mirror of
https://mau.dev/maunium/synapse.git
synced 2024-10-01 01:36:05 -04:00
Remove backing code for groups/communities (#12558)
Including handlers, configuration code, appservice support, and the GroupID construct.
This commit is contained in:
parent
1cba285a79
commit
49f06866e4
1
changelog.d/12558.removal
Normal file
1
changelog.d/12558.removal
Normal file
@ -0,0 +1 @@
|
|||||||
|
Remove support for the non-standard groups/communities feature from Synapse.
|
@ -23,13 +23,7 @@ from netaddr import IPSet
|
|||||||
|
|
||||||
from synapse.api.constants import EventTypes
|
from synapse.api.constants import EventTypes
|
||||||
from synapse.events import EventBase
|
from synapse.events import EventBase
|
||||||
from synapse.types import (
|
from synapse.types import DeviceListUpdates, JsonDict, UserID
|
||||||
DeviceListUpdates,
|
|
||||||
GroupID,
|
|
||||||
JsonDict,
|
|
||||||
UserID,
|
|
||||||
get_domain_from_id,
|
|
||||||
)
|
|
||||||
from synapse.util.caches.descriptors import _CacheContext, cached
|
from synapse.util.caches.descriptors import _CacheContext, cached
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
if TYPE_CHECKING:
|
||||||
@ -55,7 +49,6 @@ class ApplicationServiceState(Enum):
|
|||||||
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
||||||
class Namespace:
|
class Namespace:
|
||||||
exclusive: bool
|
exclusive: bool
|
||||||
group_id: Optional[str]
|
|
||||||
regex: Pattern[str]
|
regex: Pattern[str]
|
||||||
|
|
||||||
|
|
||||||
@ -141,30 +134,13 @@ class ApplicationService:
|
|||||||
exclusive = regex_obj.get("exclusive")
|
exclusive = regex_obj.get("exclusive")
|
||||||
if not isinstance(exclusive, bool):
|
if not isinstance(exclusive, bool):
|
||||||
raise ValueError("Expected bool for 'exclusive' in ns '%s'" % ns)
|
raise ValueError("Expected bool for 'exclusive' in ns '%s'" % ns)
|
||||||
group_id = regex_obj.get("group_id")
|
|
||||||
if group_id:
|
|
||||||
if not isinstance(group_id, str):
|
|
||||||
raise ValueError(
|
|
||||||
"Expected string for 'group_id' in ns '%s'" % ns
|
|
||||||
)
|
|
||||||
try:
|
|
||||||
GroupID.from_string(group_id)
|
|
||||||
except Exception:
|
|
||||||
raise ValueError(
|
|
||||||
"Expected valid group ID for 'group_id' in ns '%s'" % ns
|
|
||||||
)
|
|
||||||
|
|
||||||
if get_domain_from_id(group_id) != self.server_name:
|
|
||||||
raise ValueError(
|
|
||||||
"Expected 'group_id' to be this host in ns '%s'" % ns
|
|
||||||
)
|
|
||||||
|
|
||||||
regex = regex_obj.get("regex")
|
regex = regex_obj.get("regex")
|
||||||
if not isinstance(regex, str):
|
if not isinstance(regex, str):
|
||||||
raise ValueError("Expected string for 'regex' in ns '%s'" % ns)
|
raise ValueError("Expected string for 'regex' in ns '%s'" % ns)
|
||||||
|
|
||||||
# Pre-compile regex.
|
# Pre-compile regex.
|
||||||
result[ns].append(Namespace(exclusive, group_id, re.compile(regex)))
|
result[ns].append(Namespace(exclusive, re.compile(regex)))
|
||||||
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
@ -369,21 +345,6 @@ class ApplicationService:
|
|||||||
if namespace.exclusive
|
if namespace.exclusive
|
||||||
]
|
]
|
||||||
|
|
||||||
def get_groups_for_user(self, user_id: str) -> Iterable[str]:
|
|
||||||
"""Get the groups that this user is associated with by this AS
|
|
||||||
|
|
||||||
Args:
|
|
||||||
user_id: The ID of the user.
|
|
||||||
|
|
||||||
Returns:
|
|
||||||
An iterable that yields group_id strings.
|
|
||||||
"""
|
|
||||||
return (
|
|
||||||
namespace.group_id
|
|
||||||
for namespace in self.namespaces[ApplicationService.NS_USERS]
|
|
||||||
if namespace.group_id and namespace.regex.match(user_id)
|
|
||||||
)
|
|
||||||
|
|
||||||
def is_rate_limited(self) -> bool:
|
def is_rate_limited(self) -> bool:
|
||||||
return self.rate_limited
|
return self.rate_limited
|
||||||
|
|
||||||
|
@ -32,7 +32,6 @@ from synapse.config import (
|
|||||||
emailconfig,
|
emailconfig,
|
||||||
experimental,
|
experimental,
|
||||||
federation,
|
federation,
|
||||||
groups,
|
|
||||||
jwt,
|
jwt,
|
||||||
key,
|
key,
|
||||||
logger,
|
logger,
|
||||||
@ -107,7 +106,6 @@ class RootConfig:
|
|||||||
push: push.PushConfig
|
push: push.PushConfig
|
||||||
spamchecker: spam_checker.SpamCheckerConfig
|
spamchecker: spam_checker.SpamCheckerConfig
|
||||||
room: room.RoomConfig
|
room: room.RoomConfig
|
||||||
groups: groups.GroupsConfig
|
|
||||||
userdirectory: user_directory.UserDirectoryConfig
|
userdirectory: user_directory.UserDirectoryConfig
|
||||||
consent: consent.ConsentConfig
|
consent: consent.ConsentConfig
|
||||||
stats: stats.StatsConfig
|
stats: stats.StatsConfig
|
||||||
|
@ -1,27 +0,0 @@
|
|||||||
# Copyright 2017 New Vector Ltd
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
from typing import Any
|
|
||||||
|
|
||||||
from synapse.types import JsonDict
|
|
||||||
|
|
||||||
from ._base import Config
|
|
||||||
|
|
||||||
|
|
||||||
class GroupsConfig(Config):
|
|
||||||
section = "groups"
|
|
||||||
|
|
||||||
def read_config(self, config: JsonDict, **kwargs: Any) -> None:
|
|
||||||
self.enable_group_creation = config.get("enable_group_creation", False)
|
|
||||||
self.group_creation_prefix = config.get("group_creation_prefix", "")
|
|
@ -25,7 +25,6 @@ from .database import DatabaseConfig
|
|||||||
from .emailconfig import EmailConfig
|
from .emailconfig import EmailConfig
|
||||||
from .experimental import ExperimentalConfig
|
from .experimental import ExperimentalConfig
|
||||||
from .federation import FederationConfig
|
from .federation import FederationConfig
|
||||||
from .groups import GroupsConfig
|
|
||||||
from .jwt import JWTConfig
|
from .jwt import JWTConfig
|
||||||
from .key import KeyConfig
|
from .key import KeyConfig
|
||||||
from .logger import LoggingConfig
|
from .logger import LoggingConfig
|
||||||
@ -89,7 +88,6 @@ class HomeServerConfig(RootConfig):
|
|||||||
PushConfig,
|
PushConfig,
|
||||||
SpamCheckerConfig,
|
SpamCheckerConfig,
|
||||||
RoomConfig,
|
RoomConfig,
|
||||||
GroupsConfig,
|
|
||||||
UserDirectoryConfig,
|
UserDirectoryConfig,
|
||||||
ConsentConfig,
|
ConsentConfig,
|
||||||
StatsConfig,
|
StatsConfig,
|
||||||
|
@ -1,218 +0,0 @@
|
|||||||
# Copyright 2017 Vector Creations Ltd
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
"""Attestations ensure that users and groups can't lie about their memberships.
|
|
||||||
|
|
||||||
When a user joins a group the HS and GS swap attestations, which allow them
|
|
||||||
both to independently prove to third parties their membership.These
|
|
||||||
attestations have a validity period so need to be periodically renewed.
|
|
||||||
|
|
||||||
If a user leaves (or gets kicked out of) a group, either side can still use
|
|
||||||
their attestation to "prove" their membership, until the attestation expires.
|
|
||||||
Therefore attestations shouldn't be relied on to prove membership in important
|
|
||||||
cases, but can for less important situations, e.g. showing a users membership
|
|
||||||
of groups on their profile, showing flairs, etc.
|
|
||||||
|
|
||||||
An attestation is a signed blob of json that looks like:
|
|
||||||
|
|
||||||
{
|
|
||||||
"user_id": "@foo:a.example.com",
|
|
||||||
"group_id": "+bar:b.example.com",
|
|
||||||
"valid_until_ms": 1507994728530,
|
|
||||||
"signatures":{"matrix.org":{"ed25519:auto":"..."}}
|
|
||||||
}
|
|
||||||
"""
|
|
||||||
|
|
||||||
import logging
|
|
||||||
import random
|
|
||||||
from typing import TYPE_CHECKING, Optional, Tuple
|
|
||||||
|
|
||||||
from signedjson.sign import sign_json
|
|
||||||
|
|
||||||
from twisted.internet.defer import Deferred
|
|
||||||
|
|
||||||
from synapse.api.errors import HttpResponseException, RequestSendFailed, SynapseError
|
|
||||||
from synapse.metrics.background_process_metrics import run_as_background_process
|
|
||||||
from synapse.types import JsonDict, get_domain_from_id
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from synapse.server import HomeServer
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
# Default validity duration for new attestations we create
|
|
||||||
DEFAULT_ATTESTATION_LENGTH_MS = 3 * 24 * 60 * 60 * 1000
|
|
||||||
|
|
||||||
# We add some jitter to the validity duration of attestations so that if we
|
|
||||||
# add lots of users at once we don't need to renew them all at once.
|
|
||||||
# The jitter is a multiplier picked randomly between the first and second number
|
|
||||||
DEFAULT_ATTESTATION_JITTER = (0.9, 1.3)
|
|
||||||
|
|
||||||
# Start trying to update our attestations when they come this close to expiring
|
|
||||||
UPDATE_ATTESTATION_TIME_MS = 1 * 24 * 60 * 60 * 1000
|
|
||||||
|
|
||||||
|
|
||||||
class GroupAttestationSigning:
|
|
||||||
"""Creates and verifies group attestations."""
|
|
||||||
|
|
||||||
def __init__(self, hs: "HomeServer"):
|
|
||||||
self.keyring = hs.get_keyring()
|
|
||||||
self.clock = hs.get_clock()
|
|
||||||
self.server_name = hs.hostname
|
|
||||||
self.signing_key = hs.signing_key
|
|
||||||
|
|
||||||
async def verify_attestation(
|
|
||||||
self,
|
|
||||||
attestation: JsonDict,
|
|
||||||
group_id: str,
|
|
||||||
user_id: str,
|
|
||||||
server_name: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
"""Verifies that the given attestation matches the given parameters.
|
|
||||||
|
|
||||||
An optional server_name can be supplied to explicitly set which server's
|
|
||||||
signature is expected. Otherwise assumes that either the group_id or user_id
|
|
||||||
is local and uses the other's server as the one to check.
|
|
||||||
"""
|
|
||||||
|
|
||||||
if not server_name:
|
|
||||||
if get_domain_from_id(group_id) == self.server_name:
|
|
||||||
server_name = get_domain_from_id(user_id)
|
|
||||||
elif get_domain_from_id(user_id) == self.server_name:
|
|
||||||
server_name = get_domain_from_id(group_id)
|
|
||||||
else:
|
|
||||||
raise Exception("Expected either group_id or user_id to be local")
|
|
||||||
|
|
||||||
if user_id != attestation["user_id"]:
|
|
||||||
raise SynapseError(400, "Attestation has incorrect user_id")
|
|
||||||
|
|
||||||
if group_id != attestation["group_id"]:
|
|
||||||
raise SynapseError(400, "Attestation has incorrect group_id")
|
|
||||||
valid_until_ms = attestation["valid_until_ms"]
|
|
||||||
|
|
||||||
# TODO: We also want to check that *new* attestations that people give
|
|
||||||
# us to store are valid for at least a little while.
|
|
||||||
now = self.clock.time_msec()
|
|
||||||
if valid_until_ms < now:
|
|
||||||
raise SynapseError(400, "Attestation expired")
|
|
||||||
|
|
||||||
assert server_name is not None
|
|
||||||
await self.keyring.verify_json_for_server(
|
|
||||||
server_name,
|
|
||||||
attestation,
|
|
||||||
now,
|
|
||||||
)
|
|
||||||
|
|
||||||
def create_attestation(self, group_id: str, user_id: str) -> JsonDict:
|
|
||||||
"""Create an attestation for the group_id and user_id with default
|
|
||||||
validity length.
|
|
||||||
"""
|
|
||||||
validity_period = DEFAULT_ATTESTATION_LENGTH_MS * random.uniform(
|
|
||||||
*DEFAULT_ATTESTATION_JITTER
|
|
||||||
)
|
|
||||||
valid_until_ms = int(self.clock.time_msec() + validity_period)
|
|
||||||
|
|
||||||
return sign_json(
|
|
||||||
{
|
|
||||||
"group_id": group_id,
|
|
||||||
"user_id": user_id,
|
|
||||||
"valid_until_ms": valid_until_ms,
|
|
||||||
},
|
|
||||||
self.server_name,
|
|
||||||
self.signing_key,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class GroupAttestionRenewer:
|
|
||||||
"""Responsible for sending and receiving attestation updates."""
|
|
||||||
|
|
||||||
def __init__(self, hs: "HomeServer"):
|
|
||||||
self.clock = hs.get_clock()
|
|
||||||
self.store = hs.get_datastores().main
|
|
||||||
self.assestations = hs.get_groups_attestation_signing()
|
|
||||||
self.transport_client = hs.get_federation_transport_client()
|
|
||||||
self.is_mine_id = hs.is_mine_id
|
|
||||||
self.attestations = hs.get_groups_attestation_signing()
|
|
||||||
|
|
||||||
if not hs.config.worker.worker_app:
|
|
||||||
self._renew_attestations_loop = self.clock.looping_call(
|
|
||||||
self._start_renew_attestations, 30 * 60 * 1000
|
|
||||||
)
|
|
||||||
|
|
||||||
async def on_renew_attestation(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""When a remote updates an attestation"""
|
|
||||||
attestation = content["attestation"]
|
|
||||||
|
|
||||||
if not self.is_mine_id(group_id) and not self.is_mine_id(user_id):
|
|
||||||
raise SynapseError(400, "Neither user not group are on this server")
|
|
||||||
|
|
||||||
await self.attestations.verify_attestation(
|
|
||||||
attestation, user_id=user_id, group_id=group_id
|
|
||||||
)
|
|
||||||
|
|
||||||
await self.store.update_remote_attestion(group_id, user_id, attestation)
|
|
||||||
|
|
||||||
return {}
|
|
||||||
|
|
||||||
def _start_renew_attestations(self) -> "Deferred[None]":
|
|
||||||
return run_as_background_process("renew_attestations", self._renew_attestations)
|
|
||||||
|
|
||||||
async def _renew_attestations(self) -> None:
|
|
||||||
"""Called periodically to check if we need to update any of our attestations"""
|
|
||||||
|
|
||||||
now = self.clock.time_msec()
|
|
||||||
|
|
||||||
rows = await self.store.get_attestations_need_renewals(
|
|
||||||
now + UPDATE_ATTESTATION_TIME_MS
|
|
||||||
)
|
|
||||||
|
|
||||||
async def _renew_attestation(group_user: Tuple[str, str]) -> None:
|
|
||||||
group_id, user_id = group_user
|
|
||||||
try:
|
|
||||||
if not self.is_mine_id(group_id):
|
|
||||||
destination = get_domain_from_id(group_id)
|
|
||||||
elif not self.is_mine_id(user_id):
|
|
||||||
destination = get_domain_from_id(user_id)
|
|
||||||
else:
|
|
||||||
logger.warning(
|
|
||||||
"Incorrectly trying to do attestations for user: %r in %r",
|
|
||||||
user_id,
|
|
||||||
group_id,
|
|
||||||
)
|
|
||||||
await self.store.remove_attestation_renewal(group_id, user_id)
|
|
||||||
return
|
|
||||||
|
|
||||||
attestation = self.attestations.create_attestation(group_id, user_id)
|
|
||||||
|
|
||||||
await self.transport_client.renew_group_attestation(
|
|
||||||
destination, group_id, user_id, content={"attestation": attestation}
|
|
||||||
)
|
|
||||||
|
|
||||||
await self.store.update_attestation_renewal(
|
|
||||||
group_id, user_id, attestation
|
|
||||||
)
|
|
||||||
except (RequestSendFailed, HttpResponseException) as e:
|
|
||||||
logger.warning(
|
|
||||||
"Failed to renew attestation of %r in %r: %s", user_id, group_id, e
|
|
||||||
)
|
|
||||||
except Exception:
|
|
||||||
logger.exception(
|
|
||||||
"Error renewing attestation of %r in %r", user_id, group_id
|
|
||||||
)
|
|
||||||
|
|
||||||
for row in rows:
|
|
||||||
await _renew_attestation((row["group_id"], row["user_id"]))
|
|
File diff suppressed because it is too large
Load Diff
@ -1,503 +0,0 @@
|
|||||||
# Copyright 2017 Vector Creations Ltd
|
|
||||||
# Copyright 2018 New Vector Ltd
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
import logging
|
|
||||||
from typing import TYPE_CHECKING, Any, Awaitable, Callable, Dict, Iterable, List, Set
|
|
||||||
|
|
||||||
from synapse.api.errors import HttpResponseException, RequestSendFailed, SynapseError
|
|
||||||
from synapse.types import GroupID, JsonDict, get_domain_from_id
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from synapse.server import HomeServer
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
def _create_rerouter(func_name: str) -> Callable[..., Awaitable[JsonDict]]:
|
|
||||||
"""Returns an async function that looks at the group id and calls the function
|
|
||||||
on federation or the local group server if the group is local
|
|
||||||
"""
|
|
||||||
|
|
||||||
async def f(
|
|
||||||
self: "GroupsLocalWorkerHandler", group_id: str, *args: Any, **kwargs: Any
|
|
||||||
) -> JsonDict:
|
|
||||||
if not GroupID.is_valid(group_id):
|
|
||||||
raise SynapseError(400, "%s is not a legal group ID" % (group_id,))
|
|
||||||
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
return await getattr(self.groups_server_handler, func_name)(
|
|
||||||
group_id, *args, **kwargs
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
destination = get_domain_from_id(group_id)
|
|
||||||
|
|
||||||
try:
|
|
||||||
return await getattr(self.transport_client, func_name)(
|
|
||||||
destination, group_id, *args, **kwargs
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
# Capture errors returned by the remote homeserver and
|
|
||||||
# re-throw specific errors as SynapseErrors. This is so
|
|
||||||
# when the remote end responds with things like 403 Not
|
|
||||||
# In Group, we can communicate that to the client instead
|
|
||||||
# of a 500.
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
return f
|
|
||||||
|
|
||||||
|
|
||||||
class GroupsLocalWorkerHandler:
|
|
||||||
def __init__(self, hs: "HomeServer"):
|
|
||||||
self.hs = hs
|
|
||||||
self.store = hs.get_datastores().main
|
|
||||||
self.room_list_handler = hs.get_room_list_handler()
|
|
||||||
self.groups_server_handler = hs.get_groups_server_handler()
|
|
||||||
self.transport_client = hs.get_federation_transport_client()
|
|
||||||
self.auth = hs.get_auth()
|
|
||||||
self.clock = hs.get_clock()
|
|
||||||
self.keyring = hs.get_keyring()
|
|
||||||
self.is_mine_id = hs.is_mine_id
|
|
||||||
self.signing_key = hs.signing_key
|
|
||||||
self.server_name = hs.hostname
|
|
||||||
self.notifier = hs.get_notifier()
|
|
||||||
self.attestations = hs.get_groups_attestation_signing()
|
|
||||||
|
|
||||||
self.profile_handler = hs.get_profile_handler()
|
|
||||||
|
|
||||||
# The following functions merely route the query to the local groups server
|
|
||||||
# or federation depending on if the group is local or remote
|
|
||||||
|
|
||||||
get_group_profile = _create_rerouter("get_group_profile")
|
|
||||||
get_rooms_in_group = _create_rerouter("get_rooms_in_group")
|
|
||||||
get_invited_users_in_group = _create_rerouter("get_invited_users_in_group")
|
|
||||||
get_group_category = _create_rerouter("get_group_category")
|
|
||||||
get_group_categories = _create_rerouter("get_group_categories")
|
|
||||||
get_group_role = _create_rerouter("get_group_role")
|
|
||||||
get_group_roles = _create_rerouter("get_group_roles")
|
|
||||||
|
|
||||||
async def get_group_summary(
|
|
||||||
self, group_id: str, requester_user_id: str
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Get the group summary for a group.
|
|
||||||
|
|
||||||
If the group is remote we check that the users have valid attestations.
|
|
||||||
"""
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
res = await self.groups_server_handler.get_group_summary(
|
|
||||||
group_id, requester_user_id
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.get_group_summary(
|
|
||||||
get_domain_from_id(group_id), group_id, requester_user_id
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
group_server_name = get_domain_from_id(group_id)
|
|
||||||
|
|
||||||
# Loop through the users and validate the attestations.
|
|
||||||
chunk = res["users_section"]["users"]
|
|
||||||
valid_users = []
|
|
||||||
for entry in chunk:
|
|
||||||
g_user_id = entry["user_id"]
|
|
||||||
attestation = entry.pop("attestation", {})
|
|
||||||
try:
|
|
||||||
if get_domain_from_id(g_user_id) != group_server_name:
|
|
||||||
await self.attestations.verify_attestation(
|
|
||||||
attestation,
|
|
||||||
group_id=group_id,
|
|
||||||
user_id=g_user_id,
|
|
||||||
server_name=get_domain_from_id(g_user_id),
|
|
||||||
)
|
|
||||||
valid_users.append(entry)
|
|
||||||
except Exception as e:
|
|
||||||
logger.info("Failed to verify user is in group: %s", e)
|
|
||||||
|
|
||||||
res["users_section"]["users"] = valid_users
|
|
||||||
|
|
||||||
res["users_section"]["users"].sort(key=lambda e: e.get("order", 0))
|
|
||||||
res["rooms_section"]["rooms"].sort(key=lambda e: e.get("order", 0))
|
|
||||||
|
|
||||||
# Add `is_publicised` flag to indicate whether the user has publicised their
|
|
||||||
# membership of the group on their profile
|
|
||||||
result = await self.store.get_publicised_groups_for_user(requester_user_id)
|
|
||||||
is_publicised = group_id in result
|
|
||||||
|
|
||||||
res.setdefault("user", {})["is_publicised"] = is_publicised
|
|
||||||
|
|
||||||
return res
|
|
||||||
|
|
||||||
async def get_users_in_group(
|
|
||||||
self, group_id: str, requester_user_id: str
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Get users in a group"""
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
return await self.groups_server_handler.get_users_in_group(
|
|
||||||
group_id, requester_user_id
|
|
||||||
)
|
|
||||||
|
|
||||||
group_server_name = get_domain_from_id(group_id)
|
|
||||||
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.get_users_in_group(
|
|
||||||
get_domain_from_id(group_id), group_id, requester_user_id
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
chunk = res["chunk"]
|
|
||||||
valid_entries = []
|
|
||||||
for entry in chunk:
|
|
||||||
g_user_id = entry["user_id"]
|
|
||||||
attestation = entry.pop("attestation", {})
|
|
||||||
try:
|
|
||||||
if get_domain_from_id(g_user_id) != group_server_name:
|
|
||||||
await self.attestations.verify_attestation(
|
|
||||||
attestation,
|
|
||||||
group_id=group_id,
|
|
||||||
user_id=g_user_id,
|
|
||||||
server_name=get_domain_from_id(g_user_id),
|
|
||||||
)
|
|
||||||
valid_entries.append(entry)
|
|
||||||
except Exception as e:
|
|
||||||
logger.info("Failed to verify user is in group: %s", e)
|
|
||||||
|
|
||||||
res["chunk"] = valid_entries
|
|
||||||
|
|
||||||
return res
|
|
||||||
|
|
||||||
async def get_joined_groups(self, user_id: str) -> JsonDict:
|
|
||||||
group_ids = await self.store.get_joined_groups(user_id)
|
|
||||||
return {"groups": group_ids}
|
|
||||||
|
|
||||||
async def get_publicised_groups_for_user(self, user_id: str) -> JsonDict:
|
|
||||||
if self.hs.is_mine_id(user_id):
|
|
||||||
result = await self.store.get_publicised_groups_for_user(user_id)
|
|
||||||
|
|
||||||
# Check AS associated groups for this user - this depends on the
|
|
||||||
# RegExps in the AS registration file (under `users`)
|
|
||||||
for app_service in self.store.get_app_services():
|
|
||||||
result.extend(app_service.get_groups_for_user(user_id))
|
|
||||||
|
|
||||||
return {"groups": result}
|
|
||||||
else:
|
|
||||||
try:
|
|
||||||
bulk_result = await self.transport_client.bulk_get_publicised_groups(
|
|
||||||
get_domain_from_id(user_id), [user_id]
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
result = bulk_result.get("users", {}).get(user_id)
|
|
||||||
# TODO: Verify attestations
|
|
||||||
return {"groups": result}
|
|
||||||
|
|
||||||
async def bulk_get_publicised_groups(
|
|
||||||
self, user_ids: Iterable[str], proxy: bool = True
|
|
||||||
) -> JsonDict:
|
|
||||||
destinations: Dict[str, Set[str]] = {}
|
|
||||||
local_users = set()
|
|
||||||
|
|
||||||
for user_id in user_ids:
|
|
||||||
if self.hs.is_mine_id(user_id):
|
|
||||||
local_users.add(user_id)
|
|
||||||
else:
|
|
||||||
destinations.setdefault(get_domain_from_id(user_id), set()).add(user_id)
|
|
||||||
|
|
||||||
if not proxy and destinations:
|
|
||||||
raise SynapseError(400, "Some user_ids are not local")
|
|
||||||
|
|
||||||
results = {}
|
|
||||||
failed_results: List[str] = []
|
|
||||||
for destination, dest_user_ids in destinations.items():
|
|
||||||
try:
|
|
||||||
r = await self.transport_client.bulk_get_publicised_groups(
|
|
||||||
destination, list(dest_user_ids)
|
|
||||||
)
|
|
||||||
results.update(r["users"])
|
|
||||||
except Exception:
|
|
||||||
failed_results.extend(dest_user_ids)
|
|
||||||
|
|
||||||
for uid in local_users:
|
|
||||||
results[uid] = await self.store.get_publicised_groups_for_user(uid)
|
|
||||||
|
|
||||||
# Check AS associated groups for this user - this depends on the
|
|
||||||
# RegExps in the AS registration file (under `users`)
|
|
||||||
for app_service in self.store.get_app_services():
|
|
||||||
results[uid].extend(app_service.get_groups_for_user(uid))
|
|
||||||
|
|
||||||
return {"users": results}
|
|
||||||
|
|
||||||
|
|
||||||
class GroupsLocalHandler(GroupsLocalWorkerHandler):
|
|
||||||
def __init__(self, hs: "HomeServer"):
|
|
||||||
super().__init__(hs)
|
|
||||||
|
|
||||||
# Ensure attestations get renewed
|
|
||||||
hs.get_groups_attestation_renewer()
|
|
||||||
|
|
||||||
# The following functions merely route the query to the local groups server
|
|
||||||
# or federation depending on if the group is local or remote
|
|
||||||
|
|
||||||
update_group_profile = _create_rerouter("update_group_profile")
|
|
||||||
|
|
||||||
add_room_to_group = _create_rerouter("add_room_to_group")
|
|
||||||
update_room_in_group = _create_rerouter("update_room_in_group")
|
|
||||||
remove_room_from_group = _create_rerouter("remove_room_from_group")
|
|
||||||
|
|
||||||
update_group_summary_room = _create_rerouter("update_group_summary_room")
|
|
||||||
delete_group_summary_room = _create_rerouter("delete_group_summary_room")
|
|
||||||
|
|
||||||
update_group_category = _create_rerouter("update_group_category")
|
|
||||||
delete_group_category = _create_rerouter("delete_group_category")
|
|
||||||
|
|
||||||
update_group_summary_user = _create_rerouter("update_group_summary_user")
|
|
||||||
delete_group_summary_user = _create_rerouter("delete_group_summary_user")
|
|
||||||
|
|
||||||
update_group_role = _create_rerouter("update_group_role")
|
|
||||||
delete_group_role = _create_rerouter("delete_group_role")
|
|
||||||
|
|
||||||
set_group_join_policy = _create_rerouter("set_group_join_policy")
|
|
||||||
|
|
||||||
async def create_group(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Create a group"""
|
|
||||||
|
|
||||||
logger.info("Asking to create group with ID: %r", group_id)
|
|
||||||
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
res = await self.groups_server_handler.create_group(
|
|
||||||
group_id, user_id, content
|
|
||||||
)
|
|
||||||
local_attestation = None
|
|
||||||
remote_attestation = None
|
|
||||||
else:
|
|
||||||
raise SynapseError(400, "Unable to create remote groups")
|
|
||||||
|
|
||||||
is_publicised = content.get("publicise", False)
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id,
|
|
||||||
user_id,
|
|
||||||
membership="join",
|
|
||||||
is_admin=True,
|
|
||||||
local_attestation=local_attestation,
|
|
||||||
remote_attestation=remote_attestation,
|
|
||||||
is_publicised=is_publicised,
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
||||||
|
|
||||||
return res
|
|
||||||
|
|
||||||
async def join_group(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Request to join a group"""
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
await self.groups_server_handler.join_group(group_id, user_id, content)
|
|
||||||
local_attestation = None
|
|
||||||
remote_attestation = None
|
|
||||||
else:
|
|
||||||
local_attestation = self.attestations.create_attestation(group_id, user_id)
|
|
||||||
content["attestation"] = local_attestation
|
|
||||||
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.join_group(
|
|
||||||
get_domain_from_id(group_id), group_id, user_id, content
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
remote_attestation = res["attestation"]
|
|
||||||
|
|
||||||
await self.attestations.verify_attestation(
|
|
||||||
remote_attestation,
|
|
||||||
group_id=group_id,
|
|
||||||
user_id=user_id,
|
|
||||||
server_name=get_domain_from_id(group_id),
|
|
||||||
)
|
|
||||||
|
|
||||||
# TODO: Check that the group is public and we're being added publicly
|
|
||||||
is_publicised = content.get("publicise", False)
|
|
||||||
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id,
|
|
||||||
user_id,
|
|
||||||
membership="join",
|
|
||||||
is_admin=False,
|
|
||||||
local_attestation=local_attestation,
|
|
||||||
remote_attestation=remote_attestation,
|
|
||||||
is_publicised=is_publicised,
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
||||||
|
|
||||||
return {}
|
|
||||||
|
|
||||||
async def accept_invite(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Accept an invite to a group"""
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
await self.groups_server_handler.accept_invite(group_id, user_id, content)
|
|
||||||
local_attestation = None
|
|
||||||
remote_attestation = None
|
|
||||||
else:
|
|
||||||
local_attestation = self.attestations.create_attestation(group_id, user_id)
|
|
||||||
content["attestation"] = local_attestation
|
|
||||||
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.accept_group_invite(
|
|
||||||
get_domain_from_id(group_id), group_id, user_id, content
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
remote_attestation = res["attestation"]
|
|
||||||
|
|
||||||
await self.attestations.verify_attestation(
|
|
||||||
remote_attestation,
|
|
||||||
group_id=group_id,
|
|
||||||
user_id=user_id,
|
|
||||||
server_name=get_domain_from_id(group_id),
|
|
||||||
)
|
|
||||||
|
|
||||||
# TODO: Check that the group is public and we're being added publicly
|
|
||||||
is_publicised = content.get("publicise", False)
|
|
||||||
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id,
|
|
||||||
user_id,
|
|
||||||
membership="join",
|
|
||||||
is_admin=False,
|
|
||||||
local_attestation=local_attestation,
|
|
||||||
remote_attestation=remote_attestation,
|
|
||||||
is_publicised=is_publicised,
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
||||||
|
|
||||||
return {}
|
|
||||||
|
|
||||||
async def invite(
|
|
||||||
self, group_id: str, user_id: str, requester_user_id: str, config: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Invite a user to a group"""
|
|
||||||
content = {"requester_user_id": requester_user_id, "config": config}
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
res = await self.groups_server_handler.invite_to_group(
|
|
||||||
group_id, user_id, requester_user_id, content
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.invite_to_group(
|
|
||||||
get_domain_from_id(group_id),
|
|
||||||
group_id,
|
|
||||||
user_id,
|
|
||||||
requester_user_id,
|
|
||||||
content,
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
return res
|
|
||||||
|
|
||||||
async def on_invite(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""One of our users were invited to a group"""
|
|
||||||
# TODO: Support auto join and rejection
|
|
||||||
|
|
||||||
if not self.is_mine_id(user_id):
|
|
||||||
raise SynapseError(400, "User not on this server")
|
|
||||||
|
|
||||||
local_profile = {}
|
|
||||||
if "profile" in content:
|
|
||||||
if "name" in content["profile"]:
|
|
||||||
local_profile["name"] = content["profile"]["name"]
|
|
||||||
if "avatar_url" in content["profile"]:
|
|
||||||
local_profile["avatar_url"] = content["profile"]["avatar_url"]
|
|
||||||
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id,
|
|
||||||
user_id,
|
|
||||||
membership="invite",
|
|
||||||
content={"profile": local_profile, "inviter": content["inviter"]},
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
||||||
try:
|
|
||||||
user_profile = await self.profile_handler.get_profile(user_id)
|
|
||||||
except Exception as e:
|
|
||||||
logger.warning("No profile for user %s: %s", user_id, e)
|
|
||||||
user_profile = {}
|
|
||||||
|
|
||||||
return {"state": "invite", "user_profile": user_profile}
|
|
||||||
|
|
||||||
async def remove_user_from_group(
|
|
||||||
self, group_id: str, user_id: str, requester_user_id: str, content: JsonDict
|
|
||||||
) -> JsonDict:
|
|
||||||
"""Remove a user from a group"""
|
|
||||||
if user_id == requester_user_id:
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id, user_id, membership="leave"
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
||||||
|
|
||||||
# TODO: Should probably remember that we tried to leave so that we can
|
|
||||||
# retry if the group server is currently down.
|
|
||||||
|
|
||||||
if self.is_mine_id(group_id):
|
|
||||||
res = await self.groups_server_handler.remove_user_from_group(
|
|
||||||
group_id, user_id, requester_user_id, content
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
content["requester_user_id"] = requester_user_id
|
|
||||||
try:
|
|
||||||
res = await self.transport_client.remove_user_from_group(
|
|
||||||
get_domain_from_id(group_id),
|
|
||||||
group_id,
|
|
||||||
requester_user_id,
|
|
||||||
user_id,
|
|
||||||
content,
|
|
||||||
)
|
|
||||||
except HttpResponseException as e:
|
|
||||||
raise e.to_synapse_error()
|
|
||||||
except RequestSendFailed:
|
|
||||||
raise SynapseError(502, "Failed to contact group server")
|
|
||||||
|
|
||||||
return res
|
|
||||||
|
|
||||||
async def user_removed_from_group(
|
|
||||||
self, group_id: str, user_id: str, content: JsonDict
|
|
||||||
) -> None:
|
|
||||||
"""One of our users was removed/kicked from a group"""
|
|
||||||
# TODO: Check if user in group
|
|
||||||
token = await self.store.register_user_group_membership(
|
|
||||||
group_id, user_id, membership="leave"
|
|
||||||
)
|
|
||||||
self.notifier.on_new_event("groups_key", token, users=[user_id])
|
|
@ -21,17 +21,7 @@
|
|||||||
import abc
|
import abc
|
||||||
import functools
|
import functools
|
||||||
import logging
|
import logging
|
||||||
from typing import (
|
from typing import TYPE_CHECKING, Any, Callable, Dict, List, Optional, TypeVar, cast
|
||||||
TYPE_CHECKING,
|
|
||||||
Any,
|
|
||||||
Callable,
|
|
||||||
Dict,
|
|
||||||
List,
|
|
||||||
Optional,
|
|
||||||
TypeVar,
|
|
||||||
Union,
|
|
||||||
cast,
|
|
||||||
)
|
|
||||||
|
|
||||||
from twisted.internet.interfaces import IOpenSSLContextFactory
|
from twisted.internet.interfaces import IOpenSSLContextFactory
|
||||||
from twisted.internet.tcp import Port
|
from twisted.internet.tcp import Port
|
||||||
@ -60,8 +50,6 @@ from synapse.federation.federation_server import (
|
|||||||
from synapse.federation.send_queue import FederationRemoteSendQueue
|
from synapse.federation.send_queue import FederationRemoteSendQueue
|
||||||
from synapse.federation.sender import AbstractFederationSender, FederationSender
|
from synapse.federation.sender import AbstractFederationSender, FederationSender
|
||||||
from synapse.federation.transport.client import TransportLayerClient
|
from synapse.federation.transport.client import TransportLayerClient
|
||||||
from synapse.groups.attestations import GroupAttestationSigning, GroupAttestionRenewer
|
|
||||||
from synapse.groups.groups_server import GroupsServerHandler, GroupsServerWorkerHandler
|
|
||||||
from synapse.handlers.account import AccountHandler
|
from synapse.handlers.account import AccountHandler
|
||||||
from synapse.handlers.account_data import AccountDataHandler
|
from synapse.handlers.account_data import AccountDataHandler
|
||||||
from synapse.handlers.account_validity import AccountValidityHandler
|
from synapse.handlers.account_validity import AccountValidityHandler
|
||||||
@ -79,7 +67,6 @@ from synapse.handlers.event_auth import EventAuthHandler
|
|||||||
from synapse.handlers.events import EventHandler, EventStreamHandler
|
from synapse.handlers.events import EventHandler, EventStreamHandler
|
||||||
from synapse.handlers.federation import FederationHandler
|
from synapse.handlers.federation import FederationHandler
|
||||||
from synapse.handlers.federation_event import FederationEventHandler
|
from synapse.handlers.federation_event import FederationEventHandler
|
||||||
from synapse.handlers.groups_local import GroupsLocalHandler, GroupsLocalWorkerHandler
|
|
||||||
from synapse.handlers.identity import IdentityHandler
|
from synapse.handlers.identity import IdentityHandler
|
||||||
from synapse.handlers.initial_sync import InitialSyncHandler
|
from synapse.handlers.initial_sync import InitialSyncHandler
|
||||||
from synapse.handlers.message import EventCreationHandler, MessageHandler
|
from synapse.handlers.message import EventCreationHandler, MessageHandler
|
||||||
@ -651,30 +638,6 @@ class HomeServer(metaclass=abc.ABCMeta):
|
|||||||
def get_user_directory_handler(self) -> UserDirectoryHandler:
|
def get_user_directory_handler(self) -> UserDirectoryHandler:
|
||||||
return UserDirectoryHandler(self)
|
return UserDirectoryHandler(self)
|
||||||
|
|
||||||
@cache_in_self
|
|
||||||
def get_groups_local_handler(
|
|
||||||
self,
|
|
||||||
) -> Union[GroupsLocalWorkerHandler, GroupsLocalHandler]:
|
|
||||||
if self.config.worker.worker_app:
|
|
||||||
return GroupsLocalWorkerHandler(self)
|
|
||||||
else:
|
|
||||||
return GroupsLocalHandler(self)
|
|
||||||
|
|
||||||
@cache_in_self
|
|
||||||
def get_groups_server_handler(self):
|
|
||||||
if self.config.worker.worker_app:
|
|
||||||
return GroupsServerWorkerHandler(self)
|
|
||||||
else:
|
|
||||||
return GroupsServerHandler(self)
|
|
||||||
|
|
||||||
@cache_in_self
|
|
||||||
def get_groups_attestation_signing(self) -> GroupAttestationSigning:
|
|
||||||
return GroupAttestationSigning(self)
|
|
||||||
|
|
||||||
@cache_in_self
|
|
||||||
def get_groups_attestation_renewer(self) -> GroupAttestionRenewer:
|
|
||||||
return GroupAttestionRenewer(self)
|
|
||||||
|
|
||||||
@cache_in_self
|
@cache_in_self
|
||||||
def get_stats_handler(self) -> StatsHandler:
|
def get_stats_handler(self) -> StatsHandler:
|
||||||
return StatsHandler(self)
|
return StatsHandler(self)
|
||||||
|
@ -320,29 +320,6 @@ class EventID(DomainSpecificString):
|
|||||||
SIGIL = "$"
|
SIGIL = "$"
|
||||||
|
|
||||||
|
|
||||||
@attr.s(slots=True, frozen=True, repr=False)
|
|
||||||
class GroupID(DomainSpecificString):
|
|
||||||
"""Structure representing a group ID."""
|
|
||||||
|
|
||||||
SIGIL = "+"
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_string(cls: Type[DS], s: str) -> DS:
|
|
||||||
group_id: DS = super().from_string(s) # type: ignore
|
|
||||||
|
|
||||||
if not group_id.localpart:
|
|
||||||
raise SynapseError(400, "Group ID cannot be empty", Codes.INVALID_PARAM)
|
|
||||||
|
|
||||||
if contains_invalid_mxid_characters(group_id.localpart):
|
|
||||||
raise SynapseError(
|
|
||||||
400,
|
|
||||||
"Group ID can only contain characters a-z, 0-9, or '=_-./'",
|
|
||||||
Codes.INVALID_PARAM,
|
|
||||||
)
|
|
||||||
|
|
||||||
return group_id
|
|
||||||
|
|
||||||
|
|
||||||
mxid_localpart_allowed_characters = set(
|
mxid_localpart_allowed_characters = set(
|
||||||
"_-./=" + string.ascii_lowercase + string.digits
|
"_-./=" + string.ascii_lowercase + string.digits
|
||||||
)
|
)
|
||||||
|
@ -23,7 +23,7 @@ from tests.test_utils import simple_async_mock
|
|||||||
|
|
||||||
|
|
||||||
def _regex(regex: str, exclusive: bool = True) -> Namespace:
|
def _regex(regex: str, exclusive: bool = True) -> Namespace:
|
||||||
return Namespace(exclusive, None, re.compile(regex))
|
return Namespace(exclusive, re.compile(regex))
|
||||||
|
|
||||||
|
|
||||||
class ApplicationServiceTestCase(unittest.TestCase):
|
class ApplicationServiceTestCase(unittest.TestCase):
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
from synapse.api.errors import SynapseError
|
from synapse.api.errors import SynapseError
|
||||||
from synapse.types import GroupID, RoomAlias, UserID, map_username_to_mxid_localpart
|
from synapse.types import RoomAlias, UserID, map_username_to_mxid_localpart
|
||||||
|
|
||||||
from tests import unittest
|
from tests import unittest
|
||||||
|
|
||||||
@ -62,25 +62,6 @@ class RoomAliasTestCase(unittest.HomeserverTestCase):
|
|||||||
self.assertFalse(RoomAlias.is_valid(id_string))
|
self.assertFalse(RoomAlias.is_valid(id_string))
|
||||||
|
|
||||||
|
|
||||||
class GroupIDTestCase(unittest.TestCase):
|
|
||||||
def test_parse(self):
|
|
||||||
group_id = GroupID.from_string("+group/=_-.123:my.domain")
|
|
||||||
self.assertEqual("group/=_-.123", group_id.localpart)
|
|
||||||
self.assertEqual("my.domain", group_id.domain)
|
|
||||||
|
|
||||||
def test_validate(self):
|
|
||||||
bad_ids = ["$badsigil:domain", "+:empty"] + [
|
|
||||||
"+group" + c + ":domain" for c in "A%?æ£"
|
|
||||||
]
|
|
||||||
for id_string in bad_ids:
|
|
||||||
try:
|
|
||||||
GroupID.from_string(id_string)
|
|
||||||
self.fail("Parsing '%s' should raise exception" % id_string)
|
|
||||||
except SynapseError as exc:
|
|
||||||
self.assertEqual(400, exc.code)
|
|
||||||
self.assertEqual("M_INVALID_PARAM", exc.errcode)
|
|
||||||
|
|
||||||
|
|
||||||
class MapUsernameTestCase(unittest.TestCase):
|
class MapUsernameTestCase(unittest.TestCase):
|
||||||
def testPassThrough(self):
|
def testPassThrough(self):
|
||||||
self.assertEqual(map_username_to_mxid_localpart("test1234"), "test1234")
|
self.assertEqual(map_username_to_mxid_localpart("test1234"), "test1234")
|
||||||
|
Loading…
Reference in New Issue
Block a user