with_at_token(self):
443+
"""
444+
Tests that a former member of the room can not get the member list
445+
(in the case that they use an at token).
446+
"""
447+
# create a room, invite the user and the user joins
448+
room_id = self.helper.create_room_as("@alice:red")
449+
self.helper.invite(room_id, "@alice:red", self.user_id)
450+
self.helper.join(room_id, self.user_id)
451+
452+
# sync to get an at token
453+
channel = self.make_request("GET", "/sync")
454+
self.assertEquals(200, channel.code)
455+
sync_token = channel.json_body["next_batch"]
456+
457+
# check that the user can see the member list to start with
458+
channel = self.make_request(
459+
"GET", "/rooms/%s/members?at=%s" % (room_id, sync_token)
460+
)
461+
self.assertEquals(200, channel.code, msg=channel.result["body"])
462+
463+
# ban the user (Note: the user is actually allowed to see this event and
464+
# state so that they know they're banned!)
465+
self.helper.change_membership(room_id, "@alice:red", self.user_id, "ban")
466+
467+
# invite a third user and let them join
468+
self.helper.invite(room_id, "@alice:red", "@bob:red")
469+
self.helper.join(room_id, "@bob:red")
470+
471+
# now, with the original user, sync again to get a new at token
472+
channel = self.make_request("GET", "/sync")
473+
self.assertEquals(200, channel.code)
474+
sync_token = channel.json_body["next_batch"]
475+
476+
# check the user can no longer see the updated member list
477+
channel = self.make_request(
478+
"GET", "/rooms/%s/members?at=%s" % (room_id, sync_token)
479+
)
480+
self.assertEquals(403, channel.code, msg=channel.result["body"])
481+
400482
def test_get_member_list_mixed_memberships(self):
401483
room_creator = "@some_other_guy:red"
402484
room_id = self.helper.create_room_as(room_creator)

0 commit comments

Comments
 (0)