2014-08-12 10:10:52 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2019-04-11 12:08:13 -04:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-12 22:14:34 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Contains exceptions and error codes."""
|
2020-07-15 13:40:54 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
import logging
|
2020-07-14 07:03:58 -04:00
|
|
|
import typing
|
2020-06-16 08:51:47 -04:00
|
|
|
from http import HTTPStatus
|
2020-07-14 07:03:58 -04:00
|
|
|
from typing import Dict, List, Optional, Union
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2020-01-15 10:58:55 -05:00
|
|
|
from twisted.web import http
|
|
|
|
|
2020-08-19 07:26:03 -04:00
|
|
|
from synapse.util import json_decoder
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
if typing.TYPE_CHECKING:
|
|
|
|
from synapse.types import JsonDict
|
|
|
|
|
2014-11-20 12:10:37 -05:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
class Codes(object):
|
2015-01-22 12:38:53 -05:00
|
|
|
UNRECOGNIZED = "M_UNRECOGNIZED"
|
2014-10-13 11:39:15 -04:00
|
|
|
UNAUTHORIZED = "M_UNAUTHORIZED"
|
2014-08-12 10:10:52 -04:00
|
|
|
FORBIDDEN = "M_FORBIDDEN"
|
|
|
|
BAD_JSON = "M_BAD_JSON"
|
|
|
|
NOT_JSON = "M_NOT_JSON"
|
|
|
|
USER_IN_USE = "M_USER_IN_USE"
|
|
|
|
ROOM_IN_USE = "M_ROOM_IN_USE"
|
|
|
|
BAD_PAGINATION = "M_BAD_PAGINATION"
|
2016-01-15 11:27:26 -05:00
|
|
|
BAD_STATE = "M_BAD_STATE"
|
2014-08-12 10:10:52 -04:00
|
|
|
UNKNOWN = "M_UNKNOWN"
|
|
|
|
NOT_FOUND = "M_NOT_FOUND"
|
2015-04-23 08:23:44 -04:00
|
|
|
MISSING_TOKEN = "M_MISSING_TOKEN"
|
2014-08-14 08:47:39 -04:00
|
|
|
UNKNOWN_TOKEN = "M_UNKNOWN_TOKEN"
|
2015-11-04 12:29:07 -05:00
|
|
|
GUEST_ACCESS_FORBIDDEN = "M_GUEST_ACCESS_FORBIDDEN"
|
2014-09-02 12:57:04 -04:00
|
|
|
LIMIT_EXCEEDED = "M_LIMIT_EXCEEDED"
|
2014-09-05 22:18:23 -04:00
|
|
|
CAPTCHA_NEEDED = "M_CAPTCHA_NEEDED"
|
|
|
|
CAPTCHA_INVALID = "M_CAPTCHA_INVALID"
|
2015-04-24 04:27:42 -04:00
|
|
|
MISSING_PARAM = "M_MISSING_PARAM"
|
2016-11-21 08:13:55 -05:00
|
|
|
INVALID_PARAM = "M_INVALID_PARAM"
|
2015-04-24 04:27:42 -04:00
|
|
|
TOO_LARGE = "M_TOO_LARGE"
|
2015-02-06 05:57:14 -05:00
|
|
|
EXCLUSIVE = "M_EXCLUSIVE"
|
2015-04-23 13:20:17 -04:00
|
|
|
THREEPID_AUTH_FAILED = "M_THREEPID_AUTH_FAILED"
|
2016-06-30 12:51:28 -04:00
|
|
|
THREEPID_IN_USE = "M_THREEPID_IN_USE"
|
2016-07-08 12:42:48 -04:00
|
|
|
THREEPID_NOT_FOUND = "M_THREEPID_NOT_FOUND"
|
2018-01-18 19:19:58 -05:00
|
|
|
THREEPID_DENIED = "M_THREEPID_DENIED"
|
2016-01-15 05:06:34 -05:00
|
|
|
INVALID_USERNAME = "M_INVALID_USERNAME"
|
2016-06-30 12:51:28 -04:00
|
|
|
SERVER_NOT_TRUSTED = "M_SERVER_NOT_TRUSTED"
|
2018-05-22 03:56:52 -04:00
|
|
|
CONSENT_NOT_GIVEN = "M_CONSENT_NOT_GIVEN"
|
2018-05-22 12:27:03 -04:00
|
|
|
CANNOT_LEAVE_SERVER_NOTICE_ROOM = "M_CANNOT_LEAVE_SERVER_NOTICE_ROOM"
|
2018-08-18 09:39:45 -04:00
|
|
|
RESOURCE_LIMIT_EXCEEDED = "M_RESOURCE_LIMIT_EXCEEDED"
|
2018-07-25 17:10:39 -04:00
|
|
|
UNSUPPORTED_ROOM_VERSION = "M_UNSUPPORTED_ROOM_VERSION"
|
2018-07-25 17:25:41 -04:00
|
|
|
INCOMPATIBLE_ROOM_VERSION = "M_INCOMPATIBLE_ROOM_VERSION"
|
2017-12-05 20:02:57 -05:00
|
|
|
WRONG_ROOM_KEYS_VERSION = "M_WRONG_ROOM_KEYS_VERSION"
|
2019-04-08 12:10:55 -04:00
|
|
|
EXPIRED_ACCOUNT = "ORG_MATRIX_EXPIRED_ACCOUNT"
|
2020-03-26 12:51:13 -04:00
|
|
|
PASSWORD_TOO_SHORT = "M_PASSWORD_TOO_SHORT"
|
|
|
|
PASSWORD_NO_DIGIT = "M_PASSWORD_NO_DIGIT"
|
|
|
|
PASSWORD_NO_UPPERCASE = "M_PASSWORD_NO_UPPERCASE"
|
|
|
|
PASSWORD_NO_LOWERCASE = "M_PASSWORD_NO_LOWERCASE"
|
|
|
|
PASSWORD_NO_SYMBOL = "M_PASSWORD_NO_SYMBOL"
|
|
|
|
PASSWORD_IN_DICTIONARY = "M_PASSWORD_IN_DICTIONARY"
|
|
|
|
WEAK_PASSWORD = "M_WEAK_PASSWORD"
|
2019-07-25 11:08:24 -04:00
|
|
|
INVALID_SIGNATURE = "M_INVALID_SIGNATURE"
|
2019-07-31 10:19:06 -04:00
|
|
|
USER_DEACTIVATED = "M_USER_DEACTIVATED"
|
2020-03-03 07:12:45 -05:00
|
|
|
BAD_ALIAS = "M_BAD_ALIAS"
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
|
2015-02-04 11:28:12 -05:00
|
|
|
class CodeMessageException(RuntimeError):
|
2017-03-13 09:50:16 -04:00
|
|
|
"""An exception with integer code and message string attributes.
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2017-03-13 09:50:16 -04:00
|
|
|
Attributes:
|
2020-07-14 07:03:58 -04:00
|
|
|
code: HTTP error code
|
|
|
|
msg: string describing the error
|
2017-03-13 09:50:16 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, code: Union[int, HTTPStatus], msg: str):
|
2017-03-14 08:36:50 -04:00
|
|
|
super(CodeMessageException, self).__init__("%d: %s" % (code, msg))
|
2020-04-03 09:26:07 -04:00
|
|
|
|
|
|
|
# Some calls to this method pass instances of http.HTTPStatus for `code`.
|
|
|
|
# While HTTPStatus is a subclass of int, it has magic __str__ methods
|
|
|
|
# which emit `HTTPStatus.FORBIDDEN` when converted to a str, instead of `403`.
|
|
|
|
# This causes inconsistency in our log lines.
|
|
|
|
#
|
|
|
|
# To eliminate this behaviour, we convert them to their integer equivalents here.
|
|
|
|
self.code = int(code)
|
2017-03-14 08:36:50 -04:00
|
|
|
self.msg = msg
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2017-04-25 14:30:55 -04:00
|
|
|
|
2020-01-15 10:58:55 -05:00
|
|
|
class RedirectException(CodeMessageException):
|
|
|
|
"""A pseudo-error indicating that we want to redirect the client to a different
|
|
|
|
location
|
|
|
|
|
|
|
|
Attributes:
|
|
|
|
cookies: a list of set-cookies values to add to the response. For example:
|
|
|
|
b"sessionId=a3fWa; Expires=Wed, 21 Oct 2015 07:28:00 GMT"
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, location: bytes, http_code: int = http.FOUND):
|
|
|
|
"""
|
|
|
|
|
|
|
|
Args:
|
|
|
|
location: the URI to redirect to
|
|
|
|
http_code: the HTTP response code
|
|
|
|
"""
|
|
|
|
msg = "Redirect to %s" % (location.decode("utf-8"),)
|
|
|
|
super().__init__(code=http_code, msg=msg)
|
|
|
|
self.location = location
|
|
|
|
|
|
|
|
self.cookies = [] # type: List[bytes]
|
|
|
|
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
class SynapseError(CodeMessageException):
|
2017-03-14 08:36:50 -04:00
|
|
|
"""A base exception type for matrix errors which have an errcode and error
|
|
|
|
message (as well as an HTTP status code).
|
|
|
|
|
|
|
|
Attributes:
|
2020-07-14 07:03:58 -04:00
|
|
|
errcode: Matrix error code e.g 'M_FORBIDDEN'
|
2017-03-14 08:36:50 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, code: int, msg: str, errcode: str = Codes.UNKNOWN):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Constructs a synapse error.
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
code: The integer error code (an HTTP response code)
|
|
|
|
msg: The human-readable error message.
|
|
|
|
errcode: The matrix error code e.g 'M_FORBIDDEN'
|
2014-08-12 10:10:52 -04:00
|
|
|
"""
|
2017-03-14 08:36:50 -04:00
|
|
|
super(SynapseError, self).__init__(code, msg)
|
2014-08-12 10:10:52 -04:00
|
|
|
self.errcode = errcode
|
|
|
|
|
2014-09-03 03:58:48 -04:00
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2017-03-14 09:36:06 -04:00
|
|
|
|
2018-08-01 09:58:16 -04:00
|
|
|
class ProxiedRequestError(SynapseError):
|
|
|
|
"""An error from a general matrix endpoint, eg. from a proxied Matrix API call.
|
2017-03-13 09:50:16 -04:00
|
|
|
|
2018-08-01 09:58:16 -04:00
|
|
|
Attributes:
|
2020-07-14 07:03:58 -04:00
|
|
|
errcode: Matrix error code e.g 'M_FORBIDDEN'
|
2018-08-01 09:58:16 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
code: int,
|
|
|
|
msg: str,
|
|
|
|
errcode: str = Codes.UNKNOWN,
|
|
|
|
additional_fields: Optional[Dict] = None,
|
|
|
|
):
|
2019-06-20 05:32:02 -04:00
|
|
|
super(ProxiedRequestError, self).__init__(code, msg, errcode)
|
2018-08-01 09:58:16 -04:00
|
|
|
if additional_fields is None:
|
2019-10-02 08:29:01 -04:00
|
|
|
self._additional_fields = {} # type: Dict
|
2018-08-01 09:58:16 -04:00
|
|
|
else:
|
|
|
|
self._additional_fields = dict(additional_fields)
|
2017-03-13 09:50:16 -04:00
|
|
|
|
2018-08-01 09:58:16 -04:00
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode, **self._additional_fields)
|
2017-03-13 09:50:16 -04:00
|
|
|
|
2014-10-30 07:10:17 -04:00
|
|
|
|
2018-05-22 03:56:52 -04:00
|
|
|
class ConsentNotGivenError(SynapseError):
|
|
|
|
"""The error returned to the client when the user has not consented to the
|
|
|
|
privacy policy.
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str, consent_uri: str):
|
2018-05-22 03:56:52 -04:00
|
|
|
"""Constructs a ConsentNotGivenError
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
msg: The human-readable error message
|
|
|
|
consent_url: The URL where the user can give their consent
|
2018-05-22 03:56:52 -04:00
|
|
|
"""
|
|
|
|
super(ConsentNotGivenError, self).__init__(
|
2020-06-16 08:51:47 -04:00
|
|
|
code=HTTPStatus.FORBIDDEN, msg=msg, errcode=Codes.CONSENT_NOT_GIVEN
|
2018-05-22 03:56:52 -04:00
|
|
|
)
|
|
|
|
self._consent_uri = consent_uri
|
|
|
|
|
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode, consent_uri=self._consent_uri)
|
2018-05-22 03:56:52 -04:00
|
|
|
|
|
|
|
|
2019-07-15 06:45:29 -04:00
|
|
|
class UserDeactivatedError(SynapseError):
|
|
|
|
"""The error returned to the client when the user attempted to access an
|
|
|
|
authenticated endpoint, but the account has been deactivated.
|
|
|
|
"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str):
|
2019-07-15 06:45:29 -04:00
|
|
|
"""Constructs a UserDeactivatedError
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
msg: The human-readable error message
|
2019-07-15 06:45:29 -04:00
|
|
|
"""
|
|
|
|
super(UserDeactivatedError, self).__init__(
|
2020-06-16 08:51:47 -04:00
|
|
|
code=HTTPStatus.FORBIDDEN, msg=msg, errcode=Codes.USER_DEACTIVATED
|
2019-07-15 06:45:29 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2018-01-22 13:11:18 -05:00
|
|
|
class FederationDeniedError(SynapseError):
|
|
|
|
"""An error raised when the server tries to federate with a server which
|
|
|
|
is not on its federation whitelist.
|
|
|
|
|
|
|
|
Attributes:
|
2020-07-14 07:03:58 -04:00
|
|
|
destination: The destination which has been denied
|
2018-01-22 13:11:18 -05:00
|
|
|
"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, destination: Optional[str]):
|
2018-01-22 13:11:18 -05:00
|
|
|
"""Raised by federation client or server to indicate that we are
|
|
|
|
are deliberately not attempting to contact a given server because it is
|
|
|
|
not on our federation whitelist.
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
destination: the domain in question
|
2018-01-22 13:11:18 -05:00
|
|
|
"""
|
|
|
|
|
|
|
|
self.destination = destination
|
|
|
|
|
|
|
|
super(FederationDeniedError, self).__init__(
|
|
|
|
code=403,
|
|
|
|
msg="Federation denied with %s." % (self.destination,),
|
|
|
|
errcode=Codes.FORBIDDEN,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2017-12-04 10:47:27 -05:00
|
|
|
class InteractiveAuthIncompleteError(Exception):
|
|
|
|
"""An error raised when UI auth is not yet complete
|
|
|
|
|
|
|
|
(This indicates we should return a 401 with 'result' as the body)
|
|
|
|
|
|
|
|
Attributes:
|
2020-08-06 08:09:55 -04:00
|
|
|
session_id: The ID of the ongoing interactive auth session.
|
2020-07-14 07:03:58 -04:00
|
|
|
result: the server response to the request, which should be
|
2017-12-04 10:47:27 -05:00
|
|
|
passed back to the client
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-08-06 08:09:55 -04:00
|
|
|
def __init__(self, session_id: str, result: "JsonDict"):
|
2017-12-04 10:47:27 -05:00
|
|
|
super(InteractiveAuthIncompleteError, self).__init__(
|
2019-06-20 05:32:02 -04:00
|
|
|
"Interactive auth not yet complete"
|
2017-12-04 10:47:27 -05:00
|
|
|
)
|
2020-08-06 08:09:55 -04:00
|
|
|
self.session_id = session_id
|
2017-12-04 10:47:27 -05:00
|
|
|
self.result = result
|
|
|
|
|
|
|
|
|
2015-01-22 12:38:53 -05:00
|
|
|
class UnrecognizedRequestError(SynapseError):
|
|
|
|
"""An error indicating we don't understand the request you're trying to make"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2015-01-22 12:38:53 -05:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if "errcode" not in kwargs:
|
2015-01-22 14:32:17 -05:00
|
|
|
kwargs["errcode"] = Codes.UNRECOGNIZED
|
2015-01-23 06:19:02 -05:00
|
|
|
if len(args) == 0:
|
|
|
|
message = "Unrecognized request"
|
|
|
|
else:
|
|
|
|
message = args[0]
|
2019-06-20 05:32:02 -04:00
|
|
|
super(UnrecognizedRequestError, self).__init__(400, message, **kwargs)
|
2015-01-22 12:38:53 -05:00
|
|
|
|
2015-01-22 14:32:17 -05:00
|
|
|
|
|
|
|
class NotFoundError(SynapseError):
|
|
|
|
"""An error indicating we can't find the thing you asked for"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str = "Not found", errcode: str = Codes.NOT_FOUND):
|
2019-06-20 05:32:02 -04:00
|
|
|
super(NotFoundError, self).__init__(404, msg, errcode=errcode)
|
2015-01-22 14:32:17 -05:00
|
|
|
|
2015-01-29 11:10:35 -05:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
class AuthError(SynapseError):
|
2019-07-11 06:06:23 -04:00
|
|
|
"""An error raised when there was a problem authorising an event, and at various
|
|
|
|
other poorly-defined times.
|
|
|
|
"""
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if "errcode" not in kwargs:
|
|
|
|
kwargs["errcode"] = Codes.FORBIDDEN
|
|
|
|
super(AuthError, self).__init__(*args, **kwargs)
|
|
|
|
|
|
|
|
|
2019-07-11 06:06:23 -04:00
|
|
|
class InvalidClientCredentialsError(SynapseError):
|
|
|
|
"""An error raised when there was a problem with the authorisation credentials
|
|
|
|
in a client request.
|
|
|
|
|
|
|
|
https://matrix.org/docs/spec/client_server/r0.5.0#using-access-tokens:
|
|
|
|
|
|
|
|
When credentials are required but missing or invalid, the HTTP call will
|
|
|
|
return with a status of 401 and the error code, M_MISSING_TOKEN or
|
|
|
|
M_UNKNOWN_TOKEN respectively.
|
|
|
|
"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str, errcode: str):
|
2019-07-11 06:06:23 -04:00
|
|
|
super().__init__(code=401, msg=msg, errcode=errcode)
|
|
|
|
|
|
|
|
|
|
|
|
class MissingClientTokenError(InvalidClientCredentialsError):
|
|
|
|
"""Raised when we couldn't find the access token in a request"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str = "Missing access token"):
|
2019-07-11 06:06:23 -04:00
|
|
|
super().__init__(msg=msg, errcode="M_MISSING_TOKEN")
|
|
|
|
|
|
|
|
|
|
|
|
class InvalidClientTokenError(InvalidClientCredentialsError):
|
|
|
|
"""Raised when we didn't understand the access token in a request"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(
|
|
|
|
self, msg: str = "Unrecognised access token", soft_logout: bool = False
|
|
|
|
):
|
2019-07-11 06:06:23 -04:00
|
|
|
super().__init__(msg=msg, errcode="M_UNKNOWN_TOKEN")
|
2019-07-12 12:26:02 -04:00
|
|
|
self._soft_logout = soft_logout
|
|
|
|
|
|
|
|
def error_dict(self):
|
|
|
|
d = super().error_dict()
|
|
|
|
d["soft_logout"] = self._soft_logout
|
|
|
|
return d
|
2019-07-11 06:06:23 -04:00
|
|
|
|
|
|
|
|
2018-08-16 13:02:02 -04:00
|
|
|
class ResourceLimitError(SynapseError):
|
|
|
|
"""
|
|
|
|
Any error raised when there is a problem with resource usage.
|
|
|
|
For instance, the monthly active user limit for the server has been exceeded
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2018-08-16 13:02:02 -04:00
|
|
|
def __init__(
|
2019-06-20 05:32:02 -04:00
|
|
|
self,
|
2020-07-14 07:03:58 -04:00
|
|
|
code: int,
|
|
|
|
msg: str,
|
|
|
|
errcode: str = Codes.RESOURCE_LIMIT_EXCEEDED,
|
|
|
|
admin_contact: Optional[str] = None,
|
|
|
|
limit_type: Optional[str] = None,
|
2018-08-16 13:02:02 -04:00
|
|
|
):
|
2018-08-24 11:51:27 -04:00
|
|
|
self.admin_contact = admin_contact
|
2018-08-16 13:02:02 -04:00
|
|
|
self.limit_type = limit_type
|
|
|
|
super(ResourceLimitError, self).__init__(code, msg, errcode=errcode)
|
2018-08-13 13:00:23 -04:00
|
|
|
|
|
|
|
def error_dict(self):
|
|
|
|
return cs_error(
|
|
|
|
self.msg,
|
|
|
|
self.errcode,
|
2018-08-24 11:51:27 -04:00
|
|
|
admin_contact=self.admin_contact,
|
2019-06-20 05:32:02 -04:00
|
|
|
limit_type=self.limit_type,
|
2018-08-13 13:00:23 -04:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
|
2015-10-22 06:44:31 -04:00
|
|
|
class EventSizeError(SynapseError):
|
|
|
|
"""An error raised when an event is too big."""
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if "errcode" not in kwargs:
|
|
|
|
kwargs["errcode"] = Codes.TOO_LARGE
|
|
|
|
super(EventSizeError, self).__init__(413, *args, **kwargs)
|
|
|
|
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
class EventStreamError(SynapseError):
|
|
|
|
"""An error raised when there a problem with the event stream."""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2014-08-14 06:57:25 -04:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if "errcode" not in kwargs:
|
|
|
|
kwargs["errcode"] = Codes.BAD_PAGINATION
|
|
|
|
super(EventStreamError, self).__init__(*args, **kwargs)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
|
|
|
|
class LoginError(SynapseError):
|
|
|
|
"""An error raised when there was a problem logging in."""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class StoreError(SynapseError):
|
|
|
|
"""An error raised when there was a problem storing some data."""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
2014-09-05 22:18:23 -04:00
|
|
|
class InvalidCaptchaError(SynapseError):
|
2019-06-20 05:32:02 -04:00
|
|
|
def __init__(
|
|
|
|
self,
|
2020-07-14 07:03:58 -04:00
|
|
|
code: int = 400,
|
|
|
|
msg: str = "Invalid captcha.",
|
|
|
|
error_url: Optional[str] = None,
|
|
|
|
errcode: str = Codes.CAPTCHA_INVALID,
|
2019-06-20 05:32:02 -04:00
|
|
|
):
|
2014-09-05 22:18:23 -04:00
|
|
|
super(InvalidCaptchaError, self).__init__(code, msg, errcode)
|
|
|
|
self.error_url = error_url
|
|
|
|
|
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode, error_url=self.error_url)
|
2014-09-05 22:18:23 -04:00
|
|
|
|
2014-10-30 07:10:17 -04:00
|
|
|
|
2014-09-03 03:58:48 -04:00
|
|
|
class LimitExceededError(SynapseError):
|
|
|
|
"""A client has sent too many requests and is being throttled.
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self,
|
2020-07-14 07:03:58 -04:00
|
|
|
code: int = 429,
|
|
|
|
msg: str = "Too Many Requests",
|
|
|
|
retry_after_ms: Optional[int] = None,
|
|
|
|
errcode: str = Codes.LIMIT_EXCEEDED,
|
2019-06-20 05:32:02 -04:00
|
|
|
):
|
2014-09-03 03:58:48 -04:00
|
|
|
super(LimitExceededError, self).__init__(code, msg, errcode)
|
|
|
|
self.retry_after_ms = retry_after_ms
|
|
|
|
|
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode, retry_after_ms=self.retry_after_ms)
|
2014-09-03 03:58:48 -04:00
|
|
|
|
|
|
|
|
2017-12-05 20:02:57 -05:00
|
|
|
class RoomKeysVersionError(SynapseError):
|
|
|
|
"""A client has tried to upload to a non-current version of the room_keys store
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, current_version: str):
|
2017-12-17 20:52:46 -05:00
|
|
|
"""
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
current_version: the current version of the store they should have used
|
2017-12-17 20:52:46 -05:00
|
|
|
"""
|
|
|
|
super(RoomKeysVersionError, self).__init__(
|
|
|
|
403, "Wrong room_keys version", Codes.WRONG_ROOM_KEYS_VERSION
|
|
|
|
)
|
2017-12-05 20:02:57 -05:00
|
|
|
self.current_version = current_version
|
|
|
|
|
2018-09-06 11:23:16 -04:00
|
|
|
|
2019-05-21 08:47:25 -04:00
|
|
|
class UnsupportedRoomVersionError(SynapseError):
|
|
|
|
"""The client's request to create a room used a room version that the server does
|
|
|
|
not support."""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, msg: str = "Homeserver does not support this room version"):
|
2019-05-21 08:47:25 -04:00
|
|
|
super(UnsupportedRoomVersionError, self).__init__(
|
2020-01-31 05:28:15 -05:00
|
|
|
code=400, msg=msg, errcode=Codes.UNSUPPORTED_ROOM_VERSION,
|
2019-05-21 08:47:25 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2019-06-06 12:34:07 -04:00
|
|
|
class ThreepidValidationError(SynapseError):
|
|
|
|
"""An error raised when there was a problem authorising an event."""
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if "errcode" not in kwargs:
|
|
|
|
kwargs["errcode"] = Codes.FORBIDDEN
|
|
|
|
super(ThreepidValidationError, self).__init__(*args, **kwargs)
|
|
|
|
|
|
|
|
|
2018-07-25 17:25:41 -04:00
|
|
|
class IncompatibleRoomVersionError(SynapseError):
|
2019-05-21 08:47:25 -04:00
|
|
|
"""A server is trying to join a room whose version it does not support.
|
2018-07-25 17:25:41 -04:00
|
|
|
|
2019-05-21 08:47:25 -04:00
|
|
|
Unlike UnsupportedRoomVersionError, it is specific to the case of the make_join
|
|
|
|
failing.
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, room_version: str):
|
2018-07-25 17:25:41 -04:00
|
|
|
super(IncompatibleRoomVersionError, self).__init__(
|
|
|
|
code=400,
|
|
|
|
msg="Your homeserver does not support the features required to "
|
2019-06-20 05:32:02 -04:00
|
|
|
"join this room",
|
2018-07-25 17:25:41 -04:00
|
|
|
errcode=Codes.INCOMPATIBLE_ROOM_VERSION,
|
|
|
|
)
|
|
|
|
|
|
|
|
self._room_version = room_version
|
|
|
|
|
2017-12-05 20:02:57 -05:00
|
|
|
def error_dict(self):
|
2019-06-20 05:32:02 -04:00
|
|
|
return cs_error(self.msg, self.errcode, room_version=self._room_version)
|
2017-12-05 20:02:57 -05:00
|
|
|
|
|
|
|
|
2020-03-26 12:51:13 -04:00
|
|
|
class PasswordRefusedError(SynapseError):
|
|
|
|
"""A password has been refused, either during password reset/change or registration.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self,
|
2020-07-14 07:03:58 -04:00
|
|
|
msg: str = "This password doesn't comply with the server's policy",
|
|
|
|
errcode: str = Codes.WEAK_PASSWORD,
|
2020-03-26 12:51:13 -04:00
|
|
|
):
|
|
|
|
super(PasswordRefusedError, self).__init__(
|
|
|
|
code=400, msg=msg, errcode=errcode,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2019-01-08 06:04:28 -05:00
|
|
|
class RequestSendFailed(RuntimeError):
|
|
|
|
"""Sending a HTTP request over federation failed due to not being able to
|
|
|
|
talk to the remote server for some reason.
|
|
|
|
|
|
|
|
This exception is used to differentiate "expected" errors that arise due to
|
|
|
|
networking (e.g. DNS failures, connection timeouts etc), versus unexpected
|
|
|
|
errors (like programming errors).
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-01-08 06:04:28 -05:00
|
|
|
def __init__(self, inner_exception, can_retry):
|
|
|
|
super(RequestSendFailed, self).__init__(
|
2019-06-20 05:32:02 -04:00
|
|
|
"Failed to send request: %s: %s"
|
|
|
|
% (type(inner_exception).__name__, inner_exception)
|
2019-01-08 06:04:28 -05:00
|
|
|
)
|
|
|
|
self.inner_exception = inner_exception
|
|
|
|
self.can_retry = can_retry
|
|
|
|
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def cs_error(msg: str, code: str = Codes.UNKNOWN, **kwargs):
|
2014-08-12 10:10:52 -04:00
|
|
|
""" Utility method for constructing an error response for client-server
|
|
|
|
interactions.
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
msg: The error message.
|
|
|
|
code: The error code.
|
|
|
|
kwargs: Additional keys to add to the response.
|
2014-08-12 10:10:52 -04:00
|
|
|
Returns:
|
|
|
|
A dict representing the error response JSON.
|
|
|
|
"""
|
|
|
|
err = {"error": msg, "errcode": code}
|
2020-06-15 07:03:36 -04:00
|
|
|
for key, value in kwargs.items():
|
2014-08-12 10:10:52 -04:00
|
|
|
err[key] = value
|
|
|
|
return err
|
2014-11-04 10:10:27 -05:00
|
|
|
|
|
|
|
|
|
|
|
class FederationError(RuntimeError):
|
2019-11-12 08:08:12 -05:00
|
|
|
""" This class is used to inform remote homeservers about erroneous
|
2014-11-04 10:10:27 -05:00
|
|
|
PDUs they sent us.
|
|
|
|
|
|
|
|
FATAL: The remote server could not interpret the source event.
|
|
|
|
(e.g., it was missing a required field)
|
|
|
|
ERROR: The remote server interpreted the event, but it failed some other
|
|
|
|
check (e.g. auth)
|
|
|
|
WARN: The remote server accepted the event, but believes some part of it
|
|
|
|
is wrong (e.g., it referred to an invalid event)
|
|
|
|
"""
|
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
level: str,
|
|
|
|
code: int,
|
|
|
|
reason: str,
|
|
|
|
affected: str,
|
|
|
|
source: Optional[str] = None,
|
|
|
|
):
|
2014-11-04 10:10:27 -05:00
|
|
|
if level not in ["FATAL", "ERROR", "WARN"]:
|
|
|
|
raise ValueError("Level is not valid: %s" % (level,))
|
|
|
|
self.level = level
|
|
|
|
self.code = code
|
|
|
|
self.reason = reason
|
|
|
|
self.affected = affected
|
|
|
|
self.source = source
|
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
msg = "%s %s: %s" % (level, code, reason)
|
2014-11-04 10:10:27 -05:00
|
|
|
super(FederationError, self).__init__(msg)
|
|
|
|
|
|
|
|
def get_dict(self):
|
|
|
|
return {
|
|
|
|
"level": self.level,
|
|
|
|
"code": self.code,
|
|
|
|
"reason": self.reason,
|
|
|
|
"affected": self.affected,
|
|
|
|
"source": self.source if self.source else self.affected,
|
|
|
|
}
|
2015-02-04 11:28:12 -05:00
|
|
|
|
|
|
|
|
|
|
|
class HttpResponseException(CodeMessageException):
|
2017-03-13 09:50:16 -04:00
|
|
|
"""
|
|
|
|
Represents an HTTP-level failure of an outbound request
|
|
|
|
|
|
|
|
Attributes:
|
2020-07-14 07:03:58 -04:00
|
|
|
response: body of response
|
2017-03-13 09:50:16 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-07-14 07:03:58 -04:00
|
|
|
def __init__(self, code: int, msg: str, response: bytes):
|
2017-03-13 09:50:16 -04:00
|
|
|
"""
|
|
|
|
|
|
|
|
Args:
|
2020-07-14 07:03:58 -04:00
|
|
|
code: HTTP status code
|
|
|
|
msg: reason phrase from HTTP response status line
|
|
|
|
response: body of response
|
2017-03-13 09:50:16 -04:00
|
|
|
"""
|
2017-03-14 08:36:50 -04:00
|
|
|
super(HttpResponseException, self).__init__(code, msg)
|
2015-02-04 11:28:12 -05:00
|
|
|
self.response = response
|
2018-08-01 09:58:16 -04:00
|
|
|
|
|
|
|
def to_synapse_error(self):
|
|
|
|
"""Make a SynapseError based on an HTTPResponseException
|
|
|
|
|
|
|
|
This is useful when a proxied request has failed, and we need to
|
|
|
|
decide how to map the failure onto a matrix error to send back to the
|
|
|
|
client.
|
|
|
|
|
|
|
|
An attempt is made to parse the body of the http response as a matrix
|
|
|
|
error. If that succeeds, the errcode and error message from the body
|
|
|
|
are used as the errcode and error message in the new synapse error.
|
|
|
|
|
|
|
|
Otherwise, the errcode is set to M_UNKNOWN, and the error message is
|
|
|
|
set to the reason code from the HTTP response.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
SynapseError:
|
|
|
|
"""
|
|
|
|
# try to parse the body as json, to get better errcode/msg, but
|
|
|
|
# default to M_UNKNOWN with the HTTP status as the error text
|
|
|
|
try:
|
2020-08-19 07:26:03 -04:00
|
|
|
j = json_decoder.decode(self.response.decode("utf-8"))
|
2018-08-01 09:58:16 -04:00
|
|
|
except ValueError:
|
|
|
|
j = {}
|
|
|
|
|
|
|
|
if not isinstance(j, dict):
|
|
|
|
j = {}
|
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
errcode = j.pop("errcode", Codes.UNKNOWN)
|
|
|
|
errmsg = j.pop("error", self.msg)
|
2018-08-01 09:58:16 -04:00
|
|
|
|
|
|
|
return ProxiedRequestError(self.code, errmsg, errcode, j)
|
2020-08-20 15:07:42 -04:00
|
|
|
|
|
|
|
|
|
|
|
class ShadowBanError(Exception):
|
|
|
|
"""
|
|
|
|
Raised when a shadow-banned user attempts to perform an action.
|
|
|
|
|
|
|
|
This should be caught and a proper "fake" success response sent to the user.
|
|
|
|
"""
|