2021-03-18 19:24:16 +01:00
|
|
|
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
|
|
|
|
#
|
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
|
#
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
#
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
|
|
import itertools
|
|
|
|
|
import logging
|
2021-05-11 18:57:39 +02:00
|
|
|
|
import re
|
2021-03-18 19:24:16 +01:00
|
|
|
|
from collections import deque
|
2021-08-16 14:06:17 +02:00
|
|
|
|
from typing import TYPE_CHECKING, Dict, Iterable, List, Optional, Sequence, Set, Tuple
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
|
|
|
|
import attr
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-05-20 17:10:36 +02:00
|
|
|
|
from synapse.api.constants import (
|
|
|
|
|
EventContentFields,
|
|
|
|
|
EventTypes,
|
|
|
|
|
HistoryVisibility,
|
2021-07-13 14:59:27 +02:00
|
|
|
|
JoinRules,
|
2021-05-20 17:10:36 +02:00
|
|
|
|
Membership,
|
2021-06-29 18:00:04 +02:00
|
|
|
|
RoomTypes,
|
2021-05-20 17:10:36 +02:00
|
|
|
|
)
|
2021-09-01 19:01:08 +02:00
|
|
|
|
from synapse.api.errors import (
|
|
|
|
|
AuthError,
|
|
|
|
|
Codes,
|
|
|
|
|
NotFoundError,
|
|
|
|
|
StoreError,
|
|
|
|
|
SynapseError,
|
|
|
|
|
UnsupportedRoomVersionError,
|
|
|
|
|
)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
from synapse.events import EventBase
|
|
|
|
|
from synapse.types import JsonDict
|
2021-08-10 19:08:17 +02:00
|
|
|
|
from synapse.util.caches.response_cache import ResponseCache
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
|
|
|
|
if TYPE_CHECKING:
|
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
# number of rooms to return. We'll stop once we hit this limit.
|
|
|
|
|
MAX_ROOMS = 50
|
|
|
|
|
|
|
|
|
|
# max number of events to return per room.
|
|
|
|
|
MAX_ROOMS_PER_SPACE = 50
|
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
# max number of federation servers to hit per room
|
|
|
|
|
MAX_SERVERS_PER_SPACE = 3
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-10 19:08:17 +02:00
|
|
|
|
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
|
|
|
|
class _PaginationKey:
|
|
|
|
|
"""The key used to find unique pagination session."""
|
|
|
|
|
|
|
|
|
|
# The first three entries match the request parameters (and cannot change
|
|
|
|
|
# during a pagination session).
|
|
|
|
|
room_id: str
|
|
|
|
|
suggested_only: bool
|
|
|
|
|
max_depth: Optional[int]
|
|
|
|
|
# The randomly generated token.
|
|
|
|
|
token: str
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
|
|
|
|
class _PaginationSession:
|
|
|
|
|
"""The information that is stored for pagination."""
|
|
|
|
|
|
2021-08-11 20:52:09 +02:00
|
|
|
|
# The time the pagination session was created, in milliseconds.
|
|
|
|
|
creation_time_ms: int
|
2021-08-10 19:08:17 +02:00
|
|
|
|
# The queue of rooms which are still to process.
|
2021-08-16 14:06:17 +02:00
|
|
|
|
room_queue: List["_RoomQueueEntry"]
|
2021-08-10 19:08:17 +02:00
|
|
|
|
# A set of rooms which have been processed.
|
|
|
|
|
processed_rooms: Set[str]
|
|
|
|
|
|
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
|
class RoomSummaryHandler:
|
2021-08-24 14:14:03 +02:00
|
|
|
|
# A unique key used for pagination sessions for the room hierarchy endpoint.
|
|
|
|
|
_PAGINATION_SESSION_TYPE = "room_hierarchy_pagination"
|
|
|
|
|
|
2021-08-11 20:52:09 +02:00
|
|
|
|
# The time a pagination session remains valid for.
|
|
|
|
|
_PAGINATION_SESSION_VALIDITY_PERIOD_MS = 5 * 60 * 1000
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
def __init__(self, hs: "HomeServer"):
|
2021-05-20 17:10:36 +02:00
|
|
|
|
self._event_auth_handler = hs.get_event_auth_handler()
|
2021-03-18 19:24:16 +01:00
|
|
|
|
self._store = hs.get_datastore()
|
|
|
|
|
self._event_serializer = hs.get_event_client_serializer()
|
2021-03-24 13:45:39 +01:00
|
|
|
|
self._server_name = hs.hostname
|
|
|
|
|
self._federation_client = hs.get_federation_client()
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-10 19:08:17 +02:00
|
|
|
|
# If a user tries to fetch the same page multiple times in quick succession,
|
|
|
|
|
# only process the first attempt and return its result to subsequent requests.
|
|
|
|
|
self._pagination_response_cache: ResponseCache[
|
|
|
|
|
Tuple[str, bool, Optional[int], Optional[int], Optional[str]]
|
|
|
|
|
] = ResponseCache(
|
|
|
|
|
hs.get_clock(),
|
|
|
|
|
"get_room_hierarchy",
|
|
|
|
|
)
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
async def get_space_summary(
|
|
|
|
|
self,
|
|
|
|
|
requester: str,
|
|
|
|
|
room_id: str,
|
|
|
|
|
suggested_only: bool = False,
|
|
|
|
|
max_rooms_per_space: Optional[int] = None,
|
|
|
|
|
) -> JsonDict:
|
|
|
|
|
"""
|
2021-03-23 12:51:12 +01:00
|
|
|
|
Implementation of the space summary C-S API
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
requester: user id of the user making this request
|
|
|
|
|
|
|
|
|
|
room_id: room id to start the summary at
|
|
|
|
|
|
|
|
|
|
suggested_only: whether we should only return children with the "suggested"
|
|
|
|
|
flag set.
|
|
|
|
|
|
|
|
|
|
max_rooms_per_space: an optional limit on the number of child rooms we will
|
|
|
|
|
return. This does not apply to the root room (ie, room_id), and
|
2021-03-23 12:51:12 +01:00
|
|
|
|
is overridden by MAX_ROOMS_PER_SPACE.
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
summary dict to return
|
|
|
|
|
"""
|
2021-08-11 21:04:51 +02:00
|
|
|
|
# First of all, check that the room is accessible.
|
|
|
|
|
if not await self._is_local_room_accessible(room_id, requester):
|
|
|
|
|
raise AuthError(
|
|
|
|
|
403,
|
|
|
|
|
"User %s not in room %s, and room previews are disabled"
|
|
|
|
|
% (requester, room_id),
|
|
|
|
|
)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
|
|
|
|
# the queue of rooms to process
|
2021-03-24 13:45:39 +01:00
|
|
|
|
room_queue = deque((_RoomQueueEntry(room_id, ()),))
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
# rooms we have already processed
|
2021-07-16 19:22:36 +02:00
|
|
|
|
processed_rooms: Set[str] = set()
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
# events we have already processed. We don't necessarily have their event ids,
|
|
|
|
|
# so instead we key on (room id, state key)
|
2021-07-16 19:22:36 +02:00
|
|
|
|
processed_events: Set[Tuple[str, str]] = set()
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
2021-07-16 19:22:36 +02:00
|
|
|
|
rooms_result: List[JsonDict] = []
|
|
|
|
|
events_result: List[JsonDict] = []
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
while room_queue and len(rooms_result) < MAX_ROOMS:
|
|
|
|
|
queue_entry = room_queue.popleft()
|
|
|
|
|
room_id = queue_entry.room_id
|
2021-03-24 13:45:39 +01:00
|
|
|
|
if room_id in processed_rooms:
|
|
|
|
|
# already done this room
|
|
|
|
|
continue
|
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
logger.debug("Processing room %s", room_id)
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
|
|
|
|
is_in_room = await self._store.is_host_joined(room_id, self._server_name)
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
|
|
|
|
# The client-specified max_rooms_per_space limit doesn't apply to the
|
|
|
|
|
# room_id specified in the request, so we ignore it if this is the
|
|
|
|
|
# first room we are processing.
|
|
|
|
|
max_children = max_rooms_per_space if processed_rooms else None
|
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
if is_in_room:
|
2021-08-05 14:39:17 +02:00
|
|
|
|
room_entry = await self._summarize_local_room(
|
2021-05-20 17:10:36 +02:00
|
|
|
|
requester, None, room_id, suggested_only, max_children
|
2021-03-24 13:45:39 +01:00
|
|
|
|
)
|
2021-05-20 17:10:36 +02:00
|
|
|
|
|
2021-08-10 19:08:17 +02:00
|
|
|
|
events: Sequence[JsonDict] = []
|
2021-08-05 14:39:17 +02:00
|
|
|
|
if room_entry:
|
|
|
|
|
rooms_result.append(room_entry.room)
|
2021-08-16 14:06:17 +02:00
|
|
|
|
events = room_entry.children_state_events
|
2021-08-05 14:39:17 +02:00
|
|
|
|
|
2021-05-20 17:10:36 +02:00
|
|
|
|
logger.debug(
|
|
|
|
|
"Query of local room %s returned events %s",
|
|
|
|
|
room_id,
|
|
|
|
|
["%s->%s" % (ev["room_id"], ev["state_key"]) for ev in events],
|
|
|
|
|
)
|
2021-03-24 13:45:39 +01:00
|
|
|
|
else:
|
2021-08-05 14:39:17 +02:00
|
|
|
|
fed_rooms = await self._summarize_remote_room(
|
2021-03-24 13:45:39 +01:00
|
|
|
|
queue_entry,
|
|
|
|
|
suggested_only,
|
|
|
|
|
max_children,
|
|
|
|
|
exclude_rooms=processed_rooms,
|
|
|
|
|
)
|
|
|
|
|
|
2021-05-20 17:10:36 +02:00
|
|
|
|
# The results over federation might include rooms that the we,
|
|
|
|
|
# as the requesting server, are allowed to see, but the requesting
|
|
|
|
|
# user is not permitted see.
|
|
|
|
|
#
|
|
|
|
|
# Filter the returned results to only what is accessible to the user.
|
|
|
|
|
events = []
|
2021-08-05 14:39:17 +02:00
|
|
|
|
for room_entry in fed_rooms:
|
|
|
|
|
room = room_entry.room
|
|
|
|
|
fed_room_id = room_entry.room_id
|
2021-05-20 17:10:36 +02:00
|
|
|
|
|
|
|
|
|
# The user can see the room, include it!
|
2021-08-10 16:56:54 +02:00
|
|
|
|
if await self._is_remote_room_accessible(
|
|
|
|
|
requester, fed_room_id, room
|
|
|
|
|
):
|
2021-08-06 13:40:29 +02:00
|
|
|
|
# Before returning to the client, remove the allowed_room_ids
|
|
|
|
|
# and allowed_spaces keys.
|
|
|
|
|
room.pop("allowed_room_ids", None)
|
|
|
|
|
room.pop("allowed_spaces", None)
|
|
|
|
|
|
2021-05-20 17:10:36 +02:00
|
|
|
|
rooms_result.append(room)
|
2021-08-16 14:06:17 +02:00
|
|
|
|
events.extend(room_entry.children_state_events)
|
2021-05-20 17:10:36 +02:00
|
|
|
|
|
|
|
|
|
# All rooms returned don't need visiting again (even if the user
|
|
|
|
|
# didn't have access to them).
|
|
|
|
|
processed_rooms.add(fed_room_id)
|
|
|
|
|
|
|
|
|
|
logger.debug(
|
|
|
|
|
"Query of %s returned rooms %s, events %s",
|
|
|
|
|
room_id,
|
2021-08-05 14:39:17 +02:00
|
|
|
|
[room_entry.room.get("room_id") for room_entry in fed_rooms],
|
|
|
|
|
["%s->%s" % (ev["room_id"], ev["state_key"]) for ev in events],
|
2021-05-20 17:10:36 +02:00
|
|
|
|
)
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
|
|
|
|
# the room we queried may or may not have been returned, but don't process
|
|
|
|
|
# it again, anyway.
|
|
|
|
|
processed_rooms.add(room_id)
|
|
|
|
|
|
|
|
|
|
# XXX: is it ok that we blindly iterate through any events returned by
|
|
|
|
|
# a remote server, whether or not they actually link to any rooms in our
|
|
|
|
|
# tree?
|
|
|
|
|
for ev in events:
|
|
|
|
|
# remote servers might return events we have already processed
|
|
|
|
|
# (eg, Dendrite returns inward pointers as well as outward ones), so
|
|
|
|
|
# we need to filter them out, to avoid returning duplicate links to the
|
|
|
|
|
# client.
|
|
|
|
|
ev_key = (ev["room_id"], ev["state_key"])
|
|
|
|
|
if ev_key in processed_events:
|
|
|
|
|
continue
|
|
|
|
|
events_result.append(ev)
|
|
|
|
|
|
|
|
|
|
# add the child to the queue. we have already validated
|
|
|
|
|
# that the vias are a list of server names.
|
|
|
|
|
room_queue.append(
|
|
|
|
|
_RoomQueueEntry(ev["state_key"], ev["content"]["via"])
|
|
|
|
|
)
|
|
|
|
|
processed_events.add(ev_key)
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
|
|
|
|
return {"rooms": rooms_result, "events": events_result}
|
|
|
|
|
|
2021-08-10 19:08:17 +02:00
|
|
|
|
async def get_room_hierarchy(
|
|
|
|
|
self,
|
|
|
|
|
requester: str,
|
|
|
|
|
requested_room_id: str,
|
|
|
|
|
suggested_only: bool = False,
|
|
|
|
|
max_depth: Optional[int] = None,
|
|
|
|
|
limit: Optional[int] = None,
|
|
|
|
|
from_token: Optional[str] = None,
|
|
|
|
|
) -> JsonDict:
|
|
|
|
|
"""
|
|
|
|
|
Implementation of the room hierarchy C-S API.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
requester: The user ID of the user making this request.
|
|
|
|
|
requested_room_id: The room ID to start the hierarchy at (the "root" room).
|
|
|
|
|
suggested_only: Whether we should only return children with the "suggested"
|
|
|
|
|
flag set.
|
|
|
|
|
max_depth: The maximum depth in the tree to explore, must be a
|
|
|
|
|
non-negative integer.
|
|
|
|
|
|
|
|
|
|
0 would correspond to just the root room, 1 would include just
|
|
|
|
|
the root room's children, etc.
|
|
|
|
|
limit: An optional limit on the number of rooms to return per
|
|
|
|
|
page. Must be a positive integer.
|
|
|
|
|
from_token: An optional pagination token.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
The JSON hierarchy dictionary.
|
|
|
|
|
"""
|
|
|
|
|
# If a user tries to fetch the same page multiple times in quick succession,
|
|
|
|
|
# only process the first attempt and return its result to subsequent requests.
|
|
|
|
|
#
|
|
|
|
|
# This is due to the pagination process mutating internal state, attempting
|
|
|
|
|
# to process multiple requests for the same page will result in errors.
|
|
|
|
|
return await self._pagination_response_cache.wrap(
|
|
|
|
|
(requested_room_id, suggested_only, max_depth, limit, from_token),
|
|
|
|
|
self._get_room_hierarchy,
|
|
|
|
|
requester,
|
|
|
|
|
requested_room_id,
|
|
|
|
|
suggested_only,
|
|
|
|
|
max_depth,
|
|
|
|
|
limit,
|
|
|
|
|
from_token,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
async def _get_room_hierarchy(
|
|
|
|
|
self,
|
|
|
|
|
requester: str,
|
|
|
|
|
requested_room_id: str,
|
|
|
|
|
suggested_only: bool = False,
|
|
|
|
|
max_depth: Optional[int] = None,
|
|
|
|
|
limit: Optional[int] = None,
|
|
|
|
|
from_token: Optional[str] = None,
|
|
|
|
|
) -> JsonDict:
|
|
|
|
|
"""See docstring for SpaceSummaryHandler.get_room_hierarchy."""
|
|
|
|
|
|
2021-08-11 21:04:51 +02:00
|
|
|
|
# First of all, check that the room is accessible.
|
|
|
|
|
if not await self._is_local_room_accessible(requested_room_id, requester):
|
|
|
|
|
raise AuthError(
|
|
|
|
|
403,
|
|
|
|
|
"User %s not in room %s, and room previews are disabled"
|
|
|
|
|
% (requester, requested_room_id),
|
|
|
|
|
)
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
|
|
# If this is continuing a previous session, pull the persisted data.
|
|
|
|
|
if from_token:
|
2021-08-24 14:14:03 +02:00
|
|
|
|
try:
|
|
|
|
|
pagination_session = await self._store.get_session(
|
|
|
|
|
session_type=self._PAGINATION_SESSION_TYPE,
|
|
|
|
|
session_id=from_token,
|
|
|
|
|
)
|
|
|
|
|
except StoreError:
|
|
|
|
|
raise SynapseError(400, "Unknown pagination token", Codes.INVALID_PARAM)
|
2021-08-11 20:52:09 +02:00
|
|
|
|
|
2021-08-24 14:14:03 +02:00
|
|
|
|
# If the requester, room ID, suggested-only, or max depth were modified
|
|
|
|
|
# the session is invalid.
|
|
|
|
|
if (
|
|
|
|
|
requester != pagination_session["requester"]
|
|
|
|
|
or requested_room_id != pagination_session["room_id"]
|
|
|
|
|
or suggested_only != pagination_session["suggested_only"]
|
|
|
|
|
or max_depth != pagination_session["max_depth"]
|
|
|
|
|
):
|
2021-08-10 19:08:17 +02:00
|
|
|
|
raise SynapseError(400, "Unknown pagination token", Codes.INVALID_PARAM)
|
|
|
|
|
|
|
|
|
|
# Load the previous state.
|
2021-08-24 14:14:03 +02:00
|
|
|
|
room_queue = [
|
|
|
|
|
_RoomQueueEntry(*fields) for fields in pagination_session["room_queue"]
|
|
|
|
|
]
|
|
|
|
|
processed_rooms = set(pagination_session["processed_rooms"])
|
2021-08-10 19:08:17 +02:00
|
|
|
|
else:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# The queue of rooms to process, the next room is last on the stack.
|
|
|
|
|
room_queue = [_RoomQueueEntry(requested_room_id, ())]
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
|
|
# Rooms we have already processed.
|
|
|
|
|
processed_rooms = set()
|
|
|
|
|
|
|
|
|
|
rooms_result: List[JsonDict] = []
|
|
|
|
|
|
|
|
|
|
# Cap the limit to a server-side maximum.
|
|
|
|
|
if limit is None:
|
|
|
|
|
limit = MAX_ROOMS
|
|
|
|
|
else:
|
|
|
|
|
limit = min(limit, MAX_ROOMS)
|
|
|
|
|
|
|
|
|
|
# Iterate through the queue until we reach the limit or run out of
|
|
|
|
|
# rooms to include.
|
|
|
|
|
while room_queue and len(rooms_result) < limit:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
queue_entry = room_queue.pop()
|
2021-08-10 19:08:17 +02:00
|
|
|
|
room_id = queue_entry.room_id
|
|
|
|
|
current_depth = queue_entry.depth
|
|
|
|
|
if room_id in processed_rooms:
|
|
|
|
|
# already done this room
|
|
|
|
|
continue
|
|
|
|
|
|
|
|
|
|
logger.debug("Processing room %s", room_id)
|
|
|
|
|
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# A map of summaries for children rooms that might be returned over
|
|
|
|
|
# federation. The rationale for caching these and *maybe* using them
|
|
|
|
|
# is to prefer any information local to the homeserver before trusting
|
|
|
|
|
# data received over federation.
|
|
|
|
|
children_room_entries: Dict[str, JsonDict] = {}
|
|
|
|
|
# A set of room IDs which are children that did not have information
|
|
|
|
|
# returned over federation and are known to be inaccessible to the
|
|
|
|
|
# current server. We should not reach out over federation to try to
|
|
|
|
|
# summarise these rooms.
|
|
|
|
|
inaccessible_children: Set[str] = set()
|
|
|
|
|
|
|
|
|
|
# If the room is known locally, summarise it!
|
2021-08-10 19:08:17 +02:00
|
|
|
|
is_in_room = await self._store.is_host_joined(room_id, self._server_name)
|
|
|
|
|
if is_in_room:
|
|
|
|
|
room_entry = await self._summarize_local_room(
|
|
|
|
|
requester,
|
|
|
|
|
None,
|
|
|
|
|
room_id,
|
|
|
|
|
suggested_only,
|
|
|
|
|
# TODO Handle max children.
|
|
|
|
|
max_children=None,
|
|
|
|
|
)
|
|
|
|
|
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# Otherwise, attempt to use information for federation.
|
2021-08-10 19:08:17 +02:00
|
|
|
|
else:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# A previous call might have included information for this room.
|
|
|
|
|
# It can be used if either:
|
|
|
|
|
#
|
|
|
|
|
# 1. The room is not a space.
|
|
|
|
|
# 2. The maximum depth has been achieved (since no children
|
|
|
|
|
# information is needed).
|
|
|
|
|
if queue_entry.remote_room and (
|
|
|
|
|
queue_entry.remote_room.get("room_type") != RoomTypes.SPACE
|
|
|
|
|
or (max_depth is not None and current_depth >= max_depth)
|
|
|
|
|
):
|
|
|
|
|
room_entry = _RoomEntry(
|
|
|
|
|
queue_entry.room_id, queue_entry.remote_room
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# If the above isn't true, attempt to fetch the room
|
|
|
|
|
# information over federation.
|
|
|
|
|
else:
|
|
|
|
|
(
|
|
|
|
|
room_entry,
|
|
|
|
|
children_room_entries,
|
|
|
|
|
inaccessible_children,
|
2021-08-16 16:49:12 +02:00
|
|
|
|
) = await self._summarize_remote_room_hierarchy(
|
2021-08-16 14:06:17 +02:00
|
|
|
|
queue_entry,
|
|
|
|
|
suggested_only,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# Ensure this room is accessible to the requester (and not just
|
|
|
|
|
# the homeserver).
|
|
|
|
|
if room_entry and not await self._is_remote_room_accessible(
|
|
|
|
|
requester, queue_entry.room_id, room_entry.room
|
|
|
|
|
):
|
|
|
|
|
room_entry = None
|
|
|
|
|
|
|
|
|
|
# This room has been processed and should be ignored if it appears
|
|
|
|
|
# elsewhere in the hierarchy.
|
|
|
|
|
processed_rooms.add(room_id)
|
|
|
|
|
|
|
|
|
|
# There may or may not be a room entry based on whether it is
|
|
|
|
|
# inaccessible to the requesting user.
|
|
|
|
|
if room_entry:
|
|
|
|
|
# Add the room (including the stripped m.space.child events).
|
|
|
|
|
rooms_result.append(room_entry.as_json())
|
|
|
|
|
|
|
|
|
|
# If this room is not at the max-depth, check if there are any
|
|
|
|
|
# children to process.
|
|
|
|
|
if max_depth is None or current_depth < max_depth:
|
|
|
|
|
# The children get added in reverse order so that the next
|
|
|
|
|
# room to process, according to the ordering, is the last
|
|
|
|
|
# item in the list.
|
|
|
|
|
room_queue.extend(
|
|
|
|
|
_RoomQueueEntry(
|
|
|
|
|
ev["state_key"],
|
|
|
|
|
ev["content"]["via"],
|
|
|
|
|
current_depth + 1,
|
|
|
|
|
children_room_entries.get(ev["state_key"]),
|
|
|
|
|
)
|
|
|
|
|
for ev in reversed(room_entry.children_state_events)
|
|
|
|
|
if ev["type"] == EventTypes.SpaceChild
|
|
|
|
|
and ev["state_key"] not in inaccessible_children
|
|
|
|
|
)
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
|
|
result: JsonDict = {"rooms": rooms_result}
|
|
|
|
|
|
|
|
|
|
# If there's additional data, generate a pagination token (and persist state).
|
|
|
|
|
if room_queue:
|
2021-08-24 14:14:03 +02:00
|
|
|
|
result["next_batch"] = await self._store.create_session(
|
|
|
|
|
session_type=self._PAGINATION_SESSION_TYPE,
|
|
|
|
|
value={
|
|
|
|
|
# Information which must be identical across pagination.
|
|
|
|
|
"requester": requester,
|
|
|
|
|
"room_id": requested_room_id,
|
|
|
|
|
"suggested_only": suggested_only,
|
|
|
|
|
"max_depth": max_depth,
|
|
|
|
|
# The stored state.
|
|
|
|
|
"room_queue": [
|
|
|
|
|
attr.astuple(room_entry) for room_entry in room_queue
|
|
|
|
|
],
|
|
|
|
|
"processed_rooms": list(processed_rooms),
|
|
|
|
|
},
|
|
|
|
|
expiry_ms=self._PAGINATION_SESSION_VALIDITY_PERIOD_MS,
|
2021-08-10 19:08:17 +02:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
async def federation_space_summary(
|
|
|
|
|
self,
|
2021-05-20 17:10:36 +02:00
|
|
|
|
origin: str,
|
2021-03-23 12:51:12 +01:00
|
|
|
|
room_id: str,
|
|
|
|
|
suggested_only: bool,
|
|
|
|
|
max_rooms_per_space: Optional[int],
|
|
|
|
|
exclude_rooms: Iterable[str],
|
|
|
|
|
) -> JsonDict:
|
|
|
|
|
"""
|
|
|
|
|
Implementation of the space summary Federation API
|
|
|
|
|
|
|
|
|
|
Args:
|
2021-05-20 17:10:36 +02:00
|
|
|
|
origin: The server requesting the spaces summary.
|
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
room_id: room id to start the summary at
|
|
|
|
|
|
|
|
|
|
suggested_only: whether we should only return children with the "suggested"
|
|
|
|
|
flag set.
|
|
|
|
|
|
|
|
|
|
max_rooms_per_space: an optional limit on the number of child rooms we will
|
|
|
|
|
return. Unlike the C-S API, this applies to the root room (room_id).
|
|
|
|
|
It is clipped to MAX_ROOMS_PER_SPACE.
|
|
|
|
|
|
|
|
|
|
exclude_rooms: a list of rooms to skip over (presumably because the
|
|
|
|
|
calling server has already seen them).
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
summary dict to return
|
|
|
|
|
"""
|
|
|
|
|
# the queue of rooms to process
|
|
|
|
|
room_queue = deque((room_id,))
|
|
|
|
|
|
|
|
|
|
# the set of rooms that we should not walk further. Initialise it with the
|
|
|
|
|
# excluded-rooms list; we will add other rooms as we process them so that
|
|
|
|
|
# we do not loop.
|
2021-07-16 19:22:36 +02:00
|
|
|
|
processed_rooms: Set[str] = set(exclude_rooms)
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
2021-07-16 19:22:36 +02:00
|
|
|
|
rooms_result: List[JsonDict] = []
|
|
|
|
|
events_result: List[JsonDict] = []
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
|
|
|
|
while room_queue and len(rooms_result) < MAX_ROOMS:
|
|
|
|
|
room_id = room_queue.popleft()
|
2021-03-24 13:45:39 +01:00
|
|
|
|
if room_id in processed_rooms:
|
|
|
|
|
# already done this room
|
|
|
|
|
continue
|
|
|
|
|
|
2021-08-05 14:39:17 +02:00
|
|
|
|
room_entry = await self._summarize_local_room(
|
2021-05-20 17:10:36 +02:00
|
|
|
|
None, origin, room_id, suggested_only, max_rooms_per_space
|
2021-03-23 12:51:12 +01:00
|
|
|
|
)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
processed_rooms.add(room_id)
|
|
|
|
|
|
2021-08-05 14:39:17 +02:00
|
|
|
|
if room_entry:
|
|
|
|
|
rooms_result.append(room_entry.room)
|
2021-08-16 14:06:17 +02:00
|
|
|
|
events_result.extend(room_entry.children_state_events)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-05 14:39:17 +02:00
|
|
|
|
# add any children to the queue
|
|
|
|
|
room_queue.extend(
|
2021-08-16 14:06:17 +02:00
|
|
|
|
edge_event["state_key"]
|
|
|
|
|
for edge_event in room_entry.children_state_events
|
2021-08-05 14:39:17 +02:00
|
|
|
|
)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
return {"rooms": rooms_result, "events": events_result}
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-16 14:06:17 +02:00
|
|
|
|
async def get_federation_hierarchy(
|
|
|
|
|
self,
|
|
|
|
|
origin: str,
|
|
|
|
|
requested_room_id: str,
|
|
|
|
|
suggested_only: bool,
|
2021-09-20 14:56:23 +02:00
|
|
|
|
) -> JsonDict:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
"""
|
|
|
|
|
Implementation of the room hierarchy Federation API.
|
|
|
|
|
|
|
|
|
|
This is similar to get_room_hierarchy, but does not recurse into the space.
|
|
|
|
|
It also considers whether anyone on the server may be able to access the
|
|
|
|
|
room, as opposed to whether a specific user can.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
origin: The server requesting the spaces summary.
|
|
|
|
|
requested_room_id: The room ID to start the hierarchy at (the "root" room).
|
|
|
|
|
suggested_only: whether we should only return children with the "suggested"
|
|
|
|
|
flag set.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
The JSON hierarchy dictionary.
|
|
|
|
|
"""
|
|
|
|
|
root_room_entry = await self._summarize_local_room(
|
|
|
|
|
None, origin, requested_room_id, suggested_only, max_children=None
|
|
|
|
|
)
|
|
|
|
|
if root_room_entry is None:
|
|
|
|
|
# Room is inaccessible to the requesting server.
|
|
|
|
|
raise SynapseError(404, "Unknown room: %s" % (requested_room_id,))
|
|
|
|
|
|
|
|
|
|
children_rooms_result: List[JsonDict] = []
|
|
|
|
|
inaccessible_children: List[str] = []
|
|
|
|
|
|
|
|
|
|
# Iterate through each child and potentially add it, but not its children,
|
|
|
|
|
# to the response.
|
|
|
|
|
for child_room in root_room_entry.children_state_events:
|
|
|
|
|
room_id = child_room.get("state_key")
|
|
|
|
|
assert isinstance(room_id, str)
|
|
|
|
|
# If the room is unknown, skip it.
|
|
|
|
|
if not await self._store.is_host_joined(room_id, self._server_name):
|
|
|
|
|
continue
|
|
|
|
|
|
|
|
|
|
room_entry = await self._summarize_local_room(
|
|
|
|
|
None, origin, room_id, suggested_only, max_children=0
|
|
|
|
|
)
|
|
|
|
|
# If the room is accessible, include it in the results.
|
|
|
|
|
#
|
|
|
|
|
# Note that only the room summary (without information on children)
|
|
|
|
|
# is included in the summary.
|
|
|
|
|
if room_entry:
|
|
|
|
|
children_rooms_result.append(room_entry.room)
|
|
|
|
|
# Otherwise, note that the requesting server shouldn't bother
|
|
|
|
|
# trying to summarize this room - they do not have access to it.
|
|
|
|
|
else:
|
|
|
|
|
inaccessible_children.append(room_id)
|
|
|
|
|
|
|
|
|
|
return {
|
|
|
|
|
# Include the requested room (including the stripped children events).
|
|
|
|
|
"room": root_room_entry.as_json(),
|
|
|
|
|
"children": children_rooms_result,
|
|
|
|
|
"inaccessible_children": inaccessible_children,
|
|
|
|
|
}
|
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
async def _summarize_local_room(
|
|
|
|
|
self,
|
|
|
|
|
requester: Optional[str],
|
2021-05-20 17:10:36 +02:00
|
|
|
|
origin: Optional[str],
|
2021-03-23 12:51:12 +01:00
|
|
|
|
room_id: str,
|
|
|
|
|
suggested_only: bool,
|
|
|
|
|
max_children: Optional[int],
|
2021-08-05 14:39:17 +02:00
|
|
|
|
) -> Optional["_RoomEntry"]:
|
2021-05-11 18:57:39 +02:00
|
|
|
|
"""
|
|
|
|
|
Generate a room entry and a list of event entries for a given room.
|
|
|
|
|
|
|
|
|
|
Args:
|
2021-05-17 15:01:19 +02:00
|
|
|
|
requester:
|
|
|
|
|
The user requesting the summary, if it is a local request. None
|
|
|
|
|
if this is a federation request.
|
2021-05-20 17:10:36 +02:00
|
|
|
|
origin:
|
|
|
|
|
The server requesting the summary, if it is a federation request.
|
|
|
|
|
None if this is a local request.
|
2021-05-11 18:57:39 +02:00
|
|
|
|
room_id: The room ID to summarize.
|
|
|
|
|
suggested_only: True if only suggested children should be returned.
|
|
|
|
|
Otherwise, all children are returned.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
max_children:
|
|
|
|
|
The maximum number of children rooms to include. This is capped
|
|
|
|
|
to a server-set limit.
|
2021-05-11 18:57:39 +02:00
|
|
|
|
|
|
|
|
|
Returns:
|
2021-08-05 14:39:17 +02:00
|
|
|
|
A room entry if the room should be returned. None, otherwise.
|
2021-05-11 18:57:39 +02:00
|
|
|
|
"""
|
2021-08-10 16:56:54 +02:00
|
|
|
|
if not await self._is_local_room_accessible(room_id, requester, origin):
|
2021-08-05 14:39:17 +02:00
|
|
|
|
return None
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
2021-08-06 13:40:29 +02:00
|
|
|
|
room_entry = await self._build_room_entry(room_id, for_federation=bool(origin))
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# If the room is not a space or the children don't matter, return just
|
|
|
|
|
# the room information.
|
|
|
|
|
if room_entry.get("room_type") != RoomTypes.SPACE or max_children == 0:
|
2021-08-05 14:39:17 +02:00
|
|
|
|
return _RoomEntry(room_id, room_entry)
|
2021-06-29 18:00:04 +02:00
|
|
|
|
|
|
|
|
|
# Otherwise, look for child rooms/spaces.
|
2021-03-23 12:51:12 +01:00
|
|
|
|
child_events = await self._get_child_events(room_id)
|
|
|
|
|
|
|
|
|
|
if suggested_only:
|
|
|
|
|
# we only care about suggested children
|
|
|
|
|
child_events = filter(_is_suggested_child_event, child_events)
|
|
|
|
|
|
|
|
|
|
if max_children is None or max_children > MAX_ROOMS_PER_SPACE:
|
|
|
|
|
max_children = MAX_ROOMS_PER_SPACE
|
|
|
|
|
|
2021-09-07 14:43:54 +02:00
|
|
|
|
stripped_events: List[JsonDict] = [
|
|
|
|
|
{
|
|
|
|
|
"type": e.type,
|
|
|
|
|
"state_key": e.state_key,
|
|
|
|
|
"content": e.content,
|
|
|
|
|
"room_id": e.room_id,
|
|
|
|
|
"sender": e.sender,
|
|
|
|
|
"origin_server_ts": e.origin_server_ts,
|
|
|
|
|
}
|
|
|
|
|
for e in itertools.islice(child_events, max_children)
|
|
|
|
|
]
|
|
|
|
|
return _RoomEntry(room_id, room_entry, stripped_events)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-24 13:45:39 +01:00
|
|
|
|
async def _summarize_remote_room(
|
|
|
|
|
self,
|
|
|
|
|
room: "_RoomQueueEntry",
|
|
|
|
|
suggested_only: bool,
|
|
|
|
|
max_children: Optional[int],
|
|
|
|
|
exclude_rooms: Iterable[str],
|
2021-08-05 14:39:17 +02:00
|
|
|
|
) -> Iterable["_RoomEntry"]:
|
2021-05-17 15:01:19 +02:00
|
|
|
|
"""
|
|
|
|
|
Request room entries and a list of event entries for a given room by querying a remote server.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
room: The room to summarize.
|
|
|
|
|
suggested_only: True if only suggested children should be returned.
|
|
|
|
|
Otherwise, all children are returned.
|
|
|
|
|
max_children:
|
|
|
|
|
The maximum number of children rooms to include. This is capped
|
|
|
|
|
to a server-set limit.
|
|
|
|
|
exclude_rooms:
|
|
|
|
|
Rooms IDs which do not need to be summarized.
|
|
|
|
|
|
|
|
|
|
Returns:
|
2021-08-05 14:39:17 +02:00
|
|
|
|
An iterable of room entries.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
"""
|
2021-03-24 13:45:39 +01:00
|
|
|
|
room_id = room.room_id
|
|
|
|
|
logger.info("Requesting summary for %s via %s", room_id, room.via)
|
|
|
|
|
|
|
|
|
|
# we need to make the exclusion list json-serialisable
|
|
|
|
|
exclude_rooms = list(exclude_rooms)
|
|
|
|
|
|
|
|
|
|
via = itertools.islice(room.via, MAX_SERVERS_PER_SPACE)
|
|
|
|
|
try:
|
|
|
|
|
res = await self._federation_client.get_space_summary(
|
|
|
|
|
via,
|
|
|
|
|
room_id,
|
|
|
|
|
suggested_only=suggested_only,
|
|
|
|
|
max_rooms_per_space=max_children,
|
|
|
|
|
exclude_rooms=exclude_rooms,
|
|
|
|
|
)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
logger.warning(
|
|
|
|
|
"Unable to get summary of %s via federation: %s",
|
|
|
|
|
room_id,
|
|
|
|
|
e,
|
|
|
|
|
exc_info=logger.isEnabledFor(logging.DEBUG),
|
|
|
|
|
)
|
2021-08-05 14:39:17 +02:00
|
|
|
|
return ()
|
|
|
|
|
|
|
|
|
|
# Group the events by their room.
|
|
|
|
|
children_by_room: Dict[str, List[JsonDict]] = {}
|
|
|
|
|
for ev in res.events:
|
|
|
|
|
if ev.event_type == EventTypes.SpaceChild:
|
|
|
|
|
children_by_room.setdefault(ev.room_id, []).append(ev.data)
|
|
|
|
|
|
|
|
|
|
# Generate the final results.
|
|
|
|
|
results = []
|
|
|
|
|
for fed_room in res.rooms:
|
|
|
|
|
fed_room_id = fed_room.get("room_id")
|
|
|
|
|
if not fed_room_id or not isinstance(fed_room_id, str):
|
|
|
|
|
continue
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
2021-08-05 14:39:17 +02:00
|
|
|
|
results.append(
|
|
|
|
|
_RoomEntry(
|
|
|
|
|
fed_room_id,
|
|
|
|
|
fed_room,
|
|
|
|
|
children_by_room.get(fed_room_id, []),
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
return results
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
|
async def _summarize_remote_room_hierarchy(
|
2021-08-16 14:06:17 +02:00
|
|
|
|
self, room: "_RoomQueueEntry", suggested_only: bool
|
|
|
|
|
) -> Tuple[Optional["_RoomEntry"], Dict[str, JsonDict], Set[str]]:
|
|
|
|
|
"""
|
|
|
|
|
Request room entries and a list of event entries for a given room by querying a remote server.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
room: The room to summarize.
|
|
|
|
|
suggested_only: True if only suggested children should be returned.
|
|
|
|
|
Otherwise, all children are returned.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
A tuple of:
|
|
|
|
|
The room entry.
|
|
|
|
|
Partial room data return over federation.
|
|
|
|
|
A set of inaccessible children room IDs.
|
|
|
|
|
"""
|
|
|
|
|
room_id = room.room_id
|
|
|
|
|
logger.info("Requesting summary for %s via %s", room_id, room.via)
|
|
|
|
|
|
|
|
|
|
via = itertools.islice(room.via, MAX_SERVERS_PER_SPACE)
|
|
|
|
|
try:
|
|
|
|
|
(
|
|
|
|
|
room_response,
|
|
|
|
|
children,
|
|
|
|
|
inaccessible_children,
|
|
|
|
|
) = await self._federation_client.get_room_hierarchy(
|
|
|
|
|
via,
|
|
|
|
|
room_id,
|
|
|
|
|
suggested_only=suggested_only,
|
|
|
|
|
)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
logger.warning(
|
|
|
|
|
"Unable to get hierarchy of %s via federation: %s",
|
|
|
|
|
room_id,
|
|
|
|
|
e,
|
|
|
|
|
exc_info=logger.isEnabledFor(logging.DEBUG),
|
|
|
|
|
)
|
|
|
|
|
return None, {}, set()
|
|
|
|
|
|
|
|
|
|
# Map the children to their room ID.
|
|
|
|
|
children_by_room_id = {
|
|
|
|
|
c["room_id"]: c
|
|
|
|
|
for c in children
|
|
|
|
|
if "room_id" in c and isinstance(c["room_id"], str)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (
|
|
|
|
|
_RoomEntry(room_id, room_response, room_response.pop("children_state", ())),
|
|
|
|
|
children_by_room_id,
|
|
|
|
|
set(inaccessible_children),
|
|
|
|
|
)
|
|
|
|
|
|
2021-08-10 16:56:54 +02:00
|
|
|
|
async def _is_local_room_accessible(
|
2021-08-11 21:04:51 +02:00
|
|
|
|
self, room_id: str, requester: Optional[str], origin: Optional[str] = None
|
2021-05-20 17:10:36 +02:00
|
|
|
|
) -> bool:
|
2021-05-17 15:01:19 +02:00
|
|
|
|
"""
|
2021-08-16 16:49:12 +02:00
|
|
|
|
Calculate whether the room should be shown to the requester.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
|
It should return true if:
|
2021-05-17 15:01:19 +02:00
|
|
|
|
|
2021-07-13 14:59:27 +02:00
|
|
|
|
* The requester is joined or can join the room (per MSC3173).
|
|
|
|
|
* The origin server has any user that is joined or can join the room.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
* The history visibility is set to world readable.
|
|
|
|
|
|
|
|
|
|
Args:
|
2021-08-16 16:49:12 +02:00
|
|
|
|
room_id: The room ID to check accessibility of.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
requester:
|
2021-08-16 16:49:12 +02:00
|
|
|
|
The user making the request, if it is a local request.
|
|
|
|
|
None if this is a federation request.
|
2021-05-20 17:10:36 +02:00
|
|
|
|
origin:
|
2021-08-16 16:49:12 +02:00
|
|
|
|
The server making the request, if it is a federation request.
|
2021-05-20 17:10:36 +02:00
|
|
|
|
None if this is a local request.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
|
|
|
|
|
Returns:
|
2021-08-16 16:49:12 +02:00
|
|
|
|
True if the room is accessible to the requesting user or server.
|
2021-05-17 15:01:19 +02:00
|
|
|
|
"""
|
2021-05-20 17:10:36 +02:00
|
|
|
|
state_ids = await self._store.get_current_state_ids(room_id)
|
|
|
|
|
|
|
|
|
|
# If there's no state for the room, it isn't known.
|
|
|
|
|
if not state_ids:
|
2021-07-13 14:59:27 +02:00
|
|
|
|
# The user might have a pending invite for the room.
|
|
|
|
|
if requester and await self._store.get_invite_for_local_user_in_room(
|
|
|
|
|
requester, room_id
|
|
|
|
|
):
|
|
|
|
|
return True
|
|
|
|
|
|
2021-05-20 17:10:36 +02:00
|
|
|
|
logger.info("room %s is unknown, omitting from summary", room_id)
|
|
|
|
|
return False
|
|
|
|
|
|
2021-09-01 19:01:08 +02:00
|
|
|
|
try:
|
|
|
|
|
room_version = await self._store.get_room_version(room_id)
|
|
|
|
|
except UnsupportedRoomVersionError:
|
|
|
|
|
# If a room with an unsupported room version is encountered, ignore
|
|
|
|
|
# it to avoid breaking the entire summary response.
|
|
|
|
|
return False
|
2021-05-17 15:01:19 +02:00
|
|
|
|
|
2021-07-13 14:59:27 +02:00
|
|
|
|
# Include the room if it has join rules of public or knock.
|
|
|
|
|
join_rules_event_id = state_ids.get((EventTypes.JoinRules, ""))
|
|
|
|
|
if join_rules_event_id:
|
|
|
|
|
join_rules_event = await self._store.get_event(join_rules_event_id)
|
|
|
|
|
join_rule = join_rules_event.content.get("join_rule")
|
|
|
|
|
if join_rule == JoinRules.PUBLIC or (
|
|
|
|
|
room_version.msc2403_knocking and join_rule == JoinRules.KNOCK
|
|
|
|
|
):
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Include the room if it is peekable.
|
|
|
|
|
hist_vis_event_id = state_ids.get((EventTypes.RoomHistoryVisibility, ""))
|
|
|
|
|
if hist_vis_event_id:
|
|
|
|
|
hist_vis_ev = await self._store.get_event(hist_vis_event_id)
|
|
|
|
|
hist_vis = hist_vis_ev.content.get("history_visibility")
|
|
|
|
|
if hist_vis == HistoryVisibility.WORLD_READABLE:
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Otherwise we need to check information specific to the user or server.
|
|
|
|
|
|
|
|
|
|
# If we have an authenticated requesting user, check if they are a member
|
|
|
|
|
# of the room (or can join the room).
|
2021-03-23 12:51:12 +01:00
|
|
|
|
if requester:
|
2021-05-20 17:10:36 +02:00
|
|
|
|
member_event_id = state_ids.get((EventTypes.Member, requester), None)
|
|
|
|
|
|
|
|
|
|
# If they're in the room they can see info on it.
|
|
|
|
|
if member_event_id:
|
|
|
|
|
member_event = await self._store.get_event(member_event_id)
|
|
|
|
|
if member_event.membership in (Membership.JOIN, Membership.INVITE):
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Otherwise, check if they should be allowed access via membership in a space.
|
2021-06-18 19:41:33 +02:00
|
|
|
|
if await self._event_auth_handler.has_restricted_join_rules(
|
2021-06-02 17:31:41 +02:00
|
|
|
|
state_ids, room_version
|
|
|
|
|
):
|
2021-06-17 18:53:27 +02:00
|
|
|
|
allowed_rooms = (
|
|
|
|
|
await self._event_auth_handler.get_rooms_that_allow_join(state_ids)
|
2021-05-20 17:10:36 +02:00
|
|
|
|
)
|
2021-06-02 17:31:41 +02:00
|
|
|
|
if await self._event_auth_handler.is_user_in_rooms(
|
2021-06-17 18:53:27 +02:00
|
|
|
|
allowed_rooms, requester
|
2021-06-02 17:31:41 +02:00
|
|
|
|
):
|
|
|
|
|
return True
|
2021-05-20 17:10:36 +02:00
|
|
|
|
|
|
|
|
|
# If this is a request over federation, check if the host is in the room or
|
2021-07-13 14:59:27 +02:00
|
|
|
|
# has a user who could join the room.
|
2021-05-20 17:10:36 +02:00
|
|
|
|
elif origin:
|
2021-07-13 14:59:27 +02:00
|
|
|
|
if await self._event_auth_handler.check_host_in_room(
|
|
|
|
|
room_id, origin
|
|
|
|
|
) or await self._store.is_host_invited(room_id, origin):
|
2021-05-20 17:10:36 +02:00
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Alternately, if the host has a user in any of the spaces specified
|
|
|
|
|
# for access, then the host can see this room (and should do filtering
|
|
|
|
|
# if the requester cannot see it).
|
|
|
|
|
if await self._event_auth_handler.has_restricted_join_rules(
|
|
|
|
|
state_ids, room_version
|
|
|
|
|
):
|
2021-06-17 18:53:27 +02:00
|
|
|
|
allowed_rooms = (
|
|
|
|
|
await self._event_auth_handler.get_rooms_that_allow_join(state_ids)
|
2021-05-20 17:10:36 +02:00
|
|
|
|
)
|
2021-06-17 18:53:27 +02:00
|
|
|
|
for space_id in allowed_rooms:
|
2021-07-01 20:25:37 +02:00
|
|
|
|
if await self._event_auth_handler.check_host_in_room(
|
|
|
|
|
space_id, origin
|
|
|
|
|
):
|
2021-05-20 17:10:36 +02:00
|
|
|
|
return True
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-03-23 12:51:12 +01:00
|
|
|
|
logger.info(
|
2021-07-13 14:59:27 +02:00
|
|
|
|
"room %s is unpeekable and requester %s is not a member / not allowed to join, omitting from summary",
|
2021-03-23 12:51:12 +01:00
|
|
|
|
room_id,
|
2021-07-13 14:59:27 +02:00
|
|
|
|
requester or origin,
|
2021-03-23 12:51:12 +01:00
|
|
|
|
)
|
|
|
|
|
return False
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-10 16:56:54 +02:00
|
|
|
|
async def _is_remote_room_accessible(
|
|
|
|
|
self, requester: str, room_id: str, room: JsonDict
|
|
|
|
|
) -> bool:
|
|
|
|
|
"""
|
2021-08-16 16:49:12 +02:00
|
|
|
|
Calculate whether the room received over federation should be shown to the requester.
|
2021-08-10 16:56:54 +02:00
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
|
It should return true if:
|
2021-08-10 16:56:54 +02:00
|
|
|
|
|
|
|
|
|
* The requester is joined or can join the room (per MSC3173).
|
|
|
|
|
* The history visibility is set to world readable.
|
|
|
|
|
|
|
|
|
|
Note that the local server is not in the requested room (which is why the
|
|
|
|
|
remote call was made in the first place), but the user could have access
|
|
|
|
|
due to an invite, etc.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
requester: The user requesting the summary.
|
|
|
|
|
room_id: The room ID returned over federation.
|
2021-08-16 16:49:12 +02:00
|
|
|
|
room: The summary of the room returned over federation.
|
2021-08-10 16:56:54 +02:00
|
|
|
|
|
|
|
|
|
Returns:
|
2021-08-16 16:49:12 +02:00
|
|
|
|
True if the room is accessible to the requesting user.
|
2021-08-10 16:56:54 +02:00
|
|
|
|
"""
|
|
|
|
|
# The API doesn't return the room version so assume that a
|
|
|
|
|
# join rule of knock is valid.
|
|
|
|
|
if (
|
|
|
|
|
room.get("join_rules") in (JoinRules.PUBLIC, JoinRules.KNOCK)
|
|
|
|
|
or room.get("world_readable") is True
|
|
|
|
|
):
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Check if the user is a member of any of the allowed spaces
|
|
|
|
|
# from the response.
|
|
|
|
|
allowed_rooms = room.get("allowed_room_ids") or room.get("allowed_spaces")
|
|
|
|
|
if allowed_rooms and isinstance(allowed_rooms, list):
|
|
|
|
|
if await self._event_auth_handler.is_user_in_rooms(
|
|
|
|
|
allowed_rooms, requester
|
|
|
|
|
):
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
# Finally, check locally if we can access the room. The user might
|
|
|
|
|
# already be in the room (if it was a child room), or there might be a
|
|
|
|
|
# pending invite, etc.
|
2021-08-11 21:04:51 +02:00
|
|
|
|
return await self._is_local_room_accessible(room_id, requester)
|
2021-08-10 16:56:54 +02:00
|
|
|
|
|
2021-08-06 13:40:29 +02:00
|
|
|
|
async def _build_room_entry(self, room_id: str, for_federation: bool) -> JsonDict:
|
|
|
|
|
"""
|
2021-08-16 16:49:12 +02:00
|
|
|
|
Generate en entry summarising a single room.
|
2021-08-06 13:40:29 +02:00
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
room_id: The room ID to summarize.
|
|
|
|
|
for_federation: True if this is a summary requested over federation
|
|
|
|
|
(which includes additional fields).
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
The JSON dictionary for the room.
|
|
|
|
|
"""
|
2021-03-18 19:24:16 +01:00
|
|
|
|
stats = await self._store.get_room_with_stats(room_id)
|
|
|
|
|
|
|
|
|
|
# currently this should be impossible because we call
|
2021-08-11 21:04:51 +02:00
|
|
|
|
# _is_local_room_accessible on the room before we get here, so
|
2021-03-18 19:24:16 +01:00
|
|
|
|
# there should always be an entry
|
|
|
|
|
assert stats is not None, "unable to retrieve stats for %s" % (room_id,)
|
|
|
|
|
|
|
|
|
|
current_state_ids = await self._store.get_current_state_ids(room_id)
|
|
|
|
|
create_event = await self._store.get_event(
|
|
|
|
|
current_state_ids[(EventTypes.Create, "")]
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
entry = {
|
|
|
|
|
"room_id": stats["room_id"],
|
|
|
|
|
"name": stats["name"],
|
|
|
|
|
"topic": stats["topic"],
|
|
|
|
|
"canonical_alias": stats["canonical_alias"],
|
|
|
|
|
"num_joined_members": stats["joined_members"],
|
|
|
|
|
"avatar_url": stats["avatar"],
|
2021-07-13 14:59:27 +02:00
|
|
|
|
"join_rules": stats["join_rules"],
|
2021-03-18 19:24:16 +01:00
|
|
|
|
"world_readable": (
|
|
|
|
|
stats["history_visibility"] == HistoryVisibility.WORLD_READABLE
|
|
|
|
|
),
|
|
|
|
|
"guest_can_join": stats["guest_access"] == "can_join",
|
2021-05-05 19:33:05 +02:00
|
|
|
|
"creation_ts": create_event.origin_server_ts,
|
2021-06-15 14:03:17 +02:00
|
|
|
|
"room_type": create_event.content.get(EventContentFields.ROOM_TYPE),
|
2021-03-18 19:24:16 +01:00
|
|
|
|
}
|
|
|
|
|
|
2021-08-06 13:40:29 +02:00
|
|
|
|
# Federation requests need to provide additional information so the
|
|
|
|
|
# requested server is able to filter the response appropriately.
|
|
|
|
|
if for_federation:
|
|
|
|
|
room_version = await self._store.get_room_version(room_id)
|
|
|
|
|
if await self._event_auth_handler.has_restricted_join_rules(
|
|
|
|
|
current_state_ids, room_version
|
|
|
|
|
):
|
|
|
|
|
allowed_rooms = (
|
|
|
|
|
await self._event_auth_handler.get_rooms_that_allow_join(
|
|
|
|
|
current_state_ids
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
if allowed_rooms:
|
|
|
|
|
entry["allowed_room_ids"] = allowed_rooms
|
|
|
|
|
# TODO Remove this key once the API is stable.
|
|
|
|
|
entry["allowed_spaces"] = allowed_rooms
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
# Filter out Nones – rather omit the field altogether
|
|
|
|
|
room_entry = {k: v for k, v in entry.items() if v is not None}
|
|
|
|
|
|
|
|
|
|
return room_entry
|
|
|
|
|
|
|
|
|
|
async def _get_child_events(self, room_id: str) -> Iterable[EventBase]:
|
2021-05-11 18:57:39 +02:00
|
|
|
|
"""
|
|
|
|
|
Get the child events for a given room.
|
|
|
|
|
|
|
|
|
|
The returned results are sorted for stability.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
room_id: The room id to get the children of.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
An iterable of sorted child events.
|
|
|
|
|
"""
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
# look for child rooms/spaces.
|
|
|
|
|
current_state_ids = await self._store.get_current_state_ids(room_id)
|
|
|
|
|
|
|
|
|
|
events = await self._store.get_events_as_list(
|
|
|
|
|
[
|
|
|
|
|
event_id
|
|
|
|
|
for key, event_id in current_state_ids.items()
|
2021-06-15 14:03:17 +02:00
|
|
|
|
if key[0] == EventTypes.SpaceChild
|
2021-03-18 19:24:16 +01:00
|
|
|
|
]
|
|
|
|
|
)
|
|
|
|
|
|
2021-05-11 18:57:39 +02:00
|
|
|
|
# filter out any events without a "via" (which implies it has been redacted),
|
|
|
|
|
# and order to ensure we return stable results.
|
|
|
|
|
return sorted(filter(_has_valid_via, events), key=_child_events_comparison_key)
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-16 16:49:12 +02:00
|
|
|
|
async def get_room_summary(
|
|
|
|
|
self,
|
|
|
|
|
requester: Optional[str],
|
|
|
|
|
room_id: str,
|
|
|
|
|
remote_room_hosts: Optional[List[str]] = None,
|
|
|
|
|
) -> JsonDict:
|
|
|
|
|
"""
|
|
|
|
|
Implementation of the room summary C-S API from MSC3266
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
requester: user id of the user making this request, will be None
|
|
|
|
|
for unauthenticated requests
|
|
|
|
|
|
|
|
|
|
room_id: room id to summarise.
|
|
|
|
|
|
|
|
|
|
remote_room_hosts: a list of homeservers to try fetching data through
|
|
|
|
|
if we don't know it ourselves
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
summary dict to return
|
|
|
|
|
"""
|
|
|
|
|
is_in_room = await self._store.is_host_joined(room_id, self._server_name)
|
|
|
|
|
|
|
|
|
|
if is_in_room:
|
|
|
|
|
room_entry = await self._summarize_local_room(
|
|
|
|
|
requester,
|
|
|
|
|
None,
|
|
|
|
|
room_id,
|
|
|
|
|
# Suggested-only doesn't matter since no children are requested.
|
|
|
|
|
suggested_only=False,
|
|
|
|
|
max_children=0,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
if not room_entry:
|
|
|
|
|
raise NotFoundError("Room not found or is not accessible")
|
|
|
|
|
|
|
|
|
|
room_summary = room_entry.room
|
|
|
|
|
|
|
|
|
|
# If there was a requester, add their membership.
|
|
|
|
|
if requester:
|
|
|
|
|
(
|
|
|
|
|
membership,
|
|
|
|
|
_,
|
|
|
|
|
) = await self._store.get_local_current_membership_for_user_in_room(
|
|
|
|
|
requester, room_id
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
room_summary["membership"] = membership or "leave"
|
|
|
|
|
else:
|
|
|
|
|
# TODO federation API, descoped from initial unstable implementation
|
|
|
|
|
# as MSC needs more maturing on that side.
|
|
|
|
|
raise SynapseError(400, "Federation is not currently supported.")
|
|
|
|
|
|
|
|
|
|
return room_summary
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
|
2021-08-05 14:39:17 +02:00
|
|
|
|
@attr.s(frozen=True, slots=True, auto_attribs=True)
|
2021-03-23 12:51:12 +01:00
|
|
|
|
class _RoomQueueEntry:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# The room ID of this entry.
|
2021-08-05 14:39:17 +02:00
|
|
|
|
room_id: str
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# The server to query if the room is not known locally.
|
2021-08-05 14:39:17 +02:00
|
|
|
|
via: Sequence[str]
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# The minimum number of hops necessary to get to this room (compared to the
|
|
|
|
|
# originally requested room).
|
2021-08-10 19:08:17 +02:00
|
|
|
|
depth: int = 0
|
2021-08-16 14:06:17 +02:00
|
|
|
|
# The room summary for this room returned via federation. This will only be
|
|
|
|
|
# used if the room is not known locally (and is not a space).
|
|
|
|
|
remote_room: Optional[JsonDict] = None
|
2021-08-05 14:39:17 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@attr.s(frozen=True, slots=True, auto_attribs=True)
|
|
|
|
|
class _RoomEntry:
|
|
|
|
|
room_id: str
|
|
|
|
|
# The room summary for this room.
|
|
|
|
|
room: JsonDict
|
|
|
|
|
# An iterable of the sorted, stripped children events for children of this room.
|
|
|
|
|
#
|
|
|
|
|
# This may not include all children.
|
2021-08-16 14:06:17 +02:00
|
|
|
|
children_state_events: Sequence[JsonDict] = ()
|
2021-08-10 19:08:17 +02:00
|
|
|
|
|
|
|
|
|
def as_json(self) -> JsonDict:
|
2021-08-16 14:06:17 +02:00
|
|
|
|
"""
|
|
|
|
|
Returns a JSON dictionary suitable for the room hierarchy endpoint.
|
|
|
|
|
|
|
|
|
|
It returns the room summary including the stripped m.space.child events
|
|
|
|
|
as a sub-key.
|
|
|
|
|
"""
|
2021-08-10 19:08:17 +02:00
|
|
|
|
result = dict(self.room)
|
2021-08-16 14:06:17 +02:00
|
|
|
|
result["children_state"] = self.children_state_events
|
2021-08-10 19:08:17 +02:00
|
|
|
|
return result
|
2021-03-24 13:45:39 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def _has_valid_via(e: EventBase) -> bool:
|
|
|
|
|
via = e.content.get("via")
|
|
|
|
|
if not via or not isinstance(via, Sequence):
|
|
|
|
|
return False
|
|
|
|
|
for v in via:
|
|
|
|
|
if not isinstance(v, str):
|
|
|
|
|
logger.debug("Ignoring edge event %s with invalid via entry", e.event_id)
|
|
|
|
|
return False
|
|
|
|
|
return True
|
2021-03-23 12:51:12 +01:00
|
|
|
|
|
|
|
|
|
|
2021-03-18 19:24:16 +01:00
|
|
|
|
def _is_suggested_child_event(edge_event: EventBase) -> bool:
|
|
|
|
|
suggested = edge_event.content.get("suggested")
|
|
|
|
|
if isinstance(suggested, bool) and suggested:
|
|
|
|
|
return True
|
|
|
|
|
logger.debug("Ignorning not-suggested child %s", edge_event.state_key)
|
|
|
|
|
return False
|
2021-05-11 18:57:39 +02:00
|
|
|
|
|
|
|
|
|
|
2021-05-17 15:59:17 +02:00
|
|
|
|
# Order may only contain characters in the range of \x20 (space) to \x7E (~) inclusive.
|
|
|
|
|
_INVALID_ORDER_CHARS_RE = re.compile(r"[^\x20-\x7E]")
|
2021-05-11 18:57:39 +02:00
|
|
|
|
|
|
|
|
|
|
2021-09-01 18:59:52 +02:00
|
|
|
|
def _child_events_comparison_key(
|
|
|
|
|
child: EventBase,
|
|
|
|
|
) -> Tuple[bool, Optional[str], int, str]:
|
2021-05-11 18:57:39 +02:00
|
|
|
|
"""
|
|
|
|
|
Generate a value for comparing two child events for ordering.
|
|
|
|
|
|
2021-09-01 18:59:52 +02:00
|
|
|
|
The rules for ordering are:
|
2021-05-11 18:57:39 +02:00
|
|
|
|
|
|
|
|
|
1. The 'order' key, if it is valid.
|
2021-09-01 18:59:52 +02:00
|
|
|
|
2. The 'origin_server_ts' of the 'm.space.child' event.
|
2021-05-11 18:57:39 +02:00
|
|
|
|
3. The 'room_id'.
|
|
|
|
|
|
|
|
|
|
Args:
|
|
|
|
|
child: The event for generating a comparison key.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
The comparison key as a tuple of:
|
|
|
|
|
False if the ordering is valid.
|
2021-09-01 18:59:52 +02:00
|
|
|
|
The 'order' field or None if it is not given or invalid.
|
|
|
|
|
The 'origin_server_ts' field.
|
2021-05-11 18:57:39 +02:00
|
|
|
|
The room ID.
|
|
|
|
|
"""
|
|
|
|
|
order = child.content.get("order")
|
|
|
|
|
# If order is not a string or doesn't meet the requirements, ignore it.
|
|
|
|
|
if not isinstance(order, str):
|
|
|
|
|
order = None
|
|
|
|
|
elif len(order) > 50 or _INVALID_ORDER_CHARS_RE.search(order):
|
|
|
|
|
order = None
|
|
|
|
|
|
|
|
|
|
# Items without an order come last.
|
2021-09-23 12:59:07 +02:00
|
|
|
|
return order is None, order, child.origin_server_ts, child.room_id
|