2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2019-05-01 16:32:38 +02:00
|
|
|
# Copyright 2018-2019 New Vector Ltd
|
2021-01-11 22:43:58 +01:00
|
|
|
# Copyright 2020, 2021 The Matrix.org Foundation C.I.C.
|
|
|
|
|
2014-09-29 15:59:52 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
import logging
|
2019-03-01 04:05:47 +01:00
|
|
|
import platform
|
2021-11-29 23:19:45 +01:00
|
|
|
from http import HTTPStatus
|
2021-06-07 16:12:34 +02:00
|
|
|
from typing import TYPE_CHECKING, Optional, Tuple
|
2014-09-29 15:59:52 +02:00
|
|
|
|
2019-08-13 13:49:28 +02:00
|
|
|
from synapse.api.errors import Codes, NotFoundError, SynapseError
|
2021-06-07 16:12:34 +02:00
|
|
|
from synapse.http.server import HttpServer, JsonResource
|
2019-11-20 12:49:11 +01:00
|
|
|
from synapse.http.servlet import RestServlet, parse_json_object_from_request
|
2021-06-07 16:12:34 +02:00
|
|
|
from synapse.http.site import SynapseRequest
|
2020-11-25 22:26:11 +01:00
|
|
|
from synapse.rest.admin._base import admin_patterns, assert_requester_is_admin
|
2021-11-08 17:08:02 +01:00
|
|
|
from synapse.rest.admin.background_updates import (
|
|
|
|
BackgroundUpdateEnabledRestServlet,
|
|
|
|
BackgroundUpdateRestServlet,
|
2021-11-19 20:39:46 +01:00
|
|
|
BackgroundUpdateStartJobRestServlet,
|
2021-11-08 17:08:02 +01:00
|
|
|
)
|
2020-06-05 14:07:22 +02:00
|
|
|
from synapse.rest.admin.devices import (
|
|
|
|
DeleteDevicesRestServlet,
|
|
|
|
DeviceRestServlet,
|
|
|
|
DevicesRestServlet,
|
|
|
|
)
|
2020-10-26 19:16:37 +01:00
|
|
|
from synapse.rest.admin.event_reports import (
|
|
|
|
EventReportDetailRestServlet,
|
|
|
|
EventReportsRestServlet,
|
|
|
|
)
|
2023-04-28 20:33:45 +02:00
|
|
|
from synapse.rest.admin.experimental_features import ExperimentalFeaturesRestServlet
|
2021-12-06 17:59:50 +01:00
|
|
|
from synapse.rest.admin.federation import (
|
2022-01-25 17:11:40 +01:00
|
|
|
DestinationMembershipRestServlet,
|
2022-01-25 13:06:29 +01:00
|
|
|
DestinationResetConnectionRestServlet,
|
|
|
|
DestinationRestServlet,
|
2021-12-06 17:59:50 +01:00
|
|
|
ListDestinationsRestServlet,
|
|
|
|
)
|
2019-09-03 21:35:20 +02:00
|
|
|
from synapse.rest.admin.media import ListMediaInRoom, register_servlets_for_media_repo
|
2021-08-21 23:14:43 +02:00
|
|
|
from synapse.rest.admin.registration_tokens import (
|
|
|
|
ListRegistrationTokensRestServlet,
|
|
|
|
NewRegistrationTokenRestServlet,
|
|
|
|
RegistrationTokenRestServlet,
|
|
|
|
)
|
2020-03-27 20:16:43 +01:00
|
|
|
from synapse.rest.admin.rooms import (
|
2021-11-18 18:43:49 +01:00
|
|
|
BlockRoomRestServlet,
|
2021-11-12 13:35:31 +01:00
|
|
|
DeleteRoomStatusByDeleteIdRestServlet,
|
|
|
|
DeleteRoomStatusByRoomIdRestServlet,
|
2021-01-07 22:01:59 +01:00
|
|
|
ForwardExtremitiesRestServlet,
|
2020-03-27 20:16:43 +01:00
|
|
|
JoinRoomAliasServlet,
|
|
|
|
ListRoomRestServlet,
|
2020-12-18 16:37:19 +01:00
|
|
|
MakeRoomAdminRestServlet,
|
2021-01-18 15:02:22 +01:00
|
|
|
RoomEventContextServlet,
|
2020-07-16 22:43:23 +02:00
|
|
|
RoomMembersRestServlet,
|
2022-09-07 11:54:44 +02:00
|
|
|
RoomMessagesRestServlet,
|
2020-05-07 21:33:07 +02:00
|
|
|
RoomRestServlet,
|
2021-11-12 13:35:31 +01:00
|
|
|
RoomRestV2Servlet,
|
2021-02-02 12:16:29 +01:00
|
|
|
RoomStateRestServlet,
|
2022-09-07 11:54:44 +02:00
|
|
|
RoomTimestampToEventRestServlet,
|
2020-03-27 20:16:43 +01:00
|
|
|
)
|
2019-05-02 12:59:16 +02:00
|
|
|
from synapse.rest.admin.server_notice_servlet import SendServerNoticeServlet
|
2023-04-26 18:00:11 +02:00
|
|
|
from synapse.rest.admin.statistics import (
|
|
|
|
LargestRoomsStatistics,
|
|
|
|
UserMediaStatisticsRestServlet,
|
|
|
|
)
|
2021-08-17 11:52:38 +02:00
|
|
|
from synapse.rest.admin.username_available import UsernameAvailableRestServlet
|
2019-11-20 12:49:11 +01:00
|
|
|
from synapse.rest.admin.users import (
|
2022-01-05 12:49:06 +01:00
|
|
|
AccountDataRestServlet,
|
2019-11-20 12:49:11 +01:00
|
|
|
AccountValidityRenewServlet,
|
|
|
|
DeactivateAccountRestServlet,
|
2020-10-28 16:02:42 +01:00
|
|
|
PushersRestServlet,
|
2021-04-13 11:26:37 +02:00
|
|
|
RateLimitRestServlet,
|
2019-11-20 12:49:11 +01:00
|
|
|
ResetPasswordRestServlet,
|
|
|
|
SearchUsersRestServlet,
|
2021-01-25 20:49:39 +01:00
|
|
|
ShadowBanRestServlet,
|
2019-11-20 12:49:11 +01:00
|
|
|
UserAdminServlet,
|
2022-09-16 14:29:03 +02:00
|
|
|
UserByExternalId,
|
2022-11-11 16:38:17 +01:00
|
|
|
UserByThreePid,
|
2020-09-18 16:26:36 +02:00
|
|
|
UserMembershipRestServlet,
|
2019-11-20 12:49:11 +01:00
|
|
|
UserRegisterServlet,
|
2020-01-09 14:31:00 +01:00
|
|
|
UserRestServletV2,
|
2019-12-05 19:12:23 +01:00
|
|
|
UsersRestServletV2,
|
2020-11-17 11:51:25 +01:00
|
|
|
UserTokenRestServlet,
|
2019-11-20 12:49:11 +01:00
|
|
|
WhoisRestServlet,
|
|
|
|
)
|
2021-06-07 16:12:34 +02:00
|
|
|
from synapse.types import JsonDict, RoomStreamToken
|
2022-06-07 16:24:11 +02:00
|
|
|
from synapse.util import SYNAPSE_VERSION
|
2015-01-23 12:47:15 +01:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
2014-09-29 15:59:52 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2019-05-01 11:40:33 +02:00
|
|
|
class VersionServlet(RestServlet):
|
2020-09-17 13:04:15 +02:00
|
|
|
PATTERNS = admin_patterns("/server_version$")
|
2019-03-01 04:05:47 +01:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2019-05-07 10:29:30 +02:00
|
|
|
self.res = {
|
2022-06-07 16:24:11 +02:00
|
|
|
"server_version": SYNAPSE_VERSION,
|
2019-06-20 11:32:02 +02:00
|
|
|
"python_version": platform.python_version(),
|
2019-03-01 04:05:47 +01:00
|
|
|
}
|
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def on_GET(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2021-11-29 23:19:45 +01:00
|
|
|
return HTTPStatus.OK, self.res
|
2019-03-01 04:05:47 +01:00
|
|
|
|
|
|
|
|
2019-05-01 11:40:33 +02:00
|
|
|
class PurgeHistoryRestServlet(RestServlet):
|
2020-11-25 22:26:11 +01:00
|
|
|
PATTERNS = admin_patterns(
|
2021-12-08 17:59:40 +01:00
|
|
|
"/purge_history/(?P<room_id>[^/]*)(/(?P<event_id>[^/]*))?$"
|
2016-07-05 11:28:51 +02:00
|
|
|
)
|
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2018-07-18 16:22:02 +02:00
|
|
|
self.pagination_handler = hs.get_pagination_handler()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2019-05-01 11:40:33 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
async def on_POST(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_id: Optional[str]
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-11 13:05:27 +02:00
|
|
|
await assert_requester_is_admin(self.auth, request)
|
2016-07-05 11:28:51 +02:00
|
|
|
|
2018-02-08 19:44:52 +01:00
|
|
|
body = parse_json_object_from_request(request, allow_empty_body=True)
|
|
|
|
|
2018-02-13 14:04:41 +01:00
|
|
|
delete_local_events = bool(body.get("delete_local_events", False))
|
2018-02-08 19:44:52 +01:00
|
|
|
|
2018-03-02 00:20:54 +01:00
|
|
|
# establish the topological ordering we should keep events from. The
|
|
|
|
# user can provide an event_id in the URL or the request body, or can
|
|
|
|
# provide a timestamp in the request body.
|
|
|
|
if event_id is None:
|
2019-06-20 11:32:02 +02:00
|
|
|
event_id = body.get("purge_up_to_event_id")
|
2018-03-02 00:20:54 +01:00
|
|
|
|
|
|
|
if event_id is not None:
|
2019-10-11 13:05:27 +02:00
|
|
|
event = await self.store.get_event(event_id)
|
2018-03-02 00:20:54 +01:00
|
|
|
|
|
|
|
if event.room_id != room_id:
|
2021-11-29 23:19:45 +01:00
|
|
|
raise SynapseError(HTTPStatus.BAD_REQUEST, "Event is for wrong room.")
|
2018-03-02 00:20:54 +01:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
# RoomStreamToken expects [int] not Optional[int]
|
|
|
|
assert event.internal_metadata.stream_ordering is not None
|
2020-10-05 15:43:14 +02:00
|
|
|
room_token = RoomStreamToken(
|
|
|
|
event.depth, event.internal_metadata.stream_ordering
|
|
|
|
)
|
2020-09-30 21:29:19 +02:00
|
|
|
token = await room_token.to_string(self.store)
|
2018-05-15 17:06:30 +02:00
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
logger.info("[purge] purging up to token %s (event_id %s)", token, event_id)
|
|
|
|
elif "purge_up_to_ts" in body:
|
|
|
|
ts = body["purge_up_to_ts"]
|
Prefer `type(x) is int` to `isinstance(x, int)` (#14945)
* Perfer `type(x) is int` to `isinstance(x, int)`
This covered all additional instances I could see where `x` was
user-controlled.
The remaining cases are
```
$ rg -s 'isinstance.*[^_]int'
tests/replication/_base.py
576: if isinstance(obj, int):
synapse/util/caches/stream_change_cache.py
136: assert isinstance(stream_pos, int)
214: assert isinstance(stream_pos, int)
246: assert isinstance(stream_pos, int)
267: assert isinstance(stream_pos, int)
synapse/replication/tcp/external_cache.py
133: if isinstance(result, int):
synapse/metrics/__init__.py
100: if isinstance(calls, (int, float)):
synapse/handlers/appservice.py
262: assert isinstance(new_token, int)
synapse/config/_util.py
62: if isinstance(p, int):
```
which cover metrics, logic related to `jsonschema`, and replication and
data streams. AFAICS these are all internal to Synapse
* Changelog
2023-01-31 11:33:07 +01:00
|
|
|
if type(ts) is not int:
|
2018-03-02 00:20:54 +01:00
|
|
|
raise SynapseError(
|
2021-11-29 23:19:45 +01:00
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
"purge_up_to_ts must be an int",
|
|
|
|
errcode=Codes.BAD_JSON,
|
2018-03-02 00:20:54 +01:00
|
|
|
)
|
|
|
|
|
2019-10-11 13:05:27 +02:00
|
|
|
stream_ordering = await self.store.find_first_stream_ordering_after_ts(ts)
|
2018-03-02 00:20:54 +01:00
|
|
|
|
2020-01-16 21:24:17 +01:00
|
|
|
r = await self.store.get_room_event_before_stream_ordering(
|
2019-10-11 13:05:27 +02:00
|
|
|
room_id, stream_ordering
|
2018-03-02 00:20:54 +01:00
|
|
|
)
|
2018-06-07 01:15:49 +02:00
|
|
|
if not r:
|
2019-10-31 11:23:24 +01:00
|
|
|
logger.warning(
|
2018-04-30 14:29:48 +02:00
|
|
|
"[purge] purging events not possible: No event found "
|
|
|
|
"(received_ts %i => stream_ordering %i)",
|
2019-06-20 11:32:02 +02:00
|
|
|
ts,
|
|
|
|
stream_ordering,
|
2018-04-30 14:29:48 +02:00
|
|
|
)
|
|
|
|
raise SynapseError(
|
2021-11-29 23:19:45 +01:00
|
|
|
HTTPStatus.NOT_FOUND,
|
|
|
|
"there is no event to be purged",
|
|
|
|
errcode=Codes.NOT_FOUND,
|
2018-04-30 14:29:48 +02:00
|
|
|
)
|
2018-06-07 01:15:49 +02:00
|
|
|
(stream, topo, _event_id) = r
|
|
|
|
token = "t%d-%d" % (topo, stream)
|
2018-03-02 00:20:54 +01:00
|
|
|
logger.info(
|
2018-06-07 01:26:38 +02:00
|
|
|
"[purge] purging up to token %s (received_ts %i => "
|
2018-03-02 00:20:54 +01:00
|
|
|
"stream_ordering %i)",
|
2019-06-20 11:32:02 +02:00
|
|
|
token,
|
|
|
|
ts,
|
|
|
|
stream_ordering,
|
2018-03-02 00:20:54 +01:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
raise SynapseError(
|
2021-11-29 23:19:45 +01:00
|
|
|
HTTPStatus.BAD_REQUEST,
|
2018-03-02 00:20:54 +01:00
|
|
|
"must specify purge_up_to_event_id or purge_up_to_ts",
|
|
|
|
errcode=Codes.BAD_JSON,
|
|
|
|
)
|
|
|
|
|
2019-10-11 16:26:09 +02:00
|
|
|
purge_id = self.pagination_handler.start_purge_history(
|
2019-06-20 11:32:02 +02:00
|
|
|
room_id, token, delete_local_events=delete_local_events
|
2018-02-08 19:44:52 +01:00
|
|
|
)
|
2016-07-05 11:28:51 +02:00
|
|
|
|
2021-11-29 23:19:45 +01:00
|
|
|
return HTTPStatus.OK, {"purge_id": purge_id}
|
2018-03-08 12:47:28 +01:00
|
|
|
|
|
|
|
|
2019-05-01 11:40:33 +02:00
|
|
|
class PurgeHistoryStatusRestServlet(RestServlet):
|
2021-12-08 17:59:40 +01:00
|
|
|
PATTERNS = admin_patterns("/purge_history_status/(?P<purge_id>[^/]*)$")
|
2018-03-08 12:47:28 +01:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2018-07-18 16:22:02 +02:00
|
|
|
self.pagination_handler = hs.get_pagination_handler()
|
2019-05-01 11:40:33 +02:00
|
|
|
self.auth = hs.get_auth()
|
2018-03-08 12:47:28 +01:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, purge_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-11 13:05:27 +02:00
|
|
|
await assert_requester_is_admin(self.auth, request)
|
2018-03-08 12:47:28 +01:00
|
|
|
|
2018-07-18 16:22:02 +02:00
|
|
|
purge_status = self.pagination_handler.get_purge_status(purge_id)
|
2018-03-08 12:47:28 +01:00
|
|
|
if purge_status is None:
|
|
|
|
raise NotFoundError("purge id '%s' not found" % purge_id)
|
|
|
|
|
2021-11-29 23:19:45 +01:00
|
|
|
return HTTPStatus.OK, purge_status.asdict()
|
2016-07-05 11:28:51 +02:00
|
|
|
|
|
|
|
|
2019-05-02 12:59:16 +02:00
|
|
|
########################################################################################
|
|
|
|
#
|
|
|
|
# please don't add more servlets here: this file is already long and unwieldy. Put
|
|
|
|
# them in separate files within the 'admin' package.
|
|
|
|
#
|
|
|
|
########################################################################################
|
|
|
|
|
2019-04-16 21:13:59 +02:00
|
|
|
|
2019-05-01 16:18:58 +02:00
|
|
|
class AdminRestResource(JsonResource):
|
|
|
|
"""The REST resource which gets mounted at /_synapse/admin"""
|
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2019-05-01 16:18:58 +02:00
|
|
|
JsonResource.__init__(self, hs, canonical_json=False)
|
2019-05-29 17:47:16 +02:00
|
|
|
register_servlets(hs, self)
|
2019-05-02 12:59:16 +02:00
|
|
|
|
2019-05-29 17:47:16 +02:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
|
2019-05-29 17:47:16 +02:00
|
|
|
"""
|
|
|
|
Register all the admin servlets.
|
|
|
|
"""
|
2022-11-22 20:08:04 +01:00
|
|
|
# Admin servlets aren't registered on workers.
|
|
|
|
if hs.config.worker.worker_app is not None:
|
|
|
|
return
|
|
|
|
|
2019-05-29 17:47:16 +02:00
|
|
|
register_servlets_for_client_rest_resource(hs, http_server)
|
2021-11-18 18:43:49 +01:00
|
|
|
BlockRoomRestServlet(hs).register(http_server)
|
2020-01-22 14:36:43 +01:00
|
|
|
ListRoomRestServlet(hs).register(http_server)
|
2021-02-02 12:16:29 +01:00
|
|
|
RoomStateRestServlet(hs).register(http_server)
|
2020-05-07 21:33:07 +02:00
|
|
|
RoomRestServlet(hs).register(http_server)
|
2021-11-12 13:35:31 +01:00
|
|
|
RoomRestV2Servlet(hs).register(http_server)
|
2020-07-16 22:43:23 +02:00
|
|
|
RoomMembersRestServlet(hs).register(http_server)
|
2021-11-12 13:35:31 +01:00
|
|
|
DeleteRoomStatusByDeleteIdRestServlet(hs).register(http_server)
|
|
|
|
DeleteRoomStatusByRoomIdRestServlet(hs).register(http_server)
|
2020-03-27 20:16:43 +01:00
|
|
|
JoinRoomAliasServlet(hs).register(http_server)
|
2019-05-29 17:47:16 +02:00
|
|
|
VersionServlet(hs).register(http_server)
|
2023-05-10 18:05:06 +02:00
|
|
|
if not hs.config.experimental.msc3861.enabled:
|
|
|
|
UserAdminServlet(hs).register(http_server)
|
2020-09-18 16:26:36 +02:00
|
|
|
UserMembershipRestServlet(hs).register(http_server)
|
2023-05-10 18:05:06 +02:00
|
|
|
if not hs.config.experimental.msc3861.enabled:
|
|
|
|
UserTokenRestServlet(hs).register(http_server)
|
2020-01-09 14:31:00 +01:00
|
|
|
UserRestServletV2(hs).register(http_server)
|
2019-12-05 19:12:23 +01:00
|
|
|
UsersRestServletV2(hs).register(http_server)
|
2020-11-05 19:59:12 +01:00
|
|
|
UserMediaStatisticsRestServlet(hs).register(http_server)
|
2023-04-26 18:00:11 +02:00
|
|
|
LargestRoomsStatistics(hs).register(http_server)
|
2020-10-26 19:16:37 +01:00
|
|
|
EventReportDetailRestServlet(hs).register(http_server)
|
2020-10-28 16:02:42 +01:00
|
|
|
EventReportsRestServlet(hs).register(http_server)
|
2022-01-05 12:49:06 +01:00
|
|
|
AccountDataRestServlet(hs).register(http_server)
|
2020-10-28 16:02:42 +01:00
|
|
|
PushersRestServlet(hs).register(http_server)
|
2020-12-18 16:37:19 +01:00
|
|
|
MakeRoomAdminRestServlet(hs).register(http_server)
|
2021-01-25 20:49:39 +01:00
|
|
|
ShadowBanRestServlet(hs).register(http_server)
|
2021-01-07 22:01:59 +01:00
|
|
|
ForwardExtremitiesRestServlet(hs).register(http_server)
|
2021-01-18 15:02:22 +01:00
|
|
|
RoomEventContextServlet(hs).register(http_server)
|
2021-04-13 11:26:37 +02:00
|
|
|
RateLimitRestServlet(hs).register(http_server)
|
2021-08-17 11:52:38 +02:00
|
|
|
UsernameAvailableRestServlet(hs).register(http_server)
|
2023-05-10 18:05:06 +02:00
|
|
|
if not hs.config.experimental.msc3861.enabled:
|
|
|
|
ListRegistrationTokensRestServlet(hs).register(http_server)
|
|
|
|
NewRegistrationTokenRestServlet(hs).register(http_server)
|
|
|
|
RegistrationTokenRestServlet(hs).register(http_server)
|
2022-01-25 17:11:40 +01:00
|
|
|
DestinationMembershipRestServlet(hs).register(http_server)
|
2022-01-25 13:06:29 +01:00
|
|
|
DestinationResetConnectionRestServlet(hs).register(http_server)
|
|
|
|
DestinationRestServlet(hs).register(http_server)
|
2021-12-06 17:59:50 +01:00
|
|
|
ListDestinationsRestServlet(hs).register(http_server)
|
2022-09-07 11:54:44 +02:00
|
|
|
RoomMessagesRestServlet(hs).register(http_server)
|
|
|
|
RoomTimestampToEventRestServlet(hs).register(http_server)
|
2022-09-16 14:29:03 +02:00
|
|
|
UserByExternalId(hs).register(http_server)
|
2022-11-11 16:38:17 +01:00
|
|
|
UserByThreePid(hs).register(http_server)
|
2019-05-01 16:18:58 +02:00
|
|
|
|
2022-11-22 20:08:04 +01:00
|
|
|
DeviceRestServlet(hs).register(http_server)
|
|
|
|
DevicesRestServlet(hs).register(http_server)
|
|
|
|
DeleteDevicesRestServlet(hs).register(http_server)
|
|
|
|
SendServerNoticeServlet(hs).register(http_server)
|
|
|
|
BackgroundUpdateEnabledRestServlet(hs).register(http_server)
|
|
|
|
BackgroundUpdateRestServlet(hs).register(http_server)
|
|
|
|
BackgroundUpdateStartJobRestServlet(hs).register(http_server)
|
2023-04-28 20:33:45 +02:00
|
|
|
ExperimentalFeaturesRestServlet(hs).register(http_server)
|
2021-08-27 11:16:40 +02:00
|
|
|
|
2019-05-01 16:18:58 +02:00
|
|
|
|
2021-06-07 16:12:34 +02:00
|
|
|
def register_servlets_for_client_rest_resource(
|
|
|
|
hs: "HomeServer", http_server: HttpServer
|
|
|
|
) -> None:
|
2019-05-02 12:59:16 +02:00
|
|
|
"""Register only the servlets which need to be exposed on /_matrix/client/xxx"""
|
2014-09-29 15:59:52 +02:00
|
|
|
WhoisRestServlet(hs).register(http_server)
|
2018-03-08 12:47:28 +01:00
|
|
|
PurgeHistoryStatusRestServlet(hs).register(http_server)
|
2016-07-06 16:56:59 +02:00
|
|
|
PurgeHistoryRestServlet(hs).register(http_server)
|
2022-11-22 20:08:04 +01:00
|
|
|
# The following resources can only be run on the main process.
|
|
|
|
if hs.config.worker.worker_app is None:
|
|
|
|
DeactivateAccountRestServlet(hs).register(http_server)
|
2023-05-10 18:05:06 +02:00
|
|
|
if not hs.config.experimental.msc3861.enabled:
|
|
|
|
ResetPasswordRestServlet(hs).register(http_server)
|
2017-02-02 14:02:26 +01:00
|
|
|
SearchUsersRestServlet(hs).register(http_server)
|
2023-05-10 18:05:06 +02:00
|
|
|
if not hs.config.experimental.msc3861.enabled:
|
|
|
|
UserRegisterServlet(hs).register(http_server)
|
|
|
|
AccountValidityRenewServlet(hs).register(http_server)
|
2019-08-13 13:49:28 +02:00
|
|
|
|
2019-09-03 21:35:20 +02:00
|
|
|
# Load the media repo ones if we're using them. Otherwise load the servlets which
|
|
|
|
# don't need a media repo (typically readonly admin APIs).
|
2021-09-24 13:25:21 +02:00
|
|
|
if hs.config.media.can_load_media_repo:
|
2019-08-13 13:49:28 +02:00
|
|
|
register_servlets_for_media_repo(hs, http_server)
|
2019-09-03 21:35:20 +02:00
|
|
|
else:
|
|
|
|
ListMediaInRoom(hs).register(http_server)
|
2019-08-13 13:49:28 +02:00
|
|
|
|
2019-05-02 12:59:16 +02:00
|
|
|
# don't add more things here: new servlets should only be exposed on
|
|
|
|
# /_synapse/admin so should not go here. Instead register them in AdminRestResource.
|