2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-03-28 09:03:37 -04:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2019-07-18 06:46:47 -04:00
|
|
|
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-12 22:14:34 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
import functools
|
|
|
|
import logging
|
|
|
|
import re
|
2021-03-23 07:51:12 -04:00
|
|
|
from typing import Container, Mapping, Optional, Sequence, Tuple, Type
|
2018-07-09 02:09:20 -04:00
|
|
|
|
|
|
|
import synapse
|
2021-02-17 08:41:47 -05:00
|
|
|
from synapse.api.constants import MAX_GROUP_CATEGORYID_LENGTH, MAX_GROUP_ROLEID_LENGTH
|
2018-07-09 02:09:20 -04:00
|
|
|
from synapse.api.errors import Codes, FederationDeniedError, SynapseError
|
2019-04-01 05:24:38 -04:00
|
|
|
from synapse.api.room_versions import RoomVersions
|
2019-05-29 11:47:16 -04:00
|
|
|
from synapse.api.urls import (
|
|
|
|
FEDERATION_UNSTABLE_PREFIX,
|
|
|
|
FEDERATION_V1_PREFIX,
|
|
|
|
FEDERATION_V2_PREFIX,
|
|
|
|
)
|
2021-03-23 07:51:12 -04:00
|
|
|
from synapse.http.server import HttpServer, JsonResource
|
2016-09-15 05:36:19 -04:00
|
|
|
from synapse.http.servlet import (
|
2016-12-06 05:43:48 -05:00
|
|
|
parse_boolean_from_args,
|
2018-07-09 02:09:20 -04:00
|
|
|
parse_integer_from_args,
|
|
|
|
parse_json_object_from_request,
|
|
|
|
parse_string_from_args,
|
2016-09-15 05:36:19 -04:00
|
|
|
)
|
2019-07-03 10:07:04 -04:00
|
|
|
from synapse.logging.context import run_in_background
|
2019-08-22 13:08:07 -04:00
|
|
|
from synapse.logging.opentracing import (
|
|
|
|
start_active_span,
|
|
|
|
start_active_span_from_request,
|
|
|
|
tags,
|
|
|
|
whitelisted_homeserver,
|
|
|
|
)
|
2020-01-17 05:27:19 -05:00
|
|
|
from synapse.server import HomeServer
|
2021-03-23 07:51:12 -04:00
|
|
|
from synapse.types import JsonDict, ThirdPartyInstanceID, get_domain_from_id
|
|
|
|
from synapse.util.ratelimitutils import FederationRateLimiter
|
2021-01-20 08:15:14 -05:00
|
|
|
from synapse.util.stringutils import parse_and_validate_server_name
|
2016-08-05 11:36:07 -04:00
|
|
|
from synapse.util.versionstring import get_version_string
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2016-01-26 08:52:29 -05:00
|
|
|
class TransportLayerServer(JsonResource):
|
2015-01-16 08:21:14 -05:00
|
|
|
"""Handles incoming federation HTTP requests"""
|
2014-11-07 10:35:53 -05:00
|
|
|
|
2019-01-20 18:54:43 -05:00
|
|
|
def __init__(self, hs, servlet_groups=None):
|
2019-01-22 04:00:17 -05:00
|
|
|
"""Initialize the TransportLayerServer
|
|
|
|
|
|
|
|
Will by default register all servlets. For custom behaviour, pass in
|
|
|
|
a list of servlet_groups to register.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
hs (synapse.server.HomeServer): homeserver
|
|
|
|
servlet_groups (list[str], optional): List of servlet groups to register.
|
|
|
|
Defaults to ``DEFAULT_SERVLET_GROUPS``.
|
|
|
|
"""
|
2016-01-26 08:52:29 -05:00
|
|
|
self.hs = hs
|
|
|
|
self.clock = hs.get_clock()
|
2019-01-20 18:54:43 -05:00
|
|
|
self.servlet_groups = servlet_groups
|
2016-01-26 08:52:29 -05:00
|
|
|
|
2020-09-18 09:56:44 -04:00
|
|
|
super().__init__(hs, canonical_json=False)
|
2016-01-26 08:52:29 -05:00
|
|
|
|
|
|
|
self.authenticator = Authenticator(hs)
|
2020-09-18 05:49:29 -04:00
|
|
|
self.ratelimiter = hs.get_federation_ratelimiter()
|
2016-01-26 08:52:29 -05:00
|
|
|
|
|
|
|
self.register_servlets()
|
|
|
|
|
|
|
|
def register_servlets(self):
|
|
|
|
register_servlets(
|
|
|
|
self.hs,
|
|
|
|
resource=self,
|
|
|
|
ratelimiter=self.ratelimiter,
|
|
|
|
authenticator=self.authenticator,
|
2019-01-20 18:54:43 -05:00
|
|
|
servlet_groups=self.servlet_groups,
|
2016-01-26 08:52:29 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
class AuthenticationError(SynapseError):
|
|
|
|
"""There was a problem authenticating the request"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class NoAuthenticationError(AuthenticationError):
|
|
|
|
"""The request had no authentication information"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
2020-09-04 06:54:56 -04:00
|
|
|
class Authenticator:
|
2020-01-17 05:27:19 -05:00
|
|
|
def __init__(self, hs: HomeServer):
|
2019-06-03 17:59:51 -04:00
|
|
|
self._clock = hs.get_clock()
|
2016-01-26 08:52:29 -05:00
|
|
|
self.keyring = hs.get_keyring()
|
|
|
|
self.server_name = hs.hostname
|
2017-05-05 05:34:53 -04:00
|
|
|
self.store = hs.get_datastore()
|
2018-01-22 13:11:18 -05:00
|
|
|
self.federation_domain_whitelist = hs.config.federation_domain_whitelist
|
2020-07-09 09:52:58 -04:00
|
|
|
self.notifier = hs.get_notifier()
|
2020-01-17 05:27:19 -05:00
|
|
|
|
|
|
|
self.replication_client = None
|
|
|
|
if hs.config.worker.worker_app:
|
|
|
|
self.replication_client = hs.get_tcp_replication()
|
2016-01-26 08:52:29 -05:00
|
|
|
|
2015-03-05 15:33:16 -05:00
|
|
|
# A method just so we can pass 'self' as the authenticator to the Servlets
|
2019-07-18 06:46:47 -04:00
|
|
|
async def authenticate_request(self, request, content):
|
2019-06-03 17:59:51 -04:00
|
|
|
now = self._clock.time_msec()
|
2014-10-13 09:37:46 -04:00
|
|
|
json_request = {
|
2018-09-12 09:23:32 -04:00
|
|
|
"method": request.method.decode("ascii"),
|
|
|
|
"uri": request.uri.decode("ascii"),
|
2014-10-13 09:37:46 -04:00
|
|
|
"destination": self.server_name,
|
|
|
|
"signatures": {},
|
|
|
|
}
|
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
if content is not None:
|
|
|
|
json_request["content"] = content
|
2014-10-13 09:37:46 -04:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
origin = None
|
2014-10-13 09:37:46 -04:00
|
|
|
|
|
|
|
auth_headers = request.requestHeaders.getRawHeaders(b"Authorization")
|
|
|
|
|
2014-10-17 16:00:58 -04:00
|
|
|
if not auth_headers:
|
2016-08-05 11:17:04 -04:00
|
|
|
raise NoAuthenticationError(
|
2014-10-17 16:00:58 -04:00
|
|
|
401, "Missing Authorization headers", Codes.UNAUTHORIZED
|
|
|
|
)
|
|
|
|
|
2014-10-13 09:37:46 -04:00
|
|
|
for auth in auth_headers:
|
2018-07-03 09:36:14 -04:00
|
|
|
if auth.startswith(b"X-Matrix"):
|
|
|
|
(origin, key, sig) = _parse_auth_header(auth)
|
2014-10-13 09:37:46 -04:00
|
|
|
json_request["origin"] = origin
|
2014-11-10 08:46:44 -05:00
|
|
|
json_request["signatures"].setdefault(origin, {})[key] = sig
|
2014-10-13 09:37:46 -04:00
|
|
|
|
2018-04-13 10:47:43 -04:00
|
|
|
if (
|
|
|
|
self.federation_domain_whitelist is not None
|
|
|
|
and origin not in self.federation_domain_whitelist
|
|
|
|
):
|
|
|
|
raise FederationDeniedError(origin)
|
|
|
|
|
2021-01-04 10:04:50 -05:00
|
|
|
if origin is None or not json_request["signatures"]:
|
2016-08-05 11:17:04 -04:00
|
|
|
raise NoAuthenticationError(
|
2014-10-13 11:39:15 -04:00
|
|
|
401, "Missing Authorization headers", Codes.UNAUTHORIZED
|
2014-10-13 10:53:18 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
await self.keyring.verify_json_for_server(
|
2019-06-04 11:12:57 -04:00
|
|
|
origin, json_request, now, "Incoming request"
|
|
|
|
)
|
2014-10-13 09:37:46 -04:00
|
|
|
|
2020-02-06 08:31:05 -05:00
|
|
|
logger.debug("Request from %s", origin)
|
2020-10-29 11:58:44 -04:00
|
|
|
request.requester = origin
|
2015-06-02 13:15:13 -04:00
|
|
|
|
2017-05-05 05:34:53 -04:00
|
|
|
# If we get a valid signed request from the other side, its probably
|
|
|
|
# alive
|
2019-07-18 06:46:47 -04:00
|
|
|
retry_timings = await self.store.get_destination_retry_timings(origin)
|
2017-05-05 05:34:53 -04:00
|
|
|
if retry_timings and retry_timings["retry_last_ts"]:
|
2018-04-27 06:07:40 -04:00
|
|
|
run_in_background(self._reset_retry_timings, origin)
|
2017-05-05 05:34:53 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return origin
|
2014-10-13 09:37:46 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def _reset_retry_timings(self, origin):
|
2018-04-27 06:07:40 -04:00
|
|
|
try:
|
|
|
|
logger.info("Marking origin %r as up", origin)
|
2019-09-20 07:05:00 -04:00
|
|
|
await self.store.set_destination_retry_timings(origin, None, 0, 0)
|
2020-01-17 05:27:19 -05:00
|
|
|
|
|
|
|
# Inform the relevant places that the remote server is back up.
|
2020-07-09 09:52:58 -04:00
|
|
|
self.notifier.notify_remote_server_up(origin)
|
2020-01-17 05:27:19 -05:00
|
|
|
if self.replication_client:
|
|
|
|
# If we're on a worker we try and inform master about this. The
|
|
|
|
# replication client doesn't hook into the notifier to avoid
|
|
|
|
# infinite loops where we send a `REMOTE_SERVER_UP` command to
|
|
|
|
# master, which then echoes it back to us which in turn pokes
|
|
|
|
# the notifier.
|
|
|
|
self.replication_client.send_remote_server_up(origin)
|
|
|
|
|
2018-04-27 06:07:40 -04:00
|
|
|
except Exception:
|
|
|
|
logger.exception("Error resetting retry timings on %s", origin)
|
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2018-07-03 09:36:14 -04:00
|
|
|
def _parse_auth_header(header_bytes):
|
|
|
|
"""Parse an X-Matrix auth header
|
|
|
|
|
|
|
|
Args:
|
|
|
|
header_bytes (bytes): header value
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Tuple[str, str, str]: origin, key id, signature.
|
|
|
|
|
|
|
|
Raises:
|
|
|
|
AuthenticationError if the header could not be parsed
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
header_str = header_bytes.decode("utf-8")
|
|
|
|
params = header_str.split(" ")[1].split(",")
|
|
|
|
param_dict = dict(kv.split("=") for kv in params)
|
|
|
|
|
|
|
|
def strip_quotes(value):
|
2018-08-01 10:54:06 -04:00
|
|
|
if value.startswith('"'):
|
2018-07-03 09:36:14 -04:00
|
|
|
return value[1:-1]
|
|
|
|
else:
|
|
|
|
return value
|
|
|
|
|
|
|
|
origin = strip_quotes(param_dict["origin"])
|
2018-07-04 13:15:03 -04:00
|
|
|
|
2018-07-03 09:36:14 -04:00
|
|
|
# ensure that the origin is a valid server name
|
2018-07-04 13:15:03 -04:00
|
|
|
parse_and_validate_server_name(origin)
|
2018-07-03 09:36:14 -04:00
|
|
|
|
|
|
|
key = strip_quotes(param_dict["key"])
|
|
|
|
sig = strip_quotes(param_dict["sig"])
|
|
|
|
return origin, key, sig
|
|
|
|
except Exception as e:
|
2019-10-31 06:23:24 -04:00
|
|
|
logger.warning(
|
2018-07-03 09:36:14 -04:00
|
|
|
"Error parsing auth header '%s': %s",
|
|
|
|
header_bytes.decode("ascii", "replace"),
|
|
|
|
e,
|
|
|
|
)
|
|
|
|
raise AuthenticationError(
|
|
|
|
400, "Malformed Authorization header", Codes.UNAUTHORIZED
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-09-04 06:54:56 -04:00
|
|
|
class BaseFederationServlet:
|
2018-08-03 11:04:29 -04:00
|
|
|
"""Abstract base class for federation servlet classes.
|
|
|
|
|
|
|
|
The servlet object should have a PATH attribute which takes the form of a regexp to
|
|
|
|
match against the request path (excluding the /federation/v1 prefix).
|
|
|
|
|
|
|
|
The servlet should also implement one or more of on_GET, on_POST, on_PUT, to match
|
2019-07-18 06:46:47 -04:00
|
|
|
the appropriate HTTP method. These methods must be *asynchronous* and have the
|
|
|
|
signature:
|
2018-08-03 11:04:29 -04:00
|
|
|
|
|
|
|
on_<METHOD>(self, origin, content, query, **kwargs)
|
|
|
|
|
|
|
|
With arguments:
|
|
|
|
|
|
|
|
origin (unicode|None): The authenticated server_name of the calling server,
|
|
|
|
unless REQUIRE_AUTH is set to False and authentication failed.
|
|
|
|
|
|
|
|
content (unicode|None): decoded json body of the request. None if the
|
|
|
|
request was a GET.
|
|
|
|
|
|
|
|
query (dict[bytes, list[bytes]]): Query params from the request. url-decoded
|
|
|
|
(ie, '+' and '%xx' are decoded) but note that it is *not* utf8-decoded
|
|
|
|
yet.
|
|
|
|
|
|
|
|
**kwargs (dict[unicode, unicode]): the dict mapping keys to path
|
|
|
|
components as specified in the path match regexp.
|
|
|
|
|
|
|
|
Returns:
|
2019-07-18 06:46:47 -04:00
|
|
|
Optional[Tuple[int, object]]: either (response code, response object) to
|
2018-08-03 11:04:29 -04:00
|
|
|
return a JSON response, or None if the request has already been handled.
|
|
|
|
|
|
|
|
Raises:
|
|
|
|
SynapseError: to return an error code
|
|
|
|
|
|
|
|
Exception: other exceptions will be caught, logged, and a 500 will be
|
|
|
|
returned.
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
PATH = "" # Overridden in subclasses, the regex to match against the path.
|
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
REQUIRE_AUTH = True
|
|
|
|
|
2019-01-15 06:14:34 -05:00
|
|
|
PREFIX = FEDERATION_V1_PREFIX # Allows specifying the API version
|
|
|
|
|
2020-09-18 05:49:29 -04:00
|
|
|
RATELIMIT = True # Whether to rate limit requests or not
|
|
|
|
|
2017-07-05 09:32:24 -04:00
|
|
|
def __init__(self, handler, authenticator, ratelimiter, server_name):
|
2015-03-05 14:10:57 -05:00
|
|
|
self.handler = handler
|
2015-03-05 15:33:16 -05:00
|
|
|
self.authenticator = authenticator
|
2015-03-05 15:53:33 -05:00
|
|
|
self.ratelimiter = ratelimiter
|
2015-03-05 15:33:16 -05:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
def _wrap(self, func):
|
2015-03-05 15:33:16 -05:00
|
|
|
authenticator = self.authenticator
|
2015-03-05 15:53:33 -05:00
|
|
|
ratelimiter = self.ratelimiter
|
2015-03-05 15:33:16 -05:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
@functools.wraps(func)
|
2019-07-18 06:46:47 -04:00
|
|
|
async def new_func(request, *args, **kwargs):
|
|
|
|
"""A callback which can be passed to HttpServer.RegisterPaths
|
2018-08-03 11:04:29 -04:00
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request):
|
|
|
|
*args: unused?
|
|
|
|
**kwargs (dict[unicode, unicode]): the dict mapping keys to path
|
|
|
|
components as specified in the path match regexp.
|
|
|
|
|
|
|
|
Returns:
|
2019-07-18 06:46:47 -04:00
|
|
|
Tuple[int, object]|None: (response code, response object) as returned by
|
|
|
|
the callback method. None if the request has already been handled.
|
2018-08-03 11:04:29 -04:00
|
|
|
"""
|
2016-08-05 11:17:04 -04:00
|
|
|
content = None
|
2018-09-12 09:23:32 -04:00
|
|
|
if request.method in [b"PUT", b"POST"]:
|
2016-08-05 11:17:04 -04:00
|
|
|
# TODO: Handle other method types? other content types?
|
|
|
|
content = parse_json_object_from_request(request)
|
|
|
|
|
2015-03-05 15:33:16 -05:00
|
|
|
try:
|
2019-07-18 06:46:47 -04:00
|
|
|
origin = await authenticator.authenticate_request(request, content)
|
2016-08-05 11:17:04 -04:00
|
|
|
except NoAuthenticationError:
|
|
|
|
origin = None
|
|
|
|
if self.REQUIRE_AUTH:
|
2019-10-31 06:23:24 -04:00
|
|
|
logger.warning(
|
|
|
|
"authenticate_request failed: missing authentication"
|
|
|
|
)
|
2016-08-05 11:17:04 -04:00
|
|
|
raise
|
2018-08-21 06:41:07 -04:00
|
|
|
except Exception as e:
|
2019-10-31 06:23:24 -04:00
|
|
|
logger.warning("authenticate_request failed: %s", e)
|
2016-08-05 11:17:04 -04:00
|
|
|
raise
|
|
|
|
|
2019-08-22 13:08:07 -04:00
|
|
|
request_tags = {
|
|
|
|
"request_id": request.get_request_id(),
|
|
|
|
tags.SPAN_KIND: tags.SPAN_KIND_RPC_SERVER,
|
|
|
|
tags.HTTP_METHOD: request.get_method(),
|
|
|
|
tags.HTTP_URL: request.get_redacted_uri(),
|
|
|
|
tags.PEER_HOST_IPV6: request.getClientIP(),
|
|
|
|
"authenticated_entity": origin,
|
|
|
|
"servlet_name": request.request_metrics.name,
|
|
|
|
}
|
|
|
|
|
|
|
|
# Only accept the span context if the origin is authenticated
|
|
|
|
# and whitelisted
|
|
|
|
if origin and whitelisted_homeserver(origin):
|
|
|
|
scope = start_active_span_from_request(
|
|
|
|
request, "incoming-federation-request", tags=request_tags
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
scope = start_active_span(
|
|
|
|
"incoming-federation-request", tags=request_tags
|
|
|
|
)
|
|
|
|
|
|
|
|
with scope:
|
2020-09-18 05:49:29 -04:00
|
|
|
if origin and self.RATELIMIT:
|
2019-07-11 05:36:03 -04:00
|
|
|
with ratelimiter.ratelimit(origin) as d:
|
2019-07-18 06:46:47 -04:00
|
|
|
await d
|
Abort federation requests if the client disconnects early (#7930)
For inbound federation requests, if a given remote server makes too many
requests at once, we start stacking them up rather than processing them
immediatedly.
However, that means that there is a fair chance that the requesting server will
disconnect before we start processing the request. In that case, if it was a
read-only request (ie, a GET request), there is absolutely no point in
building a response (and some requests are quite expensive to handle).
Even in the case of a POST request, one of two things will happen:
* Most likely, the requesting server will retry the request and we'll get the
information anyway.
* Even if it doesn't, the requesting server has to assume that we didn't get
the memo, and act accordingly.
In short, we're better off aborting the request at this point rather than
ploughing on with what might be a quite expensive request.
2020-07-23 11:52:33 -04:00
|
|
|
if request._disconnected:
|
|
|
|
logger.warning(
|
|
|
|
"client disconnected before we started processing "
|
|
|
|
"request"
|
|
|
|
)
|
|
|
|
return -1, None
|
2019-07-18 06:46:47 -04:00
|
|
|
response = await func(
|
2019-07-11 05:36:03 -04:00
|
|
|
origin, content, request.args, *args, **kwargs
|
|
|
|
)
|
|
|
|
else:
|
2019-07-18 06:46:47 -04:00
|
|
|
response = await func(
|
2015-03-05 15:33:16 -05:00
|
|
|
origin, content, request.args, *args, **kwargs
|
|
|
|
)
|
2016-08-05 11:17:04 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return response
|
2015-03-09 14:34:20 -04:00
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
return new_func
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
def register(self, server):
|
2019-01-15 06:14:34 -05:00
|
|
|
pattern = re.compile("^" + self.PREFIX + self.PATH + "$")
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
for method in ("GET", "PUT", "POST"):
|
|
|
|
code = getattr(self, "on_%s" % (method), None)
|
|
|
|
if code is None:
|
|
|
|
continue
|
|
|
|
|
2019-07-24 08:07:35 -04:00
|
|
|
server.register_paths(
|
2020-07-03 14:02:19 -04:00
|
|
|
method,
|
|
|
|
(pattern,),
|
|
|
|
self._wrap(code),
|
|
|
|
self.__class__.__name__,
|
2019-07-24 08:07:35 -04:00
|
|
|
)
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
|
|
|
|
class FederationSendServlet(BaseFederationServlet):
|
2019-03-26 07:35:29 -04:00
|
|
|
PATH = "/send/(?P<transaction_id>[^/]*)/?"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2020-09-18 05:49:29 -04:00
|
|
|
# We ratelimit manually in the handler as we queue up the requests and we
|
|
|
|
# don't want to fill up the ratelimiter with blocked requests.
|
|
|
|
RATELIMIT = False
|
|
|
|
|
2015-03-05 15:33:16 -05:00
|
|
|
def __init__(self, handler, server_name, **kwargs):
|
2020-09-18 09:56:44 -04:00
|
|
|
super().__init__(handler, server_name=server_name, **kwargs)
|
2015-03-05 14:10:57 -05:00
|
|
|
self.server_name = server_name
|
|
|
|
|
|
|
|
# This is when someone is trying to send us a bunch of data.
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_PUT(self, origin, content, query, transaction_id):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Called on PUT /send/<transaction_id>/
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request): The HTTP request.
|
|
|
|
transaction_id (str): The transaction_id associated with this
|
|
|
|
request. This is *not* None.
|
|
|
|
|
|
|
|
Returns:
|
2019-07-18 06:46:47 -04:00
|
|
|
Tuple of `(code, response)`, where
|
2014-08-12 10:10:52 -04:00
|
|
|
`response` is a python dict to be converted into JSON that is
|
|
|
|
used as the response body.
|
|
|
|
"""
|
|
|
|
# Parse the request
|
|
|
|
try:
|
2014-10-13 09:37:46 -04:00
|
|
|
transaction_data = content
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
logger.debug("Decoded %s: %s", transaction_id, str(transaction_data))
|
|
|
|
|
2015-05-22 09:44:25 -04:00
|
|
|
logger.info(
|
2018-07-30 18:24:02 -04:00
|
|
|
"Received txn %s from %s. (PDUs: %d, EDUs: %d)",
|
2015-05-22 09:44:25 -04:00
|
|
|
transaction_id,
|
|
|
|
origin,
|
|
|
|
len(transaction_data.get("pdus", [])),
|
|
|
|
len(transaction_data.get("edus", [])),
|
|
|
|
)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
# We should ideally be getting this from the security layer.
|
|
|
|
# origin = body["origin"]
|
|
|
|
|
|
|
|
# Add some extra data to the transaction dict that isn't included
|
|
|
|
# in the request body.
|
|
|
|
transaction_data.update(
|
|
|
|
transaction_id=transaction_id, destination=self.server_name
|
|
|
|
)
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(e)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 400, {"error": "Invalid transaction"}
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2021-04-09 13:12:15 -04:00
|
|
|
code, response = await self.handler.on_incoming_transaction(
|
|
|
|
origin, transaction_data
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return code, response
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
class FederationEventServlet(BaseFederationServlet):
|
2019-03-26 07:35:29 -04:00
|
|
|
PATH = "/event/(?P<event_id>[^/]*)/?"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
# This is when someone asks for a data item for a given server data_id pair.
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, event_id):
|
|
|
|
return await self.handler.on_pdu_request(origin, event_id)
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
|
2019-11-27 16:54:07 -05:00
|
|
|
class FederationStateV1Servlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/state/(?P<room_id>[^/]*)/?"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
# This is when someone asks for all data for a given room.
|
|
|
|
async def on_GET(self, origin, content, query, room_id):
|
|
|
|
return await self.handler.on_room_state_request(
|
2015-03-05 15:53:33 -05:00
|
|
|
origin,
|
2020-11-19 05:05:33 -05:00
|
|
|
room_id,
|
2019-11-27 16:54:07 -05:00
|
|
|
parse_string_from_args(query, "event_id", None, required=False),
|
2015-03-05 14:10:57 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2016-08-03 09:47:37 -04:00
|
|
|
class FederationStateIdsServlet(BaseFederationServlet):
|
2019-03-26 07:35:29 -04:00
|
|
|
PATH = "/state_ids/(?P<room_id>[^/]*)/?"
|
2016-08-03 09:47:37 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, room_id):
|
|
|
|
return await self.handler.on_state_ids_request(
|
2016-08-03 09:47:37 -04:00
|
|
|
origin,
|
|
|
|
room_id,
|
2019-02-27 17:35:47 -05:00
|
|
|
parse_string_from_args(query, "event_id", None, required=True),
|
2016-08-03 09:47:37 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
class FederationBackfillServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/backfill/(?P<room_id>[^/]*)/?"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_GET(self, origin, content, query, room_id):
|
2018-09-12 09:23:32 -04:00
|
|
|
versions = [x.decode("ascii") for x in query[b"v"]]
|
|
|
|
limit = parse_integer_from_args(query, "limit", None)
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2018-09-12 09:23:32 -04:00
|
|
|
if not limit:
|
2019-07-18 06:46:47 -04:00
|
|
|
return 400, {"error": "Did not include limit param"}
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
return await self.handler.on_backfill_request(origin, room_id, versions, limit)
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
|
|
|
|
class FederationQueryServlet(BaseFederationServlet):
|
2016-03-23 12:13:05 -04:00
|
|
|
PATH = "/query/(?P<query_type>[^/]*)"
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
# This is when we receive a server-server Query
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, query_type):
|
2021-02-19 04:50:41 -05:00
|
|
|
args = {k.decode("utf8"): v[0].decode("utf-8") for k, v in query.items()}
|
|
|
|
args["origin"] = origin
|
|
|
|
return await self.handler.on_query_request(query_type, args)
|
2014-10-16 11:56:51 -04:00
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
class FederationMakeJoinServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/make_join/(?P<room_id>[^/]*)/(?P<user_id>[^/]*)"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_GET(self, origin, _content, query, room_id, user_id):
|
2018-07-25 17:25:41 -04:00
|
|
|
"""
|
|
|
|
Args:
|
|
|
|
origin (unicode): The authenticated server_name of the calling server
|
|
|
|
|
|
|
|
_content (None): (GETs don't have bodies)
|
|
|
|
|
|
|
|
query (dict[bytes, list[bytes]]): Query params from the request.
|
|
|
|
|
|
|
|
**kwargs (dict[unicode, unicode]): the dict mapping keys to path
|
|
|
|
components as specified in the path match regexp.
|
|
|
|
|
|
|
|
Returns:
|
2019-07-18 06:46:47 -04:00
|
|
|
Tuple[int, object]: (response code, response object)
|
2018-07-25 17:25:41 -04:00
|
|
|
"""
|
|
|
|
versions = query.get(b"ver")
|
|
|
|
if versions is not None:
|
|
|
|
supported_versions = [v.decode("utf-8") for v in versions]
|
|
|
|
else:
|
|
|
|
supported_versions = ["1"]
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
content = await self.handler.on_make_join_request(
|
2020-11-19 05:05:33 -05:00
|
|
|
origin, room_id, user_id, supported_versions=supported_versions
|
2018-07-04 10:31:00 -04:00
|
|
|
)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2014-10-16 11:56:51 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2015-10-20 06:58:58 -04:00
|
|
|
class FederationMakeLeaveServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/make_leave/(?P<room_id>[^/]*)/(?P<user_id>[^/]*)"
|
2015-10-20 06:58:58 -04:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_GET(self, origin, content, query, room_id, user_id):
|
|
|
|
content = await self.handler.on_make_leave_request(origin, room_id, user_id)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2015-10-20 06:58:58 -04:00
|
|
|
|
|
|
|
|
2019-11-11 11:40:45 -05:00
|
|
|
class FederationV1SendLeaveServlet(BaseFederationServlet):
|
|
|
|
PATH = "/send_leave/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
|
|
|
|
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
2020-11-19 05:05:33 -05:00
|
|
|
content = await self.handler.on_send_leave_request(origin, content)
|
2019-11-11 11:40:45 -05:00
|
|
|
return 200, (200, content)
|
|
|
|
|
|
|
|
|
|
|
|
class FederationV2SendLeaveServlet(BaseFederationServlet):
|
2018-07-26 16:41:59 -04:00
|
|
|
PATH = "/send_leave/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2015-10-20 06:58:58 -04:00
|
|
|
|
2019-11-11 11:46:09 -05:00
|
|
|
PREFIX = FEDERATION_V2_PREFIX
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
2020-11-19 05:05:33 -05:00
|
|
|
content = await self.handler.on_send_leave_request(origin, content)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2015-10-20 06:58:58 -04:00
|
|
|
|
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
class FederationEventAuthServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/event_auth/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_GET(self, origin, content, query, room_id, event_id):
|
|
|
|
return await self.handler.on_event_auth(origin, room_id, event_id)
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
|
2019-11-11 11:40:45 -05:00
|
|
|
class FederationV1SendJoinServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/send_join/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2019-11-11 11:40:45 -05:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
|
|
|
# TODO(paul): assert that room_id/event_id parsed from path actually
|
2019-11-11 11:40:45 -05:00
|
|
|
# match those given in content
|
2020-11-19 05:05:33 -05:00
|
|
|
content = await self.handler.on_send_join_request(origin, content)
|
2019-11-11 11:40:45 -05:00
|
|
|
return 200, (200, content)
|
|
|
|
|
|
|
|
|
|
|
|
class FederationV2SendJoinServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/send_join/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2019-11-11 11:40:45 -05:00
|
|
|
PREFIX = FEDERATION_V2_PREFIX
|
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
|
|
|
# TODO(paul): assert that room_id/event_id parsed from path actually
|
2015-03-05 14:10:57 -05:00
|
|
|
# match those given in content
|
2020-11-19 05:05:33 -05:00
|
|
|
content = await self.handler.on_send_join_request(origin, content)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2015-03-05 14:10:57 -05:00
|
|
|
|
|
|
|
|
2019-01-15 08:22:44 -05:00
|
|
|
class FederationV1InviteServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/invite/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
2019-01-15 08:22:44 -05:00
|
|
|
# We don't get a room version, so we have to assume its EITHER v1 or
|
|
|
|
# v2. This is "fine" as the only difference between V1 and V2 is the
|
|
|
|
# state resolution algorithm, and we don't use that for processing
|
|
|
|
# invites
|
2019-07-18 06:46:47 -04:00
|
|
|
content = await self.handler.on_invite_request(
|
2020-02-03 08:15:24 -05:00
|
|
|
origin, content, room_version_id=RoomVersions.V1.identifier
|
2019-01-15 08:22:44 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
# V1 federation API is defined to return a content of `[200, {...}]`
|
|
|
|
# due to a historical bug.
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, (200, content)
|
2019-01-15 08:22:44 -05:00
|
|
|
|
|
|
|
|
|
|
|
class FederationV2InviteServlet(BaseFederationServlet):
|
2020-11-19 05:05:33 -05:00
|
|
|
PATH = "/invite/(?P<room_id>[^/]*)/(?P<event_id>[^/]*)"
|
2019-01-15 08:22:44 -05:00
|
|
|
|
|
|
|
PREFIX = FEDERATION_V2_PREFIX
|
|
|
|
|
2020-11-19 05:05:33 -05:00
|
|
|
async def on_PUT(self, origin, content, query, room_id, event_id):
|
|
|
|
# TODO(paul): assert that room_id/event_id parsed from path actually
|
2015-03-05 14:10:57 -05:00
|
|
|
# match those given in content
|
2019-01-15 08:22:44 -05:00
|
|
|
|
|
|
|
room_version = content["room_version"]
|
|
|
|
event = content["event"]
|
|
|
|
invite_room_state = content["invite_room_state"]
|
|
|
|
|
|
|
|
# Synapse expects invite_room_state to be in unsigned, as it is in v1
|
|
|
|
# API
|
|
|
|
|
|
|
|
event.setdefault("unsigned", {})["invite_room_state"] = invite_room_state
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
content = await self.handler.on_invite_request(
|
2020-02-03 08:15:24 -05:00
|
|
|
origin, event, room_version_id=room_version
|
2019-01-15 08:22:44 -05:00
|
|
|
)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2015-01-29 11:50:23 -05:00
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2015-11-05 11:43:19 -05:00
|
|
|
class FederationThirdPartyInviteExchangeServlet(BaseFederationServlet):
|
2016-03-23 12:13:05 -04:00
|
|
|
PATH = "/exchange_third_party_invite/(?P<room_id>[^/]*)"
|
2015-11-05 11:43:19 -05:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_PUT(self, origin, content, query, room_id):
|
2021-04-06 07:21:57 -04:00
|
|
|
await self.handler.on_exchange_third_party_invite_request(content)
|
|
|
|
return 200, {}
|
2015-11-05 11:43:19 -05:00
|
|
|
|
|
|
|
|
2015-07-23 11:03:38 -04:00
|
|
|
class FederationClientKeysQueryServlet(BaseFederationServlet):
|
2015-07-24 13:26:46 -04:00
|
|
|
PATH = "/user/keys/query"
|
2015-07-23 11:03:38 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query):
|
|
|
|
return await self.handler.on_query_client_keys(origin, content)
|
2015-07-23 11:03:38 -04:00
|
|
|
|
|
|
|
|
2017-01-26 11:06:54 -05:00
|
|
|
class FederationUserDevicesQueryServlet(BaseFederationServlet):
|
|
|
|
PATH = "/user/devices/(?P<user_id>[^/]*)"
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, user_id):
|
|
|
|
return await self.handler.on_query_user_devices(origin, user_id)
|
2017-01-26 11:06:54 -05:00
|
|
|
|
|
|
|
|
2015-07-23 11:03:38 -04:00
|
|
|
class FederationClientKeysClaimServlet(BaseFederationServlet):
|
2015-07-24 13:26:46 -04:00
|
|
|
PATH = "/user/keys/claim"
|
2015-07-23 11:03:38 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query):
|
|
|
|
response = await self.handler.on_claim_client_keys(origin, content)
|
|
|
|
return 200, response
|
2015-07-23 11:03:38 -04:00
|
|
|
|
|
|
|
|
2015-03-05 14:10:57 -05:00
|
|
|
class FederationGetMissingEventsServlet(BaseFederationServlet):
|
2015-03-05 15:36:05 -05:00
|
|
|
# TODO(paul): Why does this path alone end with "/?" optional?
|
2016-03-23 12:13:05 -04:00
|
|
|
PATH = "/get_missing_events/(?P<room_id>[^/]*)/?"
|
2015-03-05 14:10:57 -05:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, room_id):
|
2015-02-23 08:58:02 -05:00
|
|
|
limit = int(content.get("limit", 10))
|
|
|
|
earliest_events = content.get("earliest_events", [])
|
|
|
|
latest_events = content.get("latest_events", [])
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
content = await self.handler.on_get_missing_events(
|
2015-02-23 08:58:02 -05:00
|
|
|
origin,
|
|
|
|
room_id=room_id,
|
|
|
|
earliest_events=earliest_events,
|
|
|
|
latest_events=latest_events,
|
|
|
|
limit=limit,
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, content
|
2015-03-05 15:53:33 -05:00
|
|
|
|
|
|
|
|
2015-11-05 11:43:19 -05:00
|
|
|
class On3pidBindServlet(BaseFederationServlet):
|
|
|
|
PATH = "/3pid/onbind"
|
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
REQUIRE_AUTH = False
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query):
|
2015-11-05 11:43:19 -05:00
|
|
|
if "invites" in content:
|
|
|
|
last_exception = None
|
|
|
|
for invite in content["invites"]:
|
|
|
|
try:
|
2016-02-23 10:11:25 -05:00
|
|
|
if "signed" not in invite or "token" not in invite["signed"]:
|
|
|
|
message = (
|
|
|
|
"Rejecting received notification of third-"
|
|
|
|
"party invite without signed: %s" % (invite,)
|
2019-06-20 05:32:02 -04:00
|
|
|
)
|
2016-02-23 10:11:25 -05:00
|
|
|
logger.info(message)
|
|
|
|
raise SynapseError(400, message)
|
2019-07-18 06:46:47 -04:00
|
|
|
await self.handler.exchange_third_party_invite(
|
2016-02-23 10:11:25 -05:00
|
|
|
invite["sender"],
|
|
|
|
invite["mxid"],
|
|
|
|
invite["room_id"],
|
|
|
|
invite["signed"],
|
|
|
|
)
|
2015-11-05 11:43:19 -05:00
|
|
|
except Exception as e:
|
|
|
|
last_exception = e
|
|
|
|
if last_exception:
|
|
|
|
raise last_exception
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, {}
|
2015-11-05 11:43:19 -05:00
|
|
|
|
|
|
|
|
2016-05-05 08:42:44 -04:00
|
|
|
class OpenIdUserInfo(BaseFederationServlet):
|
|
|
|
"""
|
|
|
|
Exchange a bearer token for information about a user.
|
|
|
|
|
|
|
|
The response format should be compatible with:
|
|
|
|
http://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse
|
|
|
|
|
|
|
|
GET /openid/userinfo?access_token=ABDEFGH HTTP/1.1
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Content-Type: application/json
|
|
|
|
|
|
|
|
{
|
|
|
|
"sub": "@userpart:example.org",
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
|
|
|
PATH = "/openid/userinfo"
|
|
|
|
|
2016-08-05 11:17:04 -04:00
|
|
|
REQUIRE_AUTH = False
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query):
|
2018-09-12 09:23:32 -04:00
|
|
|
token = query.get(b"access_token", [None])[0]
|
2016-05-05 08:42:44 -04:00
|
|
|
if token is None:
|
2019-07-18 06:46:47 -04:00
|
|
|
return (
|
|
|
|
401,
|
|
|
|
{"errcode": "M_MISSING_TOKEN", "error": "Access Token required"},
|
2016-05-05 08:42:44 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
user_id = await self.handler.on_openid_userinfo(token.decode("ascii"))
|
2016-05-05 08:42:44 -04:00
|
|
|
|
|
|
|
if user_id is None:
|
2019-07-18 06:46:47 -04:00
|
|
|
return (
|
|
|
|
401,
|
|
|
|
{
|
|
|
|
"errcode": "M_UNKNOWN_TOKEN",
|
|
|
|
"error": "Access Token unknown or expired",
|
|
|
|
},
|
2019-06-20 05:32:02 -04:00
|
|
|
)
|
2016-05-05 08:42:44 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, {"sub": user_id}
|
2016-05-05 08:42:44 -04:00
|
|
|
|
2016-06-01 04:48:55 -04:00
|
|
|
|
2016-05-31 06:55:57 -04:00
|
|
|
class PublicRoomList(BaseFederationServlet):
|
|
|
|
"""
|
|
|
|
Fetch the public room list for this server.
|
|
|
|
|
|
|
|
This API returns information in the same format as /publicRooms on the
|
|
|
|
client API, but will only ever include local public rooms and hence is
|
2019-11-12 08:08:12 -05:00
|
|
|
intended for consumption by other homeservers.
|
2016-05-31 06:55:57 -04:00
|
|
|
|
|
|
|
GET /publicRooms HTTP/1.1
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Content-Type: application/json
|
|
|
|
|
|
|
|
{
|
|
|
|
"chunk": [
|
|
|
|
{
|
|
|
|
"aliases": [
|
|
|
|
"#test:localhost"
|
|
|
|
],
|
|
|
|
"guest_can_join": false,
|
|
|
|
"name": "test room",
|
|
|
|
"num_joined_members": 3,
|
|
|
|
"room_id": "!whkydVegtvatLfXmPN:localhost",
|
|
|
|
"world_readable": false
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"end": "END",
|
|
|
|
"start": "START"
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
|
|
|
PATH = "/publicRooms"
|
|
|
|
|
2019-06-24 06:45:11 -04:00
|
|
|
def __init__(self, handler, authenticator, ratelimiter, server_name, allow_access):
|
2020-09-18 09:56:44 -04:00
|
|
|
super().__init__(handler, authenticator, ratelimiter, server_name)
|
2019-06-24 06:45:11 -04:00
|
|
|
self.allow_access = allow_access
|
2019-05-08 13:26:56 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query):
|
2019-06-24 06:45:11 -04:00
|
|
|
if not self.allow_access:
|
2019-05-08 13:26:56 -04:00
|
|
|
raise FederationDeniedError(origin)
|
|
|
|
|
2016-09-15 05:36:19 -04:00
|
|
|
limit = parse_integer_from_args(query, "limit", 0)
|
|
|
|
since_token = parse_string_from_args(query, "since", None)
|
2016-12-06 05:43:48 -05:00
|
|
|
include_all_networks = parse_boolean_from_args(
|
|
|
|
query, "include_all_networks", False
|
|
|
|
)
|
|
|
|
third_party_instance_id = parse_string_from_args(
|
|
|
|
query, "third_party_instance_id", None
|
|
|
|
)
|
|
|
|
|
|
|
|
if include_all_networks:
|
|
|
|
network_tuple = None
|
|
|
|
elif third_party_instance_id:
|
|
|
|
network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
|
|
|
|
else:
|
|
|
|
network_tuple = ThirdPartyInstanceID(None, None)
|
|
|
|
|
2019-10-02 09:08:35 -04:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2020-07-21 07:51:48 -04:00
|
|
|
data = await self.handler.get_local_public_room_list(
|
|
|
|
limit, since_token, network_tuple=network_tuple, from_federation=True
|
2016-09-15 05:36:19 -04:00
|
|
|
)
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, data
|
2016-05-31 06:55:57 -04:00
|
|
|
|
2019-08-15 06:06:21 -04:00
|
|
|
async def on_POST(self, origin, content, query):
|
2019-08-20 03:49:31 -04:00
|
|
|
# This implements MSC2197 (Search Filtering over Federation)
|
2019-08-15 06:06:21 -04:00
|
|
|
if not self.allow_access:
|
|
|
|
raise FederationDeniedError(origin)
|
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
limit = int(content.get("limit", 100)) # type: Optional[int]
|
2019-08-15 06:06:21 -04:00
|
|
|
since_token = content.get("since", None)
|
|
|
|
search_filter = content.get("filter", None)
|
|
|
|
|
|
|
|
include_all_networks = content.get("include_all_networks", False)
|
|
|
|
third_party_instance_id = content.get("third_party_instance_id", None)
|
|
|
|
|
|
|
|
if include_all_networks:
|
|
|
|
network_tuple = None
|
|
|
|
if third_party_instance_id is not None:
|
|
|
|
raise SynapseError(
|
|
|
|
400, "Can't use include_all_networks with an explicit network"
|
|
|
|
)
|
|
|
|
elif third_party_instance_id is None:
|
|
|
|
network_tuple = ThirdPartyInstanceID(None, None)
|
|
|
|
else:
|
|
|
|
network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
|
|
|
|
|
|
|
|
if search_filter is None:
|
|
|
|
logger.warning("Nonefilter")
|
|
|
|
|
2019-10-02 09:08:35 -04:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2019-08-15 06:06:21 -04:00
|
|
|
data = await self.handler.get_local_public_room_list(
|
|
|
|
limit=limit,
|
|
|
|
since_token=since_token,
|
|
|
|
search_filter=search_filter,
|
|
|
|
network_tuple=network_tuple,
|
|
|
|
from_federation=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, data
|
|
|
|
|
2016-05-05 08:42:44 -04:00
|
|
|
|
2016-08-05 11:36:07 -04:00
|
|
|
class FederationVersionServlet(BaseFederationServlet):
|
|
|
|
PATH = "/version"
|
|
|
|
|
|
|
|
REQUIRE_AUTH = False
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query):
|
|
|
|
return (
|
|
|
|
200,
|
|
|
|
{"server": {"name": "Synapse", "version": get_version_string(synapse)}},
|
2016-08-05 11:36:07 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsProfileServlet(BaseFederationServlet):
|
2017-10-23 10:19:28 -04:00
|
|
|
"""Get/set the basic profile of a group on behalf of a user"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/profile"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.get_group_profile(group_id, requester_user_id)
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:40 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.update_group_profile(
|
2017-10-23 10:19:28 -04:00
|
|
|
group_id, requester_user_id, content
|
2017-07-10 10:44:40 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:40 -04:00
|
|
|
|
2017-10-23 10:19:28 -04:00
|
|
|
|
|
|
|
class FederationGroupsSummaryServlet(BaseFederationServlet):
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/summary"
|
2017-10-23 10:19:28 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-20 04:46:33 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.get_group_summary(group_id, requester_user_id)
|
2017-07-20 04:46:33 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-20 04:46:33 -04:00
|
|
|
|
2017-07-10 10:44:40 -04:00
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsRoomsServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""Get the rooms in a group on behalf of a user"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/rooms"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.get_rooms_in_group(group_id, requester_user_id)
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
2017-07-11 09:35:07 -04:00
|
|
|
class FederationGroupsAddRoomsServlet(BaseFederationServlet):
|
2017-09-26 10:52:41 -04:00
|
|
|
"""Add/remove room from group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/room/(?P<room_id>[^/]*)"
|
2017-07-11 09:35:07 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, room_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-11 09:35:07 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.add_room_to_group(
|
2017-07-11 09:35:07 -04:00
|
|
|
group_id, requester_user_id, room_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-11 09:35:07 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_DELETE(self, origin, content, query, group_id, room_id):
|
2017-09-26 10:52:41 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.remove_room_from_group(
|
2017-09-26 10:52:41 -04:00
|
|
|
group_id, requester_user_id, room_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-09-26 10:52:41 -04:00
|
|
|
|
2017-07-11 09:35:07 -04:00
|
|
|
|
2017-11-08 11:13:27 -05:00
|
|
|
class FederationGroupsAddRoomsConfigServlet(BaseFederationServlet):
|
|
|
|
"""Update room config in group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2017-11-09 05:06:42 -05:00
|
|
|
PATH = (
|
|
|
|
"/groups/(?P<group_id>[^/]*)/room/(?P<room_id>[^/]*)"
|
2019-03-04 10:25:12 -05:00
|
|
|
"/config/(?P<config_key>[^/]*)"
|
2017-11-09 05:06:42 -05:00
|
|
|
)
|
2017-11-08 11:13:27 -05:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, room_id, config_key):
|
2017-11-08 11:13:27 -05:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
result = await self.handler.update_room_in_group(
|
2017-11-08 11:13:27 -05:00
|
|
|
group_id, requester_user_id, room_id, config_key, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, result
|
2017-11-08 11:13:27 -05:00
|
|
|
|
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsUsersServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""Get the users in a group on behalf of a user"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/users"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.get_users_in_group(group_id, requester_user_id)
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2017-10-16 10:52:12 -04:00
|
|
|
|
2017-10-16 10:31:11 -04:00
|
|
|
class FederationGroupsInvitedUsersServlet(BaseFederationServlet):
|
|
|
|
"""Get the users that have been invited to a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/invited_users"
|
2017-10-16 10:31:11 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-10-16 10:31:11 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.get_invited_users_in_group(
|
2017-10-16 10:31:11 -04:00
|
|
|
group_id, requester_user_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2017-10-16 10:52:12 -04:00
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsInviteServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""Ask a group server to invite someone to the group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/invite"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.invite_to_group(
|
2017-07-10 10:44:15 -04:00
|
|
|
group_id, user_id, requester_user_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsAcceptInviteServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""Accept an invitation from the group server"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/accept_invite"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(user_id) != origin:
|
|
|
|
raise SynapseError(403, "user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.accept_invite(group_id, user_id, content)
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
2018-03-28 12:18:02 -04:00
|
|
|
class FederationGroupsJoinServlet(BaseFederationServlet):
|
|
|
|
"""Attempt to join a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/join"
|
2018-03-28 12:18:02 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2018-03-28 12:18:02 -04:00
|
|
|
if get_domain_from_id(user_id) != origin:
|
|
|
|
raise SynapseError(403, "user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.join_group(group_id, user_id, content)
|
2018-03-28 12:18:02 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2018-03-28 12:18:02 -04:00
|
|
|
|
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsRemoveUserServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""Leave or kick a user from the group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/remove"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-10 10:44:15 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.remove_user_from_group(
|
2017-07-10 10:44:15 -04:00
|
|
|
group_id, user_id, requester_user_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
2017-07-18 05:31:59 -04:00
|
|
|
class FederationGroupsLocalInviteServlet(BaseFederationServlet):
|
|
|
|
"""A group server has invited a local user"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/local/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/invite"
|
2017-07-18 05:31:59 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-18 05:31:59 -04:00
|
|
|
if get_domain_from_id(group_id) != origin:
|
|
|
|
raise SynapseError(403, "group_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.on_invite(group_id, user_id, content)
|
2017-07-18 05:31:59 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-18 05:31:59 -04:00
|
|
|
|
|
|
|
|
2017-07-10 09:52:27 -04:00
|
|
|
class FederationGroupsRemoveLocalUserServlet(BaseFederationServlet):
|
2017-07-18 05:31:59 -04:00
|
|
|
"""A group server has removed a local user"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/local/(?P<group_id>[^/]*)/users/(?P<user_id>[^/]*)/remove"
|
2017-07-10 09:52:27 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-10 09:52:27 -04:00
|
|
|
if get_domain_from_id(group_id) != origin:
|
|
|
|
raise SynapseError(403, "user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.user_removed_from_group(
|
2017-07-10 09:52:27 -04:00
|
|
|
group_id, user_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 09:52:27 -04:00
|
|
|
|
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
class FederationGroupsRenewAttestaionServlet(BaseFederationServlet):
|
2017-07-11 06:52:03 -04:00
|
|
|
"""A group or user's server renews their attestation"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/renew_attestation/(?P<user_id>[^/]*)"
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, user_id):
|
2017-07-10 10:44:15 -04:00
|
|
|
# We don't need to check auth here as we check the attestation signatures
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.on_renew_attestation(
|
2017-10-19 06:22:48 -04:00
|
|
|
group_id, user_id, content
|
2017-07-10 10:44:15 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
2017-07-13 06:13:19 -04:00
|
|
|
class FederationGroupsSummaryRoomsServlet(BaseFederationServlet):
|
|
|
|
"""Add/remove a room from the group summary, with optional category.
|
|
|
|
|
|
|
|
Matches both:
|
|
|
|
- /groups/:group/summary/rooms/:room_id
|
|
|
|
- /groups/:group/summary/categories/:category/rooms/:room_id
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2017-07-13 06:13:19 -04:00
|
|
|
PATH = (
|
|
|
|
"/groups/(?P<group_id>[^/]*)/summary"
|
|
|
|
"(/categories/(?P<category_id>[^/]+))?"
|
2019-03-04 10:25:12 -05:00
|
|
|
"/rooms/(?P<room_id>[^/]*)"
|
2017-07-13 06:13:19 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, category_id, room_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if category_id == "":
|
2021-02-17 08:41:47 -05:00
|
|
|
raise SynapseError(
|
|
|
|
400, "category_id cannot be empty string", Codes.INVALID_PARAM
|
|
|
|
)
|
|
|
|
|
|
|
|
if len(category_id) > MAX_GROUP_CATEGORYID_LENGTH:
|
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"category_id may not be longer than %s characters"
|
|
|
|
% (MAX_GROUP_CATEGORYID_LENGTH,),
|
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
2017-07-14 09:06:09 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.update_group_summary_room(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id,
|
|
|
|
requester_user_id,
|
|
|
|
room_id=room_id,
|
|
|
|
category_id=category_id,
|
|
|
|
content=content,
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_DELETE(self, origin, content, query, group_id, category_id, room_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if category_id == "":
|
|
|
|
raise SynapseError(400, "category_id cannot be empty string")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.delete_group_summary_room(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, room_id=room_id, category_id=category_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsCategoriesServlet(BaseFederationServlet):
|
2017-07-13 08:32:40 -04:00
|
|
|
"""Get all categories for a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-26 07:35:29 -04:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/categories/?"
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.get_group_categories(group_id, requester_user_id)
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsCategoryServlet(BaseFederationServlet):
|
2017-07-13 08:32:40 -04:00
|
|
|
"""Add/remove/get a category in a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/categories/(?P<category_id>[^/]+)"
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id, category_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.get_group_category(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, category_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, category_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if category_id == "":
|
|
|
|
raise SynapseError(400, "category_id cannot be empty string")
|
|
|
|
|
2021-02-17 08:41:47 -05:00
|
|
|
if len(category_id) > MAX_GROUP_CATEGORYID_LENGTH:
|
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"category_id may not be longer than %s characters"
|
|
|
|
% (MAX_GROUP_CATEGORYID_LENGTH,),
|
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.upsert_group_category(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, category_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_DELETE(self, origin, content, query, group_id, category_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if category_id == "":
|
|
|
|
raise SynapseError(400, "category_id cannot be empty string")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.delete_group_category(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, category_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsRolesServlet(BaseFederationServlet):
|
2017-07-13 08:32:40 -04:00
|
|
|
"""Get roles in a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-26 07:35:29 -04:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/roles/?"
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.get_group_roles(group_id, requester_user_id)
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsRoleServlet(BaseFederationServlet):
|
2017-07-13 08:32:40 -04:00
|
|
|
"""Add/remove/get a role in a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/roles/(?P<role_id>[^/]+)"
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, group_id, role_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.get_group_role(group_id, requester_user_id, role_id)
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, role_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if role_id == "":
|
2021-02-17 08:41:47 -05:00
|
|
|
raise SynapseError(
|
|
|
|
400, "role_id cannot be empty string", Codes.INVALID_PARAM
|
|
|
|
)
|
|
|
|
|
|
|
|
if len(role_id) > MAX_GROUP_ROLEID_LENGTH:
|
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"role_id may not be longer than %s characters"
|
|
|
|
% (MAX_GROUP_ROLEID_LENGTH,),
|
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
2017-07-14 09:06:09 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.update_group_role(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, role_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_DELETE(self, origin, content, query, group_id, role_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if role_id == "":
|
|
|
|
raise SynapseError(400, "role_id cannot be empty string")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.delete_group_role(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, role_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
|
|
|
class FederationGroupsSummaryUsersServlet(BaseFederationServlet):
|
|
|
|
"""Add/remove a user from the group summary, with optional role.
|
|
|
|
|
|
|
|
Matches both:
|
|
|
|
- /groups/:group/summary/users/:user_id
|
|
|
|
- /groups/:group/summary/roles/:role/users/:user_id
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2017-07-13 06:13:19 -04:00
|
|
|
PATH = (
|
|
|
|
"/groups/(?P<group_id>[^/]*)/summary"
|
|
|
|
"(/roles/(?P<role_id>[^/]+))?"
|
2019-03-04 10:25:12 -05:00
|
|
|
"/users/(?P<user_id>[^/]*)"
|
2017-07-13 06:13:19 -04:00
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query, group_id, role_id, user_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if role_id == "":
|
|
|
|
raise SynapseError(400, "role_id cannot be empty string")
|
|
|
|
|
2021-02-17 08:41:47 -05:00
|
|
|
if len(role_id) > MAX_GROUP_ROLEID_LENGTH:
|
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"role_id may not be longer than %s characters"
|
|
|
|
% (MAX_GROUP_ROLEID_LENGTH,),
|
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.update_group_summary_user(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id,
|
|
|
|
requester_user_id,
|
|
|
|
user_id=user_id,
|
|
|
|
role_id=role_id,
|
|
|
|
content=content,
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_DELETE(self, origin, content, query, group_id, role_id, user_id):
|
2017-07-18 10:33:09 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
2017-07-13 06:13:19 -04:00
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2017-07-14 09:06:09 -04:00
|
|
|
if role_id == "":
|
|
|
|
raise SynapseError(400, "role_id cannot be empty string")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
resp = await self.handler.delete_group_summary_user(
|
2017-07-13 06:13:19 -04:00
|
|
|
group_id, requester_user_id, user_id=user_id, role_id=role_id
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-07-13 06:13:19 -04:00
|
|
|
|
|
|
|
|
2017-08-09 08:36:22 -04:00
|
|
|
class FederationGroupsBulkPublicisedServlet(BaseFederationServlet):
|
|
|
|
"""Get roles in a group"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/get_groups_publicised"
|
2017-08-09 08:36:22 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_POST(self, origin, content, query):
|
|
|
|
resp = await self.handler.bulk_get_publicised_groups(
|
2017-08-09 08:36:22 -04:00
|
|
|
content["user_ids"], proxy=False
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, resp
|
2017-08-09 08:36:22 -04:00
|
|
|
|
|
|
|
|
2018-04-03 10:40:43 -04:00
|
|
|
class FederationGroupsSettingJoinPolicyServlet(BaseFederationServlet):
|
2018-03-28 09:03:37 -04:00
|
|
|
"""Sets whether a group is joinable without an invite or knock"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-03-04 10:25:12 -05:00
|
|
|
PATH = "/groups/(?P<group_id>[^/]*)/settings/m.join_policy"
|
2018-03-28 09:03:37 -04:00
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_PUT(self, origin, content, query, group_id):
|
2018-03-28 09:03:37 -04:00
|
|
|
requester_user_id = parse_string_from_args(query, "requester_user_id")
|
|
|
|
if get_domain_from_id(requester_user_id) != origin:
|
|
|
|
raise SynapseError(403, "requester_user_id doesn't match origin")
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
new_content = await self.handler.set_group_join_policy(
|
2018-03-28 09:03:37 -04:00
|
|
|
group_id, requester_user_id, content
|
|
|
|
)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
return 200, new_content
|
2018-03-28 09:03:37 -04:00
|
|
|
|
|
|
|
|
2021-03-23 07:51:12 -04:00
|
|
|
class FederationSpaceSummaryServlet(BaseFederationServlet):
|
|
|
|
PREFIX = FEDERATION_UNSTABLE_PREFIX + "/org.matrix.msc2946"
|
|
|
|
PATH = "/spaces/(?P<room_id>[^/]*)"
|
|
|
|
|
|
|
|
async def on_POST(
|
|
|
|
self,
|
|
|
|
origin: str,
|
|
|
|
content: JsonDict,
|
|
|
|
query: Mapping[bytes, Sequence[bytes]],
|
|
|
|
room_id: str,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
suggested_only = content.get("suggested_only", False)
|
|
|
|
if not isinstance(suggested_only, bool):
|
|
|
|
raise SynapseError(
|
|
|
|
400, "'suggested_only' must be a boolean", Codes.BAD_JSON
|
|
|
|
)
|
|
|
|
|
|
|
|
exclude_rooms = content.get("exclude_rooms", [])
|
|
|
|
if not isinstance(exclude_rooms, list) or any(
|
|
|
|
not isinstance(x, str) for x in exclude_rooms
|
|
|
|
):
|
|
|
|
raise SynapseError(400, "bad value for 'exclude_rooms'", Codes.BAD_JSON)
|
|
|
|
|
|
|
|
max_rooms_per_space = content.get("max_rooms_per_space")
|
|
|
|
if max_rooms_per_space is not None and not isinstance(max_rooms_per_space, int):
|
|
|
|
raise SynapseError(
|
|
|
|
400, "bad value for 'max_rooms_per_space'", Codes.BAD_JSON
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, await self.handler.federation_space_summary(
|
|
|
|
room_id, suggested_only, max_rooms_per_space, exclude_rooms
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2019-05-29 11:47:16 -04:00
|
|
|
class RoomComplexityServlet(BaseFederationServlet):
|
|
|
|
"""
|
|
|
|
Indicates to other servers how complex (and therefore likely
|
|
|
|
resource-intensive) a public room this server knows about is.
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-05-29 11:47:16 -04:00
|
|
|
PATH = "/rooms/(?P<room_id>[^/]*)/complexity"
|
|
|
|
PREFIX = FEDERATION_UNSTABLE_PREFIX
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
async def on_GET(self, origin, content, query, room_id):
|
2019-05-29 11:47:16 -04:00
|
|
|
|
|
|
|
store = self.handler.hs.get_datastore()
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
is_public = await store.is_room_world_readable_or_publicly_joinable(room_id)
|
2019-05-29 11:47:16 -04:00
|
|
|
|
|
|
|
if not is_public:
|
|
|
|
raise SynapseError(404, "Room not found", errcode=Codes.INVALID_PARAM)
|
|
|
|
|
2019-07-18 06:46:47 -04:00
|
|
|
complexity = await store.get_room_complexity(room_id)
|
|
|
|
return 200, complexity
|
2019-05-29 11:47:16 -04:00
|
|
|
|
|
|
|
|
2017-07-05 09:32:24 -04:00
|
|
|
FEDERATION_SERVLET_CLASSES = (
|
2016-01-26 08:52:29 -05:00
|
|
|
FederationSendServlet,
|
2015-03-05 15:53:33 -05:00
|
|
|
FederationEventServlet,
|
2019-11-27 16:54:07 -05:00
|
|
|
FederationStateV1Servlet,
|
2016-08-03 09:47:37 -04:00
|
|
|
FederationStateIdsServlet,
|
2015-03-05 15:53:33 -05:00
|
|
|
FederationBackfillServlet,
|
|
|
|
FederationQueryServlet,
|
|
|
|
FederationMakeJoinServlet,
|
2015-10-20 06:58:58 -04:00
|
|
|
FederationMakeLeaveServlet,
|
2015-03-05 15:53:33 -05:00
|
|
|
FederationEventServlet,
|
2019-11-11 11:40:45 -05:00
|
|
|
FederationV1SendJoinServlet,
|
|
|
|
FederationV2SendJoinServlet,
|
|
|
|
FederationV1SendLeaveServlet,
|
|
|
|
FederationV2SendLeaveServlet,
|
2019-01-15 08:22:44 -05:00
|
|
|
FederationV1InviteServlet,
|
|
|
|
FederationV2InviteServlet,
|
2015-03-05 15:53:33 -05:00
|
|
|
FederationGetMissingEventsServlet,
|
2015-03-19 13:48:21 -04:00
|
|
|
FederationEventAuthServlet,
|
2015-07-23 11:03:38 -04:00
|
|
|
FederationClientKeysQueryServlet,
|
2017-01-26 11:06:54 -05:00
|
|
|
FederationUserDevicesQueryServlet,
|
2015-07-23 11:03:38 -04:00
|
|
|
FederationClientKeysClaimServlet,
|
2015-11-05 11:43:19 -05:00
|
|
|
FederationThirdPartyInviteExchangeServlet,
|
|
|
|
On3pidBindServlet,
|
2016-08-05 11:36:07 -04:00
|
|
|
FederationVersionServlet,
|
2019-05-29 11:47:16 -04:00
|
|
|
RoomComplexityServlet,
|
2020-01-30 11:42:11 -05:00
|
|
|
) # type: Tuple[Type[BaseFederationServlet], ...]
|
2016-01-26 08:52:29 -05:00
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
OPENID_SERVLET_CLASSES = (
|
|
|
|
OpenIdUserInfo,
|
|
|
|
) # type: Tuple[Type[BaseFederationServlet], ...]
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
ROOM_LIST_CLASSES = (PublicRoomList,) # type: Tuple[Type[PublicRoomList], ...]
|
2017-07-05 09:32:24 -04:00
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
GROUP_SERVER_SERVLET_CLASSES = (
|
|
|
|
FederationGroupsProfileServlet,
|
2017-07-10 10:44:40 -04:00
|
|
|
FederationGroupsSummaryServlet,
|
2017-07-10 10:44:15 -04:00
|
|
|
FederationGroupsRoomsServlet,
|
|
|
|
FederationGroupsUsersServlet,
|
2017-10-16 10:31:11 -04:00
|
|
|
FederationGroupsInvitedUsersServlet,
|
2017-07-10 10:44:15 -04:00
|
|
|
FederationGroupsInviteServlet,
|
|
|
|
FederationGroupsAcceptInviteServlet,
|
2018-03-28 12:18:02 -04:00
|
|
|
FederationGroupsJoinServlet,
|
2017-07-10 10:44:15 -04:00
|
|
|
FederationGroupsRemoveUserServlet,
|
2017-07-13 06:13:19 -04:00
|
|
|
FederationGroupsSummaryRoomsServlet,
|
|
|
|
FederationGroupsCategoriesServlet,
|
|
|
|
FederationGroupsCategoryServlet,
|
|
|
|
FederationGroupsRolesServlet,
|
|
|
|
FederationGroupsRoleServlet,
|
|
|
|
FederationGroupsSummaryUsersServlet,
|
2017-11-08 11:13:27 -05:00
|
|
|
FederationGroupsAddRoomsServlet,
|
|
|
|
FederationGroupsAddRoomsConfigServlet,
|
2018-04-03 10:40:43 -04:00
|
|
|
FederationGroupsSettingJoinPolicyServlet,
|
2020-01-30 11:42:11 -05:00
|
|
|
) # type: Tuple[Type[BaseFederationServlet], ...]
|
2017-07-10 10:44:15 -04:00
|
|
|
|
|
|
|
|
2017-07-10 09:52:27 -04:00
|
|
|
GROUP_LOCAL_SERVLET_CLASSES = (
|
|
|
|
FederationGroupsLocalInviteServlet,
|
|
|
|
FederationGroupsRemoveLocalUserServlet,
|
2017-08-09 08:36:22 -04:00
|
|
|
FederationGroupsBulkPublicisedServlet,
|
2020-01-30 11:42:11 -05:00
|
|
|
) # type: Tuple[Type[BaseFederationServlet], ...]
|
2017-07-10 09:52:27 -04:00
|
|
|
|
|
|
|
|
2020-01-30 11:42:11 -05:00
|
|
|
GROUP_ATTESTATION_SERVLET_CLASSES = (
|
|
|
|
FederationGroupsRenewAttestaionServlet,
|
|
|
|
) # type: Tuple[Type[BaseFederationServlet], ...]
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-01-20 18:54:43 -05:00
|
|
|
DEFAULT_SERVLET_GROUPS = (
|
|
|
|
"federation",
|
|
|
|
"room_list",
|
|
|
|
"group_server",
|
|
|
|
"group_local",
|
|
|
|
"group_attestation",
|
|
|
|
"openid",
|
|
|
|
)
|
|
|
|
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2021-03-23 07:51:12 -04:00
|
|
|
def register_servlets(
|
|
|
|
hs: HomeServer,
|
|
|
|
resource: HttpServer,
|
|
|
|
authenticator: Authenticator,
|
|
|
|
ratelimiter: FederationRateLimiter,
|
|
|
|
servlet_groups: Optional[Container[str]] = None,
|
|
|
|
):
|
2019-01-22 04:00:17 -05:00
|
|
|
"""Initialize and register servlet classes.
|
2017-07-10 10:44:15 -04:00
|
|
|
|
2019-01-22 04:00:17 -05:00
|
|
|
Will by default register all servlets. For custom behaviour, pass in
|
|
|
|
a list of servlet_groups to register.
|
|
|
|
|
|
|
|
Args:
|
2021-03-23 07:51:12 -04:00
|
|
|
hs: homeserver
|
|
|
|
resource: resource class to register to
|
|
|
|
authenticator: authenticator to use
|
|
|
|
ratelimiter: ratelimiter to use
|
|
|
|
servlet_groups: List of servlet groups to register.
|
2019-01-22 04:00:17 -05:00
|
|
|
Defaults to ``DEFAULT_SERVLET_GROUPS``.
|
|
|
|
"""
|
2019-01-20 18:54:43 -05:00
|
|
|
if not servlet_groups:
|
|
|
|
servlet_groups = DEFAULT_SERVLET_GROUPS
|
|
|
|
|
|
|
|
if "federation" in servlet_groups:
|
|
|
|
for servletclass in FEDERATION_SERVLET_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_federation_server(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|
|
|
|
|
2021-03-23 07:51:12 -04:00
|
|
|
if hs.config.experimental.spaces_enabled:
|
|
|
|
FederationSpaceSummaryServlet(
|
|
|
|
handler=hs.get_space_summary_handler(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|
|
|
|
|
2019-01-20 18:54:43 -05:00
|
|
|
if "openid" in servlet_groups:
|
|
|
|
for servletclass in OPENID_SERVLET_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_federation_server(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|
|
|
|
|
|
|
|
if "room_list" in servlet_groups:
|
|
|
|
for servletclass in ROOM_LIST_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_room_list_handler(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
2019-06-24 06:45:11 -04:00
|
|
|
allow_access=hs.config.allow_public_rooms_over_federation,
|
2019-01-20 18:54:43 -05:00
|
|
|
).register(resource)
|
|
|
|
|
|
|
|
if "group_server" in servlet_groups:
|
|
|
|
for servletclass in GROUP_SERVER_SERVLET_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_groups_server_handler(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|
|
|
|
|
|
|
|
if "group_local" in servlet_groups:
|
|
|
|
for servletclass in GROUP_LOCAL_SERVLET_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_groups_local_handler(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|
|
|
|
|
|
|
|
if "group_attestation" in servlet_groups:
|
|
|
|
for servletclass in GROUP_ATTESTATION_SERVLET_CLASSES:
|
|
|
|
servletclass(
|
|
|
|
handler=hs.get_groups_attestation_renewer(),
|
|
|
|
authenticator=authenticator,
|
|
|
|
ratelimiter=ratelimiter,
|
|
|
|
server_name=hs.hostname,
|
|
|
|
).register(resource)
|