615 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			615 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Python
		
	
	
# Copyright 2014-2016 OpenMarket Ltd
 | 
						|
# Copyright 2021 Matrix.org Foundation C.I.C.
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
from typing import Any, Awaitable, Callable, Dict
 | 
						|
from unittest.mock import Mock
 | 
						|
 | 
						|
from twisted.test.proto_helpers import MemoryReactor
 | 
						|
 | 
						|
import synapse.api.errors
 | 
						|
import synapse.rest.admin
 | 
						|
from synapse.api.constants import EventTypes
 | 
						|
from synapse.rest.client import directory, login, room
 | 
						|
from synapse.server import HomeServer
 | 
						|
from synapse.types import JsonDict, RoomAlias, create_requester
 | 
						|
from synapse.util import Clock
 | 
						|
 | 
						|
from tests import unittest
 | 
						|
from tests.test_utils import make_awaitable
 | 
						|
 | 
						|
 | 
						|
class DirectoryTestCase(unittest.HomeserverTestCase):
 | 
						|
    """Tests the directory service."""
 | 
						|
 | 
						|
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
						|
        self.mock_federation = Mock()
 | 
						|
        self.mock_registry = Mock()
 | 
						|
 | 
						|
        self.query_handlers: Dict[str, Callable[[dict], Awaitable[JsonDict]]] = {}
 | 
						|
 | 
						|
        def register_query_handler(
 | 
						|
            query_type: str, handler: Callable[[dict], Awaitable[JsonDict]]
 | 
						|
        ) -> None:
 | 
						|
            self.query_handlers[query_type] = handler
 | 
						|
 | 
						|
        self.mock_registry.register_query_handler = register_query_handler
 | 
						|
 | 
						|
        hs = self.setup_test_homeserver(
 | 
						|
            federation_client=self.mock_federation,
 | 
						|
            federation_registry=self.mock_registry,
 | 
						|
        )
 | 
						|
 | 
						|
        self.handler = hs.get_directory_handler()
 | 
						|
 | 
						|
        self.store = hs.get_datastores().main
 | 
						|
 | 
						|
        self.my_room = RoomAlias.from_string("#my-room:test")
 | 
						|
        self.your_room = RoomAlias.from_string("#your-room:test")
 | 
						|
        self.remote_room = RoomAlias.from_string("#another:remote")
 | 
						|
 | 
						|
        return hs
 | 
						|
 | 
						|
    def test_get_local_association(self) -> None:
 | 
						|
        self.get_success(
 | 
						|
            self.store.create_room_alias_association(
 | 
						|
                self.my_room, "!8765qwer:test", ["test"]
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
        result = self.get_success(self.handler.get_association(self.my_room))
 | 
						|
 | 
						|
        self.assertEqual({"room_id": "!8765qwer:test", "servers": ["test"]}, result)
 | 
						|
 | 
						|
    def test_get_remote_association(self) -> None:
 | 
						|
        self.mock_federation.make_query.return_value = make_awaitable(
 | 
						|
            {"room_id": "!8765qwer:test", "servers": ["test", "remote"]}
 | 
						|
        )
 | 
						|
 | 
						|
        result = self.get_success(self.handler.get_association(self.remote_room))
 | 
						|
 | 
						|
        self.assertEqual(
 | 
						|
            {"room_id": "!8765qwer:test", "servers": ["test", "remote"]}, result
 | 
						|
        )
 | 
						|
        self.mock_federation.make_query.assert_called_with(
 | 
						|
            destination="remote",
 | 
						|
            query_type="directory",
 | 
						|
            args={"room_alias": "#another:remote"},
 | 
						|
            retry_on_dns_fail=False,
 | 
						|
            ignore_backoff=True,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_incoming_fed_query(self) -> None:
 | 
						|
        self.get_success(
 | 
						|
            self.store.create_room_alias_association(
 | 
						|
                self.your_room, "!8765asdf:test", ["test"]
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
        response = self.get_success(
 | 
						|
            self.handler.on_directory_query({"room_alias": "#your-room:test"})
 | 
						|
        )
 | 
						|
 | 
						|
        self.assertEqual({"room_id": "!8765asdf:test", "servers": ["test"]}, response)
 | 
						|
 | 
						|
 | 
						|
class TestCreateAlias(unittest.HomeserverTestCase):
 | 
						|
    servlets = [
 | 
						|
        synapse.rest.admin.register_servlets,
 | 
						|
        login.register_servlets,
 | 
						|
        room.register_servlets,
 | 
						|
        directory.register_servlets,
 | 
						|
    ]
 | 
						|
 | 
						|
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
						|
        self.handler = hs.get_directory_handler()
 | 
						|
 | 
						|
        # Create user
 | 
						|
        self.admin_user = self.register_user("admin", "pass", admin=True)
 | 
						|
        self.admin_user_tok = self.login("admin", "pass")
 | 
						|
 | 
						|
        # Create a test room
 | 
						|
        self.room_id = self.helper.create_room_as(
 | 
						|
            self.admin_user, tok=self.admin_user_tok
 | 
						|
        )
 | 
						|
 | 
						|
        self.test_alias = "#test:test"
 | 
						|
        self.room_alias = RoomAlias.from_string(self.test_alias)
 | 
						|
 | 
						|
        # Create a test user.
 | 
						|
        self.test_user = self.register_user("user", "pass", admin=False)
 | 
						|
        self.test_user_tok = self.login("user", "pass")
 | 
						|
        self.helper.join(room=self.room_id, user=self.test_user, tok=self.test_user_tok)
 | 
						|
 | 
						|
    def test_create_alias_joined_room(self) -> None:
 | 
						|
        """A user can create an alias for a room they're in."""
 | 
						|
        self.get_success(
 | 
						|
            self.handler.create_association(
 | 
						|
                create_requester(self.test_user),
 | 
						|
                self.room_alias,
 | 
						|
                self.room_id,
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
    def test_create_alias_other_room(self) -> None:
 | 
						|
        """A user cannot create an alias for a room they're NOT in."""
 | 
						|
        other_room_id = self.helper.create_room_as(
 | 
						|
            self.admin_user, tok=self.admin_user_tok
 | 
						|
        )
 | 
						|
 | 
						|
        self.get_failure(
 | 
						|
            self.handler.create_association(
 | 
						|
                create_requester(self.test_user),
 | 
						|
                self.room_alias,
 | 
						|
                other_room_id,
 | 
						|
            ),
 | 
						|
            synapse.api.errors.SynapseError,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_create_alias_admin(self) -> None:
 | 
						|
        """An admin can create an alias for a room they're NOT in."""
 | 
						|
        other_room_id = self.helper.create_room_as(
 | 
						|
            self.test_user, tok=self.test_user_tok
 | 
						|
        )
 | 
						|
 | 
						|
        self.get_success(
 | 
						|
            self.handler.create_association(
 | 
						|
                create_requester(self.admin_user),
 | 
						|
                self.room_alias,
 | 
						|
                other_room_id,
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
 | 
						|
class TestDeleteAlias(unittest.HomeserverTestCase):
 | 
						|
    servlets = [
 | 
						|
        synapse.rest.admin.register_servlets,
 | 
						|
        login.register_servlets,
 | 
						|
        room.register_servlets,
 | 
						|
        directory.register_servlets,
 | 
						|
    ]
 | 
						|
 | 
						|
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
						|
        self.store = hs.get_datastores().main
 | 
						|
        self.handler = hs.get_directory_handler()
 | 
						|
        self.state_handler = hs.get_state_handler()
 | 
						|
 | 
						|
        # Create user
 | 
						|
        self.admin_user = self.register_user("admin", "pass", admin=True)
 | 
						|
        self.admin_user_tok = self.login("admin", "pass")
 | 
						|
 | 
						|
        # Create a test room
 | 
						|
        self.room_id = self.helper.create_room_as(
 | 
						|
            self.admin_user, tok=self.admin_user_tok
 | 
						|
        )
 | 
						|
 | 
						|
        self.test_alias = "#test:test"
 | 
						|
        self.room_alias = RoomAlias.from_string(self.test_alias)
 | 
						|
 | 
						|
        # Create a test user.
 | 
						|
        self.test_user = self.register_user("user", "pass", admin=False)
 | 
						|
        self.test_user_tok = self.login("user", "pass")
 | 
						|
        self.helper.join(room=self.room_id, user=self.test_user, tok=self.test_user_tok)
 | 
						|
 | 
						|
    def _create_alias(self, user) -> None:
 | 
						|
        # Create a new alias to this room.
 | 
						|
        self.get_success(
 | 
						|
            self.store.create_room_alias_association(
 | 
						|
                self.room_alias, self.room_id, ["test"], user
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
    def test_delete_alias_not_allowed(self) -> None:
 | 
						|
        """A user that doesn't meet the expected guidelines cannot delete an alias."""
 | 
						|
        self._create_alias(self.admin_user)
 | 
						|
        self.get_failure(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.test_user), self.room_alias
 | 
						|
            ),
 | 
						|
            synapse.api.errors.AuthError,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_delete_alias_creator(self) -> None:
 | 
						|
        """An alias creator can delete their own alias."""
 | 
						|
        # Create an alias from a different user.
 | 
						|
        self._create_alias(self.test_user)
 | 
						|
 | 
						|
        # Delete the user's alias.
 | 
						|
        result = self.get_success(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.test_user), self.room_alias
 | 
						|
            )
 | 
						|
        )
 | 
						|
        self.assertEqual(self.room_id, result)
 | 
						|
 | 
						|
        # Confirm the alias is gone.
 | 
						|
        self.get_failure(
 | 
						|
            self.handler.get_association(self.room_alias),
 | 
						|
            synapse.api.errors.SynapseError,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_delete_alias_admin(self) -> None:
 | 
						|
        """A server admin can delete an alias created by another user."""
 | 
						|
        # Create an alias from a different user.
 | 
						|
        self._create_alias(self.test_user)
 | 
						|
 | 
						|
        # Delete the user's alias as the admin.
 | 
						|
        result = self.get_success(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.admin_user), self.room_alias
 | 
						|
            )
 | 
						|
        )
 | 
						|
        self.assertEqual(self.room_id, result)
 | 
						|
 | 
						|
        # Confirm the alias is gone.
 | 
						|
        self.get_failure(
 | 
						|
            self.handler.get_association(self.room_alias),
 | 
						|
            synapse.api.errors.SynapseError,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_delete_alias_sufficient_power(self) -> None:
 | 
						|
        """A user with a sufficient power level should be able to delete an alias."""
 | 
						|
        self._create_alias(self.admin_user)
 | 
						|
 | 
						|
        # Increase the user's power level.
 | 
						|
        self.helper.send_state(
 | 
						|
            self.room_id,
 | 
						|
            "m.room.power_levels",
 | 
						|
            {"users": {self.test_user: 100}},
 | 
						|
            tok=self.admin_user_tok,
 | 
						|
        )
 | 
						|
 | 
						|
        # They can now delete the alias.
 | 
						|
        result = self.get_success(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.test_user), self.room_alias
 | 
						|
            )
 | 
						|
        )
 | 
						|
        self.assertEqual(self.room_id, result)
 | 
						|
 | 
						|
        # Confirm the alias is gone.
 | 
						|
        self.get_failure(
 | 
						|
            self.handler.get_association(self.room_alias),
 | 
						|
            synapse.api.errors.SynapseError,
 | 
						|
        )
 | 
						|
 | 
						|
 | 
						|
class CanonicalAliasTestCase(unittest.HomeserverTestCase):
 | 
						|
    """Test modifications of the canonical alias when delete aliases."""
 | 
						|
 | 
						|
    servlets = [
 | 
						|
        synapse.rest.admin.register_servlets,
 | 
						|
        login.register_servlets,
 | 
						|
        room.register_servlets,
 | 
						|
        directory.register_servlets,
 | 
						|
    ]
 | 
						|
 | 
						|
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
						|
        self.store = hs.get_datastores().main
 | 
						|
        self.handler = hs.get_directory_handler()
 | 
						|
        self.state_handler = hs.get_state_handler()
 | 
						|
 | 
						|
        # Create user
 | 
						|
        self.admin_user = self.register_user("admin", "pass", admin=True)
 | 
						|
        self.admin_user_tok = self.login("admin", "pass")
 | 
						|
 | 
						|
        # Create a test room
 | 
						|
        self.room_id = self.helper.create_room_as(
 | 
						|
            self.admin_user, tok=self.admin_user_tok
 | 
						|
        )
 | 
						|
 | 
						|
        self.test_alias = "#test:test"
 | 
						|
        self.room_alias = self._add_alias(self.test_alias)
 | 
						|
 | 
						|
    def _add_alias(self, alias: str) -> RoomAlias:
 | 
						|
        """Add an alias to the test room."""
 | 
						|
        room_alias = RoomAlias.from_string(alias)
 | 
						|
 | 
						|
        # Create a new alias to this room.
 | 
						|
        self.get_success(
 | 
						|
            self.store.create_room_alias_association(
 | 
						|
                room_alias, self.room_id, ["test"], self.admin_user
 | 
						|
            )
 | 
						|
        )
 | 
						|
        return room_alias
 | 
						|
 | 
						|
    def _set_canonical_alias(self, content) -> None:
 | 
						|
        """Configure the canonical alias state on the room."""
 | 
						|
        self.helper.send_state(
 | 
						|
            self.room_id,
 | 
						|
            "m.room.canonical_alias",
 | 
						|
            content,
 | 
						|
            tok=self.admin_user_tok,
 | 
						|
        )
 | 
						|
 | 
						|
    def _get_canonical_alias(self):
 | 
						|
        """Get the canonical alias state of the room."""
 | 
						|
        return self.get_success(
 | 
						|
            self.state_handler.get_current_state(
 | 
						|
                self.room_id, EventTypes.CanonicalAlias, ""
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
    def test_remove_alias(self) -> None:
 | 
						|
        """Removing an alias that is the canonical alias should remove it there too."""
 | 
						|
        # Set this new alias as the canonical alias for this room
 | 
						|
        self._set_canonical_alias(
 | 
						|
            {"alias": self.test_alias, "alt_aliases": [self.test_alias]}
 | 
						|
        )
 | 
						|
 | 
						|
        data = self._get_canonical_alias()
 | 
						|
        self.assertEqual(data["content"]["alias"], self.test_alias)
 | 
						|
        self.assertEqual(data["content"]["alt_aliases"], [self.test_alias])
 | 
						|
 | 
						|
        # Finally, delete the alias.
 | 
						|
        self.get_success(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.admin_user), self.room_alias
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
        data = self._get_canonical_alias()
 | 
						|
        self.assertNotIn("alias", data["content"])
 | 
						|
        self.assertNotIn("alt_aliases", data["content"])
 | 
						|
 | 
						|
    def test_remove_other_alias(self) -> None:
 | 
						|
        """Removing an alias listed as in alt_aliases should remove it there too."""
 | 
						|
        # Create a second alias.
 | 
						|
        other_test_alias = "#test2:test"
 | 
						|
        other_room_alias = self._add_alias(other_test_alias)
 | 
						|
 | 
						|
        # Set the alias as the canonical alias for this room.
 | 
						|
        self._set_canonical_alias(
 | 
						|
            {
 | 
						|
                "alias": self.test_alias,
 | 
						|
                "alt_aliases": [self.test_alias, other_test_alias],
 | 
						|
            }
 | 
						|
        )
 | 
						|
 | 
						|
        data = self._get_canonical_alias()
 | 
						|
        self.assertEqual(data["content"]["alias"], self.test_alias)
 | 
						|
        self.assertEqual(
 | 
						|
            data["content"]["alt_aliases"], [self.test_alias, other_test_alias]
 | 
						|
        )
 | 
						|
 | 
						|
        # Delete the second alias.
 | 
						|
        self.get_success(
 | 
						|
            self.handler.delete_association(
 | 
						|
                create_requester(self.admin_user), other_room_alias
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
        data = self._get_canonical_alias()
 | 
						|
        self.assertEqual(data["content"]["alias"], self.test_alias)
 | 
						|
        self.assertEqual(data["content"]["alt_aliases"], [self.test_alias])
 | 
						|
 | 
						|
 | 
						|
class TestCreateAliasACL(unittest.HomeserverTestCase):
 | 
						|
    user_id = "@test:test"
 | 
						|
 | 
						|
    servlets = [directory.register_servlets, room.register_servlets]
 | 
						|
 | 
						|
    def default_config(self) -> Dict[str, Any]:
 | 
						|
        config = super().default_config()
 | 
						|
 | 
						|
        # Add custom alias creation rules to the config.
 | 
						|
        config["alias_creation_rules"] = [
 | 
						|
            {"user_id": "*", "alias": "#unofficial_*", "action": "allow"}
 | 
						|
        ]
 | 
						|
 | 
						|
        return config
 | 
						|
 | 
						|
    def test_denied(self) -> None:
 | 
						|
        room_id = self.helper.create_room_as(self.user_id)
 | 
						|
 | 
						|
        channel = self.make_request(
 | 
						|
            "PUT",
 | 
						|
            b"directory/room/%23test%3Atest",
 | 
						|
            {"room_id": room_id},
 | 
						|
        )
 | 
						|
        self.assertEqual(403, channel.code, channel.result)
 | 
						|
 | 
						|
    def test_allowed(self) -> None:
 | 
						|
        room_id = self.helper.create_room_as(self.user_id)
 | 
						|
 | 
						|
        channel = self.make_request(
 | 
						|
            "PUT",
 | 
						|
            b"directory/room/%23unofficial_test%3Atest",
 | 
						|
            {"room_id": room_id},
 | 
						|
        )
 | 
						|
        self.assertEqual(200, channel.code, channel.result)
 | 
						|
 | 
						|
    def test_denied_during_creation(self) -> None:
 | 
						|
        """A room alias that is not allowed should be rejected during creation."""
 | 
						|
        # Invalid room alias.
 | 
						|
        self.helper.create_room_as(
 | 
						|
            self.user_id,
 | 
						|
            expect_code=403,
 | 
						|
            extra_content={"room_alias_name": "foo"},
 | 
						|
        )
 | 
						|
 | 
						|
    def test_allowed_during_creation(self) -> None:
 | 
						|
        """A valid room alias should be allowed during creation."""
 | 
						|
        room_id = self.helper.create_room_as(
 | 
						|
            self.user_id,
 | 
						|
            extra_content={"room_alias_name": "unofficial_test"},
 | 
						|
        )
 | 
						|
 | 
						|
        channel = self.make_request(
 | 
						|
            "GET",
 | 
						|
            b"directory/room/%23unofficial_test%3Atest",
 | 
						|
        )
 | 
						|
        self.assertEqual(200, channel.code, channel.result)
 | 
						|
        self.assertEqual(channel.json_body["room_id"], room_id)
 | 
						|
 | 
						|
 | 
						|
class TestCreatePublishedRoomACL(unittest.HomeserverTestCase):
 | 
						|
    servlets = [
 | 
						|
        synapse.rest.admin.register_servlets_for_client_rest_resource,
 | 
						|
        login.register_servlets,
 | 
						|
        directory.register_servlets,
 | 
						|
        room.register_servlets,
 | 
						|
    ]
 | 
						|
    hijack_auth = False
 | 
						|
 | 
						|
    data = {"room_alias_name": "unofficial_test"}
 | 
						|
    allowed_localpart = "allowed"
 | 
						|
 | 
						|
    def default_config(self) -> Dict[str, Any]:
 | 
						|
        config = super().default_config()
 | 
						|
 | 
						|
        # Add custom room list publication rules to the config.
 | 
						|
        config["room_list_publication_rules"] = [
 | 
						|
            {
 | 
						|
                "user_id": "@" + self.allowed_localpart + "*",
 | 
						|
                "alias": "#unofficial_*",
 | 
						|
                "action": "allow",
 | 
						|
            },
 | 
						|
            {"user_id": "*", "alias": "*", "action": "deny"},
 | 
						|
        ]
 | 
						|
 | 
						|
        return config
 | 
						|
 | 
						|
    def prepare(
 | 
						|
        self, reactor: MemoryReactor, clock: Clock, hs: HomeServer
 | 
						|
    ) -> HomeServer:
 | 
						|
        self.allowed_user_id = self.register_user(self.allowed_localpart, "pass")
 | 
						|
        self.allowed_access_token = self.login(self.allowed_localpart, "pass")
 | 
						|
 | 
						|
        self.denied_user_id = self.register_user("denied", "pass")
 | 
						|
        self.denied_access_token = self.login("denied", "pass")
 | 
						|
 | 
						|
        return hs
 | 
						|
 | 
						|
    def test_denied_without_publication_permission(self) -> None:
 | 
						|
        """
 | 
						|
        Try to create a room, register an alias for it, and publish it,
 | 
						|
        as a user without permission to publish rooms.
 | 
						|
        (This is used as both a standalone test & as a helper function.)
 | 
						|
        """
 | 
						|
        self.helper.create_room_as(
 | 
						|
            self.denied_user_id,
 | 
						|
            tok=self.denied_access_token,
 | 
						|
            extra_content=self.data,
 | 
						|
            is_public=True,
 | 
						|
            expect_code=403,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_allowed_when_creating_private_room(self) -> None:
 | 
						|
        """
 | 
						|
        Try to create a room, register an alias for it, and NOT publish it,
 | 
						|
        as a user without permission to publish rooms.
 | 
						|
        (This is used as both a standalone test & as a helper function.)
 | 
						|
        """
 | 
						|
        self.helper.create_room_as(
 | 
						|
            self.denied_user_id,
 | 
						|
            tok=self.denied_access_token,
 | 
						|
            extra_content=self.data,
 | 
						|
            is_public=False,
 | 
						|
            expect_code=200,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_allowed_with_publication_permission(self) -> None:
 | 
						|
        """
 | 
						|
        Try to create a room, register an alias for it, and publish it,
 | 
						|
        as a user WITH permission to publish rooms.
 | 
						|
        (This is used as both a standalone test & as a helper function.)
 | 
						|
        """
 | 
						|
        self.helper.create_room_as(
 | 
						|
            self.allowed_user_id,
 | 
						|
            tok=self.allowed_access_token,
 | 
						|
            extra_content=self.data,
 | 
						|
            is_public=True,
 | 
						|
            expect_code=200,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_denied_publication_with_invalid_alias(self) -> None:
 | 
						|
        """
 | 
						|
        Try to create a room, register an alias for it, and publish it,
 | 
						|
        as a user WITH permission to publish rooms.
 | 
						|
        """
 | 
						|
        self.helper.create_room_as(
 | 
						|
            self.allowed_user_id,
 | 
						|
            tok=self.allowed_access_token,
 | 
						|
            extra_content={"room_alias_name": "foo"},
 | 
						|
            is_public=True,
 | 
						|
            expect_code=403,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_can_create_as_private_room_after_rejection(self) -> None:
 | 
						|
        """
 | 
						|
        After failing to publish a room with an alias as a user without publish permission,
 | 
						|
        retry as the same user, but without publishing the room.
 | 
						|
 | 
						|
        This should pass, but used to fail because the alias was registered by the first
 | 
						|
        request, even though the room creation was denied.
 | 
						|
        """
 | 
						|
        self.test_denied_without_publication_permission()
 | 
						|
        self.test_allowed_when_creating_private_room()
 | 
						|
 | 
						|
    def test_can_create_with_permission_after_rejection(self) -> None:
 | 
						|
        """
 | 
						|
        After failing to publish a room with an alias as a user without publish permission,
 | 
						|
        retry as someone with permission, using the same alias.
 | 
						|
 | 
						|
        This also used to fail because of the alias having been registered by the first
 | 
						|
        request, leaving it unavailable for any other user's new rooms.
 | 
						|
        """
 | 
						|
        self.test_denied_without_publication_permission()
 | 
						|
        self.test_allowed_with_publication_permission()
 | 
						|
 | 
						|
 | 
						|
class TestRoomListSearchDisabled(unittest.HomeserverTestCase):
 | 
						|
    user_id = "@test:test"
 | 
						|
 | 
						|
    servlets = [directory.register_servlets, room.register_servlets]
 | 
						|
 | 
						|
    def prepare(
 | 
						|
        self, reactor: MemoryReactor, clock: Clock, hs: HomeServer
 | 
						|
    ) -> HomeServer:
 | 
						|
        room_id = self.helper.create_room_as(self.user_id)
 | 
						|
 | 
						|
        channel = self.make_request(
 | 
						|
            "PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
 | 
						|
        )
 | 
						|
        self.assertEqual(200, channel.code, channel.result)
 | 
						|
 | 
						|
        self.room_list_handler = hs.get_room_list_handler()
 | 
						|
        self.directory_handler = hs.get_directory_handler()
 | 
						|
 | 
						|
        return hs
 | 
						|
 | 
						|
    def test_disabling_room_list(self) -> None:
 | 
						|
        self.room_list_handler.enable_room_list_search = True
 | 
						|
        self.directory_handler.enable_room_list_search = True
 | 
						|
 | 
						|
        # Room list is enabled so we should get some results
 | 
						|
        channel = self.make_request("GET", b"publicRooms")
 | 
						|
        self.assertEqual(200, channel.code, channel.result)
 | 
						|
        self.assertTrue(len(channel.json_body["chunk"]) > 0)
 | 
						|
 | 
						|
        self.room_list_handler.enable_room_list_search = False
 | 
						|
        self.directory_handler.enable_room_list_search = False
 | 
						|
 | 
						|
        # Room list disabled so we should get no results
 | 
						|
        channel = self.make_request("GET", b"publicRooms")
 | 
						|
        self.assertEqual(200, channel.code, channel.result)
 | 
						|
        self.assertTrue(len(channel.json_body["chunk"]) == 0)
 | 
						|
 | 
						|
        # Room list disabled so we shouldn't be allowed to publish rooms
 | 
						|
        room_id = self.helper.create_room_as(self.user_id)
 | 
						|
        channel = self.make_request(
 | 
						|
            "PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
 | 
						|
        )
 | 
						|
        self.assertEqual(403, channel.code, channel.result)
 |