mirror of
https://git.anonymousland.org/anonymousland/synapse-product.git
synced 2024-12-25 23:19:28 -05:00
799001f2c0
... and use it in places where it's trivial to do so. This will make it easier to pass room versions into the FrozenEvent constructors.
117 lines
3.9 KiB
Python
117 lines
3.9 KiB
Python
# -*- coding: utf-8 -*-
|
|
# Copyright 2018 New Vector Ltd
|
|
# Copyright 2019 Matrix.org Federation C.I.C
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
import logging
|
|
|
|
from synapse.events import make_event_from_dict
|
|
from synapse.federation.federation_server import server_matches_acl_event
|
|
from synapse.rest import admin
|
|
from synapse.rest.client.v1 import login, room
|
|
|
|
from tests import unittest
|
|
|
|
|
|
class ServerACLsTestCase(unittest.TestCase):
|
|
def test_blacklisted_server(self):
|
|
e = _create_acl_event({"allow": ["*"], "deny": ["evil.com"]})
|
|
logging.info("ACL event: %s", e.content)
|
|
|
|
self.assertFalse(server_matches_acl_event("evil.com", e))
|
|
self.assertFalse(server_matches_acl_event("EVIL.COM", e))
|
|
|
|
self.assertTrue(server_matches_acl_event("evil.com.au", e))
|
|
self.assertTrue(server_matches_acl_event("honestly.not.evil.com", e))
|
|
|
|
def test_block_ip_literals(self):
|
|
e = _create_acl_event({"allow_ip_literals": False, "allow": ["*"]})
|
|
logging.info("ACL event: %s", e.content)
|
|
|
|
self.assertFalse(server_matches_acl_event("1.2.3.4", e))
|
|
self.assertTrue(server_matches_acl_event("1a.2.3.4", e))
|
|
self.assertFalse(server_matches_acl_event("[1:2::]", e))
|
|
self.assertTrue(server_matches_acl_event("1:2:3:4", e))
|
|
|
|
|
|
class StateQueryTests(unittest.FederatingHomeserverTestCase):
|
|
|
|
servlets = [
|
|
admin.register_servlets,
|
|
room.register_servlets,
|
|
login.register_servlets,
|
|
]
|
|
|
|
def test_without_event_id(self):
|
|
"""
|
|
Querying v1/state/<room_id> without an event ID will return the current
|
|
known state.
|
|
"""
|
|
u1 = self.register_user("u1", "pass")
|
|
u1_token = self.login("u1", "pass")
|
|
|
|
room_1 = self.helper.create_room_as(u1, tok=u1_token)
|
|
self.inject_room_member(room_1, "@user:other.example.com", "join")
|
|
|
|
request, channel = self.make_request(
|
|
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
|
|
)
|
|
self.render(request)
|
|
self.assertEquals(200, channel.code, channel.result)
|
|
|
|
self.assertEqual(
|
|
channel.json_body["room_version"],
|
|
self.hs.config.default_room_version.identifier,
|
|
)
|
|
|
|
members = set(
|
|
map(
|
|
lambda x: x["state_key"],
|
|
filter(
|
|
lambda x: x["type"] == "m.room.member", channel.json_body["pdus"]
|
|
),
|
|
)
|
|
)
|
|
|
|
self.assertEqual(members, set(["@user:other.example.com", u1]))
|
|
self.assertEqual(len(channel.json_body["pdus"]), 6)
|
|
|
|
def test_needs_to_be_in_room(self):
|
|
"""
|
|
Querying v1/state/<room_id> requires the server
|
|
be in the room to provide data.
|
|
"""
|
|
u1 = self.register_user("u1", "pass")
|
|
u1_token = self.login("u1", "pass")
|
|
|
|
room_1 = self.helper.create_room_as(u1, tok=u1_token)
|
|
|
|
request, channel = self.make_request(
|
|
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
|
|
)
|
|
self.render(request)
|
|
self.assertEquals(403, channel.code, channel.result)
|
|
self.assertEqual(channel.json_body["errcode"], "M_FORBIDDEN")
|
|
|
|
|
|
def _create_acl_event(content):
|
|
return make_event_from_dict(
|
|
{
|
|
"room_id": "!a:b",
|
|
"event_id": "$a:b",
|
|
"type": "m.room.server_acls",
|
|
"sender": "@a:b",
|
|
"content": content,
|
|
}
|
|
)
|