Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit aac2c49

Browse files
authored
Fix 'ip_range_whitelist' not working for federation servers (#10115)
Add 'federation_ip_range_whitelist'. This allows backwards-compatibility, If 'federation_ip_range_blacklist' is set. Otherwise 'ip_range_whitelist' will be used for federation servers. Signed-off-by: Michael Kutzner [email protected]
1 parent 1dfdc87 commit aac2c49

File tree

3 files changed

+19
-13
lines changed

3 files changed

+19
-13
lines changed

changelog.d/10115.bugfix

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Fix a bug introduced in Synapse v1.25.0 that prevented the `ip_range_whitelist` configuration option from working for federation and identity servers. Contributed by @mikure.

synapse/config/server.py

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -397,19 +397,22 @@ def read_config(self, config, **kwargs):
397397
self.ip_range_whitelist = generate_ip_set(
398398
config.get("ip_range_whitelist", ()), config_path=("ip_range_whitelist",)
399399
)
400-
401400
# The federation_ip_range_blacklist is used for backwards-compatibility
402-
# and only applies to federation and identity servers. If it is not given,
403-
# default to ip_range_blacklist.
404-
federation_ip_range_blacklist = config.get(
405-
"federation_ip_range_blacklist", ip_range_blacklist
406-
)
407-
# Always blacklist 0.0.0.0, ::
408-
self.federation_ip_range_blacklist = generate_ip_set(
409-
federation_ip_range_blacklist,
410-
["0.0.0.0", "::"],
411-
config_path=("federation_ip_range_blacklist",),
412-
)
401+
# and only applies to federation and identity servers.
402+
if "federation_ip_range_blacklist" in config:
403+
# Always blacklist 0.0.0.0, ::
404+
self.federation_ip_range_blacklist = generate_ip_set(
405+
config["federation_ip_range_blacklist"],
406+
["0.0.0.0", "::"],
407+
config_path=("federation_ip_range_blacklist",),
408+
)
409+
# 'federation_ip_range_whitelist' was never a supported configuration option.
410+
self.federation_ip_range_whitelist = None
411+
else:
412+
# No backwards-compatiblity requrired, as federation_ip_range_blacklist
413+
# is not given. Default to ip_range_blacklist and ip_range_whitelist.
414+
self.federation_ip_range_blacklist = self.ip_range_blacklist
415+
self.federation_ip_range_whitelist = self.ip_range_whitelist
413416

414417
# (undocumented) option for torturing the worker-mode replication a bit,
415418
# for testing. The value defines the number of milliseconds to pause before

synapse/http/matrixfederationclient.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,9 @@ def __init__(self, hs, tls_client_options_factory):
318318
# We need to use a DNS resolver which filters out blacklisted IP
319319
# addresses, to prevent DNS rebinding.
320320
self.reactor = BlacklistingReactorWrapper(
321-
hs.get_reactor(), None, hs.config.federation_ip_range_blacklist
321+
hs.get_reactor(),
322+
hs.config.federation_ip_range_whitelist,
323+
hs.config.federation_ip_range_blacklist,
322324
) # type: ISynapseReactor
323325

324326
user_agent = hs.version_string

0 commit comments

Comments
 (0)