2019-06-12 11:31:37 +02:00
|
|
|
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the 'License');
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an 'AS IS' BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2020-10-06 17:31:31 +02:00
|
|
|
import threading
|
2020-10-09 14:46:36 +02:00
|
|
|
from typing import Dict
|
2021-04-09 19:44:38 +02:00
|
|
|
from unittest.mock import Mock
|
2020-10-06 17:31:31 +02:00
|
|
|
|
2021-09-21 17:40:20 +02:00
|
|
|
from synapse.api.constants import EventTypes
|
2020-10-06 17:31:31 +02:00
|
|
|
from synapse.events import EventBase
|
2021-07-20 12:39:46 +02:00
|
|
|
from synapse.events.third_party_rules import load_legacy_third_party_event_rules
|
2020-10-09 14:46:36 +02:00
|
|
|
from synapse.module_api import ModuleApi
|
2019-06-12 11:31:37 +02:00
|
|
|
from synapse.rest import admin
|
2021-08-17 13:57:58 +02:00
|
|
|
from synapse.rest.client import login, room
|
2020-10-06 17:31:31 +02:00
|
|
|
from synapse.types import Requester, StateMap
|
2021-07-20 12:39:46 +02:00
|
|
|
from synapse.util.frozenutils import unfreeze
|
2019-06-12 11:31:37 +02:00
|
|
|
|
|
|
|
from tests import unittest
|
|
|
|
|
2020-10-06 17:31:31 +02:00
|
|
|
thread_local = threading.local()
|
|
|
|
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
class LegacyThirdPartyRulesTestModule:
|
2020-10-09 14:46:36 +02:00
|
|
|
def __init__(self, config: Dict, module_api: ModuleApi):
|
2020-10-06 17:31:31 +02:00
|
|
|
# keep a record of the "current" rules module, so that the test can patch
|
|
|
|
# it if desired.
|
|
|
|
thread_local.rules_module = self
|
2020-10-09 14:46:36 +02:00
|
|
|
self.module_api = module_api
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2020-10-05 15:57:46 +02:00
|
|
|
async def on_create_room(
|
|
|
|
self, requester: Requester, config: dict, is_requester_admin: bool
|
|
|
|
):
|
|
|
|
return True
|
|
|
|
|
2020-10-06 17:31:31 +02:00
|
|
|
async def check_event_allowed(self, event: EventBase, state: StateMap[EventBase]):
|
|
|
|
return True
|
2019-06-12 11:31:37 +02:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def parse_config(config):
|
|
|
|
return config
|
|
|
|
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
class LegacyDenyNewRooms(LegacyThirdPartyRulesTestModule):
|
|
|
|
def __init__(self, config: Dict, module_api: ModuleApi):
|
|
|
|
super().__init__(config, module_api)
|
|
|
|
|
|
|
|
def on_create_room(
|
|
|
|
self, requester: Requester, config: dict, is_requester_admin: bool
|
|
|
|
):
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
|
|
class LegacyChangeEvents(LegacyThirdPartyRulesTestModule):
|
|
|
|
def __init__(self, config: Dict, module_api: ModuleApi):
|
|
|
|
super().__init__(config, module_api)
|
|
|
|
|
|
|
|
async def check_event_allowed(self, event: EventBase, state: StateMap[EventBase]):
|
|
|
|
d = event.get_dict()
|
|
|
|
content = unfreeze(event.content)
|
|
|
|
content["foo"] = "bar"
|
|
|
|
d["content"] = content
|
|
|
|
return d
|
2020-10-06 17:31:31 +02:00
|
|
|
|
|
|
|
|
2019-06-12 11:31:37 +02:00
|
|
|
class ThirdPartyRulesTestCase(unittest.HomeserverTestCase):
|
|
|
|
servlets = [
|
|
|
|
admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
def make_homeserver(self, reactor, clock):
|
|
|
|
hs = self.setup_test_homeserver()
|
|
|
|
|
|
|
|
load_legacy_third_party_event_rules(hs)
|
|
|
|
|
|
|
|
return hs
|
2019-06-12 11:31:37 +02:00
|
|
|
|
2020-10-05 15:57:46 +02:00
|
|
|
def prepare(self, reactor, clock, homeserver):
|
|
|
|
# Create a user and room to play with during the tests
|
|
|
|
self.user_id = self.register_user("kermit", "monkey")
|
|
|
|
self.tok = self.login("kermit", "monkey")
|
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
# Some tests might prevent room creation on purpose.
|
|
|
|
try:
|
|
|
|
self.room_id = self.helper.create_room_as(self.user_id, tok=self.tok)
|
|
|
|
except Exception:
|
|
|
|
pass
|
2020-10-05 15:57:46 +02:00
|
|
|
|
2019-06-12 11:31:37 +02:00
|
|
|
def test_third_party_rules(self):
|
|
|
|
"""Tests that a forbidden event is forbidden from being sent, but an allowed one
|
|
|
|
can be sent.
|
|
|
|
"""
|
2020-10-06 17:31:31 +02:00
|
|
|
# patch the rules module with a Mock which will return False for some event
|
|
|
|
# types
|
|
|
|
async def check(ev, state):
|
2021-07-20 12:39:46 +02:00
|
|
|
return ev.type != "foo.bar.forbidden", None
|
2020-10-06 17:31:31 +02:00
|
|
|
|
|
|
|
callback = Mock(spec=[], side_effect=check)
|
2021-07-20 12:39:46 +02:00
|
|
|
self.hs.get_third_party_event_rules()._check_event_allowed_callbacks = [
|
|
|
|
callback
|
|
|
|
]
|
2020-10-06 17:31:31 +02:00
|
|
|
|
2020-12-15 15:44:04 +01:00
|
|
|
channel = self.make_request(
|
2019-06-12 11:31:37 +02:00
|
|
|
"PUT",
|
2020-10-05 15:57:46 +02:00
|
|
|
"/_matrix/client/r0/rooms/%s/send/foo.bar.allowed/1" % self.room_id,
|
2019-06-12 11:31:37 +02:00
|
|
|
{},
|
2020-10-05 15:57:46 +02:00
|
|
|
access_token=self.tok,
|
2019-06-12 11:31:37 +02:00
|
|
|
)
|
|
|
|
self.assertEquals(channel.result["code"], b"200", channel.result)
|
|
|
|
|
2020-10-06 17:31:31 +02:00
|
|
|
callback.assert_called_once()
|
|
|
|
|
|
|
|
# there should be various state events in the state arg: do some basic checks
|
|
|
|
state_arg = callback.call_args[0][1]
|
|
|
|
for k in (("m.room.create", ""), ("m.room.member", self.user_id)):
|
|
|
|
self.assertIn(k, state_arg)
|
|
|
|
ev = state_arg[k]
|
|
|
|
self.assertEqual(ev.type, k[0])
|
|
|
|
self.assertEqual(ev.state_key, k[1])
|
|
|
|
|
2020-12-15 15:44:04 +01:00
|
|
|
channel = self.make_request(
|
2019-06-12 11:31:37 +02:00
|
|
|
"PUT",
|
2020-10-13 13:07:56 +02:00
|
|
|
"/_matrix/client/r0/rooms/%s/send/foo.bar.forbidden/2" % self.room_id,
|
2019-06-12 11:31:37 +02:00
|
|
|
{},
|
2020-10-05 15:57:46 +02:00
|
|
|
access_token=self.tok,
|
2019-06-12 11:31:37 +02:00
|
|
|
)
|
|
|
|
self.assertEquals(channel.result["code"], b"403", channel.result)
|
2020-10-06 17:31:31 +02:00
|
|
|
|
2020-10-13 23:02:41 +02:00
|
|
|
def test_cannot_modify_event(self):
|
|
|
|
"""cannot accidentally modify an event before it is persisted"""
|
|
|
|
|
|
|
|
# first patch the event checker so that it will try to modify the event
|
|
|
|
async def check(ev: EventBase, state):
|
|
|
|
ev.content = {"x": "y"}
|
2021-07-20 12:39:46 +02:00
|
|
|
return True, None
|
2020-10-13 23:02:41 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
self.hs.get_third_party_event_rules()._check_event_allowed_callbacks = [check]
|
2020-10-13 23:02:41 +02:00
|
|
|
|
|
|
|
# now send the event
|
2020-12-15 15:44:04 +01:00
|
|
|
channel = self.make_request(
|
2020-10-13 23:02:41 +02:00
|
|
|
"PUT",
|
|
|
|
"/_matrix/client/r0/rooms/%s/send/modifyme/1" % self.room_id,
|
|
|
|
{"x": "x"},
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
2021-07-20 12:39:46 +02:00
|
|
|
# check_event_allowed has some error handling, so it shouldn't 500 just because a
|
|
|
|
# module did something bad.
|
|
|
|
self.assertEqual(channel.code, 200, channel.result)
|
|
|
|
event_id = channel.json_body["event_id"]
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"GET",
|
|
|
|
"/_matrix/client/r0/rooms/%s/event/%s" % (self.room_id, event_id),
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.code, 200, channel.result)
|
|
|
|
ev = channel.json_body
|
|
|
|
self.assertEqual(ev["content"]["x"], "x")
|
2020-10-13 23:02:41 +02:00
|
|
|
|
2020-10-06 17:31:31 +02:00
|
|
|
def test_modify_event(self):
|
2020-10-13 19:53:56 +02:00
|
|
|
"""The module can return a modified version of the event"""
|
2020-10-06 17:31:31 +02:00
|
|
|
# first patch the event checker so that it will modify the event
|
|
|
|
async def check(ev: EventBase, state):
|
2020-10-13 19:53:56 +02:00
|
|
|
d = ev.get_dict()
|
|
|
|
d["content"] = {"x": "y"}
|
2021-07-20 12:39:46 +02:00
|
|
|
return True, d
|
2020-10-06 17:31:31 +02:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
self.hs.get_third_party_event_rules()._check_event_allowed_callbacks = [check]
|
2020-10-06 17:31:31 +02:00
|
|
|
|
|
|
|
# now send the event
|
2020-12-15 15:44:04 +01:00
|
|
|
channel = self.make_request(
|
2020-10-06 17:31:31 +02:00
|
|
|
"PUT",
|
|
|
|
"/_matrix/client/r0/rooms/%s/send/modifyme/1" % self.room_id,
|
|
|
|
{"x": "x"},
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
event_id = channel.json_body["event_id"]
|
|
|
|
|
|
|
|
# ... and check that it got modified
|
2020-12-15 15:44:04 +01:00
|
|
|
channel = self.make_request(
|
2020-10-06 17:31:31 +02:00
|
|
|
"GET",
|
|
|
|
"/_matrix/client/r0/rooms/%s/event/%s" % (self.room_id, event_id),
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
ev = channel.json_body
|
|
|
|
self.assertEqual(ev["content"]["x"], "y")
|
2020-10-09 14:46:36 +02:00
|
|
|
|
2021-03-17 17:51:55 +01:00
|
|
|
def test_message_edit(self):
|
|
|
|
"""Ensure that the module doesn't cause issues with edited messages."""
|
|
|
|
# first patch the event checker so that it will modify the event
|
|
|
|
async def check(ev: EventBase, state):
|
|
|
|
d = ev.get_dict()
|
|
|
|
d["content"] = {
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": d["content"]["body"].upper(),
|
|
|
|
}
|
2021-07-20 12:39:46 +02:00
|
|
|
return True, d
|
2021-03-17 17:51:55 +01:00
|
|
|
|
2021-07-20 12:39:46 +02:00
|
|
|
self.hs.get_third_party_event_rules()._check_event_allowed_callbacks = [check]
|
2021-03-17 17:51:55 +01:00
|
|
|
|
|
|
|
# Send an event, then edit it.
|
|
|
|
channel = self.make_request(
|
|
|
|
"PUT",
|
|
|
|
"/_matrix/client/r0/rooms/%s/send/modifyme/1" % self.room_id,
|
|
|
|
{
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": "Original body",
|
|
|
|
},
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
orig_event_id = channel.json_body["event_id"]
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"PUT",
|
|
|
|
"/_matrix/client/r0/rooms/%s/send/m.room.message/2" % self.room_id,
|
|
|
|
{
|
|
|
|
"m.new_content": {"msgtype": "m.text", "body": "Edited body"},
|
|
|
|
"m.relates_to": {
|
|
|
|
"rel_type": "m.replace",
|
|
|
|
"event_id": orig_event_id,
|
|
|
|
},
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": "Edited body",
|
|
|
|
},
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
edited_event_id = channel.json_body["event_id"]
|
|
|
|
|
|
|
|
# ... and check that they both got modified
|
|
|
|
channel = self.make_request(
|
|
|
|
"GET",
|
|
|
|
"/_matrix/client/r0/rooms/%s/event/%s" % (self.room_id, orig_event_id),
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
ev = channel.json_body
|
|
|
|
self.assertEqual(ev["content"]["body"], "ORIGINAL BODY")
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"GET",
|
|
|
|
"/_matrix/client/r0/rooms/%s/event/%s" % (self.room_id, edited_event_id),
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
ev = channel.json_body
|
|
|
|
self.assertEqual(ev["content"]["body"], "EDITED BODY")
|
|
|
|
|
2020-10-09 14:46:36 +02:00
|
|
|
def test_send_event(self):
|
2021-07-20 12:39:46 +02:00
|
|
|
"""Tests that a module can send an event into a room via the module api"""
|
2020-10-09 14:46:36 +02:00
|
|
|
content = {
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": "Hello!",
|
|
|
|
}
|
|
|
|
event_dict = {
|
|
|
|
"room_id": self.room_id,
|
|
|
|
"type": "m.room.message",
|
|
|
|
"content": content,
|
|
|
|
"sender": self.user_id,
|
|
|
|
}
|
2021-07-13 12:52:58 +02:00
|
|
|
event: EventBase = self.get_success(
|
2021-07-20 12:39:46 +02:00
|
|
|
self.hs.get_module_api().create_and_send_event_into_room(event_dict)
|
2021-07-13 12:52:58 +02:00
|
|
|
)
|
2020-10-09 14:46:36 +02:00
|
|
|
|
|
|
|
self.assertEquals(event.sender, self.user_id)
|
|
|
|
self.assertEquals(event.room_id, self.room_id)
|
|
|
|
self.assertEquals(event.type, "m.room.message")
|
|
|
|
self.assertEquals(event.content, content)
|
2021-07-20 12:39:46 +02:00
|
|
|
|
|
|
|
@unittest.override_config(
|
|
|
|
{
|
|
|
|
"third_party_event_rules": {
|
|
|
|
"module": __name__ + ".LegacyChangeEvents",
|
|
|
|
"config": {},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
def test_legacy_check_event_allowed(self):
|
|
|
|
"""Tests that the wrapper for legacy check_event_allowed callbacks works
|
|
|
|
correctly.
|
|
|
|
"""
|
|
|
|
channel = self.make_request(
|
|
|
|
"PUT",
|
|
|
|
"/_matrix/client/r0/rooms/%s/send/m.room.message/1" % self.room_id,
|
|
|
|
{
|
|
|
|
"msgtype": "m.text",
|
|
|
|
"body": "Original body",
|
|
|
|
},
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
|
|
|
|
event_id = channel.json_body["event_id"]
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"GET",
|
|
|
|
"/_matrix/client/r0/rooms/%s/event/%s" % (self.room_id, event_id),
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(channel.result["code"], b"200", channel.result)
|
|
|
|
|
|
|
|
self.assertIn("foo", channel.json_body["content"].keys())
|
|
|
|
self.assertEqual(channel.json_body["content"]["foo"], "bar")
|
|
|
|
|
|
|
|
@unittest.override_config(
|
|
|
|
{
|
|
|
|
"third_party_event_rules": {
|
|
|
|
"module": __name__ + ".LegacyDenyNewRooms",
|
|
|
|
"config": {},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
def test_legacy_on_create_room(self):
|
|
|
|
"""Tests that the wrapper for legacy on_create_room callbacks works
|
|
|
|
correctly.
|
|
|
|
"""
|
|
|
|
self.helper.create_room_as(self.user_id, tok=self.tok, expect_code=403)
|
2021-09-21 17:40:20 +02:00
|
|
|
|
|
|
|
def test_sent_event_end_up_in_room_state(self):
|
|
|
|
"""Tests that a state event sent by a module while processing another state event
|
|
|
|
doesn't get dropped from the state of the room. This is to guard against a bug
|
|
|
|
where Synapse has been observed doing so, see https://github.com/matrix-org/synapse/issues/10830
|
|
|
|
"""
|
|
|
|
event_type = "org.matrix.test_state"
|
|
|
|
|
|
|
|
# This content will be updated later on, and since we actually use a reference on
|
|
|
|
# the dict it does the right thing. It's a bit hacky but a handy way of making
|
|
|
|
# sure the state actually gets updated.
|
|
|
|
event_content = {"i": -1}
|
|
|
|
|
|
|
|
api = self.hs.get_module_api()
|
|
|
|
|
|
|
|
# Define a callback that sends a custom event on power levels update.
|
|
|
|
async def test_fn(event: EventBase, state_events):
|
|
|
|
if event.is_state and event.type == EventTypes.PowerLevels:
|
|
|
|
await api.create_and_send_event_into_room(
|
|
|
|
{
|
|
|
|
"room_id": event.room_id,
|
|
|
|
"sender": event.sender,
|
|
|
|
"type": event_type,
|
|
|
|
"content": event_content,
|
|
|
|
"state_key": "",
|
|
|
|
}
|
|
|
|
)
|
|
|
|
return True, None
|
|
|
|
|
|
|
|
self.hs.get_third_party_event_rules()._check_event_allowed_callbacks = [test_fn]
|
|
|
|
|
|
|
|
# Sometimes the bug might not happen the first time the event type is added
|
|
|
|
# to the state but might happen when an event updates the state of the room for
|
|
|
|
# that type, so we test updating the state several times.
|
|
|
|
for i in range(5):
|
|
|
|
# Update the content of the custom state event to be sent by the callback.
|
|
|
|
event_content["i"] = i
|
|
|
|
|
|
|
|
# Update the room's power levels with a different value each time so Synapse
|
|
|
|
# doesn't consider an update redundant.
|
|
|
|
self._update_power_levels(event_default=i)
|
|
|
|
|
|
|
|
# Check that the new event made it to the room's state.
|
|
|
|
channel = self.make_request(
|
|
|
|
method="GET",
|
|
|
|
path="/rooms/" + self.room_id + "/state/" + event_type,
|
|
|
|
access_token=self.tok,
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
self.assertEqual(channel.json_body["i"], i)
|
|
|
|
|
|
|
|
def _update_power_levels(self, event_default: int = 0):
|
|
|
|
"""Updates the room's power levels.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_default: Value to use for 'events_default'.
|
|
|
|
"""
|
|
|
|
self.helper.send_state(
|
|
|
|
room_id=self.room_id,
|
|
|
|
event_type=EventTypes.PowerLevels,
|
|
|
|
body={
|
|
|
|
"ban": 50,
|
|
|
|
"events": {
|
|
|
|
"m.room.avatar": 50,
|
|
|
|
"m.room.canonical_alias": 50,
|
|
|
|
"m.room.encryption": 100,
|
|
|
|
"m.room.history_visibility": 100,
|
|
|
|
"m.room.name": 50,
|
|
|
|
"m.room.power_levels": 100,
|
|
|
|
"m.room.server_acl": 100,
|
|
|
|
"m.room.tombstone": 100,
|
|
|
|
},
|
|
|
|
"events_default": event_default,
|
|
|
|
"invite": 0,
|
|
|
|
"kick": 50,
|
|
|
|
"redact": 50,
|
|
|
|
"state_default": 50,
|
|
|
|
"users": {self.user_id: 100},
|
|
|
|
"users_default": 0,
|
|
|
|
},
|
|
|
|
tok=self.tok,
|
|
|
|
)
|