2015-01-27 16:50:28 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2015 OpenMarket Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
from twisted.internet import defer
|
|
|
|
|
2015-02-11 11:36:08 +01:00
|
|
|
from synapse.api.constants import EventTypes, Membership
|
2015-01-28 12:59:38 +01:00
|
|
|
from synapse.api.errors import Codes, StoreError, SynapseError
|
2015-02-03 15:44:16 +01:00
|
|
|
from synapse.appservice import ApplicationService
|
2015-02-05 12:25:32 +01:00
|
|
|
from synapse.types import UserID
|
2015-02-05 11:08:12 +01:00
|
|
|
import synapse.util.stringutils as stringutils
|
2015-01-27 16:50:28 +01:00
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2015-03-09 18:01:19 +01:00
|
|
|
def log_failure(failure):
|
2015-03-16 11:16:59 +01:00
|
|
|
logger.error(
|
|
|
|
"Application Services Failure",
|
|
|
|
exc_info=(
|
|
|
|
failure.type,
|
|
|
|
failure.value,
|
|
|
|
failure.getTracebackObject()
|
|
|
|
)
|
|
|
|
)
|
2015-03-09 18:01:19 +01:00
|
|
|
|
|
|
|
|
2015-02-04 13:24:20 +01:00
|
|
|
# NB: Purposefully not inheriting BaseHandler since that contains way too much
|
|
|
|
# setup code which this handler does not need or use. This makes testing a lot
|
|
|
|
# easier.
|
|
|
|
class ApplicationServicesHandler(object):
|
2015-01-27 16:50:28 +01:00
|
|
|
|
2015-03-09 18:01:19 +01:00
|
|
|
def __init__(self, hs, appservice_api, appservice_scheduler):
|
2015-02-04 13:24:20 +01:00
|
|
|
self.store = hs.get_datastore()
|
|
|
|
self.hs = hs
|
2015-02-05 18:04:59 +01:00
|
|
|
self.appservice_api = appservice_api
|
2015-03-09 18:01:19 +01:00
|
|
|
self.scheduler = appservice_scheduler
|
|
|
|
self.started_scheduler = False
|
2015-01-27 16:50:28 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2015-01-27 18:15:06 +01:00
|
|
|
def register(self, app_service):
|
2015-01-27 18:34:40 +01:00
|
|
|
logger.info("Register -> %s", app_service)
|
2015-01-27 16:50:28 +01:00
|
|
|
# check the token is recognised
|
|
|
|
try:
|
2015-02-03 12:26:33 +01:00
|
|
|
stored_service = yield self.store.get_app_service_by_token(
|
|
|
|
app_service.token
|
|
|
|
)
|
2015-01-27 18:15:06 +01:00
|
|
|
if not stored_service:
|
2015-02-03 12:26:33 +01:00
|
|
|
raise StoreError(404, "Application service not found")
|
2015-03-16 16:24:32 +01:00
|
|
|
app_service.id = stored_service.id
|
2015-01-27 16:50:28 +01:00
|
|
|
except StoreError:
|
|
|
|
raise SynapseError(
|
|
|
|
403, "Unrecognised application services token. "
|
2015-01-28 12:59:38 +01:00
|
|
|
"Consult the home server admin.",
|
|
|
|
errcode=Codes.FORBIDDEN
|
2015-01-27 16:50:28 +01:00
|
|
|
)
|
2015-02-05 11:08:12 +01:00
|
|
|
app_service.hs_token = self._generate_hs_token()
|
2015-02-09 13:03:37 +01:00
|
|
|
|
|
|
|
# create a sender for this application service which is used when
|
|
|
|
# creating rooms, etc..
|
|
|
|
account = yield self.hs.get_handlers().registration_handler.register()
|
|
|
|
app_service.sender = account[0]
|
|
|
|
|
2015-02-02 18:39:41 +01:00
|
|
|
yield self.store.update_app_service(app_service)
|
2015-02-05 11:08:12 +01:00
|
|
|
defer.returnValue(app_service)
|
2015-02-04 17:44:53 +01:00
|
|
|
|
2015-02-05 14:19:46 +01:00
|
|
|
@defer.inlineCallbacks
|
2015-01-27 17:53:59 +01:00
|
|
|
def unregister(self, token):
|
2015-01-27 18:34:40 +01:00
|
|
|
logger.info("Unregister as_token=%s", token)
|
2015-01-27 17:53:59 +01:00
|
|
|
yield self.store.unregister_app_service(token)
|
|
|
|
|
2015-02-04 17:44:53 +01:00
|
|
|
@defer.inlineCallbacks
|
2015-01-27 17:53:59 +01:00
|
|
|
def notify_interested_services(self, event):
|
|
|
|
"""Notifies (pushes) all application services interested in this event.
|
|
|
|
|
|
|
|
Pushing is done asynchronously, so this method won't block for any
|
|
|
|
prolonged length of time.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event(Event): The event to push out to interested services.
|
|
|
|
"""
|
2015-02-03 14:17:28 +01:00
|
|
|
# Gather interested services
|
2015-02-05 12:47:11 +01:00
|
|
|
services = yield self._get_services_for_event(event)
|
2015-02-03 14:17:28 +01:00
|
|
|
if len(services) == 0:
|
|
|
|
return # no services need notifying
|
|
|
|
|
|
|
|
# Do we know this user exists? If not, poke the user query API for
|
2015-02-05 15:17:08 +01:00
|
|
|
# all services which match that user regex. This needs to block as these
|
|
|
|
# user queries need to be made BEFORE pushing the event.
|
|
|
|
yield self._check_user_exists(event.sender)
|
|
|
|
if event.type == EventTypes.Member:
|
|
|
|
yield self._check_user_exists(event.state_key)
|
2015-02-03 14:17:28 +01:00
|
|
|
|
2015-03-09 18:01:19 +01:00
|
|
|
if not self.started_scheduler:
|
|
|
|
self.scheduler.start().addErrback(log_failure)
|
|
|
|
self.started_scheduler = True
|
|
|
|
|
|
|
|
# Fork off pushes to these services
|
2015-02-03 14:29:27 +01:00
|
|
|
for service in services:
|
2015-03-09 18:01:19 +01:00
|
|
|
self.scheduler.submit_event_for_as(service, event)
|
2015-02-05 11:08:12 +01:00
|
|
|
|
2015-02-05 14:19:46 +01:00
|
|
|
@defer.inlineCallbacks
|
2015-02-05 15:17:08 +01:00
|
|
|
def query_user_exists(self, user_id):
|
|
|
|
"""Check if any application service knows this user_id exists.
|
2015-02-05 14:19:46 +01:00
|
|
|
|
|
|
|
Args:
|
2015-02-05 15:17:08 +01:00
|
|
|
user_id(str): The user to query if they exist on any AS.
|
2015-02-05 14:19:46 +01:00
|
|
|
Returns:
|
2015-02-05 15:17:08 +01:00
|
|
|
True if this user exists on at least one application service.
|
2015-02-05 14:19:46 +01:00
|
|
|
"""
|
2015-02-05 15:17:08 +01:00
|
|
|
user_query_services = yield self._get_services_for_user(
|
|
|
|
user_id=user_id
|
2015-02-05 14:19:46 +01:00
|
|
|
)
|
|
|
|
for user_service in user_query_services:
|
|
|
|
is_known_user = yield self.appservice_api.query_user(
|
2015-02-05 15:17:08 +01:00
|
|
|
user_service, user_id
|
2015-02-05 14:19:46 +01:00
|
|
|
)
|
|
|
|
if is_known_user:
|
|
|
|
defer.returnValue(True)
|
|
|
|
defer.returnValue(False)
|
2015-02-05 12:47:11 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def query_room_alias_exists(self, room_alias):
|
|
|
|
"""Check if an application service knows this room alias exists.
|
|
|
|
|
|
|
|
Args:
|
2015-02-05 14:19:46 +01:00
|
|
|
room_alias(RoomAlias): The room alias to query.
|
2015-02-05 12:47:11 +01:00
|
|
|
Returns:
|
|
|
|
namedtuple: with keys "room_id" and "servers" or None if no
|
|
|
|
association can be found.
|
|
|
|
"""
|
2015-02-09 16:01:28 +01:00
|
|
|
room_alias_str = room_alias.to_string()
|
2015-02-05 12:47:11 +01:00
|
|
|
alias_query_services = yield self._get_services_for_event(
|
|
|
|
event=None,
|
|
|
|
restrict_to=ApplicationService.NS_ALIASES,
|
2015-02-09 16:01:28 +01:00
|
|
|
alias_list=[room_alias_str]
|
2015-02-05 12:47:11 +01:00
|
|
|
)
|
|
|
|
for alias_service in alias_query_services:
|
|
|
|
is_known_alias = yield self.appservice_api.query_alias(
|
2015-02-09 16:01:28 +01:00
|
|
|
alias_service, room_alias_str
|
2015-02-05 12:47:11 +01:00
|
|
|
)
|
|
|
|
if is_known_alias:
|
|
|
|
# the alias exists now so don't query more ASes.
|
|
|
|
result = yield self.store.get_association_from_room_alias(
|
|
|
|
room_alias
|
|
|
|
)
|
|
|
|
defer.returnValue(result)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _get_services_for_event(self, event, restrict_to="", alias_list=None):
|
|
|
|
"""Retrieve a list of application services interested in this event.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event(Event): The event to check. Can be None if alias_list is not.
|
|
|
|
restrict_to(str): The namespace to restrict regex tests to.
|
|
|
|
alias_list: A list of aliases to get services for. If None, this
|
|
|
|
list is obtained from the database.
|
|
|
|
Returns:
|
|
|
|
list<ApplicationService>: A list of services interested in this
|
|
|
|
event based on the service regex.
|
|
|
|
"""
|
2015-02-11 11:36:08 +01:00
|
|
|
member_list = None
|
|
|
|
if hasattr(event, "room_id"):
|
|
|
|
# We need to know the aliases associated with this event.room_id,
|
|
|
|
# if any.
|
|
|
|
if not alias_list:
|
|
|
|
alias_list = yield self.store.get_aliases_for_room(
|
|
|
|
event.room_id
|
|
|
|
)
|
|
|
|
# We need to know the members associated with this event.room_id,
|
|
|
|
# if any.
|
|
|
|
member_list = yield self.store.get_room_members(
|
|
|
|
room_id=event.room_id,
|
|
|
|
membership=Membership.JOIN
|
|
|
|
)
|
2015-02-05 12:47:11 +01:00
|
|
|
|
|
|
|
services = yield self.store.get_app_services()
|
|
|
|
interested_list = [
|
|
|
|
s for s in services if (
|
2015-02-11 11:36:08 +01:00
|
|
|
s.is_interested(event, restrict_to, alias_list, member_list)
|
2015-02-05 12:47:11 +01:00
|
|
|
)
|
|
|
|
]
|
|
|
|
defer.returnValue(interested_list)
|
|
|
|
|
2015-02-05 15:17:08 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _get_services_for_user(self, user_id):
|
|
|
|
services = yield self.store.get_app_services()
|
|
|
|
interested_list = [
|
|
|
|
s for s in services if (
|
|
|
|
s.is_interested_in_user(user_id)
|
|
|
|
)
|
|
|
|
]
|
|
|
|
defer.returnValue(interested_list)
|
|
|
|
|
2015-02-05 12:25:32 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _is_unknown_user(self, user_id):
|
|
|
|
user = UserID.from_string(user_id)
|
|
|
|
if not self.hs.is_mine(user):
|
|
|
|
# we don't know if they are unknown or not since it isn't one of our
|
|
|
|
# users. We can't poke ASes.
|
|
|
|
defer.returnValue(False)
|
|
|
|
return
|
|
|
|
|
|
|
|
user_info = yield self.store.get_user_by_id(user_id)
|
|
|
|
defer.returnValue(len(user_info) == 0)
|
|
|
|
|
2015-02-05 15:17:08 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _check_user_exists(self, user_id):
|
|
|
|
unknown_user = yield self._is_unknown_user(user_id)
|
|
|
|
if unknown_user:
|
|
|
|
exists = yield self.query_user_exists(user_id)
|
|
|
|
defer.returnValue(exists)
|
|
|
|
defer.returnValue(True)
|
|
|
|
|
2015-02-05 11:08:12 +01:00
|
|
|
def _generate_hs_token(self):
|
2015-02-05 12:25:32 +01:00
|
|
|
return stringutils.random_string(24)
|