2019-01-25 06:16:29 -05:00
|
|
|
#
|
2023-11-21 15:29:58 -05:00
|
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
|
|
#
|
|
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Affero General Public License as
|
|
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
|
|
# License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# See the GNU Affero General Public License for more details:
|
|
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
|
|
#
|
|
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
|
|
#
|
|
|
|
# [This file includes modifications made by New Vector Limited]
|
2019-01-25 06:16:29 -05:00
|
|
|
#
|
|
|
|
#
|
2022-02-11 04:32:11 -05:00
|
|
|
from http import HTTPStatus
|
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
2019-05-01 10:32:38 -04:00
|
|
|
import synapse.rest.admin
|
2019-05-23 10:00:20 -04:00
|
|
|
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS
|
2021-08-17 07:57:58 -04:00
|
|
|
from synapse.rest.client import capabilities, login
|
2022-02-23 08:33:19 -05:00
|
|
|
from synapse.server import HomeServer
|
|
|
|
from synapse.util import Clock
|
2019-01-29 07:44:10 -05:00
|
|
|
|
2019-01-25 06:16:29 -05:00
|
|
|
from tests import unittest
|
2021-03-16 11:44:25 -04:00
|
|
|
from tests.unittest import override_config
|
2019-01-25 06:16:29 -05:00
|
|
|
|
|
|
|
|
|
|
|
class CapabilitiesTestCase(unittest.HomeserverTestCase):
|
2019-01-29 06:37:56 -05:00
|
|
|
servlets = [
|
2019-05-02 06:59:16 -04:00
|
|
|
synapse.rest.admin.register_servlets_for_client_rest_resource,
|
2019-01-29 06:37:56 -05:00
|
|
|
capabilities.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
2019-01-25 06:16:29 -05:00
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2022-02-11 04:32:11 -05:00
|
|
|
self.url = b"/capabilities"
|
2019-01-25 06:16:29 -05:00
|
|
|
hs = self.setup_test_homeserver()
|
2019-05-23 10:00:20 -04:00
|
|
|
self.config = hs.config
|
2021-03-16 11:44:25 -04:00
|
|
|
self.auth_handler = hs.get_auth_handler()
|
2019-01-25 06:16:29 -05:00
|
|
|
return hs
|
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
self.localpart = "user"
|
|
|
|
self.password = "pass"
|
|
|
|
self.user = self.register_user(self.localpart, self.password)
|
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_check_auth_required(self) -> None:
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", self.url)
|
2019-01-29 06:37:56 -05:00
|
|
|
|
|
|
|
self.assertEqual(channel.code, 401)
|
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_room_version_capabilities(self) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
2019-01-29 06:37:56 -05:00
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-06-20 05:32:02 -04:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
2019-01-29 06:37:56 -05:00
|
|
|
|
2019-01-25 06:16:29 -05:00
|
|
|
self.assertEqual(channel.code, 200)
|
2019-06-20 05:32:02 -04:00
|
|
|
for room_version in capabilities["m.room_versions"]["available"].keys():
|
2019-01-25 06:16:29 -05:00
|
|
|
self.assertTrue(room_version in KNOWN_ROOM_VERSIONS, "" + room_version)
|
2019-05-23 10:00:20 -04:00
|
|
|
|
2019-01-25 06:16:29 -05:00
|
|
|
self.assertEqual(
|
2021-09-29 06:44:15 -04:00
|
|
|
self.config.server.default_room_version.identifier,
|
2019-06-20 05:32:02 -04:00
|
|
|
capabilities["m.room_versions"]["default"],
|
2019-01-25 06:16:29 -05:00
|
|
|
)
|
2019-01-29 10:58:37 -05:00
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_change_password_capabilities_password_login(self) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
2019-01-29 10:58:37 -05:00
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-06-20 05:32:02 -04:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
2019-01-29 10:58:37 -05:00
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
2019-06-20 05:32:02 -04:00
|
|
|
self.assertTrue(capabilities["m.change_password"]["enabled"])
|
2021-03-16 11:44:25 -04:00
|
|
|
|
|
|
|
@override_config({"password_config": {"localdb_enabled": False}})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_change_password_capabilities_localdb_disabled(self) -> None:
|
2021-03-16 11:44:25 -04:00
|
|
|
access_token = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 05:40:40 -04:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-03-16 11:44:25 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
self.assertFalse(capabilities["m.change_password"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"password_config": {"enabled": False}})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_change_password_capabilities_password_disabled(self) -> None:
|
2021-03-16 11:44:25 -04:00
|
|
|
access_token = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 05:40:40 -04:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-03-16 11:44:25 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2020-12-15 09:44:04 -05:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-06-20 05:32:02 -04:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
2019-01-29 10:58:37 -05:00
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
2019-06-20 05:32:02 -04:00
|
|
|
self.assertFalse(capabilities["m.change_password"]["enabled"])
|
2021-07-20 07:59:23 -04:00
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_change_users_attributes_capabilities(self) -> None:
|
2022-02-11 04:32:11 -05:00
|
|
|
"""Test that server returns capabilities by default."""
|
2021-08-19 05:40:40 -04:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 04:32:11 -05:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
2021-08-19 05:40:40 -04:00
|
|
|
self.assertTrue(capabilities["m.change_password"]["enabled"])
|
2022-02-11 04:32:11 -05:00
|
|
|
self.assertTrue(capabilities["m.set_displayname"]["enabled"])
|
|
|
|
self.assertTrue(capabilities["m.set_avatar_url"]["enabled"])
|
|
|
|
self.assertTrue(capabilities["m.3pid_changes"]["enabled"])
|
2021-08-19 05:40:40 -04:00
|
|
|
|
2022-02-11 04:32:11 -05:00
|
|
|
@override_config({"enable_set_displayname": False})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_set_displayname_capabilities_displayname_disabled(self) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
"""Test if set displayname is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 04:32:11 -05:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.set_displayname"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"enable_set_avatar_url": False})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_set_avatar_url_capabilities_avatar_url_disabled(self) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
"""Test if set avatar_url is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 04:32:11 -05:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.set_avatar_url"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"enable_3pid_changes": False})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_change_3pid_capabilities_3pid_disabled(self) -> None:
|
2021-08-19 05:40:40 -04:00
|
|
|
"""Test if change 3pid is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 04:32:11 -05:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.3pid_changes"]["enabled"])
|
2021-08-19 05:40:40 -04:00
|
|
|
|
2021-08-20 07:17:50 -04:00
|
|
|
@override_config({"experimental_features": {"msc3244_enabled": False}})
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_does_not_include_msc3244_fields_when_disabled(self) -> None:
|
2021-07-20 07:59:23 -04:00
|
|
|
access_token = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 05:40:40 -04:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-07-20 07:59:23 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
self.assertNotIn(
|
|
|
|
"org.matrix.msc3244.room_capabilities", capabilities["m.room_versions"]
|
|
|
|
)
|
|
|
|
|
2022-02-23 08:33:19 -05:00
|
|
|
def test_get_does_include_msc3244_fields_when_enabled(self) -> None:
|
2021-07-20 07:59:23 -04:00
|
|
|
access_token = self.get_success(
|
2021-11-17 09:10:57 -05:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 05:40:40 -04:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-07-20 07:59:23 -04:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
for details in capabilities["m.room_versions"][
|
|
|
|
"org.matrix.msc3244.room_capabilities"
|
|
|
|
].values():
|
|
|
|
if details["preferred"] is not None:
|
|
|
|
self.assertTrue(
|
|
|
|
details["preferred"] in KNOWN_ROOM_VERSIONS,
|
|
|
|
str(details["preferred"]),
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assertGreater(len(details["support"]), 0)
|
|
|
|
for room_version in details["support"]:
|
|
|
|
self.assertTrue(room_version in KNOWN_ROOM_VERSIONS, str(room_version))
|
2023-06-01 08:52:51 -04:00
|
|
|
|
|
|
|
def test_get_get_token_login_fields_when_disabled(self) -> None:
|
|
|
|
"""By default login via an existing session is disabled."""
|
|
|
|
access_token = self.get_success(
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
|
|
|
self.user, device_id=None, valid_until_ms=None
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.get_login_token"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"login_via_existing_session": {"enabled": True}})
|
|
|
|
def test_get_get_token_login_fields_when_enabled(self) -> None:
|
|
|
|
access_token = self.get_success(
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
|
|
|
self.user, device_id=None, valid_until_ms=None
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertTrue(capabilities["m.get_login_token"]["enabled"])
|