2019-06-12 11:31:37 +02:00
|
|
|
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2021-07-20 12:39:46 +02:00
|
|
|
import logging
|
2021-10-13 13:24:07 +02:00
|
|
|
from typing import TYPE_CHECKING, Any, Awaitable, Callable, List, Optional, Tuple
|
2020-10-13 19:53:56 +02:00
|
|
|
|
2022-05-09 13:31:14 +02:00
|
|
|
from twisted.internet.defer import CancelledError
|
|
|
|
|
2021-11-01 16:45:56 +01:00
|
|
|
from synapse.api.errors import ModuleFailedException, SynapseError
|
2020-07-27 19:40:22 +02:00
|
|
|
from synapse.events import EventBase
|
2023-02-09 22:05:02 +01:00
|
|
|
from synapse.events.snapshot import UnpersistedEventContextBase
|
2022-03-01 16:00:03 +01:00
|
|
|
from synapse.storage.roommember import ProfileInfo
|
2020-10-05 15:57:46 +02:00
|
|
|
from synapse.types import Requester, StateMap
|
2022-05-09 13:31:14 +02:00
|
|
|
from synapse.util.async_helpers import delay_cancellation, maybe_awaitable
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2021-03-24 11:49:01 +01:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
CHECK_EVENT_ALLOWED_CALLBACK = Callable[
|
|
|
|
[EventBase, StateMap[EventBase]], Awaitable[Tuple[bool, Optional[dict]]]
|
|
|
|
]
|
|
|
|
ON_CREATE_ROOM_CALLBACK = Callable[[Requester, dict, bool], Awaitable]
|
|
|
|
CHECK_THREEPID_CAN_BE_INVITED_CALLBACK = Callable[
|
|
|
|
[str, str, StateMap[EventBase]], Awaitable[bool]
|
|
|
|
]
|
|
|
|
CHECK_VISIBILITY_CAN_BE_MODIFIED_CALLBACK = Callable[
|
|
|
|
[str, StateMap[EventBase], str], Awaitable[bool]
|
|
|
|
]
|
2021-10-26 15:17:36 +02:00
|
|
|
ON_NEW_EVENT_CALLBACK = Callable[[EventBase, StateMap[EventBase]], Awaitable]
|
2022-03-09 19:23:57 +01:00
|
|
|
CHECK_CAN_SHUTDOWN_ROOM_CALLBACK = Callable[[str, str], Awaitable[bool]]
|
|
|
|
CHECK_CAN_DEACTIVATE_USER_CALLBACK = Callable[[str, bool], Awaitable[bool]]
|
2022-03-01 16:00:03 +01:00
|
|
|
ON_PROFILE_UPDATE_CALLBACK = Callable[[str, ProfileInfo, bool, bool], Awaitable]
|
|
|
|
ON_USER_DEACTIVATION_STATUS_CHANGED_CALLBACK = Callable[[str, bool, bool], Awaitable]
|
2022-03-31 18:27:21 +02:00
|
|
|
ON_THREEPID_BIND_CALLBACK = Callable[[str, str, str], Awaitable]
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
|
2021-10-13 13:24:07 +02:00
|
|
|
def load_legacy_third_party_event_rules(hs: "HomeServer") -> None:
|
2021-07-20 12:39:46 +02:00
|
|
|
"""Wrapper that loads a third party event rules module configured using the old
|
|
|
|
configuration, and registers the hooks they implement.
|
|
|
|
"""
|
2021-09-24 13:25:21 +02:00
|
|
|
if hs.config.thirdpartyrules.third_party_event_rules is None:
|
2021-07-20 12:39:46 +02:00
|
|
|
return
|
|
|
|
|
2021-09-24 13:25:21 +02:00
|
|
|
module, config = hs.config.thirdpartyrules.third_party_event_rules
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
api = hs.get_module_api()
|
|
|
|
third_party_rules = module(config=config, module_api=api)
|
|
|
|
|
|
|
|
# The known hooks. If a module implements a method which name appears in this set,
|
|
|
|
# we'll want to register it.
|
|
|
|
third_party_event_rules_methods = {
|
|
|
|
"check_event_allowed",
|
|
|
|
"on_create_room",
|
|
|
|
"check_threepid_can_be_invited",
|
|
|
|
"check_visibility_can_be_modified",
|
|
|
|
}
|
|
|
|
|
|
|
|
def async_wrapper(f: Optional[Callable]) -> Optional[Callable[..., Awaitable]]:
|
|
|
|
# f might be None if the callback isn't implemented by the module. In this
|
|
|
|
# case we don't want to register a callback at all so we return None.
|
|
|
|
if f is None:
|
|
|
|
return None
|
|
|
|
|
|
|
|
# We return a separate wrapper for these methods because, in order to wrap them
|
|
|
|
# correctly, we need to await its result. Therefore it doesn't make a lot of
|
|
|
|
# sense to make it go through the run() wrapper.
|
|
|
|
if f.__name__ == "check_event_allowed":
|
|
|
|
|
|
|
|
# We need to wrap check_event_allowed because its old form would return either
|
|
|
|
# a boolean or a dict, but now we want to return the dict separately from the
|
|
|
|
# boolean.
|
|
|
|
async def wrap_check_event_allowed(
|
|
|
|
event: EventBase,
|
|
|
|
state_events: StateMap[EventBase],
|
|
|
|
) -> Tuple[bool, Optional[dict]]:
|
2021-10-13 13:24:07 +02:00
|
|
|
# Assertion required because mypy can't prove we won't change
|
|
|
|
# `f` back to `None`. See
|
|
|
|
# https://mypy.readthedocs.io/en/latest/common_issues.html#narrowing-and-inner-functions
|
2021-07-20 12:39:46 +02:00
|
|
|
assert f is not None
|
|
|
|
|
|
|
|
res = await f(event, state_events)
|
|
|
|
if isinstance(res, dict):
|
|
|
|
return True, res
|
|
|
|
else:
|
|
|
|
return res, None
|
|
|
|
|
|
|
|
return wrap_check_event_allowed
|
|
|
|
|
|
|
|
if f.__name__ == "on_create_room":
|
|
|
|
|
|
|
|
# We need to wrap on_create_room because its old form would return a boolean
|
|
|
|
# if the room creation is denied, but now we just want it to raise an
|
|
|
|
# exception.
|
|
|
|
async def wrap_on_create_room(
|
|
|
|
requester: Requester, config: dict, is_requester_admin: bool
|
|
|
|
) -> None:
|
2021-10-13 13:24:07 +02:00
|
|
|
# Assertion required because mypy can't prove we won't change
|
|
|
|
# `f` back to `None`. See
|
|
|
|
# https://mypy.readthedocs.io/en/latest/common_issues.html#narrowing-and-inner-functions
|
2021-07-20 12:39:46 +02:00
|
|
|
assert f is not None
|
|
|
|
|
|
|
|
res = await f(requester, config, is_requester_admin)
|
|
|
|
if res is False:
|
|
|
|
raise SynapseError(
|
|
|
|
403,
|
|
|
|
"Room creation forbidden with these parameters",
|
|
|
|
)
|
|
|
|
|
|
|
|
return wrap_on_create_room
|
|
|
|
|
2021-10-13 13:24:07 +02:00
|
|
|
def run(*args: Any, **kwargs: Any) -> Awaitable:
|
|
|
|
# Assertion required because mypy can't prove we won't change `f`
|
|
|
|
# back to `None`. See
|
|
|
|
# https://mypy.readthedocs.io/en/latest/common_issues.html#narrowing-and-inner-functions
|
2021-07-20 12:39:46 +02:00
|
|
|
assert f is not None
|
|
|
|
|
|
|
|
return maybe_awaitable(f(*args, **kwargs))
|
|
|
|
|
|
|
|
return run
|
|
|
|
|
|
|
|
# Register the hooks through the module API.
|
|
|
|
hooks = {
|
|
|
|
hook: async_wrapper(getattr(third_party_rules, hook, None))
|
|
|
|
for hook in third_party_event_rules_methods
|
|
|
|
}
|
|
|
|
|
|
|
|
api.register_third_party_rules_callbacks(**hooks)
|
|
|
|
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2020-09-04 12:54:56 +02:00
|
|
|
class ThirdPartyEventRules:
|
2019-06-17 16:48:57 +02:00
|
|
|
"""Allows server admins to provide a Python module implementing an extra
|
|
|
|
set of rules to apply when processing events.
|
2019-06-12 11:31:37 +02:00
|
|
|
|
|
|
|
This is designed to help admins of closed federations with enforcing custom
|
|
|
|
behaviours.
|
|
|
|
"""
|
|
|
|
|
2021-03-24 11:49:01 +01:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2019-06-12 11:31:37 +02:00
|
|
|
self.third_party_rules = None
|
|
|
|
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2022-06-01 17:02:53 +02:00
|
|
|
self._storage_controllers = hs.get_storage_controllers()
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
self._check_event_allowed_callbacks: List[CHECK_EVENT_ALLOWED_CALLBACK] = []
|
|
|
|
self._on_create_room_callbacks: List[ON_CREATE_ROOM_CALLBACK] = []
|
|
|
|
self._check_threepid_can_be_invited_callbacks: List[
|
|
|
|
CHECK_THREEPID_CAN_BE_INVITED_CALLBACK
|
|
|
|
] = []
|
|
|
|
self._check_visibility_can_be_modified_callbacks: List[
|
|
|
|
CHECK_VISIBILITY_CAN_BE_MODIFIED_CALLBACK
|
|
|
|
] = []
|
2021-10-26 15:17:36 +02:00
|
|
|
self._on_new_event_callbacks: List[ON_NEW_EVENT_CALLBACK] = []
|
2022-03-09 19:23:57 +01:00
|
|
|
self._check_can_shutdown_room_callbacks: List[
|
|
|
|
CHECK_CAN_SHUTDOWN_ROOM_CALLBACK
|
|
|
|
] = []
|
|
|
|
self._check_can_deactivate_user_callbacks: List[
|
|
|
|
CHECK_CAN_DEACTIVATE_USER_CALLBACK
|
|
|
|
] = []
|
2022-03-01 16:00:03 +01:00
|
|
|
self._on_profile_update_callbacks: List[ON_PROFILE_UPDATE_CALLBACK] = []
|
|
|
|
self._on_user_deactivation_status_changed_callbacks: List[
|
|
|
|
ON_USER_DEACTIVATION_STATUS_CHANGED_CALLBACK
|
|
|
|
] = []
|
2022-03-31 18:27:21 +02:00
|
|
|
self._on_threepid_bind_callbacks: List[ON_THREEPID_BIND_CALLBACK] = []
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
def register_third_party_rules_callbacks(
|
|
|
|
self,
|
|
|
|
check_event_allowed: Optional[CHECK_EVENT_ALLOWED_CALLBACK] = None,
|
|
|
|
on_create_room: Optional[ON_CREATE_ROOM_CALLBACK] = None,
|
|
|
|
check_threepid_can_be_invited: Optional[
|
|
|
|
CHECK_THREEPID_CAN_BE_INVITED_CALLBACK
|
|
|
|
] = None,
|
|
|
|
check_visibility_can_be_modified: Optional[
|
|
|
|
CHECK_VISIBILITY_CAN_BE_MODIFIED_CALLBACK
|
|
|
|
] = None,
|
2021-10-26 15:17:36 +02:00
|
|
|
on_new_event: Optional[ON_NEW_EVENT_CALLBACK] = None,
|
2022-03-09 19:23:57 +01:00
|
|
|
check_can_shutdown_room: Optional[CHECK_CAN_SHUTDOWN_ROOM_CALLBACK] = None,
|
|
|
|
check_can_deactivate_user: Optional[CHECK_CAN_DEACTIVATE_USER_CALLBACK] = None,
|
2022-03-01 16:00:03 +01:00
|
|
|
on_profile_update: Optional[ON_PROFILE_UPDATE_CALLBACK] = None,
|
2022-03-03 11:39:58 +01:00
|
|
|
on_user_deactivation_status_changed: Optional[
|
|
|
|
ON_USER_DEACTIVATION_STATUS_CHANGED_CALLBACK
|
|
|
|
] = None,
|
2022-03-31 18:27:21 +02:00
|
|
|
on_threepid_bind: Optional[ON_THREEPID_BIND_CALLBACK] = None,
|
2021-10-13 13:24:07 +02:00
|
|
|
) -> None:
|
2021-07-20 12:39:46 +02:00
|
|
|
"""Register callbacks from modules for each hook."""
|
|
|
|
if check_event_allowed is not None:
|
|
|
|
self._check_event_allowed_callbacks.append(check_event_allowed)
|
|
|
|
|
|
|
|
if on_create_room is not None:
|
|
|
|
self._on_create_room_callbacks.append(on_create_room)
|
|
|
|
|
|
|
|
if check_threepid_can_be_invited is not None:
|
|
|
|
self._check_threepid_can_be_invited_callbacks.append(
|
|
|
|
check_threepid_can_be_invited,
|
|
|
|
)
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
if check_visibility_can_be_modified is not None:
|
|
|
|
self._check_visibility_can_be_modified_callbacks.append(
|
|
|
|
check_visibility_can_be_modified,
|
2019-06-17 17:27:47 +02:00
|
|
|
)
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2021-10-26 15:17:36 +02:00
|
|
|
if on_new_event is not None:
|
|
|
|
self._on_new_event_callbacks.append(on_new_event)
|
|
|
|
|
2022-03-09 19:23:57 +01:00
|
|
|
if check_can_shutdown_room is not None:
|
|
|
|
self._check_can_shutdown_room_callbacks.append(check_can_shutdown_room)
|
|
|
|
|
|
|
|
if check_can_deactivate_user is not None:
|
|
|
|
self._check_can_deactivate_user_callbacks.append(check_can_deactivate_user)
|
2022-03-01 16:00:03 +01:00
|
|
|
if on_profile_update is not None:
|
|
|
|
self._on_profile_update_callbacks.append(on_profile_update)
|
|
|
|
|
2022-03-03 11:39:58 +01:00
|
|
|
if on_user_deactivation_status_changed is not None:
|
|
|
|
self._on_user_deactivation_status_changed_callbacks.append(
|
|
|
|
on_user_deactivation_status_changed,
|
|
|
|
)
|
2022-03-01 16:00:03 +01:00
|
|
|
|
2022-03-31 18:27:21 +02:00
|
|
|
if on_threepid_bind is not None:
|
|
|
|
self._on_threepid_bind_callbacks.append(on_threepid_bind)
|
|
|
|
|
2020-07-27 19:40:22 +02:00
|
|
|
async def check_event_allowed(
|
2023-02-09 22:05:02 +01:00
|
|
|
self,
|
|
|
|
event: EventBase,
|
|
|
|
context: UnpersistedEventContextBase,
|
2021-07-20 12:39:46 +02:00
|
|
|
) -> Tuple[bool, Optional[dict]]:
|
2019-06-12 11:31:37 +02:00
|
|
|
"""Check if a provided event should be allowed in the given context.
|
|
|
|
|
2020-10-13 19:53:56 +02:00
|
|
|
The module can return:
|
|
|
|
* True: the event is allowed.
|
|
|
|
* False: the event is not allowed, and should be rejected with M_FORBIDDEN.
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
If the event is allowed, the module can also return a dictionary to use as a
|
|
|
|
replacement for the event.
|
2020-10-13 19:53:56 +02:00
|
|
|
|
2019-06-12 11:31:37 +02:00
|
|
|
Args:
|
2020-07-27 19:40:22 +02:00
|
|
|
event: The event to be checked.
|
|
|
|
context: The context of the event.
|
2019-06-12 11:31:37 +02:00
|
|
|
|
|
|
|
Returns:
|
2021-07-20 12:39:46 +02:00
|
|
|
The result from the ThirdPartyRules module, as above.
|
2019-06-12 11:31:37 +02:00
|
|
|
"""
|
2021-07-20 12:39:46 +02:00
|
|
|
# Bail out early without hitting the store if we don't have any callbacks to run.
|
|
|
|
if len(self._check_event_allowed_callbacks) == 0:
|
|
|
|
return True, None
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2020-07-27 19:40:22 +02:00
|
|
|
prev_state_ids = await context.get_prev_state_ids()
|
2019-06-12 11:31:37 +02:00
|
|
|
|
|
|
|
# Retrieve the state events from the database.
|
2020-10-06 17:31:31 +02:00
|
|
|
events = await self.store.get_events(prev_state_ids.values())
|
|
|
|
state_events = {(ev.type, ev.state_key): ev for ev in events.values()}
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2020-10-13 23:02:41 +02:00
|
|
|
# Ensure that the event is frozen, to make sure that the module is not tempted
|
|
|
|
# to try to modify it. Any attempt to modify it at this point will invalidate
|
|
|
|
# the hashes and signatures.
|
|
|
|
event.freeze()
|
2020-10-06 17:31:31 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
for callback in self._check_event_allowed_callbacks:
|
|
|
|
try:
|
2022-05-09 13:31:14 +02:00
|
|
|
res, replacement_data = await delay_cancellation(
|
|
|
|
callback(event, state_events)
|
|
|
|
)
|
|
|
|
except CancelledError:
|
|
|
|
raise
|
2021-10-11 17:29:02 +02:00
|
|
|
except SynapseError as e:
|
|
|
|
# FIXME: Being able to throw SynapseErrors is relied upon by
|
|
|
|
# some modules. PR #10386 accidentally broke this ability.
|
|
|
|
# That said, we aren't keen on exposing this implementation detail
|
|
|
|
# to modules and we should one day have a proper way to do what
|
|
|
|
# is wanted.
|
|
|
|
# This module callback needs a rework so that hacks such as
|
|
|
|
# this one are not necessary.
|
|
|
|
raise e
|
2021-11-01 16:45:56 +01:00
|
|
|
except Exception:
|
|
|
|
raise ModuleFailedException(
|
|
|
|
"Failed to run `check_event_allowed` module API callback"
|
|
|
|
)
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
# Return if the event shouldn't be allowed or if the module came up with a
|
|
|
|
# replacement dict for the event.
|
|
|
|
if res is False:
|
|
|
|
return res, None
|
|
|
|
elif isinstance(replacement_data, dict):
|
|
|
|
return True, replacement_data
|
|
|
|
|
|
|
|
return True, None
|
2019-06-17 16:48:57 +02:00
|
|
|
|
2020-07-27 19:40:22 +02:00
|
|
|
async def on_create_room(
|
|
|
|
self, requester: Requester, config: dict, is_requester_admin: bool
|
2021-07-20 12:39:46 +02:00
|
|
|
) -> None:
|
|
|
|
"""Intercept requests to create room to maybe deny it (via an exception) or
|
|
|
|
update the request config.
|
2019-06-17 16:48:57 +02:00
|
|
|
|
|
|
|
Args:
|
2020-07-27 19:40:22 +02:00
|
|
|
requester
|
|
|
|
config: The creation config from the client.
|
|
|
|
is_requester_admin: If the requester is an admin
|
2019-06-17 16:48:57 +02:00
|
|
|
"""
|
2021-07-20 12:39:46 +02:00
|
|
|
for callback in self._on_create_room_callbacks:
|
|
|
|
try:
|
|
|
|
await callback(requester, config, is_requester_admin)
|
|
|
|
except Exception as e:
|
|
|
|
# Don't silence the errors raised by this callback since we expect it to
|
|
|
|
# raise an exception to deny the creation of the room; instead make sure
|
|
|
|
# it's a SynapseError we can send to clients.
|
|
|
|
if not isinstance(e, SynapseError):
|
|
|
|
e = SynapseError(
|
|
|
|
403, "Room creation forbidden with these parameters"
|
|
|
|
)
|
|
|
|
|
|
|
|
raise e
|
2019-06-17 17:27:47 +02:00
|
|
|
|
2020-07-27 19:40:22 +02:00
|
|
|
async def check_threepid_can_be_invited(
|
|
|
|
self, medium: str, address: str, room_id: str
|
|
|
|
) -> bool:
|
2019-06-17 17:27:47 +02:00
|
|
|
"""Check if a provided 3PID can be invited in the given room.
|
|
|
|
|
|
|
|
Args:
|
2020-07-27 19:40:22 +02:00
|
|
|
medium: The 3PID's medium.
|
|
|
|
address: The 3PID's address.
|
|
|
|
room_id: The room we want to invite the threepid to.
|
2019-06-17 17:27:47 +02:00
|
|
|
|
|
|
|
Returns:
|
2020-07-27 19:40:22 +02:00
|
|
|
True if the 3PID can be invited, False if not.
|
2019-06-17 17:27:47 +02:00
|
|
|
"""
|
2021-07-20 12:39:46 +02:00
|
|
|
# Bail out early without hitting the store if we don't have any callbacks to run.
|
|
|
|
if len(self._check_threepid_can_be_invited_callbacks) == 0:
|
2019-07-23 15:00:55 +02:00
|
|
|
return True
|
2019-06-17 17:27:47 +02:00
|
|
|
|
2020-10-05 15:57:46 +02:00
|
|
|
state_events = await self._get_state_map_for_room(room_id)
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
for callback in self._check_threepid_can_be_invited_callbacks:
|
|
|
|
try:
|
2022-05-09 13:31:14 +02:00
|
|
|
threepid_can_be_invited = await delay_cancellation(
|
|
|
|
callback(medium, address, state_events)
|
|
|
|
)
|
|
|
|
if threepid_can_be_invited is False:
|
2021-07-20 12:39:46 +02:00
|
|
|
return False
|
2022-05-09 13:31:14 +02:00
|
|
|
except CancelledError:
|
|
|
|
raise
|
2021-07-20 12:39:46 +02:00
|
|
|
except Exception as e:
|
|
|
|
logger.warning("Failed to run module API callback %s: %s", callback, e)
|
|
|
|
|
|
|
|
return True
|
2020-10-05 15:57:46 +02:00
|
|
|
|
|
|
|
async def check_visibility_can_be_modified(
|
|
|
|
self, room_id: str, new_visibility: str
|
|
|
|
) -> bool:
|
|
|
|
"""Check if a room is allowed to be published to, or removed from, the public room
|
|
|
|
list.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room_id: The ID of the room.
|
|
|
|
new_visibility: The new visibility state. Either "public" or "private".
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
True if the room's visibility can be modified, False if not.
|
|
|
|
"""
|
2021-07-20 12:39:46 +02:00
|
|
|
# Bail out early without hitting the store if we don't have any callback
|
|
|
|
if len(self._check_visibility_can_be_modified_callbacks) == 0:
|
2020-10-05 15:57:46 +02:00
|
|
|
return True
|
|
|
|
|
|
|
|
state_events = await self._get_state_map_for_room(room_id)
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
for callback in self._check_visibility_can_be_modified_callbacks:
|
|
|
|
try:
|
2022-05-09 13:31:14 +02:00
|
|
|
visibility_can_be_modified = await delay_cancellation(
|
|
|
|
callback(room_id, state_events, new_visibility)
|
|
|
|
)
|
|
|
|
if visibility_can_be_modified is False:
|
2021-07-20 12:39:46 +02:00
|
|
|
return False
|
2022-05-09 13:31:14 +02:00
|
|
|
except CancelledError:
|
|
|
|
raise
|
2021-07-20 12:39:46 +02:00
|
|
|
except Exception as e:
|
|
|
|
logger.warning("Failed to run module API callback %s: %s", callback, e)
|
|
|
|
|
|
|
|
return True
|
2020-10-05 15:57:46 +02:00
|
|
|
|
2021-10-26 15:17:36 +02:00
|
|
|
async def on_new_event(self, event_id: str) -> None:
|
|
|
|
"""Let modules act on events after they've been sent (e.g. auto-accepting
|
|
|
|
invites, etc.)
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_id: The ID of the event.
|
|
|
|
"""
|
|
|
|
# Bail out early without hitting the store if we don't have any callbacks
|
|
|
|
if len(self._on_new_event_callbacks) == 0:
|
|
|
|
return
|
|
|
|
|
|
|
|
event = await self.store.get_event(event_id)
|
|
|
|
state_events = await self._get_state_map_for_room(event.room_id)
|
|
|
|
|
|
|
|
for callback in self._on_new_event_callbacks:
|
|
|
|
try:
|
|
|
|
await callback(event, state_events)
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|
|
|
|
|
2022-03-09 19:23:57 +01:00
|
|
|
async def check_can_shutdown_room(self, user_id: str, room_id: str) -> bool:
|
|
|
|
"""Intercept requests to shutdown a room. If `False` is returned, the
|
|
|
|
room must not be shut down.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
requester: The ID of the user requesting the shutdown.
|
|
|
|
room_id: The ID of the room.
|
|
|
|
"""
|
|
|
|
for callback in self._check_can_shutdown_room_callbacks:
|
|
|
|
try:
|
2022-05-09 13:31:14 +02:00
|
|
|
can_shutdown_room = await delay_cancellation(callback(user_id, room_id))
|
|
|
|
if can_shutdown_room is False:
|
2022-03-09 19:23:57 +01:00
|
|
|
return False
|
2022-05-09 13:31:14 +02:00
|
|
|
except CancelledError:
|
|
|
|
raise
|
2022-03-09 19:23:57 +01:00
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|
|
|
|
return True
|
|
|
|
|
|
|
|
async def check_can_deactivate_user(
|
|
|
|
self,
|
|
|
|
user_id: str,
|
|
|
|
by_admin: bool,
|
|
|
|
) -> bool:
|
|
|
|
"""Intercept requests to deactivate a user. If `False` is returned, the
|
|
|
|
user should not be deactivated.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
requester
|
|
|
|
user_id: The ID of the room.
|
|
|
|
"""
|
|
|
|
for callback in self._check_can_deactivate_user_callbacks:
|
|
|
|
try:
|
2022-05-09 13:31:14 +02:00
|
|
|
can_deactivate_user = await delay_cancellation(
|
|
|
|
callback(user_id, by_admin)
|
|
|
|
)
|
|
|
|
if can_deactivate_user is False:
|
2022-03-09 19:23:57 +01:00
|
|
|
return False
|
2022-05-09 13:31:14 +02:00
|
|
|
except CancelledError:
|
|
|
|
raise
|
2022-03-09 19:23:57 +01:00
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|
|
|
|
return True
|
|
|
|
|
2020-10-05 15:57:46 +02:00
|
|
|
async def _get_state_map_for_room(self, room_id: str) -> StateMap[EventBase]:
|
|
|
|
"""Given a room ID, return the state events of that room.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room_id: The ID of the room.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A dict mapping (event type, state key) to state event.
|
|
|
|
"""
|
2022-07-07 10:14:32 +02:00
|
|
|
return await self._storage_controllers.state.get_current_state(room_id)
|
2022-03-01 16:00:03 +01:00
|
|
|
|
|
|
|
async def on_profile_update(
|
|
|
|
self, user_id: str, new_profile: ProfileInfo, by_admin: bool, deactivation: bool
|
|
|
|
) -> None:
|
|
|
|
"""Called after the global profile of a user has been updated. Does not include
|
|
|
|
per-room profile changes.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
user_id: The user whose profile was changed.
|
|
|
|
new_profile: The updated profile for the user.
|
|
|
|
by_admin: Whether the profile update was performed by a server admin.
|
|
|
|
deactivation: Whether this change was made while deactivating the user.
|
|
|
|
"""
|
|
|
|
for callback in self._on_profile_update_callbacks:
|
|
|
|
try:
|
|
|
|
await callback(user_id, new_profile, by_admin, deactivation)
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|
|
|
|
|
|
|
|
async def on_user_deactivation_status_changed(
|
|
|
|
self, user_id: str, deactivated: bool, by_admin: bool
|
|
|
|
) -> None:
|
|
|
|
"""Called after a user has been deactivated or reactivated.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
user_id: The deactivated user.
|
|
|
|
deactivated: Whether the user is now deactivated.
|
|
|
|
by_admin: Whether the deactivation was performed by a server admin.
|
|
|
|
"""
|
|
|
|
for callback in self._on_user_deactivation_status_changed_callbacks:
|
|
|
|
try:
|
|
|
|
await callback(user_id, deactivated, by_admin)
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|
2022-03-31 18:27:21 +02:00
|
|
|
|
|
|
|
async def on_threepid_bind(self, user_id: str, medium: str, address: str) -> None:
|
|
|
|
"""Called after a threepid association has been verified and stored.
|
|
|
|
|
|
|
|
Note that this callback is called when an association is created on the
|
|
|
|
local homeserver, not when it's created on an identity server (and then kept track
|
|
|
|
of so that it can be unbound on the same IS later on).
|
|
|
|
|
|
|
|
Args:
|
|
|
|
user_id: the user being associated with the threepid.
|
|
|
|
medium: the threepid's medium.
|
|
|
|
address: the threepid's address.
|
|
|
|
"""
|
|
|
|
for callback in self._on_threepid_bind_callbacks:
|
|
|
|
try:
|
|
|
|
await callback(user_id, medium, address)
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to run module API callback %s: %s", callback, e
|
|
|
|
)
|