2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2021-11-19 10:19:32 -05:00
|
|
|
# Copyright 2021 Matrix.org Foundation C.I.C.
|
2014-08-13 13:03:37 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2022-03-15 09:16:37 -04:00
|
|
|
from typing import Any, Awaitable, Callable, Dict
|
2021-04-09 13:44:38 -04:00
|
|
|
from unittest.mock import Mock
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
2020-02-18 07:29:44 -05:00
|
|
|
import synapse.api.errors
|
2021-10-25 10:24:49 -04:00
|
|
|
import synapse.rest.admin
|
2020-02-18 07:29:44 -05:00
|
|
|
from synapse.api.constants import EventTypes
|
2021-08-17 07:57:58 -04:00
|
|
|
from synapse.rest.client import directory, login, room
|
2022-03-15 09:16:37 -04:00
|
|
|
from synapse.server import HomeServer
|
|
|
|
from synapse.types import JsonDict, RoomAlias, create_requester
|
|
|
|
from synapse.util import Clock
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
from tests import unittest
|
2020-07-30 08:01:33 -04:00
|
|
|
from tests.test_utils import make_awaitable
|
2014-09-11 06:59:48 -04:00
|
|
|
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2020-02-14 09:05:43 -05:00
|
|
|
class DirectoryTestCase(unittest.HomeserverTestCase):
|
2021-06-17 10:20:06 -04:00
|
|
|
"""Tests the directory service."""
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2018-03-13 06:39:19 -04:00
|
|
|
self.mock_federation = Mock()
|
|
|
|
self.mock_registry = Mock()
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
self.query_handlers: Dict[str, Callable[[dict], Awaitable[JsonDict]]] = {}
|
2014-11-04 11:35:38 -05:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def register_query_handler(
|
|
|
|
query_type: str, handler: Callable[[dict], Awaitable[JsonDict]]
|
|
|
|
) -> None:
|
2014-08-13 13:03:37 -04:00
|
|
|
self.query_handlers[query_type] = handler
|
2018-08-10 09:54:09 -04:00
|
|
|
|
2018-03-13 06:39:19 -04:00
|
|
|
self.mock_registry.register_query_handler = register_query_handler
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2020-02-14 09:05:43 -05:00
|
|
|
hs = self.setup_test_homeserver(
|
2018-03-13 09:26:52 -04:00
|
|
|
federation_client=self.mock_federation,
|
2018-03-13 06:39:19 -04:00
|
|
|
federation_registry=self.mock_registry,
|
2014-08-13 13:03:37 -04:00
|
|
|
)
|
|
|
|
|
2020-10-09 07:24:34 -04:00
|
|
|
self.handler = hs.get_directory_handler()
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-02-23 06:04:02 -05:00
|
|
|
self.store = hs.get_datastores().main
|
2014-09-03 11:04:21 -04:00
|
|
|
|
2015-01-23 08:21:58 -05:00
|
|
|
self.my_room = RoomAlias.from_string("#my-room:test")
|
|
|
|
self.your_room = RoomAlias.from_string("#your-room:test")
|
|
|
|
self.remote_room = RoomAlias.from_string("#another:remote")
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2020-02-14 09:05:43 -05:00
|
|
|
return hs
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_get_local_association(self) -> None:
|
2020-02-14 09:05:43 -05:00
|
|
|
self.get_success(
|
|
|
|
self.store.create_room_alias_association(
|
|
|
|
self.my_room, "!8765qwer:test", ["test"]
|
|
|
|
)
|
2014-08-13 13:03:37 -04:00
|
|
|
)
|
|
|
|
|
2020-02-14 09:05:43 -05:00
|
|
|
result = self.get_success(self.handler.get_association(self.my_room))
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual({"room_id": "!8765qwer:test", "servers": ["test"]}, result)
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_get_remote_association(self) -> None:
|
2020-07-30 08:01:33 -04:00
|
|
|
self.mock_federation.make_query.return_value = make_awaitable(
|
2014-08-13 13:03:37 -04:00
|
|
|
{"room_id": "!8765qwer:test", "servers": ["test", "remote"]}
|
|
|
|
)
|
|
|
|
|
2020-02-14 09:05:43 -05:00
|
|
|
result = self.get_success(self.handler.get_association(self.remote_room))
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(
|
2018-08-10 09:54:09 -04:00
|
|
|
{"room_id": "!8765qwer:test", "servers": ["test", "remote"]}, result
|
|
|
|
)
|
2014-08-13 13:03:37 -04:00
|
|
|
self.mock_federation.make_query.assert_called_with(
|
|
|
|
destination="remote",
|
|
|
|
query_type="directory",
|
2018-08-10 09:54:09 -04:00
|
|
|
args={"room_alias": "#another:remote"},
|
2014-10-02 09:09:15 -04:00
|
|
|
retry_on_dns_fail=False,
|
2017-03-23 09:20:08 -04:00
|
|
|
ignore_backoff=True,
|
2014-08-13 13:03:37 -04:00
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_incoming_fed_query(self) -> None:
|
2020-02-18 07:29:44 -05:00
|
|
|
self.get_success(
|
2020-03-04 11:30:46 -05:00
|
|
|
self.store.create_room_alias_association(
|
|
|
|
self.your_room, "!8765asdf:test", ["test"]
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
response = self.get_success(
|
|
|
|
self.handler.on_directory_query({"room_alias": "#your-room:test"})
|
|
|
|
)
|
|
|
|
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual({"room_id": "!8765asdf:test", "servers": ["test"]}, response)
|
2020-03-04 11:30:46 -05:00
|
|
|
|
|
|
|
|
2020-04-01 08:27:05 -04:00
|
|
|
class TestCreateAlias(unittest.HomeserverTestCase):
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
directory.register_servlets,
|
|
|
|
]
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2020-10-09 07:24:34 -04:00
|
|
|
self.handler = hs.get_directory_handler()
|
2020-04-01 08:27:05 -04:00
|
|
|
|
|
|
|
# Create user
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
# Create a test room
|
|
|
|
self.room_id = self.helper.create_room_as(
|
|
|
|
self.admin_user, tok=self.admin_user_tok
|
|
|
|
)
|
|
|
|
|
|
|
|
self.test_alias = "#test:test"
|
|
|
|
self.room_alias = RoomAlias.from_string(self.test_alias)
|
|
|
|
|
|
|
|
# Create a test user.
|
|
|
|
self.test_user = self.register_user("user", "pass", admin=False)
|
|
|
|
self.test_user_tok = self.login("user", "pass")
|
|
|
|
self.helper.join(room=self.room_id, user=self.test_user, tok=self.test_user_tok)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_create_alias_joined_room(self) -> None:
|
2020-04-01 08:27:05 -04:00
|
|
|
"""A user can create an alias for a room they're in."""
|
|
|
|
self.get_success(
|
|
|
|
self.handler.create_association(
|
|
|
|
create_requester(self.test_user),
|
|
|
|
self.room_alias,
|
|
|
|
self.room_id,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_create_alias_other_room(self) -> None:
|
2020-04-01 08:27:05 -04:00
|
|
|
"""A user cannot create an alias for a room they're NOT in."""
|
|
|
|
other_room_id = self.helper.create_room_as(
|
|
|
|
self.admin_user, tok=self.admin_user_tok
|
|
|
|
)
|
|
|
|
|
|
|
|
self.get_failure(
|
|
|
|
self.handler.create_association(
|
|
|
|
create_requester(self.test_user),
|
|
|
|
self.room_alias,
|
|
|
|
other_room_id,
|
|
|
|
),
|
|
|
|
synapse.api.errors.SynapseError,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_create_alias_admin(self) -> None:
|
2020-04-01 08:27:05 -04:00
|
|
|
"""An admin can create an alias for a room they're NOT in."""
|
|
|
|
other_room_id = self.helper.create_room_as(
|
|
|
|
self.test_user, tok=self.test_user_tok
|
|
|
|
)
|
|
|
|
|
|
|
|
self.get_success(
|
|
|
|
self.handler.create_association(
|
|
|
|
create_requester(self.admin_user),
|
|
|
|
self.room_alias,
|
|
|
|
other_room_id,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
class TestDeleteAlias(unittest.HomeserverTestCase):
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
directory.register_servlets,
|
|
|
|
]
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2022-02-23 06:04:02 -05:00
|
|
|
self.store = hs.get_datastores().main
|
2020-10-09 07:24:34 -04:00
|
|
|
self.handler = hs.get_directory_handler()
|
2020-03-04 11:30:46 -05:00
|
|
|
self.state_handler = hs.get_state_handler()
|
|
|
|
|
|
|
|
# Create user
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
# Create a test room
|
|
|
|
self.room_id = self.helper.create_room_as(
|
|
|
|
self.admin_user, tok=self.admin_user_tok
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
self.test_alias = "#test:test"
|
|
|
|
self.room_alias = RoomAlias.from_string(self.test_alias)
|
|
|
|
|
|
|
|
# Create a test user.
|
|
|
|
self.test_user = self.register_user("user", "pass", admin=False)
|
|
|
|
self.test_user_tok = self.login("user", "pass")
|
|
|
|
self.helper.join(room=self.room_id, user=self.test_user, tok=self.test_user_tok)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def _create_alias(self, user) -> None:
|
2020-03-04 11:30:46 -05:00
|
|
|
# Create a new alias to this room.
|
|
|
|
self.get_success(
|
|
|
|
self.store.create_room_alias_association(
|
|
|
|
self.room_alias, self.room_id, ["test"], user
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_delete_alias_not_allowed(self) -> None:
|
2020-03-04 11:30:46 -05:00
|
|
|
"""A user that doesn't meet the expected guidelines cannot delete an alias."""
|
|
|
|
self._create_alias(self.admin_user)
|
2020-02-18 07:29:44 -05:00
|
|
|
self.get_failure(
|
|
|
|
self.handler.delete_association(
|
2020-03-04 11:30:46 -05:00
|
|
|
create_requester(self.test_user), self.room_alias
|
2020-02-18 07:29:44 -05:00
|
|
|
),
|
|
|
|
synapse.api.errors.AuthError,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_delete_alias_creator(self) -> None:
|
2020-03-04 11:30:46 -05:00
|
|
|
"""An alias creator can delete their own alias."""
|
|
|
|
# Create an alias from a different user.
|
|
|
|
self._create_alias(self.test_user)
|
|
|
|
|
|
|
|
# Delete the user's alias.
|
|
|
|
result = self.get_success(
|
|
|
|
self.handler.delete_association(
|
|
|
|
create_requester(self.test_user), self.room_alias
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(self.room_id, result)
|
2020-03-04 11:30:46 -05:00
|
|
|
|
|
|
|
# Confirm the alias is gone.
|
|
|
|
self.get_failure(
|
|
|
|
self.handler.get_association(self.room_alias),
|
|
|
|
synapse.api.errors.SynapseError,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_delete_alias_admin(self) -> None:
|
2020-03-04 11:30:46 -05:00
|
|
|
"""A server admin can delete an alias created by another user."""
|
|
|
|
# Create an alias from a different user.
|
|
|
|
self._create_alias(self.test_user)
|
2020-02-18 07:29:44 -05:00
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
# Delete the user's alias as the admin.
|
2020-02-18 07:29:44 -05:00
|
|
|
result = self.get_success(
|
2020-03-04 11:30:46 -05:00
|
|
|
self.handler.delete_association(
|
|
|
|
create_requester(self.admin_user), self.room_alias
|
|
|
|
)
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(self.room_id, result)
|
2020-02-18 07:29:44 -05:00
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
# Confirm the alias is gone.
|
2020-02-18 07:29:44 -05:00
|
|
|
self.get_failure(
|
2020-03-04 11:30:46 -05:00
|
|
|
self.handler.get_association(self.room_alias),
|
|
|
|
synapse.api.errors.SynapseError,
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_delete_alias_sufficient_power(self) -> None:
|
2020-03-04 11:30:46 -05:00
|
|
|
"""A user with a sufficient power level should be able to delete an alias."""
|
|
|
|
self._create_alias(self.admin_user)
|
|
|
|
|
|
|
|
# Increase the user's power level.
|
|
|
|
self.helper.send_state(
|
|
|
|
self.room_id,
|
|
|
|
"m.room.power_levels",
|
|
|
|
{"users": {self.test_user: 100}},
|
|
|
|
tok=self.admin_user_tok,
|
2014-08-13 13:03:37 -04:00
|
|
|
)
|
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
# They can now delete the alias.
|
|
|
|
result = self.get_success(
|
|
|
|
self.handler.delete_association(
|
|
|
|
create_requester(self.test_user), self.room_alias
|
|
|
|
)
|
2014-08-13 13:03:37 -04:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(self.room_id, result)
|
2014-08-13 13:03:37 -04:00
|
|
|
|
2020-03-04 11:30:46 -05:00
|
|
|
# Confirm the alias is gone.
|
|
|
|
self.get_failure(
|
|
|
|
self.handler.get_association(self.room_alias),
|
|
|
|
synapse.api.errors.SynapseError,
|
|
|
|
)
|
2018-10-18 11:14:41 -04:00
|
|
|
|
|
|
|
|
2020-02-18 07:29:44 -05:00
|
|
|
class CanonicalAliasTestCase(unittest.HomeserverTestCase):
|
|
|
|
"""Test modifications of the canonical alias when delete aliases."""
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
directory.register_servlets,
|
|
|
|
]
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2022-02-23 06:04:02 -05:00
|
|
|
self.store = hs.get_datastores().main
|
2020-10-09 07:24:34 -04:00
|
|
|
self.handler = hs.get_directory_handler()
|
2020-02-18 07:29:44 -05:00
|
|
|
self.state_handler = hs.get_state_handler()
|
|
|
|
|
|
|
|
# Create user
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
# Create a test room
|
|
|
|
self.room_id = self.helper.create_room_as(
|
|
|
|
self.admin_user, tok=self.admin_user_tok
|
|
|
|
)
|
|
|
|
|
|
|
|
self.test_alias = "#test:test"
|
2020-03-03 07:12:45 -05:00
|
|
|
self.room_alias = self._add_alias(self.test_alias)
|
|
|
|
|
|
|
|
def _add_alias(self, alias: str) -> RoomAlias:
|
|
|
|
"""Add an alias to the test room."""
|
|
|
|
room_alias = RoomAlias.from_string(alias)
|
2020-02-18 07:29:44 -05:00
|
|
|
|
|
|
|
# Create a new alias to this room.
|
|
|
|
self.get_success(
|
|
|
|
self.store.create_room_alias_association(
|
2020-03-03 07:12:45 -05:00
|
|
|
room_alias, self.room_id, ["test"], self.admin_user
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
)
|
2020-03-03 07:12:45 -05:00
|
|
|
return room_alias
|
2020-02-18 07:29:44 -05:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def _set_canonical_alias(self, content) -> None:
|
2020-03-03 07:12:45 -05:00
|
|
|
"""Configure the canonical alias state on the room."""
|
2020-02-18 07:29:44 -05:00
|
|
|
self.helper.send_state(
|
2020-03-03 07:12:45 -05:00
|
|
|
self.room_id,
|
|
|
|
"m.room.canonical_alias",
|
|
|
|
content,
|
|
|
|
tok=self.admin_user_tok,
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
|
2020-03-03 07:12:45 -05:00
|
|
|
def _get_canonical_alias(self):
|
|
|
|
"""Get the canonical alias state of the room."""
|
|
|
|
return self.get_success(
|
2020-02-18 07:29:44 -05:00
|
|
|
self.state_handler.get_current_state(
|
|
|
|
self.room_id, EventTypes.CanonicalAlias, ""
|
|
|
|
)
|
|
|
|
)
|
2020-03-03 07:12:45 -05:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_remove_alias(self) -> None:
|
2020-03-03 07:12:45 -05:00
|
|
|
"""Removing an alias that is the canonical alias should remove it there too."""
|
|
|
|
# Set this new alias as the canonical alias for this room
|
|
|
|
self._set_canonical_alias(
|
|
|
|
{"alias": self.test_alias, "alt_aliases": [self.test_alias]}
|
|
|
|
)
|
|
|
|
|
|
|
|
data = self._get_canonical_alias()
|
2020-02-18 07:29:44 -05:00
|
|
|
self.assertEqual(data["content"]["alias"], self.test_alias)
|
|
|
|
self.assertEqual(data["content"]["alt_aliases"], [self.test_alias])
|
|
|
|
|
|
|
|
# Finally, delete the alias.
|
|
|
|
self.get_success(
|
|
|
|
self.handler.delete_association(
|
|
|
|
create_requester(self.admin_user), self.room_alias
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2020-03-03 07:12:45 -05:00
|
|
|
data = self._get_canonical_alias()
|
2020-02-18 07:29:44 -05:00
|
|
|
self.assertNotIn("alias", data["content"])
|
|
|
|
self.assertNotIn("alt_aliases", data["content"])
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_remove_other_alias(self) -> None:
|
2020-02-18 07:29:44 -05:00
|
|
|
"""Removing an alias listed as in alt_aliases should remove it there too."""
|
|
|
|
# Create a second alias.
|
|
|
|
other_test_alias = "#test2:test"
|
2020-03-03 07:12:45 -05:00
|
|
|
other_room_alias = self._add_alias(other_test_alias)
|
2020-02-18 07:29:44 -05:00
|
|
|
|
|
|
|
# Set the alias as the canonical alias for this room.
|
2020-03-03 07:12:45 -05:00
|
|
|
self._set_canonical_alias(
|
2020-02-18 07:29:44 -05:00
|
|
|
{
|
|
|
|
"alias": self.test_alias,
|
|
|
|
"alt_aliases": [self.test_alias, other_test_alias],
|
2020-03-03 07:12:45 -05:00
|
|
|
}
|
2020-02-18 07:29:44 -05:00
|
|
|
)
|
|
|
|
|
2020-03-03 07:12:45 -05:00
|
|
|
data = self._get_canonical_alias()
|
2020-02-18 07:29:44 -05:00
|
|
|
self.assertEqual(data["content"]["alias"], self.test_alias)
|
|
|
|
self.assertEqual(
|
|
|
|
data["content"]["alt_aliases"], [self.test_alias, other_test_alias]
|
|
|
|
)
|
|
|
|
|
|
|
|
# Delete the second alias.
|
|
|
|
self.get_success(
|
|
|
|
self.handler.delete_association(
|
|
|
|
create_requester(self.admin_user), other_room_alias
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2020-03-03 07:12:45 -05:00
|
|
|
data = self._get_canonical_alias()
|
2020-02-18 07:29:44 -05:00
|
|
|
self.assertEqual(data["content"]["alias"], self.test_alias)
|
|
|
|
self.assertEqual(data["content"]["alt_aliases"], [self.test_alias])
|
|
|
|
|
|
|
|
|
2018-10-18 11:14:41 -04:00
|
|
|
class TestCreateAliasACL(unittest.HomeserverTestCase):
|
|
|
|
user_id = "@test:test"
|
|
|
|
|
|
|
|
servlets = [directory.register_servlets, room.register_servlets]
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def default_config(self) -> Dict[str, Any]:
|
2021-11-19 10:19:32 -05:00
|
|
|
config = super().default_config()
|
|
|
|
|
|
|
|
# Add custom alias creation rules to the config.
|
2018-10-18 11:14:41 -04:00
|
|
|
config["alias_creation_rules"] = [
|
2019-05-10 01:12:11 -04:00
|
|
|
{"user_id": "*", "alias": "#unofficial_*", "action": "allow"}
|
2018-10-18 11:14:41 -04:00
|
|
|
]
|
|
|
|
|
2021-11-19 10:19:32 -05:00
|
|
|
return config
|
2018-10-18 11:14:41 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_denied(self) -> None:
|
2018-10-18 11:14:41 -04:00
|
|
|
room_id = self.helper.create_room_as(self.user_id)
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request(
|
2018-10-18 11:14:41 -04:00
|
|
|
"PUT",
|
|
|
|
b"directory/room/%23test%3Atest",
|
2021-11-19 10:19:32 -05:00
|
|
|
{"room_id": room_id},
|
2018-10-18 11:14:41 -04:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(403, channel.code, channel.result)
|
2018-10-18 11:14:41 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_allowed(self) -> None:
|
2018-10-18 11:14:41 -04:00
|
|
|
room_id = self.helper.create_room_as(self.user_id)
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request(
|
2018-10-18 11:14:41 -04:00
|
|
|
"PUT",
|
|
|
|
b"directory/room/%23unofficial_test%3Atest",
|
2021-11-19 10:19:32 -05:00
|
|
|
{"room_id": room_id},
|
2018-10-18 11:14:41 -04:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(200, channel.code, channel.result)
|
2019-03-20 10:53:44 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_denied_during_creation(self) -> None:
|
2021-11-19 10:19:32 -05:00
|
|
|
"""A room alias that is not allowed should be rejected during creation."""
|
|
|
|
# Invalid room alias.
|
|
|
|
self.helper.create_room_as(
|
|
|
|
self.user_id,
|
|
|
|
expect_code=403,
|
|
|
|
extra_content={"room_alias_name": "foo"},
|
|
|
|
)
|
2019-03-20 10:53:44 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_allowed_during_creation(self) -> None:
|
2021-11-19 10:19:32 -05:00
|
|
|
"""A valid room alias should be allowed during creation."""
|
|
|
|
room_id = self.helper.create_room_as(
|
|
|
|
self.user_id,
|
|
|
|
extra_content={"room_alias_name": "unofficial_test"},
|
|
|
|
)
|
2021-10-25 10:24:49 -04:00
|
|
|
|
2021-11-19 10:19:32 -05:00
|
|
|
channel = self.make_request(
|
|
|
|
"GET",
|
|
|
|
b"directory/room/%23unofficial_test%3Atest",
|
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(200, channel.code, channel.result)
|
|
|
|
self.assertEqual(channel.json_body["room_id"], room_id)
|
2021-11-19 10:19:32 -05:00
|
|
|
|
|
|
|
|
|
|
|
class TestCreatePublishedRoomACL(unittest.HomeserverTestCase):
|
2021-10-25 10:24:49 -04:00
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets_for_client_rest_resource,
|
|
|
|
login.register_servlets,
|
|
|
|
directory.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
]
|
|
|
|
hijack_auth = False
|
|
|
|
|
2021-11-19 10:19:32 -05:00
|
|
|
data = {"room_alias_name": "unofficial_test"}
|
|
|
|
allowed_localpart = "allowed"
|
2021-10-25 10:24:49 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def default_config(self) -> Dict[str, Any]:
|
2021-11-19 10:19:32 -05:00
|
|
|
config = super().default_config()
|
2021-10-25 10:24:49 -04:00
|
|
|
|
2021-11-19 10:19:32 -05:00
|
|
|
# Add custom room list publication rules to the config.
|
2021-10-25 10:24:49 -04:00
|
|
|
config["room_list_publication_rules"] = [
|
2021-11-19 10:19:32 -05:00
|
|
|
{
|
|
|
|
"user_id": "@" + self.allowed_localpart + "*",
|
|
|
|
"alias": "#unofficial_*",
|
|
|
|
"action": "allow",
|
|
|
|
},
|
2021-10-25 10:24:49 -04:00
|
|
|
{"user_id": "*", "alias": "*", "action": "deny"},
|
|
|
|
]
|
|
|
|
|
2021-11-19 10:19:32 -05:00
|
|
|
return config
|
2021-10-25 10:24:49 -04:00
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def prepare(
|
|
|
|
self, reactor: MemoryReactor, clock: Clock, hs: HomeServer
|
|
|
|
) -> HomeServer:
|
2021-11-19 10:19:32 -05:00
|
|
|
self.allowed_user_id = self.register_user(self.allowed_localpart, "pass")
|
|
|
|
self.allowed_access_token = self.login(self.allowed_localpart, "pass")
|
|
|
|
|
|
|
|
self.denied_user_id = self.register_user("denied", "pass")
|
|
|
|
self.denied_access_token = self.login("denied", "pass")
|
2021-10-25 10:24:49 -04:00
|
|
|
|
|
|
|
return hs
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_denied_without_publication_permission(self) -> None:
|
2021-10-25 10:24:49 -04:00
|
|
|
"""
|
|
|
|
Try to create a room, register an alias for it, and publish it,
|
|
|
|
as a user without permission to publish rooms.
|
|
|
|
(This is used as both a standalone test & as a helper function.)
|
|
|
|
"""
|
|
|
|
self.helper.create_room_as(
|
|
|
|
self.denied_user_id,
|
|
|
|
tok=self.denied_access_token,
|
|
|
|
extra_content=self.data,
|
|
|
|
is_public=True,
|
|
|
|
expect_code=403,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_allowed_when_creating_private_room(self) -> None:
|
2021-10-25 10:24:49 -04:00
|
|
|
"""
|
|
|
|
Try to create a room, register an alias for it, and NOT publish it,
|
|
|
|
as a user without permission to publish rooms.
|
|
|
|
(This is used as both a standalone test & as a helper function.)
|
|
|
|
"""
|
|
|
|
self.helper.create_room_as(
|
|
|
|
self.denied_user_id,
|
|
|
|
tok=self.denied_access_token,
|
|
|
|
extra_content=self.data,
|
|
|
|
is_public=False,
|
|
|
|
expect_code=200,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_allowed_with_publication_permission(self) -> None:
|
2021-10-25 10:24:49 -04:00
|
|
|
"""
|
|
|
|
Try to create a room, register an alias for it, and publish it,
|
|
|
|
as a user WITH permission to publish rooms.
|
|
|
|
(This is used as both a standalone test & as a helper function.)
|
|
|
|
"""
|
|
|
|
self.helper.create_room_as(
|
|
|
|
self.allowed_user_id,
|
|
|
|
tok=self.allowed_access_token,
|
|
|
|
extra_content=self.data,
|
2021-11-19 10:19:32 -05:00
|
|
|
is_public=True,
|
2021-10-25 10:24:49 -04:00
|
|
|
expect_code=200,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_denied_publication_with_invalid_alias(self) -> None:
|
2021-11-19 10:19:32 -05:00
|
|
|
"""
|
|
|
|
Try to create a room, register an alias for it, and publish it,
|
|
|
|
as a user WITH permission to publish rooms.
|
|
|
|
"""
|
|
|
|
self.helper.create_room_as(
|
|
|
|
self.allowed_user_id,
|
|
|
|
tok=self.allowed_access_token,
|
|
|
|
extra_content={"room_alias_name": "foo"},
|
|
|
|
is_public=True,
|
|
|
|
expect_code=403,
|
|
|
|
)
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_can_create_as_private_room_after_rejection(self) -> None:
|
2021-10-25 10:24:49 -04:00
|
|
|
"""
|
|
|
|
After failing to publish a room with an alias as a user without publish permission,
|
|
|
|
retry as the same user, but without publishing the room.
|
|
|
|
|
|
|
|
This should pass, but used to fail because the alias was registered by the first
|
|
|
|
request, even though the room creation was denied.
|
|
|
|
"""
|
|
|
|
self.test_denied_without_publication_permission()
|
|
|
|
self.test_allowed_when_creating_private_room()
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_can_create_with_permission_after_rejection(self) -> None:
|
2021-10-25 10:24:49 -04:00
|
|
|
"""
|
|
|
|
After failing to publish a room with an alias as a user without publish permission,
|
|
|
|
retry as someone with permission, using the same alias.
|
|
|
|
|
|
|
|
This also used to fail because of the alias having been registered by the first
|
|
|
|
request, leaving it unavailable for any other user's new rooms.
|
|
|
|
"""
|
|
|
|
self.test_denied_without_publication_permission()
|
|
|
|
self.test_allowed_with_publication_permission()
|
|
|
|
|
|
|
|
|
2019-03-20 10:53:44 -04:00
|
|
|
class TestRoomListSearchDisabled(unittest.HomeserverTestCase):
|
|
|
|
user_id = "@test:test"
|
|
|
|
|
|
|
|
servlets = [directory.register_servlets, room.register_servlets]
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def prepare(
|
|
|
|
self, reactor: MemoryReactor, clock: Clock, hs: HomeServer
|
|
|
|
) -> HomeServer:
|
2019-03-20 10:53:44 -04:00
|
|
|
room_id = self.helper.create_room_as(self.user_id)
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request(
|
2019-05-10 01:12:11 -04:00
|
|
|
"PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
|
2019-03-20 10:53:44 -04:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(200, channel.code, channel.result)
|
2019-03-20 10:53:44 -04:00
|
|
|
|
|
|
|
self.room_list_handler = hs.get_room_list_handler()
|
2020-10-09 07:24:34 -04:00
|
|
|
self.directory_handler = hs.get_directory_handler()
|
2019-03-20 10:53:44 -04:00
|
|
|
|
|
|
|
return hs
|
|
|
|
|
2022-03-15 09:16:37 -04:00
|
|
|
def test_disabling_room_list(self) -> None:
|
2019-03-20 10:53:44 -04:00
|
|
|
self.room_list_handler.enable_room_list_search = True
|
|
|
|
self.directory_handler.enable_room_list_search = True
|
|
|
|
|
|
|
|
# Room list is enabled so we should get some results
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", b"publicRooms")
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(200, channel.code, channel.result)
|
2019-03-20 10:53:44 -04:00
|
|
|
self.assertTrue(len(channel.json_body["chunk"]) > 0)
|
|
|
|
|
|
|
|
self.room_list_handler.enable_room_list_search = False
|
|
|
|
self.directory_handler.enable_room_list_search = False
|
|
|
|
|
|
|
|
# Room list disabled so we should get no results
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", b"publicRooms")
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(200, channel.code, channel.result)
|
2019-03-20 10:53:44 -04:00
|
|
|
self.assertTrue(len(channel.json_body["chunk"]) == 0)
|
|
|
|
|
|
|
|
# Room list disabled so we shouldn't be allowed to publish rooms
|
|
|
|
room_id = self.helper.create_room_as(self.user_id)
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request(
|
2019-05-10 01:12:11 -04:00
|
|
|
"PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
|
2019-03-20 10:53:44 -04:00
|
|
|
)
|
2022-02-28 07:12:29 -05:00
|
|
|
self.assertEqual(403, channel.code, channel.result)
|