summary refs log tree commit diff
path: root/synapse/util/thirdpartyinvites.py
blob: ad0f4e88e935450fa5ac277bbd19a539c03fad8c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
# -*- coding: utf-8 -*-
# Copyright 2015 OpenMarket Ltd
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

from twisted.internet import defer
from synapse.api.errors import AuthError


class ThirdPartyInvites(object):
    INVITE_KEYS = {"id_server", "medium", "address", "display_name"}

    JOIN_KEYS = {
        "token",
        "public_key",
        "key_validity_url",
        "signature",
        "sender",
    }

    @classmethod
    def has_invite_keys(cls, content):
        for key in cls.INVITE_KEYS:
            if key not in content:
                return False
        return True

    @classmethod
    def has_join_keys(cls, content):
        for key in cls.JOIN_KEYS:
            if key not in content:
                return False
        return True

    @classmethod
    def join_has_third_party_invite(cls, content):
        if "third_party_invite" not in content:
            return False
        return cls.has_join_keys(content["third_party_invite"])

    @classmethod
    def copy_join_keys(cls, src, dst):
        for key in cls.JOIN_KEYS:
            if key in src:
                dst[key] = src[key]

    @classmethod
    @defer.inlineCallbacks
    def check_key_valid(cls, http_client, event):
        try:
            response = yield http_client.get_json(
                event.content["third_party_invite"]["key_validity_url"],
                {"public_key": event.content["third_party_invite"]["public_key"]}
            )
            if not response["valid"]:
                raise AuthError(403, "Third party certificate was invalid")
        except IOError:
            raise AuthError(403, "Third party certificate could not be checked")