-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accept an optional web-client argument for the invite. #326
Conversation
26100ee
to
c55007f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mostly lgtm, just some nitpicking and questions.
@@ -18,7 +18,7 @@ Matrix. To join the conversation, either pick a Matrix client from | |||
https://matrix.org/docs/projects/try-matrix-now.html or use the single-click | |||
link below to join via Element (requires Chrome, Firefox, Safari, iOS or Android) | |||
|
|||
https://app.element.io/#/room/%(room_id_forurl)s?email=%(to_forurl)s&signurl=https%%3A%%2F%%2Fmatrix.org%%2F_matrix%%2Fidentity%%2Fapi%%2Fv1%%2Fsign-ed25519%%3Ftoken%%3D%(token)s%%26private_key%%3D%(ephemeral_private_key)s&room_name=%(room_name_forurl)s&room_avatar_url=%(room_avatar_url_forurl)s&inviter_name=%(sender_display_name_forurl)s&guest_access_token=%(guest_access_token_forurl)s&guest_user_id=%(guest_user_id_forurl)s | |||
%(web_client_location)/#/room/%(room_id_forurl)s?email=%(to_forurl)s&signurl=https%%3A%%2F%%2Fmatrix.org%%2F_matrix%%2Fidentity%%2Fapi%%2Fv1%%2Fsign-ed25519%%3Ftoken%%3D%(token)s%%26private_key%%3D%(ephemeral_private_key)s&room_name=%(room_name_forurl)s&room_avatar_url=%(room_avatar_url_forurl)s&inviter_name=%(sender_display_name_forurl)s&guest_access_token=%(guest_access_token_forurl)s&guest_user_id=%(guest_user_id_forurl)s |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is still quite Element-specific. Would this work with Hydrogen for instance? We could be fancy and allow the client to provide a URL filled with named placeholders.
Perhaps we don't care about this for right now though.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll see if it is reasonable for a homeserver to calculate the other items here. 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The way that sydent currently works I don't think this is easily doable since a unique key is included in this URL that sydent generates (ephemeral_private_key
), see the code around:
sydent/sydent/http/servlets/store_invite_servlet.py
Lines 71 to 80 in c55007f
tokenStore = JoinTokenStore(self.sydent) | |
ephemeralPrivateKey = nacl.signing.SigningKey.generate() | |
ephemeralPublicKey = ephemeralPrivateKey.verify_key | |
ephemeralPrivateKeyBase64 = encode_base64(ephemeralPrivateKey.encode(), True) | |
ephemeralPublicKeyBase64 = encode_base64(ephemeralPublicKey.encode(), True) | |
tokenStore.storeEphemeralPublicKey(ephemeralPublicKeyBase64) | |
tokenStore.storeToken(medium, address, roomId, sender, token) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see, thanks for digging. Note that I think we've talked about this key being either unhelpful or broken in Synapse's current implementation: matrix-org/synapse#6036
@@ -102,6 +105,9 @@ def render_POST(self, request): | |||
if substitutions["room_name"] != '': | |||
substitutions["bracketed_room_name"] = "(%s)" % substitutions["room_name"] | |||
|
|||
if 'web_client_location' not in substitutions: | |||
substitutions["web_client_location"] = 'https://app.element.io' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It'd be nice to have this as a config option instead... but this could be easily done later on if needed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this was done in bab8196.
'sender_display_name', | ||
'token', | ||
'room_name', | ||
'bracketed_room_name', | ||
'room_avatar_url', | ||
'sender_display_name', | ||
'sender_avatar_url', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh this is an unrelated fix, but send_display_name
was here twice, I'm fairly certain this is supposed to be sender_avatar_url
as that's a speced property.
@anoadragon453 Let me know what you think of these changes, although there's still some discussion going on with the Synapse PR. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Current changes look good to me.
I was on the fence for a moment about still including app.element.io
as the default config option. But seeing as it would be the easiest way for someone running Sydent to get started and serves as a working example in itself, I think it's a good thing.
I think you pretty much have to include it for backwards compatibility. It would be unfortunate to require a change on upgrade. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seeing as the Synapse PR has been approved and no changes affecting the Sydent implementation have happened since then - tick from me too.
Sydent 2.3.0 (2021-04-15) ========================= **Note**: this will be the last release of Sydent to support Python 3.5 or earlier. Future releases will require at least Python 3.6. Security advisory ----------------- This release contains fixes to the following security issues: - Denial of service attack via disk space or memory exhaustion ([CVE-2021-29430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29430)). - SSRF due to missing validation of hostnames ([CVE-2021-29431](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29431)). - Malicious users could control the content of invitation emails ([CVE-2021-29432](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29432)). - Denial of service (via resource exhaustion) due to improper input validation ([CVE-2021-29433](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29433)). Although we are not aware of these vulnerabilities being exploited in the wild, Sydent server administrators are advised to update as soon as possible. Note that as well as changes to the package, there are also changes to the default email templates. If any templates have been updated locally, they must also be updated in line with the changes to the defaults for full protection from CVE-2021-29432. Features -------- - Accept an optional `web_client_location` argument to the invite endpoint which allows customisation of the email template. ([\#326](#326)) - Move templates to a per-brand subdirectory of `/res`. Add `templates.path` and `brand.default` config options. ([\#328](#328)) Bugfixes -------- - Fix a regression in v2.2.0 where the wrong characters would be obfuscated in a 3pid invite. ([\#317](#317)) - Fix a long-standing bug where invalid JSON would be accepted over the HTTP interfaces. ([\#337](#337)) - During user registration on the identity server, validate that the MXID returned by the contacted homeserver is valid for that homeserver. ([cc97fff](cc97fff)) - Ensure that `/v2/` endpoints are correctly authenticated. ([ce04a68](ce04a68)) - Perform additional validation on the response received when requesting server signing keys. ([07e6da7](07e6da7)) - Validate the `matrix_server_name` parameter given during user registration. ([9e57334](9e57334), [8936925](8936925), [3d531ed](3d531ed), [0f00412](0f00412)) - Limit the size of requests received from HTTP clients. ([89071a1](89071a1), [0523511](0523511), [f56eee3](f56eee3)) - Limit the size of responses received from HTTP servers. ([89071a1](89071a1), [0523511](0523511), [f56eee3](f56eee3)) - In invite emails, randomise the multipart boundary, and include MXIDs where available. ([4469d1d](4469d1d), [6b405a8](6b405a8), [65a6e91](65a6e91)) - Perform additional validation on the `client_secret` and `email` parameters to various APIs. ([3175fd3](3175fd3)) Updates to the Docker image --------------------------- - Base docker image on Debian rather than Alpine Linux. ([\#335](#335)) Internal Changes ---------------- - Fix test logging to allow braces in log output. ([\#318](#318)) - Install prometheus_client in the Docker image. ([\#325](#325)) - Bump the version of signedjson to 1.1.1. ([\#334](#334))
This allows a homeserver to ask for Sydent to direct the user to a custom web client, which is useful if using a branded Element Web not hosted at
app.element.io
.Related to matrix-org/synapse#8863.