Check against sender rather than event_id

This commit is contained in:
Erik Johnston 2015-09-01 15:57:35 +01:00
parent a88e16152f
commit b345853918
2 changed files with 4 additions and 4 deletions

View file

@ -20,7 +20,7 @@ from twisted.internet import defer
from synapse.api.constants import EventTypes, Membership, JoinRules
from synapse.api.errors import AuthError, Codes, SynapseError
from synapse.util.logutils import log_function
from synapse.types import EventID, RoomID, UserID
from synapse.types import RoomID, UserID
import logging
@ -66,10 +66,10 @@ class Auth(object):
return True
creating_domain = RoomID.from_string(event.room_id).domain
originating_domain = EventID.from_string(event.event_id).domain
originating_domain = UserID.from_string(event.sender).domain
if creating_domain != originating_domain:
if not self.can_federate(event, auth_events):
raise SynapseError(
raise AuthError(
403,
"This room has been marked as unfederatable."
)

View file

@ -35,7 +35,7 @@ def create_event(name=None, type=None, state_key=None, depth=2, event_id=None,
if not event_id:
_next_event_id += 1
event_id = str(_next_event_id)
event_id = "$%s:test" % (_next_event_id,)
if not name:
if state_key is not None: