2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-02-06 17:40:38 +01:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 16:10:52 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-13 04:14:34 +02:00
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
""" This module contains REST servlets to do with rooms: /rooms/<paths> """
|
2018-07-09 08:09:20 +02:00
|
|
|
import logging
|
2020-02-19 11:40:27 +01:00
|
|
|
import re
|
2022-08-18 21:15:53 +02:00
|
|
|
from enum import Enum
|
2022-08-31 14:10:25 +02:00
|
|
|
from http import HTTPStatus
|
2021-08-31 19:22:29 +02:00
|
|
|
from typing import TYPE_CHECKING, Awaitable, Dict, List, Optional, Tuple
|
2020-06-16 14:51:47 +02:00
|
|
|
from urllib import parse as urlparse
|
2018-07-09 08:09:20 +02:00
|
|
|
|
2022-08-17 11:19:21 +02:00
|
|
|
from prometheus_client.core import Histogram
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
from twisted.web.server import Request
|
|
|
|
|
2022-04-20 13:57:39 +02:00
|
|
|
from synapse import event_auth
|
2023-02-01 22:35:24 +01:00
|
|
|
from synapse.api.constants import Direction, EventTypes, Membership
|
2019-07-11 12:06:23 +02:00
|
|
|
from synapse.api.errors import (
|
|
|
|
AuthError,
|
|
|
|
Codes,
|
|
|
|
InvalidClientCredentialsError,
|
2021-08-16 16:49:12 +02:00
|
|
|
MissingClientTokenError,
|
2020-08-20 21:07:42 +02:00
|
|
|
ShadowBanError,
|
2019-07-11 12:06:23 +02:00
|
|
|
SynapseError,
|
2022-04-20 13:57:39 +02:00
|
|
|
UnredactedContentDeletedError,
|
2019-07-11 12:06:23 +02:00
|
|
|
)
|
2016-07-14 16:59:25 +02:00
|
|
|
from synapse.api.filtering import Filter
|
2023-03-06 17:08:39 +01:00
|
|
|
from synapse.events.utils import SerializeEventConfig, format_event_for_client_v2
|
2022-08-31 13:16:05 +02:00
|
|
|
from synapse.http.server import HttpServer
|
2016-09-15 11:15:37 +02:00
|
|
|
from synapse.http.servlet import (
|
2021-08-16 16:49:12 +02:00
|
|
|
ResolveRoomIdMixin,
|
2019-06-03 13:28:59 +02:00
|
|
|
RestServlet,
|
2018-07-13 21:53:01 +02:00
|
|
|
assert_params_in_dict,
|
2021-03-18 19:24:16 +01:00
|
|
|
parse_boolean,
|
2023-02-01 22:35:24 +01:00
|
|
|
parse_enum,
|
2018-07-09 08:09:20 +02:00
|
|
|
parse_integer,
|
|
|
|
parse_json_object_from_request,
|
|
|
|
parse_string,
|
2021-06-09 20:39:51 +02:00
|
|
|
parse_strings_from_args,
|
2016-09-15 11:15:37 +02:00
|
|
|
)
|
2021-03-19 13:20:11 +01:00
|
|
|
from synapse.http.site import SynapseRequest
|
2022-08-18 21:15:53 +02:00
|
|
|
from synapse.logging.context import make_deferred_yieldable, run_in_background
|
2019-09-25 12:59:05 +02:00
|
|
|
from synapse.logging.opentracing import set_tag
|
2022-11-03 17:21:31 +01:00
|
|
|
from synapse.metrics.background_process_metrics import run_as_background_process
|
2021-08-17 13:57:58 +02:00
|
|
|
from synapse.rest.client._base import client_patterns
|
2019-06-03 13:28:59 +02:00
|
|
|
from synapse.rest.client.transactions import HttpTransactionCache
|
2018-07-09 08:09:20 +02:00
|
|
|
from synapse.streams.config import PaginationConfig
|
2023-03-07 17:05:22 +01:00
|
|
|
from synapse.types import JsonDict, Requester, StreamToken, ThirdPartyInstanceID, UserID
|
2022-12-12 17:19:30 +01:00
|
|
|
from synapse.types.state import StateFilter
|
2020-08-19 13:26:03 +02:00
|
|
|
from synapse.util import json_decoder
|
2022-08-31 13:16:05 +02:00
|
|
|
from synapse.util.cancellation import cancellable
|
2021-01-20 14:15:14 +01:00
|
|
|
from synapse.util.stringutils import parse_and_validate_server_name, random_string
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-11-17 15:09:40 +01:00
|
|
|
if TYPE_CHECKING:
|
2021-03-23 12:12:48 +01:00
|
|
|
from synapse.server import HomeServer
|
2020-02-18 17:23:25 +01:00
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2022-08-18 21:15:53 +02:00
|
|
|
|
|
|
|
class _RoomSize(Enum):
|
|
|
|
"""
|
|
|
|
Enum to differentiate sizes of rooms. This is a pretty good approximation
|
|
|
|
about how hard it will be to get events in the room. We could also look at
|
|
|
|
room "complexity".
|
|
|
|
"""
|
|
|
|
|
|
|
|
# This doesn't necessarily mean the room is a DM, just that there is a DM
|
|
|
|
# amount of people there.
|
|
|
|
DM_SIZE = "direct_message_size"
|
|
|
|
SMALL = "small"
|
|
|
|
SUBSTANTIAL = "substantial"
|
|
|
|
LARGE = "large"
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def from_member_count(member_count: int) -> "_RoomSize":
|
|
|
|
if member_count <= 2:
|
|
|
|
return _RoomSize.DM_SIZE
|
|
|
|
elif member_count < 100:
|
|
|
|
return _RoomSize.SMALL
|
|
|
|
elif member_count < 1000:
|
|
|
|
return _RoomSize.SUBSTANTIAL
|
|
|
|
else:
|
|
|
|
return _RoomSize.LARGE
|
|
|
|
|
|
|
|
|
2022-08-17 11:19:21 +02:00
|
|
|
# This is an extra metric on top of `synapse_http_server_response_time_seconds`
|
|
|
|
# which times the same sort of thing but this one allows us to see values
|
|
|
|
# greater than 10s. We use a separate dedicated histogram with its own buckets
|
|
|
|
# so that we don't increase the cardinality of the general one because it's
|
|
|
|
# multiplied across hundreds of servlets.
|
|
|
|
messsages_response_timer = Histogram(
|
|
|
|
"synapse_room_message_list_rest_servlet_response_time_seconds",
|
|
|
|
"sec",
|
2022-08-18 21:15:53 +02:00
|
|
|
# We have a label for room size so we can try to see a more realistic
|
|
|
|
# picture of /messages response time for bigger rooms. We don't want the
|
|
|
|
# tiny rooms that can always respond fast skewing our results when we're trying
|
|
|
|
# to optimize the bigger cases.
|
|
|
|
["room_size"],
|
2022-08-17 11:19:21 +02:00
|
|
|
buckets=(
|
|
|
|
0.005,
|
|
|
|
0.01,
|
|
|
|
0.025,
|
|
|
|
0.05,
|
|
|
|
0.1,
|
|
|
|
0.25,
|
|
|
|
0.5,
|
|
|
|
1.0,
|
|
|
|
2.5,
|
|
|
|
5.0,
|
|
|
|
10.0,
|
2022-08-23 09:47:30 +02:00
|
|
|
20.0,
|
2022-08-17 11:19:21 +02:00
|
|
|
30.0,
|
|
|
|
60.0,
|
2022-08-23 09:47:30 +02:00
|
|
|
80.0,
|
|
|
|
100.0,
|
2022-08-17 11:19:21 +02:00
|
|
|
120.0,
|
2022-08-23 09:47:30 +02:00
|
|
|
150.0,
|
2022-08-17 11:19:21 +02:00
|
|
|
180.0,
|
|
|
|
"+Inf",
|
|
|
|
),
|
|
|
|
)
|
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class TransactionRestServlet(RestServlet):
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.txns = HttpTransactionCache(hs)
|
|
|
|
|
|
|
|
|
|
|
|
class RoomCreateRestServlet(TransactionRestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2018-05-17 10:01:09 +02:00
|
|
|
self._room_creation_handler = hs.get_room_creation_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2015-12-01 18:34:32 +01:00
|
|
|
PATTERNS = "/createRoom"
|
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request, requester, self._do, request, requester
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self._do(request, requester)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(
|
|
|
|
self, request: SynapseRequest, requester: Requester
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2023-02-22 12:07:28 +01:00
|
|
|
room_id, _, _ = await self._room_creation_handler.create_room(
|
2016-02-15 19:13:10 +01:00
|
|
|
requester, self.get_room_config(request)
|
2014-08-12 16:10:52 +02:00
|
|
|
)
|
2016-02-15 19:13:10 +01:00
|
|
|
|
2023-02-22 12:07:28 +01:00
|
|
|
return 200, {"room_id": room_id}
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def get_room_config(self, request: Request) -> JsonDict:
|
2016-03-11 17:41:03 +01:00
|
|
|
user_supplied_config = parse_json_object_from_request(request)
|
|
|
|
return user_supplied_config
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2014-08-26 18:54:18 +02:00
|
|
|
# TODO: Needs unit testing for generic events
|
2023-03-07 17:05:22 +01:00
|
|
|
class RoomStateEventRestServlet(RestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Event sending requests"
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2023-03-07 17:05:22 +01:00
|
|
|
super().__init__()
|
2019-01-18 16:27:11 +01:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2018-03-01 11:54:37 +01:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2018-07-18 16:22:02 +02:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2022-05-18 12:28:14 +02:00
|
|
|
# /rooms/$roomid/state/$eventtype
|
2014-08-22 16:59:15 +02:00
|
|
|
no_state_key = "/rooms/(?P<room_id>[^/]*)/state/(?P<event_type>[^/]*)$"
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2022-05-18 12:28:14 +02:00
|
|
|
# /rooms/$roomid/state/$eventtype/$statekey
|
2019-06-20 11:32:02 +02:00
|
|
|
state_key = (
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/state/"
|
|
|
|
"(?P<event_type>[^/]*)/(?P<state_key>[^/]*)$"
|
|
|
|
)
|
|
|
|
|
|
|
|
http_server.register_paths(
|
2019-07-24 14:07:35 +02:00
|
|
|
"GET",
|
|
|
|
client_patterns(state_key, v1=True),
|
|
|
|
self.on_GET,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 11:32:02 +02:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 14:07:35 +02:00
|
|
|
"PUT",
|
|
|
|
client_patterns(state_key, v1=True),
|
|
|
|
self.on_PUT,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 11:32:02 +02:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 14:07:35 +02:00
|
|
|
"GET",
|
|
|
|
client_patterns(no_state_key, v1=True),
|
|
|
|
self.on_GET_no_state_key,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 11:32:02 +02:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 14:07:35 +02:00
|
|
|
"PUT",
|
|
|
|
client_patterns(no_state_key, v1=True),
|
|
|
|
self.on_PUT_no_state_key,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 11:32:02 +02:00
|
|
|
)
|
2014-08-22 16:59:15 +02:00
|
|
|
|
2022-05-11 18:22:34 +02:00
|
|
|
@cancellable
|
2021-08-31 19:22:29 +02:00
|
|
|
def on_GET_no_state_key(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_type: str
|
|
|
|
) -> Awaitable[Tuple[int, JsonDict]]:
|
2014-12-10 15:49:52 +01:00
|
|
|
return self.on_GET(request, room_id, event_type, "")
|
2014-08-22 16:59:15 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def on_PUT_no_state_key(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_type: str
|
|
|
|
) -> Awaitable[Tuple[int, JsonDict]]:
|
2014-12-10 15:49:52 +01:00
|
|
|
return self.on_PUT(request, room_id, event_type, "")
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2022-05-11 18:22:34 +02:00
|
|
|
@cancellable
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_type: str, state_key: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-06-20 11:32:02 +02:00
|
|
|
format = parse_string(
|
|
|
|
request, "format", default="content", allowed_values=["content", "event"]
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2018-07-18 16:22:02 +02:00
|
|
|
msg_handler = self.message_handler
|
2019-10-29 14:09:24 +01:00
|
|
|
data = await msg_handler.get_room_data(
|
2022-08-22 15:17:59 +02:00
|
|
|
requester=requester,
|
2014-12-12 16:05:37 +01:00
|
|
|
room_id=room_id,
|
|
|
|
event_type=event_type,
|
|
|
|
state_key=state_key,
|
2014-08-12 16:10:52 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
if not data:
|
2019-06-20 11:32:02 +02:00
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2016-09-09 15:34:29 +02:00
|
|
|
|
|
|
|
if format == "event":
|
2016-09-09 15:40:15 +02:00
|
|
|
event = format_event_for_client_v2(data.get_dict())
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, event
|
2016-09-09 15:34:29 +02:00
|
|
|
elif format == "content":
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, data.get_dict()["content"]
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
# Format must be event or content, per the parse_string call above.
|
|
|
|
raise RuntimeError(f"Unknown format: {format:r}.")
|
|
|
|
|
|
|
|
async def on_PUT(
|
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
room_id: str,
|
|
|
|
event_type: str,
|
|
|
|
state_key: str,
|
|
|
|
txn_id: Optional[str] = None,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2021-12-09 12:02:05 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2019-09-25 12:39:15 +02:00
|
|
|
if txn_id:
|
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-03-09 12:26:26 +01:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2022-10-03 15:30:45 +02:00
|
|
|
origin_server_ts = None
|
|
|
|
if requester.app_service:
|
|
|
|
origin_server_ts = parse_integer(request, "ts")
|
2014-12-10 15:02:48 +01:00
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
try:
|
|
|
|
if event_type == EventTypes.Member:
|
2020-08-20 21:07:42 +02:00
|
|
|
membership = content.get("membership", None)
|
|
|
|
event_id, _ = await self.room_member_handler.update_membership(
|
|
|
|
requester,
|
|
|
|
target=UserID.from_string(state_key),
|
|
|
|
room_id=room_id,
|
|
|
|
action=membership,
|
|
|
|
content=content,
|
2022-10-03 15:30:45 +02:00
|
|
|
origin_server_ts=origin_server_ts,
|
2020-08-20 21:07:42 +02:00
|
|
|
)
|
2020-08-24 19:58:56 +02:00
|
|
|
else:
|
2022-10-03 15:30:45 +02:00
|
|
|
event_dict: JsonDict = {
|
|
|
|
"type": event_type,
|
|
|
|
"content": content,
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": requester.user.to_string(),
|
|
|
|
}
|
|
|
|
|
|
|
|
if state_key is not None:
|
|
|
|
event_dict["state_key"] = state_key
|
|
|
|
|
|
|
|
if origin_server_ts is not None:
|
|
|
|
event_dict["origin_server_ts"] = origin_server_ts
|
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
|
|
|
requester, event_dict, txn_id=txn_id
|
|
|
|
)
|
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2017-01-09 19:25:13 +01:00
|
|
|
|
2020-07-09 14:01:42 +02:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
ret = {"event_id": event_id}
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, ret
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2014-08-26 18:54:18 +02:00
|
|
|
# TODO: Needs unit testing for generic events + feedback
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomSendEventRestServlet(TransactionRestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Event sending requests"
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2019-01-18 16:27:11 +01:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2014-08-26 18:00:24 +02:00
|
|
|
# /rooms/$roomid/send/$event_type[/$txn_id]
|
2019-06-20 11:32:02 +02:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/send/(?P<event_type>[^/]*)"
|
2023-03-07 17:05:22 +01:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(
|
2021-08-31 19:22:29 +02:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
2023-03-07 17:05:22 +01:00
|
|
|
requester: Requester,
|
2021-08-31 19:22:29 +02:00
|
|
|
room_id: str,
|
|
|
|
event_type: str,
|
2023-03-07 17:05:22 +01:00
|
|
|
txn_id: Optional[str],
|
2021-08-31 19:22:29 +02:00
|
|
|
) -> Tuple[int, JsonDict]:
|
2016-03-09 12:26:26 +01:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
event_dict: JsonDict = {
|
2018-01-23 09:59:06 +01:00
|
|
|
"type": event_type,
|
|
|
|
"content": content,
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": requester.user.to_string(),
|
|
|
|
}
|
|
|
|
|
2022-10-03 15:30:45 +02:00
|
|
|
if requester.app_service:
|
|
|
|
origin_server_ts = parse_integer(request, "ts")
|
|
|
|
if origin_server_ts is not None:
|
|
|
|
event_dict["origin_server_ts"] = origin_server_ts
|
2018-01-23 09:59:06 +01:00
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
try:
|
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
|
|
|
requester, event_dict, txn_id=txn_id
|
|
|
|
)
|
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
return 200, {"event_id": event_id}
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_POST(
|
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
room_id: str,
|
|
|
|
event_type: str,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
|
|
|
return await self._do(request, requester, room_id, event_type, None)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, room_id: str, event_type: str, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request,
|
|
|
|
requester,
|
|
|
|
self._do,
|
|
|
|
request,
|
|
|
|
requester,
|
|
|
|
room_id,
|
|
|
|
event_type,
|
|
|
|
txn_id,
|
2016-11-11 16:02:29 +01:00
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2014-08-27 10:43:42 +02:00
|
|
|
# TODO: Needs unit testing for room ID + alias joins
|
2021-08-16 16:49:12 +02:00
|
|
|
class JoinRoomAliasServlet(ResolveRoomIdMixin, TransactionRestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Event sending requests"
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2021-08-16 16:49:12 +02:00
|
|
|
super(ResolveRoomIdMixin, self).__init__(hs) # ensure the Mixin is set up
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-02-12 17:17:24 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2016-02-12 17:17:24 +01:00
|
|
|
# /join/$room_identifier[/$txn_id]
|
2019-06-20 11:32:02 +02:00
|
|
|
PATTERNS = "/join/(?P<room_identifier>[^/]*)"
|
2016-02-12 17:17:24 +01:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(
|
2021-06-09 20:39:51 +02:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
2023-03-07 17:05:22 +01:00
|
|
|
requester: Requester,
|
2021-06-09 20:39:51 +02:00
|
|
|
room_identifier: str,
|
2023-03-07 17:05:22 +01:00
|
|
|
txn_id: Optional[str],
|
2021-08-31 19:22:29 +02:00
|
|
|
) -> Tuple[int, JsonDict]:
|
2022-12-05 12:30:41 +01:00
|
|
|
content = parse_json_object_from_request(request, allow_empty_body=True)
|
2016-02-23 16:11:25 +01:00
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
# twisted.web.server.Request.args is incorrectly defined as Optional[Any]
|
|
|
|
args: Dict[bytes, List[bytes]] = request.args # type: ignore
|
|
|
|
remote_room_hosts = parse_strings_from_args(args, "server_name", required=False)
|
|
|
|
room_id, remote_room_hosts = await self.resolve_room_id(
|
|
|
|
room_identifier,
|
|
|
|
remote_room_hosts,
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
await self.room_member_handler.update_membership(
|
2016-02-15 17:16:03 +01:00
|
|
|
requester=requester,
|
|
|
|
target=requester.user,
|
|
|
|
room_id=room_id,
|
|
|
|
action="join",
|
2016-02-15 16:39:16 +01:00
|
|
|
txn_id=txn_id,
|
2016-02-17 16:50:13 +01:00
|
|
|
remote_room_hosts=remote_room_hosts,
|
2016-08-23 17:32:04 +02:00
|
|
|
content=content,
|
2016-02-23 16:11:25 +01:00
|
|
|
third_party_signed=content.get("third_party_signed", None),
|
2016-02-15 16:39:16 +01:00
|
|
|
)
|
2016-02-12 17:17:24 +01:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {"room_id": room_id}
|
2016-02-12 17:17:24 +01:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_POST(
|
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
room_identifier: str,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
|
|
|
return await self._do(request, requester, room_identifier, None)
|
|
|
|
|
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, room_identifier: str, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request, requester, self._do, request, requester, room_identifier, txn_id
|
2016-11-11 18:47:03 +01:00
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2014-08-27 15:51:59 +02:00
|
|
|
# TODO: Needs unit testing
|
2023-03-07 17:05:22 +01:00
|
|
|
class PublicRoomListRestServlet(RestServlet):
|
2019-06-03 13:28:59 +02:00
|
|
|
PATTERNS = client_patterns("/publicRooms$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2019-06-03 13:28:59 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2023-03-07 17:05:22 +01:00
|
|
|
super().__init__()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.hs = hs
|
|
|
|
self.auth = hs.get_auth()
|
2014-08-27 15:51:59 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2021-07-21 15:47:56 +02:00
|
|
|
server = parse_string(request, "server")
|
2016-09-08 12:53:05 +02:00
|
|
|
|
2016-06-08 15:23:15 +02:00
|
|
|
try:
|
2019-10-29 14:09:24 +01:00
|
|
|
await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-07-11 12:06:23 +02:00
|
|
|
except InvalidClientCredentialsError as e:
|
2019-05-08 19:26:56 +02:00
|
|
|
# Option to allow servers to require auth when accessing
|
|
|
|
# /publicRooms via CS API. This is especially helpful in private
|
|
|
|
# federations.
|
2021-09-29 12:44:15 +02:00
|
|
|
if not self.hs.config.server.allow_public_rooms_without_auth:
|
2019-05-08 19:26:56 +02:00
|
|
|
raise
|
|
|
|
|
2016-09-08 12:53:05 +02:00
|
|
|
# We allow people to not be authed if they're just looking at our
|
|
|
|
# room list, but require auth when we proxy the request.
|
|
|
|
# In both cases we call the auth function, as that has the side
|
|
|
|
# effect of logging who issued this request if an access token was
|
|
|
|
# provided.
|
|
|
|
if server:
|
|
|
|
raise e
|
2016-06-08 15:23:15 +02:00
|
|
|
|
2021-07-21 20:12:22 +02:00
|
|
|
limit: Optional[int] = parse_integer(request, "limit", 0)
|
2021-07-21 15:47:56 +02:00
|
|
|
since_token = parse_string(request, "since")
|
2016-09-15 11:15:37 +02:00
|
|
|
|
2019-10-02 15:08:35 +02:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2016-05-31 12:05:16 +02:00
|
|
|
handler = self.hs.get_room_list_handler()
|
2023-05-05 16:06:22 +02:00
|
|
|
if server and not self.hs.is_mine_server_name(server):
|
2021-01-19 20:21:59 +01:00
|
|
|
# Ensure the server is valid.
|
|
|
|
try:
|
|
|
|
parse_and_validate_server_name(server)
|
|
|
|
except ValueError:
|
|
|
|
raise SynapseError(
|
2021-02-16 23:32:34 +01:00
|
|
|
400,
|
|
|
|
"Invalid server name: %s" % (server,),
|
|
|
|
Codes.INVALID_PARAM,
|
2021-01-19 20:21:59 +01:00
|
|
|
)
|
|
|
|
|
2021-08-06 15:05:41 +02:00
|
|
|
data = await handler.get_remote_public_room_list(
|
|
|
|
server, limit=limit, since_token=since_token
|
|
|
|
)
|
2016-09-08 12:53:05 +02:00
|
|
|
else:
|
2019-10-29 14:09:24 +01:00
|
|
|
data = await handler.get_local_public_room_list(
|
2019-06-20 11:32:02 +02:00
|
|
|
limit=limit, since_token=since_token
|
2016-09-15 11:15:37 +02:00
|
|
|
)
|
2016-05-31 18:20:07 +02:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, data
|
2014-08-27 15:51:59 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
await self.auth.get_user_by_req(request, allow_guest=True)
|
2016-09-15 18:35:20 +02:00
|
|
|
|
2021-07-21 15:47:56 +02:00
|
|
|
server = parse_string(request, "server")
|
2016-09-15 18:35:20 +02:00
|
|
|
content = parse_json_object_from_request(request)
|
|
|
|
|
2021-07-16 19:22:36 +02:00
|
|
|
limit: Optional[int] = int(content.get("limit", 100))
|
2016-09-15 18:35:20 +02:00
|
|
|
since_token = content.get("since", None)
|
|
|
|
search_filter = content.get("filter", None)
|
|
|
|
|
2016-12-06 11:43:48 +01:00
|
|
|
include_all_networks = content.get("include_all_networks", False)
|
|
|
|
third_party_instance_id = content.get("third_party_instance_id", None)
|
|
|
|
|
|
|
|
if include_all_networks:
|
|
|
|
network_tuple = None
|
|
|
|
if third_party_instance_id is not None:
|
|
|
|
raise SynapseError(
|
|
|
|
400, "Can't use include_all_networks with an explicit network"
|
|
|
|
)
|
|
|
|
elif third_party_instance_id is None:
|
|
|
|
network_tuple = ThirdPartyInstanceID(None, None)
|
|
|
|
else:
|
|
|
|
network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
|
|
|
|
|
2019-10-02 15:08:35 +02:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2016-09-15 18:35:20 +02:00
|
|
|
handler = self.hs.get_room_list_handler()
|
2023-05-05 16:06:22 +02:00
|
|
|
if server and not self.hs.is_mine_server_name(server):
|
2021-01-19 20:21:59 +01:00
|
|
|
# Ensure the server is valid.
|
|
|
|
try:
|
|
|
|
parse_and_validate_server_name(server)
|
|
|
|
except ValueError:
|
|
|
|
raise SynapseError(
|
2021-02-16 23:32:34 +01:00
|
|
|
400,
|
|
|
|
"Invalid server name: %s" % (server,),
|
|
|
|
Codes.INVALID_PARAM,
|
2021-01-19 20:21:59 +01:00
|
|
|
)
|
|
|
|
|
2021-08-06 15:05:41 +02:00
|
|
|
data = await handler.get_remote_public_room_list(
|
|
|
|
server,
|
|
|
|
limit=limit,
|
|
|
|
since_token=since_token,
|
|
|
|
search_filter=search_filter,
|
|
|
|
include_all_networks=include_all_networks,
|
|
|
|
third_party_instance_id=third_party_instance_id,
|
|
|
|
)
|
|
|
|
|
2016-09-15 18:35:20 +02:00
|
|
|
else:
|
2019-10-29 14:09:24 +01:00
|
|
|
data = await handler.get_local_public_room_list(
|
2016-09-15 18:35:20 +02:00
|
|
|
limit=limit,
|
|
|
|
since_token=since_token,
|
|
|
|
search_filter=search_filter,
|
2016-12-06 11:43:48 +01:00
|
|
|
network_tuple=network_tuple,
|
2016-09-15 18:35:20 +02:00
|
|
|
)
|
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, data
|
2016-09-15 18:35:20 +02:00
|
|
|
|
2014-08-27 15:51:59 +02:00
|
|
|
|
2014-08-26 18:54:18 +02:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomMemberListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/members$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2018-07-18 16:22:02 +02:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2022-05-11 18:22:34 +02:00
|
|
|
@cancellable
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2014-08-12 16:10:52 +02:00
|
|
|
# TODO support Pagination stream API (limit/tokens)
|
2020-08-03 13:13:49 +02:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2018-08-15 17:35:22 +02:00
|
|
|
handler = self.message_handler
|
|
|
|
|
|
|
|
# request the state as of a given event, as identified by a stream token,
|
|
|
|
# for consistency with /messages etc.
|
|
|
|
# useful for getting the membership in retrospect as of a given /sync
|
|
|
|
# response.
|
|
|
|
at_token_string = parse_string(request, "at")
|
|
|
|
if at_token_string is None:
|
|
|
|
at_token = None
|
|
|
|
else:
|
2020-09-30 21:29:19 +02:00
|
|
|
at_token = await StreamToken.from_string(self.store, at_token_string)
|
2018-08-15 17:35:22 +02:00
|
|
|
|
|
|
|
# let you filter down on particular memberships.
|
|
|
|
# XXX: this may not be the best shape for this API - we could pass in a filter
|
|
|
|
# instead, except filters aren't currently aware of memberships.
|
|
|
|
# See https://github.com/matrix-org/matrix-doc/issues/1337 for more details.
|
|
|
|
membership = parse_string(request, "membership")
|
|
|
|
not_membership = parse_string(request, "not_membership")
|
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
events = await handler.get_state_events(
|
2014-12-12 16:05:37 +01:00
|
|
|
room_id=room_id,
|
2022-08-22 15:17:59 +02:00
|
|
|
requester=requester,
|
2018-08-15 17:35:22 +02:00
|
|
|
at_token=at_token,
|
2018-10-25 18:49:55 +02:00
|
|
|
state_filter=StateFilter.from_types([(EventTypes.Member, None)]),
|
2015-09-09 16:42:16 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
chunk = []
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2015-09-09 16:42:16 +02:00
|
|
|
for event in events:
|
2019-06-20 11:32:02 +02:00
|
|
|
if (membership and event["content"].get("membership") != membership) or (
|
|
|
|
not_membership and event["content"].get("membership") == not_membership
|
2018-08-15 17:35:22 +02:00
|
|
|
):
|
2015-09-09 16:42:16 +02:00
|
|
|
continue
|
|
|
|
chunk.append(event)
|
2014-08-15 17:47:50 +02:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {"chunk": chunk}
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2018-08-15 17:35:22 +02:00
|
|
|
# deprecated in favour of /members?membership=join?
|
|
|
|
# except it does custom AS logic and has a simpler return format
|
2019-06-03 13:28:59 +02:00
|
|
|
class JoinedRoomMemberListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/joined_members$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2016-12-08 14:32:05 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2018-07-18 16:22:02 +02:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-12-08 14:32:05 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2016-12-08 14:32:05 +01:00
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
users_with_profile = await self.message_handler.get_joined_members(
|
2019-06-20 11:32:02 +02:00
|
|
|
requester, room_id
|
2017-09-27 16:01:25 +02:00
|
|
|
)
|
2016-12-08 14:32:05 +01:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {"joined": users_with_profile}
|
2016-12-08 14:32:05 +01:00
|
|
|
|
|
|
|
|
2015-11-05 17:56:40 +01:00
|
|
|
# TODO: Needs better unit testing
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomMessageListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/messages$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
# TODO The routing information should be exposed programatically.
|
|
|
|
# I want to do this but for now I felt bad about leaving this without
|
|
|
|
# at least a visible warning on it.
|
|
|
|
CATEGORY = "Client API requests (ALL FOR SAME ROOM MUST GO TO SAME WORKER)"
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2021-11-09 14:10:58 +01:00
|
|
|
self._hs = hs
|
2022-08-18 21:15:53 +02:00
|
|
|
self.clock = hs.get_clock()
|
2018-07-18 16:22:02 +02:00
|
|
|
self.pagination_handler = hs.get_pagination_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2022-08-18 21:15:53 +02:00
|
|
|
processing_start_time = self.clock.time_msec()
|
|
|
|
# Fire off and hope that we get a result by the end.
|
|
|
|
#
|
|
|
|
# We're using the mypy type ignore comment because the `@cached`
|
|
|
|
# decorator on `get_number_joined_users_in_room` doesn't play well with
|
|
|
|
# the type system. Maybe in the future, it can use some ParamSpec
|
|
|
|
# wizardry to fix it up.
|
|
|
|
room_member_count_deferred = run_in_background( # type: ignore[call-arg]
|
|
|
|
self.store.get_number_joined_users_in_room,
|
|
|
|
room_id, # type: ignore[arg-type]
|
|
|
|
)
|
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2020-09-30 21:29:19 +02:00
|
|
|
pagination_config = await PaginationConfig.from_request(
|
|
|
|
self.store, request, default_limit=10
|
|
|
|
)
|
2021-08-31 19:22:29 +02:00
|
|
|
# Twisted will have processed the args by now.
|
|
|
|
assert request.args is not None
|
2018-09-12 12:41:31 +02:00
|
|
|
as_client_event = b"raw" not in request.args
|
2021-06-08 14:30:48 +02:00
|
|
|
filter_str = parse_string(request, "filter", encoding="utf-8")
|
2020-07-15 19:40:54 +02:00
|
|
|
if filter_str:
|
|
|
|
filter_json = urlparse.unquote(filter_str)
|
2021-11-09 14:10:58 +01:00
|
|
|
event_filter: Optional[Filter] = Filter(
|
|
|
|
self._hs, json_decoder.decode(filter_json)
|
|
|
|
)
|
2020-01-20 18:38:21 +01:00
|
|
|
if (
|
|
|
|
event_filter
|
|
|
|
and event_filter.filter_json.get("event_format", "client")
|
|
|
|
== "federation"
|
|
|
|
):
|
2019-05-30 16:58:53 +02:00
|
|
|
as_client_event = False
|
2016-07-14 16:59:25 +02:00
|
|
|
else:
|
|
|
|
event_filter = None
|
2020-01-20 18:38:21 +01:00
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
msgs = await self.pagination_handler.get_messages(
|
2014-12-12 16:05:37 +01:00
|
|
|
room_id=room_id,
|
2016-01-20 16:34:07 +01:00
|
|
|
requester=requester,
|
2014-08-12 16:10:52 +02:00
|
|
|
pagin_config=pagination_config,
|
2016-07-14 16:59:25 +02:00
|
|
|
as_client_event=as_client_event,
|
|
|
|
event_filter=event_filter,
|
2015-01-08 15:36:33 +01:00
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2022-08-18 21:15:53 +02:00
|
|
|
processing_end_time = self.clock.time_msec()
|
|
|
|
room_member_count = await make_deferred_yieldable(room_member_count_deferred)
|
|
|
|
messsages_response_timer.labels(
|
|
|
|
room_size=_RoomSize.from_member_count(room_member_count)
|
2022-08-23 09:47:30 +02:00
|
|
|
).observe((processing_end_time - processing_start_time) / 1000)
|
2022-08-18 21:15:53 +02:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, msgs
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
|
2014-08-27 17:42:33 +02:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomStateRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/state$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2014-08-27 17:42:33 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2018-07-18 16:22:02 +02:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2022-05-11 18:22:34 +02:00
|
|
|
@cancellable
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, List[JsonDict]]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2014-09-23 16:35:58 +02:00
|
|
|
# Get all the current state for this room
|
2019-10-29 14:09:24 +01:00
|
|
|
events = await self.message_handler.get_state_events(
|
2014-12-12 16:05:37 +01:00
|
|
|
room_id=room_id,
|
2022-08-22 15:17:59 +02:00
|
|
|
requester=requester,
|
2014-09-23 16:35:58 +02:00
|
|
|
)
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, events
|
2014-08-27 17:42:33 +02:00
|
|
|
|
|
|
|
|
2014-08-27 17:49:01 +02:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomInitialSyncRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/initialSync$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Sync requests"
|
2014-08-27 17:49:01 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2016-09-21 12:46:28 +02:00
|
|
|
self.initial_sync_handler = hs.get_initial_sync_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2022-10-14 14:30:05 +02:00
|
|
|
pagination_config = await PaginationConfig.from_request(
|
|
|
|
self.store, request, default_limit=10
|
|
|
|
)
|
2019-10-29 14:09:24 +01:00
|
|
|
content = await self.initial_sync_handler.room_initial_sync(
|
2019-06-20 11:32:02 +02:00
|
|
|
room_id=room_id, requester=requester, pagin_config=pagination_config
|
2014-11-10 20:02:19 +01:00
|
|
|
)
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, content
|
2014-08-27 17:49:01 +02:00
|
|
|
|
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomEventServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/event/(?P<event_id>[^/]*)$", v1=True
|
2018-01-09 15:39:12 +01:00
|
|
|
)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2018-01-09 15:39:12 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2018-01-09 15:39:12 +01:00
|
|
|
self.clock = hs.get_clock()
|
2022-02-23 12:04:02 +01:00
|
|
|
self._store = hs.get_datastores().main
|
2022-04-20 13:57:39 +02:00
|
|
|
self._state = hs.get_state_handler()
|
2022-06-06 10:24:12 +02:00
|
|
|
self._storage_controllers = hs.get_storage_controllers()
|
2018-01-09 15:39:12 +01:00
|
|
|
self.event_handler = hs.get_event_handler()
|
2019-05-09 14:21:57 +02:00
|
|
|
self._event_serializer = hs.get_event_client_serializer()
|
2022-03-18 18:49:32 +01:00
|
|
|
self._relations_handler = hs.get_relations_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2022-04-20 13:57:39 +02:00
|
|
|
self.content_keep_ms = hs.config.server.redaction_retention_period
|
|
|
|
self.msc2815_enabled = hs.config.experimental.msc2815_enabled
|
2018-01-09 15:39:12 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2022-04-20 13:57:39 +02:00
|
|
|
|
|
|
|
include_unredacted_content = self.msc2815_enabled and (
|
|
|
|
parse_string(
|
|
|
|
request,
|
|
|
|
"fi.mau.msc2815.include_unredacted_content",
|
|
|
|
allowed_values=("true", "false"),
|
|
|
|
)
|
|
|
|
== "true"
|
|
|
|
)
|
|
|
|
if include_unredacted_content and not await self.auth.is_server_admin(
|
2022-08-22 15:17:59 +02:00
|
|
|
requester
|
2022-04-20 13:57:39 +02:00
|
|
|
):
|
2022-06-06 10:24:12 +02:00
|
|
|
power_level_event = (
|
|
|
|
await self._storage_controllers.state.get_current_state_event(
|
|
|
|
room_id, EventTypes.PowerLevels, ""
|
|
|
|
)
|
2022-04-20 13:57:39 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
auth_events = {}
|
|
|
|
if power_level_event:
|
|
|
|
auth_events[(EventTypes.PowerLevels, "")] = power_level_event
|
|
|
|
|
|
|
|
redact_level = event_auth.get_named_level(auth_events, "redact", 50)
|
|
|
|
user_level = event_auth.get_user_power_level(
|
|
|
|
requester.user.to_string(), auth_events
|
|
|
|
)
|
|
|
|
if user_level < redact_level:
|
|
|
|
raise SynapseError(
|
|
|
|
403,
|
|
|
|
"You don't have permission to view redacted events in this room.",
|
|
|
|
errcode=Codes.FORBIDDEN,
|
|
|
|
)
|
|
|
|
|
2019-08-06 14:33:55 +02:00
|
|
|
try:
|
2019-10-29 14:09:24 +01:00
|
|
|
event = await self.event_handler.get_event(
|
2022-04-20 13:57:39 +02:00
|
|
|
requester.user,
|
|
|
|
room_id,
|
|
|
|
event_id,
|
|
|
|
show_redacted=include_unredacted_content,
|
2019-08-06 14:33:55 +02:00
|
|
|
)
|
|
|
|
except AuthError:
|
|
|
|
# This endpoint is supposed to return a 404 when the requester does
|
|
|
|
# not have permission to access the event
|
|
|
|
# https://matrix.org/docs/spec/client_server/r0.5.0#get-matrix-client-r0-rooms-roomid-event-eventid
|
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2018-01-09 15:39:12 +01:00
|
|
|
|
|
|
|
if event:
|
2022-04-20 13:57:39 +02:00
|
|
|
if include_unredacted_content and await self._store.have_censored_event(
|
|
|
|
event_id
|
|
|
|
):
|
|
|
|
raise UnredactedContentDeletedError(self.content_keep_ms)
|
|
|
|
|
2022-01-07 15:10:46 +01:00
|
|
|
# Ensure there are bundled aggregations available.
|
2022-03-18 18:49:32 +01:00
|
|
|
aggregations = await self._relations_handler.get_bundled_aggregations(
|
2022-01-18 17:38:57 +01:00
|
|
|
[event], requester.user.to_string()
|
|
|
|
)
|
2022-01-07 15:10:46 +01:00
|
|
|
|
2022-04-19 17:42:19 +02:00
|
|
|
# per MSC2676, /rooms/{roomId}/event/{eventId}, should return the
|
|
|
|
# *original* event, rather than the edited version
|
2022-01-07 15:10:46 +01:00
|
|
|
event_dict = self._event_serializer.serialize_event(
|
2023-03-06 17:08:39 +01:00
|
|
|
event,
|
|
|
|
self.clock.time_msec(),
|
|
|
|
bundle_aggregations=aggregations,
|
|
|
|
config=SerializeEventConfig(requester=requester),
|
2021-12-20 20:14:38 +01:00
|
|
|
)
|
2021-08-31 19:22:29 +02:00
|
|
|
return 200, event_dict
|
2019-08-06 14:33:55 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2018-01-09 15:39:12 +01:00
|
|
|
|
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomEventContextServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/context/(?P<event_id>[^/]*)$", v1=True
|
2015-10-28 14:45:56 +01:00
|
|
|
)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2015-10-28 14:45:56 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2021-11-09 14:10:58 +01:00
|
|
|
self._hs = hs
|
2015-10-28 14:45:56 +01:00
|
|
|
self.clock = hs.get_clock()
|
2018-07-18 16:29:45 +02:00
|
|
|
self.room_context_handler = hs.get_room_context_handler()
|
2019-05-09 14:21:57 +02:00
|
|
|
self._event_serializer = hs.get_event_client_serializer()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2015-10-28 14:45:56 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str, event_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2015-10-28 14:45:56 +01:00
|
|
|
|
2018-07-13 21:40:14 +02:00
|
|
|
limit = parse_integer(request, "limit", default=10)
|
2015-10-28 14:45:56 +01:00
|
|
|
|
2018-07-27 16:12:50 +02:00
|
|
|
# picking the API shape for symmetry with /messages
|
2021-06-08 14:30:48 +02:00
|
|
|
filter_str = parse_string(request, "filter", encoding="utf-8")
|
2020-07-15 19:40:54 +02:00
|
|
|
if filter_str:
|
|
|
|
filter_json = urlparse.unquote(filter_str)
|
2021-11-09 14:10:58 +01:00
|
|
|
event_filter: Optional[Filter] = Filter(
|
|
|
|
self._hs, json_decoder.decode(filter_json)
|
|
|
|
)
|
2018-07-27 16:12:50 +02:00
|
|
|
else:
|
|
|
|
event_filter = None
|
|
|
|
|
2022-01-26 14:27:04 +01:00
|
|
|
event_context = await self.room_context_handler.get_event_context(
|
2021-01-28 12:27:30 +01:00
|
|
|
requester, room_id, event_id, limit, event_filter
|
2015-10-28 14:45:56 +01:00
|
|
|
)
|
|
|
|
|
2022-01-26 14:27:04 +01:00
|
|
|
if not event_context:
|
2019-06-20 11:32:02 +02:00
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2016-01-13 15:19:22 +01:00
|
|
|
|
2015-10-28 14:45:56 +01:00
|
|
|
time_now = self.clock.time_msec()
|
2023-03-06 17:08:39 +01:00
|
|
|
serializer_options = SerializeEventConfig(requester=requester)
|
2022-01-26 14:27:04 +01:00
|
|
|
results = {
|
|
|
|
"events_before": self._event_serializer.serialize_events(
|
|
|
|
event_context.events_before,
|
|
|
|
time_now,
|
|
|
|
bundle_aggregations=event_context.aggregations,
|
2023-03-06 17:08:39 +01:00
|
|
|
config=serializer_options,
|
2022-01-26 14:27:04 +01:00
|
|
|
),
|
|
|
|
"event": self._event_serializer.serialize_event(
|
|
|
|
event_context.event,
|
|
|
|
time_now,
|
|
|
|
bundle_aggregations=event_context.aggregations,
|
2023-03-06 17:08:39 +01:00
|
|
|
config=serializer_options,
|
2022-01-26 14:27:04 +01:00
|
|
|
),
|
|
|
|
"events_after": self._event_serializer.serialize_events(
|
|
|
|
event_context.events_after,
|
|
|
|
time_now,
|
|
|
|
bundle_aggregations=event_context.aggregations,
|
2023-03-06 17:08:39 +01:00
|
|
|
config=serializer_options,
|
2022-01-26 14:27:04 +01:00
|
|
|
),
|
|
|
|
"state": self._event_serializer.serialize_events(
|
2023-03-06 17:08:39 +01:00
|
|
|
event_context.state,
|
|
|
|
time_now,
|
|
|
|
config=serializer_options,
|
2022-01-26 14:27:04 +01:00
|
|
|
),
|
|
|
|
"start": event_context.start,
|
|
|
|
"end": event_context.end,
|
|
|
|
}
|
2015-10-28 14:45:56 +01:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, results
|
2015-10-28 14:45:56 +01:00
|
|
|
|
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomForgetRestServlet(TransactionRestServlet):
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2018-03-01 11:54:37 +01:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2019-06-20 11:32:02 +02:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/forget"
|
2016-03-30 11:54:01 +02:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(self, requester: Requester, room_id: str) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
await self.room_member_handler.forget(user=requester.user, room_id=room_id)
|
2016-03-30 11:54:01 +02:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {}
|
2016-03-30 11:54:01 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_POST(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=False)
|
|
|
|
return await self._do(requester, room_id)
|
|
|
|
|
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, room_id: str, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=False)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request, requester, self._do, requester, room_id
|
2016-11-11 18:47:03 +01:00
|
|
|
)
|
2016-03-30 11:54:01 +02:00
|
|
|
|
|
|
|
|
2014-08-26 18:54:18 +02:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomMembershipRestServlet(TransactionRestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Event sending requests"
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2018-03-01 11:54:37 +01:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2023-03-02 18:59:53 +01:00
|
|
|
# /rooms/$roomid/[join|invite|leave|ban|unban|kick]
|
2019-06-20 11:32:02 +02:00
|
|
|
PATTERNS = (
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/"
|
|
|
|
"(?P<membership_action>join|invite|leave|ban|unban|kick)"
|
|
|
|
)
|
2015-12-01 18:34:32 +01:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-26 13:54:43 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(
|
2021-08-31 19:22:29 +02:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
2023-03-07 17:05:22 +01:00
|
|
|
requester: Requester,
|
2021-08-31 19:22:29 +02:00
|
|
|
room_id: str,
|
|
|
|
membership_action: str,
|
2023-03-07 17:05:22 +01:00
|
|
|
txn_id: Optional[str],
|
2021-08-31 19:22:29 +02:00
|
|
|
) -> Tuple[int, JsonDict]:
|
2016-01-11 16:29:57 +01:00
|
|
|
if requester.is_guest and membership_action not in {
|
|
|
|
Membership.JOIN,
|
2019-06-20 11:32:02 +02:00
|
|
|
Membership.LEAVE,
|
2016-01-11 16:29:57 +01:00
|
|
|
}:
|
2015-11-13 12:56:58 +01:00
|
|
|
raise AuthError(403, "Guest access not allowed")
|
2014-08-26 15:49:44 +02:00
|
|
|
|
2022-12-05 12:30:41 +01:00
|
|
|
content = parse_json_object_from_request(request, allow_empty_body=True)
|
2014-08-26 13:54:43 +02:00
|
|
|
|
2022-08-31 14:10:25 +02:00
|
|
|
if membership_action == "invite" and all(
|
|
|
|
key in content for key in ("medium", "address")
|
|
|
|
):
|
|
|
|
if not all(key in content for key in ("id_server", "id_access_token")):
|
|
|
|
raise SynapseError(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
"`id_server` and `id_access_token` are required when doing 3pid invite",
|
|
|
|
Codes.MISSING_PARAM,
|
|
|
|
)
|
|
|
|
|
2020-08-20 21:07:42 +02:00
|
|
|
try:
|
|
|
|
await self.room_member_handler.do_3pid_invite(
|
|
|
|
room_id,
|
|
|
|
requester.user,
|
|
|
|
content["medium"],
|
|
|
|
content["address"],
|
|
|
|
content["id_server"],
|
|
|
|
requester,
|
|
|
|
txn_id,
|
2022-08-31 14:10:25 +02:00
|
|
|
content["id_access_token"],
|
2020-08-20 21:07:42 +02:00
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend the request succeeded.
|
|
|
|
pass
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {}
|
2014-08-26 15:49:44 +02:00
|
|
|
|
2016-01-15 17:27:26 +01:00
|
|
|
target = requester.user
|
|
|
|
if membership_action in ["invite", "ban", "unban", "kick"]:
|
2018-07-13 21:53:01 +02:00
|
|
|
assert_params_in_dict(content, ["user_id"])
|
2016-01-15 17:27:26 +01:00
|
|
|
target = UserID.from_string(content["user_id"])
|
2015-11-13 12:56:58 +01:00
|
|
|
|
2017-02-14 16:10:55 +01:00
|
|
|
event_content = None
|
2019-11-28 12:02:04 +01:00
|
|
|
if "reason" in content:
|
2019-06-20 11:32:02 +02:00
|
|
|
event_content = {"reason": content["reason"]}
|
2017-02-14 16:10:55 +01:00
|
|
|
|
2020-08-20 21:07:42 +02:00
|
|
|
try:
|
|
|
|
await self.room_member_handler.update_membership(
|
|
|
|
requester=requester,
|
|
|
|
target=target,
|
|
|
|
room_id=room_id,
|
|
|
|
action=membership_action,
|
|
|
|
txn_id=txn_id,
|
|
|
|
third_party_signed=content.get("third_party_signed", None),
|
|
|
|
content=event_content,
|
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend the request succeeded.
|
|
|
|
pass
|
2014-11-10 19:24:43 +01:00
|
|
|
|
2018-03-13 14:10:07 +01:00
|
|
|
return_value = {}
|
|
|
|
|
|
|
|
if membership_action == "join":
|
|
|
|
return_value["room_id"] = room_id
|
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, return_value
|
2014-08-26 15:49:44 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_POST(
|
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
room_id: str,
|
|
|
|
membership_action: str,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
|
|
|
return await self._do(request, requester, room_id, membership_action, None)
|
|
|
|
|
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, room_id: str, membership_action: str, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request,
|
|
|
|
requester,
|
|
|
|
self._do,
|
|
|
|
request,
|
|
|
|
requester,
|
|
|
|
room_id,
|
|
|
|
membership_action,
|
|
|
|
txn_id,
|
2016-11-11 16:08:24 +01:00
|
|
|
)
|
2014-08-26 13:54:43 +02:00
|
|
|
|
2014-10-30 12:10:17 +01:00
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomRedactEventRestServlet(TransactionRestServlet):
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Event sending requests"
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(hs)
|
2018-01-15 17:52:07 +01:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2023-04-13 15:47:07 +02:00
|
|
|
self._store = hs.get_datastores().main
|
2022-11-03 17:21:31 +01:00
|
|
|
self._relation_handler = hs.get_relations_handler()
|
|
|
|
self._msc3912_enabled = hs.config.experimental.msc3912_enabled
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register(self, http_server: HttpServer) -> None:
|
2019-06-20 11:32:02 +02:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/redact/(?P<event_id>[^/]*)"
|
2015-12-01 18:34:32 +01:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-09-23 16:28:32 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def _do(
|
2021-08-31 19:22:29 +02:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
2023-03-07 17:05:22 +01:00
|
|
|
requester: Requester,
|
2021-08-31 19:22:29 +02:00
|
|
|
room_id: str,
|
|
|
|
event_id: str,
|
2023-03-07 17:05:22 +01:00
|
|
|
txn_id: Optional[str],
|
2021-08-31 19:22:29 +02:00
|
|
|
) -> Tuple[int, JsonDict]:
|
2016-03-09 12:26:26 +01:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-09-23 16:28:32 +02:00
|
|
|
|
2023-04-13 15:47:07 +02:00
|
|
|
# Ensure the redacts property in the content matches the one provided in
|
|
|
|
# the URL.
|
|
|
|
room_version = await self._store.get_room_version(room_id)
|
2023-07-18 14:44:59 +02:00
|
|
|
if room_version.updated_redaction_rules:
|
2023-04-13 15:47:07 +02:00
|
|
|
if "redacts" in content and content["redacts"] != event_id:
|
|
|
|
raise SynapseError(
|
|
|
|
400,
|
|
|
|
"Cannot provide a redacts value incoherent with the event_id of the URL parameter",
|
|
|
|
Codes.INVALID_PARAM,
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
content["redacts"] = event_id
|
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
try:
|
2022-11-03 17:21:31 +01:00
|
|
|
with_relations = None
|
|
|
|
if self._msc3912_enabled and "org.matrix.msc3912.with_relations" in content:
|
|
|
|
with_relations = content["org.matrix.msc3912.with_relations"]
|
|
|
|
del content["org.matrix.msc3912.with_relations"]
|
|
|
|
|
|
|
|
# Check if there's an existing event for this transaction now (even though
|
|
|
|
# create_and_send_nonmember_event also does it) because, if there's one,
|
|
|
|
# then we want to skip the call to redact_events_related_to.
|
|
|
|
event = None
|
|
|
|
if txn_id:
|
|
|
|
event = await self.event_creation_handler.get_event_from_transaction(
|
|
|
|
requester, txn_id, room_id
|
|
|
|
)
|
|
|
|
|
2023-04-13 15:47:07 +02:00
|
|
|
# Event is not yet redacted, create a new event to redact it.
|
2022-11-03 17:21:31 +01:00
|
|
|
if event is None:
|
2023-04-13 15:47:07 +02:00
|
|
|
event_dict = {
|
|
|
|
"type": EventTypes.Redaction,
|
|
|
|
"content": content,
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": requester.user.to_string(),
|
|
|
|
}
|
|
|
|
# Earlier room versions had a top-level redacts property.
|
2023-07-18 14:44:59 +02:00
|
|
|
if not room_version.updated_redaction_rules:
|
2023-04-13 15:47:07 +02:00
|
|
|
event_dict["redacts"] = event_id
|
|
|
|
|
2022-11-03 17:21:31 +01:00
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
2023-04-13 15:47:07 +02:00
|
|
|
requester, event_dict, txn_id=txn_id
|
2022-11-03 17:21:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
if with_relations:
|
|
|
|
run_as_background_process(
|
|
|
|
"redact_related_events",
|
|
|
|
self._relation_handler.redact_events_related_to,
|
|
|
|
requester=requester,
|
|
|
|
event_id=event_id,
|
|
|
|
initial_redaction_event=event,
|
|
|
|
relation_types=with_relations,
|
|
|
|
)
|
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2014-09-23 16:28:32 +02:00
|
|
|
|
2020-08-24 19:58:56 +02:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
return 200, {"event_id": event_id}
|
2014-09-23 16:28:32 +02:00
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
async def on_POST(
|
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
room_id: str,
|
|
|
|
event_id: str,
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
|
|
|
return await self._do(request, requester, room_id, event_id, None)
|
|
|
|
|
|
|
|
async def on_PUT(
|
2021-08-31 19:22:29 +02:00
|
|
|
self, request: SynapseRequest, room_id: str, event_id: str, txn_id: str
|
2023-03-07 17:05:22 +01:00
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2019-09-25 12:39:15 +02:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2023-03-07 17:05:22 +01:00
|
|
|
return await self.txns.fetch_or_execute_request(
|
|
|
|
request, requester, self._do, request, requester, room_id, event_id, txn_id
|
2016-11-11 16:02:29 +01:00
|
|
|
)
|
2014-09-23 16:28:32 +02:00
|
|
|
|
2014-08-26 13:54:43 +02:00
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class RoomTypingRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/typing/(?P<user_id>[^/]*)$", v1=True
|
2014-12-16 16:24:03 +01:00
|
|
|
)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "The typing stream"
|
2014-12-11 11:55:36 +01:00
|
|
|
|
2021-03-17 16:30:21 +01:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2021-03-17 16:30:21 +01:00
|
|
|
self.hs = hs
|
2016-05-16 19:56:37 +02:00
|
|
|
self.presence_handler = hs.get_presence_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-02-15 18:10:40 +01:00
|
|
|
|
2020-07-16 16:12:54 +02:00
|
|
|
# If we're not on the typing writer instance we should scream if we get
|
|
|
|
# requests.
|
|
|
|
self._is_typing_writer = (
|
2021-11-03 15:25:47 +01:00
|
|
|
hs.get_instance_name() in hs.config.worker.writers.typing
|
2020-07-16 16:12:54 +02:00
|
|
|
)
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_PUT(
|
|
|
|
self, request: SynapseRequest, room_id: str, user_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2014-12-11 11:55:36 +01:00
|
|
|
|
2020-07-16 16:12:54 +02:00
|
|
|
if not self._is_typing_writer:
|
|
|
|
raise Exception("Got /typing request on instance that is not typing writer")
|
|
|
|
|
2018-04-15 17:15:16 +02:00
|
|
|
room_id = urlparse.unquote(room_id)
|
|
|
|
target_user = UserID.from_string(urlparse.unquote(user_id))
|
2014-12-11 11:55:36 +01:00
|
|
|
|
2016-03-09 12:26:26 +01:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-12-11 11:55:36 +01:00
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
await self.presence_handler.bump_presence_active_time(requester.user)
|
2016-02-15 18:10:40 +01:00
|
|
|
|
2016-09-23 14:56:14 +02:00
|
|
|
# Limit timeout to stop people from setting silly typing timeouts.
|
|
|
|
timeout = min(content.get("timeout", 30000), 120000)
|
|
|
|
|
2023-03-23 13:11:14 +01:00
|
|
|
# Defer getting the typing handler since it will raise on WORKER_PATTERNS.
|
2021-03-17 16:30:21 +01:00
|
|
|
typing_handler = self.hs.get_typing_writer_handler()
|
|
|
|
|
2020-08-26 18:05:36 +02:00
|
|
|
try:
|
|
|
|
if content["typing"]:
|
2021-03-17 16:30:21 +01:00
|
|
|
await typing_handler.started_typing(
|
2020-08-26 18:05:36 +02:00
|
|
|
target_user=target_user,
|
|
|
|
requester=requester,
|
|
|
|
room_id=room_id,
|
|
|
|
timeout=timeout,
|
|
|
|
)
|
|
|
|
else:
|
2021-03-17 16:30:21 +01:00
|
|
|
await typing_handler.stopped_typing(
|
2020-08-26 18:05:36 +02:00
|
|
|
target_user=target_user, requester=requester, room_id=room_id
|
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend this worked without error.
|
|
|
|
pass
|
2014-12-11 11:55:36 +01:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {}
|
2014-12-11 11:55:36 +01:00
|
|
|
|
|
|
|
|
2020-02-18 17:23:25 +01:00
|
|
|
class RoomAliasListServlet(RestServlet):
|
2020-02-19 11:40:27 +01:00
|
|
|
PATTERNS = [
|
|
|
|
re.compile(
|
|
|
|
r"^/_matrix/client/unstable/org\.matrix\.msc2432"
|
|
|
|
r"/rooms/(?P<room_id>[^/]*)/aliases"
|
|
|
|
),
|
2021-06-03 14:50:49 +02:00
|
|
|
] + list(client_patterns("/rooms/(?P<room_id>[^/]*)/aliases$", unstable=False))
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2020-02-18 17:23:25 +01:00
|
|
|
|
2021-03-17 16:30:21 +01:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-02-18 17:23:25 +01:00
|
|
|
super().__init__()
|
|
|
|
self.auth = hs.get_auth()
|
2020-10-09 13:24:34 +02:00
|
|
|
self.directory_handler = hs.get_directory_handler()
|
2020-02-18 17:23:25 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
2020-02-18 17:23:25 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request)
|
|
|
|
|
|
|
|
alias_list = await self.directory_handler.get_aliases_for_room(
|
|
|
|
requester, room_id
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, {"aliases": alias_list}
|
|
|
|
|
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class SearchRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/search$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2015-10-09 16:48:31 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2020-10-09 13:24:34 +02:00
|
|
|
self.search_handler = hs.get_search_handler()
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 11:03:19 +02:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2015-10-09 16:48:31 +02:00
|
|
|
|
2016-03-09 12:26:26 +01:00
|
|
|
content = parse_json_object_from_request(request)
|
2015-10-09 16:48:31 +02:00
|
|
|
|
2018-07-13 21:40:14 +02:00
|
|
|
batch = parse_string(request, "next_batch")
|
2023-03-06 17:08:39 +01:00
|
|
|
results = await self.search_handler.search(requester, content, batch)
|
2015-10-09 16:48:31 +02:00
|
|
|
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, results
|
2015-10-09 16:48:31 +02:00
|
|
|
|
|
|
|
|
2019-06-03 13:28:59 +02:00
|
|
|
class JoinedRoomsRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/joined_rooms$", v1=True)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2016-12-08 12:39:03 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def __init__(self, hs: "HomeServer"):
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__()
|
2022-02-23 12:04:02 +01:00
|
|
|
self.store = hs.get_datastores().main
|
2019-06-03 13:28:59 +02:00
|
|
|
self.auth = hs.get_auth()
|
2016-12-08 12:39:03 +01:00
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
async def on_GET(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
|
2019-10-29 14:09:24 +01:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2016-12-08 12:39:03 +01:00
|
|
|
|
2019-10-29 14:09:24 +01:00
|
|
|
room_ids = await self.store.get_rooms_for_user(requester.user.to_string())
|
2019-08-30 17:28:26 +02:00
|
|
|
return 200, {"joined_rooms": list(room_ids)}
|
2016-12-08 12:39:03 +01:00
|
|
|
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register_txn_path(
|
|
|
|
servlet: RestServlet,
|
|
|
|
regex_string: str,
|
|
|
|
http_server: HttpServer,
|
|
|
|
) -> None:
|
2014-08-26 13:54:43 +02:00
|
|
|
"""Registers a transaction-based path.
|
|
|
|
|
|
|
|
This registers two paths:
|
|
|
|
PUT regex_string/$txnid
|
|
|
|
POST regex_string
|
|
|
|
|
|
|
|
Args:
|
2021-08-31 19:22:29 +02:00
|
|
|
regex_string: The regex string to register. Must NOT have a
|
|
|
|
trailing $ as this string will be appended to.
|
|
|
|
http_server: The http_server to register paths with.
|
2014-08-26 13:54:43 +02:00
|
|
|
"""
|
2021-08-31 19:22:29 +02:00
|
|
|
on_POST = getattr(servlet, "on_POST", None)
|
|
|
|
on_PUT = getattr(servlet, "on_PUT", None)
|
|
|
|
if on_POST is None or on_PUT is None:
|
|
|
|
raise RuntimeError("on_POST and on_PUT must exist when using register_txn_path")
|
2015-12-01 18:34:32 +01:00
|
|
|
http_server.register_paths(
|
2019-07-24 14:07:35 +02:00
|
|
|
"POST",
|
|
|
|
client_patterns(regex_string + "$", v1=True),
|
2021-08-31 19:22:29 +02:00
|
|
|
on_POST,
|
2019-07-24 14:07:35 +02:00
|
|
|
servlet.__class__.__name__,
|
2014-08-26 13:54:43 +02:00
|
|
|
)
|
2015-12-01 18:34:32 +01:00
|
|
|
http_server.register_paths(
|
2014-08-26 13:54:43 +02:00
|
|
|
"PUT",
|
2019-06-03 13:28:59 +02:00
|
|
|
client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
|
2021-08-31 19:22:29 +02:00
|
|
|
on_PUT,
|
2019-07-24 14:07:35 +02:00
|
|
|
servlet.__class__.__name__,
|
2014-08-26 13:54:43 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-12-02 08:02:20 +01:00
|
|
|
class TimestampLookupRestServlet(RestServlet):
|
|
|
|
"""
|
|
|
|
API endpoint to fetch the `event_id` of the closest event to the given
|
|
|
|
timestamp (`ts` query parameter) in the given direction (`dir` query
|
|
|
|
parameter).
|
|
|
|
|
|
|
|
Useful for cases like jump to date so you can start paginating messages from
|
|
|
|
a given date in the archive.
|
|
|
|
|
|
|
|
`ts` is a timestamp in milliseconds where we will find the closest event in
|
|
|
|
the given direction.
|
|
|
|
|
|
|
|
`dir` can be `f` or `b` to indicate forwards and backwards in time from the
|
|
|
|
given timestamp.
|
|
|
|
|
2022-11-28 22:54:18 +01:00
|
|
|
GET /_matrix/client/v1/rooms/<roomID>/timestamp_to_event?ts=<timestamp>&dir=<direction>
|
2021-12-02 08:02:20 +01:00
|
|
|
{
|
|
|
|
"event_id": ...
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
|
|
|
|
PATTERNS = (
|
2022-11-28 22:54:18 +01:00
|
|
|
re.compile("^/_matrix/client/v1/rooms/(?P<room_id>[^/]*)/timestamp_to_event$"),
|
2021-12-02 08:02:20 +01:00
|
|
|
)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2021-12-02 08:02:20 +01:00
|
|
|
|
|
|
|
def __init__(self, hs: "HomeServer"):
|
|
|
|
super().__init__()
|
|
|
|
self._auth = hs.get_auth()
|
2022-02-23 12:04:02 +01:00
|
|
|
self._store = hs.get_datastores().main
|
2021-12-02 08:02:20 +01:00
|
|
|
self.timestamp_lookup_handler = hs.get_timestamp_lookup_handler()
|
|
|
|
|
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self._auth.get_user_by_req(request)
|
2022-08-22 15:17:59 +02:00
|
|
|
await self._auth.check_user_in_room_or_world_readable(room_id, requester)
|
2021-12-02 08:02:20 +01:00
|
|
|
|
|
|
|
timestamp = parse_integer(request, "ts", required=True)
|
2023-02-01 22:35:24 +01:00
|
|
|
direction = parse_enum(request, "dir", Direction, default=Direction.FORWARDS)
|
2021-12-02 08:02:20 +01:00
|
|
|
|
|
|
|
(
|
|
|
|
event_id,
|
|
|
|
origin_server_ts,
|
|
|
|
) = await self.timestamp_lookup_handler.get_event_for_timestamp(
|
|
|
|
requester, room_id, timestamp, direction
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, {
|
|
|
|
"event_id": event_id,
|
|
|
|
"origin_server_ts": origin_server_ts,
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-08-10 19:08:17 +02:00
|
|
|
class RoomHierarchyRestServlet(RestServlet):
|
2022-05-26 13:10:28 +02:00
|
|
|
PATTERNS = (re.compile("^/_matrix/client/v1/rooms/(?P<room_id>[^/]*)/hierarchy$"),)
|
2023-03-23 13:11:14 +01:00
|
|
|
WORKERS = PATTERNS
|
|
|
|
CATEGORY = "Client API requests"
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
def __init__(self, hs: "HomeServer"):
|
|
|
|
super().__init__()
|
|
|
|
self._auth = hs.get_auth()
|
2021-08-16 16:49:12 +02:00
|
|
|
self._room_summary_handler = hs.get_room_summary_handler()
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_id: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
requester = await self._auth.get_user_by_req(request, allow_guest=True)
|
|
|
|
|
|
|
|
max_depth = parse_integer(request, "max_depth")
|
|
|
|
if max_depth is not None and max_depth < 0:
|
|
|
|
raise SynapseError(
|
|
|
|
400, "'max_depth' must be a non-negative integer", Codes.BAD_JSON
|
|
|
|
)
|
|
|
|
|
|
|
|
limit = parse_integer(request, "limit")
|
|
|
|
if limit is not None and limit <= 0:
|
|
|
|
raise SynapseError(
|
|
|
|
400, "'limit' must be a positive integer", Codes.BAD_JSON
|
|
|
|
)
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
return 200, await self._room_summary_handler.get_room_hierarchy(
|
2021-11-29 20:32:20 +01:00
|
|
|
requester,
|
2021-08-10 19:08:17 +02:00
|
|
|
room_id,
|
|
|
|
suggested_only=parse_boolean(request, "suggested_only", default=False),
|
|
|
|
max_depth=max_depth,
|
|
|
|
limit=limit,
|
|
|
|
from_token=parse_string(request, "from"),
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
class RoomSummaryRestServlet(ResolveRoomIdMixin, RestServlet):
|
|
|
|
PATTERNS = (
|
|
|
|
re.compile(
|
|
|
|
"^/_matrix/client/unstable/im.nheko.summary"
|
|
|
|
"/rooms/(?P<room_identifier>[^/]*)/summary$"
|
|
|
|
),
|
|
|
|
)
|
2023-03-23 13:11:14 +01:00
|
|
|
CATEGORY = "Client API requests"
|
2021-08-16 16:49:12 +02:00
|
|
|
|
|
|
|
def __init__(self, hs: "HomeServer"):
|
|
|
|
super().__init__(hs)
|
|
|
|
self._auth = hs.get_auth()
|
|
|
|
self._room_summary_handler = hs.get_room_summary_handler()
|
|
|
|
|
|
|
|
async def on_GET(
|
|
|
|
self, request: SynapseRequest, room_identifier: str
|
|
|
|
) -> Tuple[int, JsonDict]:
|
|
|
|
try:
|
|
|
|
requester = await self._auth.get_user_by_req(request, allow_guest=True)
|
|
|
|
requester_user_id: Optional[str] = requester.user.to_string()
|
|
|
|
except MissingClientTokenError:
|
|
|
|
# auth is optional
|
|
|
|
requester_user_id = None
|
|
|
|
|
|
|
|
# twisted.web.server.Request.args is incorrectly defined as Optional[Any]
|
|
|
|
args: Dict[bytes, List[bytes]] = request.args # type: ignore
|
|
|
|
remote_room_hosts = parse_strings_from_args(args, "via", required=False)
|
|
|
|
room_id, remote_room_hosts = await self.resolve_room_id(
|
|
|
|
room_identifier,
|
|
|
|
remote_room_hosts,
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, await self._room_summary_handler.get_room_summary(
|
|
|
|
requester_user_id,
|
|
|
|
room_id,
|
|
|
|
remote_room_hosts,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2022-12-02 19:10:05 +01:00
|
|
|
def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
|
2014-08-22 16:59:15 +02:00
|
|
|
RoomStateEventRestServlet(hs).register(http_server)
|
2014-08-12 16:10:52 +02:00
|
|
|
RoomMemberListRestServlet(hs).register(http_server)
|
2016-12-08 14:32:05 +01:00
|
|
|
JoinedRoomMemberListRestServlet(hs).register(http_server)
|
2014-08-12 16:10:52 +02:00
|
|
|
RoomMessageListRestServlet(hs).register(http_server)
|
|
|
|
JoinRoomAliasServlet(hs).register(http_server)
|
2014-08-26 13:54:43 +02:00
|
|
|
RoomMembershipRestServlet(hs).register(http_server)
|
2014-08-26 18:00:24 +02:00
|
|
|
RoomSendEventRestServlet(hs).register(http_server)
|
2014-08-27 15:51:59 +02:00
|
|
|
PublicRoomListRestServlet(hs).register(http_server)
|
2014-08-27 17:42:33 +02:00
|
|
|
RoomStateRestServlet(hs).register(http_server)
|
2014-09-24 16:27:59 +02:00
|
|
|
RoomRedactEventRestServlet(hs).register(http_server)
|
2014-12-11 11:55:36 +01:00
|
|
|
RoomTypingRestServlet(hs).register(http_server)
|
2018-01-09 15:39:12 +01:00
|
|
|
RoomEventContextServlet(hs).register(http_server)
|
2021-08-10 19:08:17 +02:00
|
|
|
RoomHierarchyRestServlet(hs).register(http_server)
|
2021-08-16 16:49:12 +02:00
|
|
|
if hs.config.experimental.msc3266_enabled:
|
|
|
|
RoomSummaryRestServlet(hs).register(http_server)
|
2021-05-27 23:45:43 +02:00
|
|
|
RoomEventServlet(hs).register(http_server)
|
|
|
|
JoinedRoomsRestServlet(hs).register(http_server)
|
|
|
|
RoomAliasListServlet(hs).register(http_server)
|
|
|
|
SearchRestServlet(hs).register(http_server)
|
2021-08-17 15:33:16 +02:00
|
|
|
RoomCreateRestServlet(hs).register(http_server)
|
2022-11-28 22:54:18 +01:00
|
|
|
TimestampLookupRestServlet(hs).register(http_server)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
2020-12-29 13:40:12 +01:00
|
|
|
# Some servlets only get registered for the main process.
|
2022-12-02 19:10:05 +01:00
|
|
|
if hs.config.worker.worker_app is None:
|
2020-12-29 13:40:12 +01:00
|
|
|
RoomForgetRestServlet(hs).register(http_server)
|
2018-07-19 12:03:33 +02:00
|
|
|
|
|
|
|
|
2021-08-31 19:22:29 +02:00
|
|
|
def register_deprecated_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
|
2018-07-19 12:03:33 +02:00
|
|
|
RoomInitialSyncRestServlet(hs).register(http_server)
|