forked from MirrorHub/synapse
Add a module API to allow modules to edit push rule actions (#12406)
Co-authored-by: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
This commit is contained in:
parent
d743b25c8f
commit
5ef673de4f
8 changed files with 319 additions and 104 deletions
1
changelog.d/12406.feature
Normal file
1
changelog.d/12406.feature
Normal file
|
@ -0,0 +1 @@
|
||||||
|
Add a module API to allow modules to change actions for existing push rules of local users.
|
138
synapse/handlers/push_rules.py
Normal file
138
synapse/handlers/push_rules.py
Normal file
|
@ -0,0 +1,138 @@
|
||||||
|
# Copyright 2022 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
from typing import TYPE_CHECKING, List, Optional, Union
|
||||||
|
|
||||||
|
import attr
|
||||||
|
|
||||||
|
from synapse.api.errors import SynapseError, UnrecognizedRequestError
|
||||||
|
from synapse.push.baserules import BASE_RULE_IDS
|
||||||
|
from synapse.storage.push_rule import RuleNotFoundException
|
||||||
|
from synapse.types import JsonDict
|
||||||
|
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from synapse.server import HomeServer
|
||||||
|
|
||||||
|
|
||||||
|
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
||||||
|
class RuleSpec:
|
||||||
|
scope: str
|
||||||
|
template: str
|
||||||
|
rule_id: str
|
||||||
|
attr: Optional[str]
|
||||||
|
|
||||||
|
|
||||||
|
class PushRulesHandler:
|
||||||
|
"""A class to handle changes in push rules for users."""
|
||||||
|
|
||||||
|
def __init__(self, hs: "HomeServer"):
|
||||||
|
self._notifier = hs.get_notifier()
|
||||||
|
self._main_store = hs.get_datastores().main
|
||||||
|
|
||||||
|
async def set_rule_attr(
|
||||||
|
self, user_id: str, spec: RuleSpec, val: Union[bool, JsonDict]
|
||||||
|
) -> None:
|
||||||
|
"""Set an attribute (enabled or actions) on an existing push rule.
|
||||||
|
|
||||||
|
Notifies listeners (e.g. sync handler) of the change.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
user_id: the user for which to modify the push rule.
|
||||||
|
spec: the spec of the push rule to modify.
|
||||||
|
val: the value to change the attribute to.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
RuleNotFoundException if the rule being modified doesn't exist.
|
||||||
|
SynapseError(400) if the value is malformed.
|
||||||
|
UnrecognizedRequestError if the attribute to change is unknown.
|
||||||
|
InvalidRuleException if we're trying to change the actions on a rule but
|
||||||
|
the provided actions aren't compliant with the spec.
|
||||||
|
"""
|
||||||
|
if spec.attr not in ("enabled", "actions"):
|
||||||
|
# for the sake of potential future expansion, shouldn't report
|
||||||
|
# 404 in the case of an unknown request so check it corresponds to
|
||||||
|
# a known attribute first.
|
||||||
|
raise UnrecognizedRequestError()
|
||||||
|
|
||||||
|
namespaced_rule_id = f"global/{spec.template}/{spec.rule_id}"
|
||||||
|
rule_id = spec.rule_id
|
||||||
|
is_default_rule = rule_id.startswith(".")
|
||||||
|
if is_default_rule:
|
||||||
|
if namespaced_rule_id not in BASE_RULE_IDS:
|
||||||
|
raise RuleNotFoundException("Unknown rule %r" % (namespaced_rule_id,))
|
||||||
|
if spec.attr == "enabled":
|
||||||
|
if isinstance(val, dict) and "enabled" in val:
|
||||||
|
val = val["enabled"]
|
||||||
|
if not isinstance(val, bool):
|
||||||
|
# Legacy fallback
|
||||||
|
# This should *actually* take a dict, but many clients pass
|
||||||
|
# bools directly, so let's not break them.
|
||||||
|
raise SynapseError(400, "Value for 'enabled' must be boolean")
|
||||||
|
await self._main_store.set_push_rule_enabled(
|
||||||
|
user_id, namespaced_rule_id, val, is_default_rule
|
||||||
|
)
|
||||||
|
elif spec.attr == "actions":
|
||||||
|
if not isinstance(val, dict):
|
||||||
|
raise SynapseError(400, "Value must be a dict")
|
||||||
|
actions = val.get("actions")
|
||||||
|
if not isinstance(actions, list):
|
||||||
|
raise SynapseError(400, "Value for 'actions' must be dict")
|
||||||
|
check_actions(actions)
|
||||||
|
rule_id = spec.rule_id
|
||||||
|
is_default_rule = rule_id.startswith(".")
|
||||||
|
if is_default_rule:
|
||||||
|
if namespaced_rule_id not in BASE_RULE_IDS:
|
||||||
|
raise RuleNotFoundException(
|
||||||
|
"Unknown rule %r" % (namespaced_rule_id,)
|
||||||
|
)
|
||||||
|
await self._main_store.set_push_rule_actions(
|
||||||
|
user_id, namespaced_rule_id, actions, is_default_rule
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
raise UnrecognizedRequestError()
|
||||||
|
|
||||||
|
self.notify_user(user_id)
|
||||||
|
|
||||||
|
def notify_user(self, user_id: str) -> None:
|
||||||
|
"""Notify listeners about a push rule change.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
user_id: the user ID the change is for.
|
||||||
|
"""
|
||||||
|
stream_id = self._main_store.get_max_push_rules_stream_id()
|
||||||
|
self._notifier.on_new_event("push_rules_key", stream_id, users=[user_id])
|
||||||
|
|
||||||
|
|
||||||
|
def check_actions(actions: List[Union[str, JsonDict]]) -> None:
|
||||||
|
"""Check if the given actions are spec compliant.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
actions: the actions to check.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
InvalidRuleException if the rules aren't compliant with the spec.
|
||||||
|
"""
|
||||||
|
if not isinstance(actions, list):
|
||||||
|
raise InvalidRuleException("No actions found")
|
||||||
|
|
||||||
|
for a in actions:
|
||||||
|
if a in ["notify", "dont_notify", "coalesce"]:
|
||||||
|
pass
|
||||||
|
elif isinstance(a, dict) and "set_tweak" in a:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
raise InvalidRuleException("Unrecognised action %s" % a)
|
||||||
|
|
||||||
|
|
||||||
|
class InvalidRuleException(Exception):
|
||||||
|
pass
|
|
@ -82,6 +82,7 @@ from synapse.handlers.auth import (
|
||||||
ON_LOGGED_OUT_CALLBACK,
|
ON_LOGGED_OUT_CALLBACK,
|
||||||
AuthHandler,
|
AuthHandler,
|
||||||
)
|
)
|
||||||
|
from synapse.handlers.push_rules import RuleSpec, check_actions
|
||||||
from synapse.http.client import SimpleHttpClient
|
from synapse.http.client import SimpleHttpClient
|
||||||
from synapse.http.server import (
|
from synapse.http.server import (
|
||||||
DirectServeHtmlResource,
|
DirectServeHtmlResource,
|
||||||
|
@ -195,6 +196,7 @@ class ModuleApi:
|
||||||
self._clock: Clock = hs.get_clock()
|
self._clock: Clock = hs.get_clock()
|
||||||
self._registration_handler = hs.get_registration_handler()
|
self._registration_handler = hs.get_registration_handler()
|
||||||
self._send_email_handler = hs.get_send_email_handler()
|
self._send_email_handler = hs.get_send_email_handler()
|
||||||
|
self._push_rules_handler = hs.get_push_rules_handler()
|
||||||
self.custom_template_dir = hs.config.server.custom_template_directory
|
self.custom_template_dir = hs.config.server.custom_template_directory
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
@ -1352,6 +1354,68 @@ class ModuleApi:
|
||||||
"""
|
"""
|
||||||
await self._store.add_user_bound_threepid(user_id, medium, address, id_server)
|
await self._store.add_user_bound_threepid(user_id, medium, address, id_server)
|
||||||
|
|
||||||
|
def check_push_rule_actions(
|
||||||
|
self, actions: List[Union[str, Dict[str, str]]]
|
||||||
|
) -> None:
|
||||||
|
"""Checks if the given push rule actions are valid according to the Matrix
|
||||||
|
specification.
|
||||||
|
|
||||||
|
See https://spec.matrix.org/v1.2/client-server-api/#actions for the list of valid
|
||||||
|
actions.
|
||||||
|
|
||||||
|
Added in Synapse v1.58.0.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
actions: the actions to check.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
synapse.module_api.errors.InvalidRuleException if the actions are invalid.
|
||||||
|
"""
|
||||||
|
check_actions(actions)
|
||||||
|
|
||||||
|
async def set_push_rule_action(
|
||||||
|
self,
|
||||||
|
user_id: str,
|
||||||
|
scope: str,
|
||||||
|
kind: str,
|
||||||
|
rule_id: str,
|
||||||
|
actions: List[Union[str, Dict[str, str]]],
|
||||||
|
) -> None:
|
||||||
|
"""Changes the actions of an existing push rule for the given user.
|
||||||
|
|
||||||
|
See https://spec.matrix.org/v1.2/client-server-api/#push-rules for more
|
||||||
|
information about push rules and their syntax.
|
||||||
|
|
||||||
|
Can only be called on the main process.
|
||||||
|
|
||||||
|
Added in Synapse v1.58.0.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
user_id: the user for which to change the push rule's actions.
|
||||||
|
scope: the push rule's scope, currently only "global" is allowed.
|
||||||
|
kind: the push rule's kind.
|
||||||
|
rule_id: the push rule's identifier.
|
||||||
|
actions: the actions to run when the rule's conditions match.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
RuntimeError if this method is called on a worker or `scope` is invalid.
|
||||||
|
synapse.module_api.errors.RuleNotFoundException if the rule being modified
|
||||||
|
can't be found.
|
||||||
|
synapse.module_api.errors.InvalidRuleException if the actions are invalid.
|
||||||
|
"""
|
||||||
|
if self.worker_app is not None:
|
||||||
|
raise RuntimeError("module tried to change push rule actions on a worker")
|
||||||
|
|
||||||
|
if scope != "global":
|
||||||
|
raise RuntimeError(
|
||||||
|
"invalid scope %s, only 'global' is currently allowed" % scope
|
||||||
|
)
|
||||||
|
|
||||||
|
spec = RuleSpec(scope, kind, rule_id, "actions")
|
||||||
|
await self._push_rules_handler.set_rule_attr(
|
||||||
|
user_id, spec, {"actions": actions}
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class PublicRoomListManager:
|
class PublicRoomListManager:
|
||||||
"""Contains methods for adding to, removing from and querying whether a room
|
"""Contains methods for adding to, removing from and querying whether a room
|
||||||
|
|
|
@ -20,10 +20,14 @@ from synapse.api.errors import (
|
||||||
SynapseError,
|
SynapseError,
|
||||||
)
|
)
|
||||||
from synapse.config._base import ConfigError
|
from synapse.config._base import ConfigError
|
||||||
|
from synapse.handlers.push_rules import InvalidRuleException
|
||||||
|
from synapse.storage.push_rule import RuleNotFoundException
|
||||||
|
|
||||||
__all__ = [
|
__all__ = [
|
||||||
"InvalidClientCredentialsError",
|
"InvalidClientCredentialsError",
|
||||||
"RedirectException",
|
"RedirectException",
|
||||||
"SynapseError",
|
"SynapseError",
|
||||||
"ConfigError",
|
"ConfigError",
|
||||||
|
"InvalidRuleException",
|
||||||
|
"RuleNotFoundException",
|
||||||
]
|
]
|
||||||
|
|
|
@ -12,9 +12,7 @@
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
from typing import TYPE_CHECKING, List, Optional, Sequence, Tuple, Union
|
from typing import TYPE_CHECKING, List, Sequence, Tuple, Union
|
||||||
|
|
||||||
import attr
|
|
||||||
|
|
||||||
from synapse.api.errors import (
|
from synapse.api.errors import (
|
||||||
NotFoundError,
|
NotFoundError,
|
||||||
|
@ -22,6 +20,7 @@ from synapse.api.errors import (
|
||||||
SynapseError,
|
SynapseError,
|
||||||
UnrecognizedRequestError,
|
UnrecognizedRequestError,
|
||||||
)
|
)
|
||||||
|
from synapse.handlers.push_rules import InvalidRuleException, RuleSpec, check_actions
|
||||||
from synapse.http.server import HttpServer
|
from synapse.http.server import HttpServer
|
||||||
from synapse.http.servlet import (
|
from synapse.http.servlet import (
|
||||||
RestServlet,
|
RestServlet,
|
||||||
|
@ -29,7 +28,6 @@ from synapse.http.servlet import (
|
||||||
parse_string,
|
parse_string,
|
||||||
)
|
)
|
||||||
from synapse.http.site import SynapseRequest
|
from synapse.http.site import SynapseRequest
|
||||||
from synapse.push.baserules import BASE_RULE_IDS
|
|
||||||
from synapse.push.clientformat import format_push_rules_for_user
|
from synapse.push.clientformat import format_push_rules_for_user
|
||||||
from synapse.push.rulekinds import PRIORITY_CLASS_MAP
|
from synapse.push.rulekinds import PRIORITY_CLASS_MAP
|
||||||
from synapse.rest.client._base import client_patterns
|
from synapse.rest.client._base import client_patterns
|
||||||
|
@ -40,14 +38,6 @@ if TYPE_CHECKING:
|
||||||
from synapse.server import HomeServer
|
from synapse.server import HomeServer
|
||||||
|
|
||||||
|
|
||||||
@attr.s(slots=True, frozen=True, auto_attribs=True)
|
|
||||||
class RuleSpec:
|
|
||||||
scope: str
|
|
||||||
template: str
|
|
||||||
rule_id: str
|
|
||||||
attr: Optional[str]
|
|
||||||
|
|
||||||
|
|
||||||
class PushRuleRestServlet(RestServlet):
|
class PushRuleRestServlet(RestServlet):
|
||||||
PATTERNS = client_patterns("/(?P<path>pushrules/.*)$", v1=True)
|
PATTERNS = client_patterns("/(?P<path>pushrules/.*)$", v1=True)
|
||||||
SLIGHTLY_PEDANTIC_TRAILING_SLASH_ERROR = (
|
SLIGHTLY_PEDANTIC_TRAILING_SLASH_ERROR = (
|
||||||
|
@ -60,6 +50,7 @@ class PushRuleRestServlet(RestServlet):
|
||||||
self.store = hs.get_datastores().main
|
self.store = hs.get_datastores().main
|
||||||
self.notifier = hs.get_notifier()
|
self.notifier = hs.get_notifier()
|
||||||
self._is_worker = hs.config.worker.worker_app is not None
|
self._is_worker = hs.config.worker.worker_app is not None
|
||||||
|
self._push_rules_handler = hs.get_push_rules_handler()
|
||||||
|
|
||||||
async def on_PUT(self, request: SynapseRequest, path: str) -> Tuple[int, JsonDict]:
|
async def on_PUT(self, request: SynapseRequest, path: str) -> Tuple[int, JsonDict]:
|
||||||
if self._is_worker:
|
if self._is_worker:
|
||||||
|
@ -81,8 +72,13 @@ class PushRuleRestServlet(RestServlet):
|
||||||
user_id = requester.user.to_string()
|
user_id = requester.user.to_string()
|
||||||
|
|
||||||
if spec.attr:
|
if spec.attr:
|
||||||
await self.set_rule_attr(user_id, spec, content)
|
try:
|
||||||
self.notify_user(user_id)
|
await self._push_rules_handler.set_rule_attr(user_id, spec, content)
|
||||||
|
except InvalidRuleException as e:
|
||||||
|
raise SynapseError(400, "Invalid actions: %s" % e)
|
||||||
|
except RuleNotFoundException:
|
||||||
|
raise NotFoundError("Unknown rule")
|
||||||
|
|
||||||
return 200, {}
|
return 200, {}
|
||||||
|
|
||||||
if spec.rule_id.startswith("."):
|
if spec.rule_id.startswith("."):
|
||||||
|
@ -98,23 +94,23 @@ class PushRuleRestServlet(RestServlet):
|
||||||
|
|
||||||
before = parse_string(request, "before")
|
before = parse_string(request, "before")
|
||||||
if before:
|
if before:
|
||||||
before = _namespaced_rule_id(spec, before)
|
before = f"global/{spec.template}/{before}"
|
||||||
|
|
||||||
after = parse_string(request, "after")
|
after = parse_string(request, "after")
|
||||||
if after:
|
if after:
|
||||||
after = _namespaced_rule_id(spec, after)
|
after = f"global/{spec.template}/{after}"
|
||||||
|
|
||||||
try:
|
try:
|
||||||
await self.store.add_push_rule(
|
await self.store.add_push_rule(
|
||||||
user_id=user_id,
|
user_id=user_id,
|
||||||
rule_id=_namespaced_rule_id_from_spec(spec),
|
rule_id=f"global/{spec.template}/{spec.rule_id}",
|
||||||
priority_class=priority_class,
|
priority_class=priority_class,
|
||||||
conditions=conditions,
|
conditions=conditions,
|
||||||
actions=actions,
|
actions=actions,
|
||||||
before=before,
|
before=before,
|
||||||
after=after,
|
after=after,
|
||||||
)
|
)
|
||||||
self.notify_user(user_id)
|
self._push_rules_handler.notify_user(user_id)
|
||||||
except InconsistentRuleException as e:
|
except InconsistentRuleException as e:
|
||||||
raise SynapseError(400, str(e))
|
raise SynapseError(400, str(e))
|
||||||
except RuleNotFoundException as e:
|
except RuleNotFoundException as e:
|
||||||
|
@ -133,11 +129,11 @@ class PushRuleRestServlet(RestServlet):
|
||||||
requester = await self.auth.get_user_by_req(request)
|
requester = await self.auth.get_user_by_req(request)
|
||||||
user_id = requester.user.to_string()
|
user_id = requester.user.to_string()
|
||||||
|
|
||||||
namespaced_rule_id = _namespaced_rule_id_from_spec(spec)
|
namespaced_rule_id = f"global/{spec.template}/{spec.rule_id}"
|
||||||
|
|
||||||
try:
|
try:
|
||||||
await self.store.delete_push_rule(user_id, namespaced_rule_id)
|
await self.store.delete_push_rule(user_id, namespaced_rule_id)
|
||||||
self.notify_user(user_id)
|
self._push_rules_handler.notify_user(user_id)
|
||||||
return 200, {}
|
return 200, {}
|
||||||
except StoreError as e:
|
except StoreError as e:
|
||||||
if e.code == 404:
|
if e.code == 404:
|
||||||
|
@ -172,55 +168,6 @@ class PushRuleRestServlet(RestServlet):
|
||||||
else:
|
else:
|
||||||
raise UnrecognizedRequestError()
|
raise UnrecognizedRequestError()
|
||||||
|
|
||||||
def notify_user(self, user_id: str) -> None:
|
|
||||||
stream_id = self.store.get_max_push_rules_stream_id()
|
|
||||||
self.notifier.on_new_event("push_rules_key", stream_id, users=[user_id])
|
|
||||||
|
|
||||||
async def set_rule_attr(
|
|
||||||
self, user_id: str, spec: RuleSpec, val: Union[bool, JsonDict]
|
|
||||||
) -> None:
|
|
||||||
if spec.attr not in ("enabled", "actions"):
|
|
||||||
# for the sake of potential future expansion, shouldn't report
|
|
||||||
# 404 in the case of an unknown request so check it corresponds to
|
|
||||||
# a known attribute first.
|
|
||||||
raise UnrecognizedRequestError()
|
|
||||||
|
|
||||||
namespaced_rule_id = _namespaced_rule_id_from_spec(spec)
|
|
||||||
rule_id = spec.rule_id
|
|
||||||
is_default_rule = rule_id.startswith(".")
|
|
||||||
if is_default_rule:
|
|
||||||
if namespaced_rule_id not in BASE_RULE_IDS:
|
|
||||||
raise NotFoundError("Unknown rule %s" % (namespaced_rule_id,))
|
|
||||||
if spec.attr == "enabled":
|
|
||||||
if isinstance(val, dict) and "enabled" in val:
|
|
||||||
val = val["enabled"]
|
|
||||||
if not isinstance(val, bool):
|
|
||||||
# Legacy fallback
|
|
||||||
# This should *actually* take a dict, but many clients pass
|
|
||||||
# bools directly, so let's not break them.
|
|
||||||
raise SynapseError(400, "Value for 'enabled' must be boolean")
|
|
||||||
await self.store.set_push_rule_enabled(
|
|
||||||
user_id, namespaced_rule_id, val, is_default_rule
|
|
||||||
)
|
|
||||||
elif spec.attr == "actions":
|
|
||||||
if not isinstance(val, dict):
|
|
||||||
raise SynapseError(400, "Value must be a dict")
|
|
||||||
actions = val.get("actions")
|
|
||||||
if not isinstance(actions, list):
|
|
||||||
raise SynapseError(400, "Value for 'actions' must be dict")
|
|
||||||
_check_actions(actions)
|
|
||||||
namespaced_rule_id = _namespaced_rule_id_from_spec(spec)
|
|
||||||
rule_id = spec.rule_id
|
|
||||||
is_default_rule = rule_id.startswith(".")
|
|
||||||
if is_default_rule:
|
|
||||||
if namespaced_rule_id not in BASE_RULE_IDS:
|
|
||||||
raise SynapseError(404, "Unknown rule %r" % (namespaced_rule_id,))
|
|
||||||
await self.store.set_push_rule_actions(
|
|
||||||
user_id, namespaced_rule_id, actions, is_default_rule
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
raise UnrecognizedRequestError()
|
|
||||||
|
|
||||||
|
|
||||||
def _rule_spec_from_path(path: Sequence[str]) -> RuleSpec:
|
def _rule_spec_from_path(path: Sequence[str]) -> RuleSpec:
|
||||||
"""Turn a sequence of path components into a rule spec
|
"""Turn a sequence of path components into a rule spec
|
||||||
|
@ -291,24 +238,11 @@ def _rule_tuple_from_request_object(
|
||||||
raise InvalidRuleException("No actions found")
|
raise InvalidRuleException("No actions found")
|
||||||
actions = req_obj["actions"]
|
actions = req_obj["actions"]
|
||||||
|
|
||||||
_check_actions(actions)
|
check_actions(actions)
|
||||||
|
|
||||||
return conditions, actions
|
return conditions, actions
|
||||||
|
|
||||||
|
|
||||||
def _check_actions(actions: List[Union[str, JsonDict]]) -> None:
|
|
||||||
if not isinstance(actions, list):
|
|
||||||
raise InvalidRuleException("No actions found")
|
|
||||||
|
|
||||||
for a in actions:
|
|
||||||
if a in ["notify", "dont_notify", "coalesce"]:
|
|
||||||
pass
|
|
||||||
elif isinstance(a, dict) and "set_tweak" in a:
|
|
||||||
pass
|
|
||||||
else:
|
|
||||||
raise InvalidRuleException("Unrecognised action")
|
|
||||||
|
|
||||||
|
|
||||||
def _filter_ruleset_with_path(ruleset: JsonDict, path: List[str]) -> JsonDict:
|
def _filter_ruleset_with_path(ruleset: JsonDict, path: List[str]) -> JsonDict:
|
||||||
if path == []:
|
if path == []:
|
||||||
raise UnrecognizedRequestError(
|
raise UnrecognizedRequestError(
|
||||||
|
@ -357,17 +291,5 @@ def _priority_class_from_spec(spec: RuleSpec) -> int:
|
||||||
return pc
|
return pc
|
||||||
|
|
||||||
|
|
||||||
def _namespaced_rule_id_from_spec(spec: RuleSpec) -> str:
|
|
||||||
return _namespaced_rule_id(spec, spec.rule_id)
|
|
||||||
|
|
||||||
|
|
||||||
def _namespaced_rule_id(spec: RuleSpec, rule_id: str) -> str:
|
|
||||||
return "global/%s/%s" % (spec.template, rule_id)
|
|
||||||
|
|
||||||
|
|
||||||
class InvalidRuleException(Exception):
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
|
def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
|
||||||
PushRuleRestServlet(hs).register(http_server)
|
PushRuleRestServlet(hs).register(http_server)
|
||||||
|
|
|
@ -91,6 +91,7 @@ from synapse.handlers.presence import (
|
||||||
WorkerPresenceHandler,
|
WorkerPresenceHandler,
|
||||||
)
|
)
|
||||||
from synapse.handlers.profile import ProfileHandler
|
from synapse.handlers.profile import ProfileHandler
|
||||||
|
from synapse.handlers.push_rules import PushRulesHandler
|
||||||
from synapse.handlers.read_marker import ReadMarkerHandler
|
from synapse.handlers.read_marker import ReadMarkerHandler
|
||||||
from synapse.handlers.receipts import ReceiptsHandler
|
from synapse.handlers.receipts import ReceiptsHandler
|
||||||
from synapse.handlers.register import RegistrationHandler
|
from synapse.handlers.register import RegistrationHandler
|
||||||
|
@ -810,6 +811,10 @@ class HomeServer(metaclass=abc.ABCMeta):
|
||||||
def get_account_handler(self) -> AccountHandler:
|
def get_account_handler(self) -> AccountHandler:
|
||||||
return AccountHandler(self)
|
return AccountHandler(self)
|
||||||
|
|
||||||
|
@cache_in_self
|
||||||
|
def get_push_rules_handler(self) -> PushRulesHandler:
|
||||||
|
return PushRulesHandler(self)
|
||||||
|
|
||||||
@cache_in_self
|
@cache_in_self
|
||||||
def get_outbound_redis_connection(self) -> "ConnectionHandler":
|
def get_outbound_redis_connection(self) -> "ConnectionHandler":
|
||||||
"""
|
"""
|
||||||
|
|
|
@ -16,7 +16,7 @@ import abc
|
||||||
import logging
|
import logging
|
||||||
from typing import TYPE_CHECKING, Dict, List, Tuple, Union
|
from typing import TYPE_CHECKING, Dict, List, Tuple, Union
|
||||||
|
|
||||||
from synapse.api.errors import NotFoundError, StoreError
|
from synapse.api.errors import StoreError
|
||||||
from synapse.push.baserules import list_with_base_rules
|
from synapse.push.baserules import list_with_base_rules
|
||||||
from synapse.replication.slave.storage._slaved_id_tracker import SlavedIdTracker
|
from synapse.replication.slave.storage._slaved_id_tracker import SlavedIdTracker
|
||||||
from synapse.storage._base import SQLBaseStore, db_to_json
|
from synapse.storage._base import SQLBaseStore, db_to_json
|
||||||
|
@ -618,7 +618,7 @@ class PushRuleStore(PushRulesWorkerStore):
|
||||||
are always stored in the database `push_rules` table).
|
are always stored in the database `push_rules` table).
|
||||||
|
|
||||||
Raises:
|
Raises:
|
||||||
NotFoundError if the rule does not exist.
|
RuleNotFoundException if the rule does not exist.
|
||||||
"""
|
"""
|
||||||
async with self._push_rules_stream_id_gen.get_next() as stream_id:
|
async with self._push_rules_stream_id_gen.get_next() as stream_id:
|
||||||
event_stream_ordering = self._stream_id_gen.get_current_token()
|
event_stream_ordering = self._stream_id_gen.get_current_token()
|
||||||
|
@ -668,8 +668,7 @@ class PushRuleStore(PushRulesWorkerStore):
|
||||||
)
|
)
|
||||||
txn.execute(sql, (user_id, rule_id))
|
txn.execute(sql, (user_id, rule_id))
|
||||||
if txn.fetchone() is None:
|
if txn.fetchone() is None:
|
||||||
# needed to set NOT_FOUND code.
|
raise RuleNotFoundException("Push rule does not exist.")
|
||||||
raise NotFoundError("Push rule does not exist.")
|
|
||||||
|
|
||||||
self.db_pool.simple_upsert_txn(
|
self.db_pool.simple_upsert_txn(
|
||||||
txn,
|
txn,
|
||||||
|
@ -698,9 +697,6 @@ class PushRuleStore(PushRulesWorkerStore):
|
||||||
"""
|
"""
|
||||||
Sets the `actions` state of a push rule.
|
Sets the `actions` state of a push rule.
|
||||||
|
|
||||||
Will throw NotFoundError if the rule does not exist; the Code for this
|
|
||||||
is NOT_FOUND.
|
|
||||||
|
|
||||||
Args:
|
Args:
|
||||||
user_id: the user ID of the user who wishes to enable/disable the rule
|
user_id: the user ID of the user who wishes to enable/disable the rule
|
||||||
e.g. '@tina:example.org'
|
e.g. '@tina:example.org'
|
||||||
|
@ -712,6 +708,9 @@ class PushRuleStore(PushRulesWorkerStore):
|
||||||
is_default_rule: True if and only if this is a server-default rule.
|
is_default_rule: True if and only if this is a server-default rule.
|
||||||
This skips the check for existence (as only user-created rules
|
This skips the check for existence (as only user-created rules
|
||||||
are always stored in the database `push_rules` table).
|
are always stored in the database `push_rules` table).
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
RuleNotFoundException if the rule does not exist.
|
||||||
"""
|
"""
|
||||||
actions_json = json_encoder.encode(actions)
|
actions_json = json_encoder.encode(actions)
|
||||||
|
|
||||||
|
@ -744,7 +743,7 @@ class PushRuleStore(PushRulesWorkerStore):
|
||||||
except StoreError as serr:
|
except StoreError as serr:
|
||||||
if serr.code == 404:
|
if serr.code == 404:
|
||||||
# this sets the NOT_FOUND error Code
|
# this sets the NOT_FOUND error Code
|
||||||
raise NotFoundError("Push rule does not exist")
|
raise RuleNotFoundException("Push rule does not exist")
|
||||||
else:
|
else:
|
||||||
raise
|
raise
|
||||||
|
|
||||||
|
|
|
@ -19,8 +19,9 @@ from synapse.api.constants import EduTypes, EventTypes
|
||||||
from synapse.events import EventBase
|
from synapse.events import EventBase
|
||||||
from synapse.federation.units import Transaction
|
from synapse.federation.units import Transaction
|
||||||
from synapse.handlers.presence import UserPresenceState
|
from synapse.handlers.presence import UserPresenceState
|
||||||
|
from synapse.handlers.push_rules import InvalidRuleException
|
||||||
from synapse.rest import admin
|
from synapse.rest import admin
|
||||||
from synapse.rest.client import login, presence, profile, room
|
from synapse.rest.client import login, notifications, presence, profile, room
|
||||||
from synapse.types import create_requester
|
from synapse.types import create_requester
|
||||||
|
|
||||||
from tests.events.test_presence_router import send_presence_update, sync_presence
|
from tests.events.test_presence_router import send_presence_update, sync_presence
|
||||||
|
@ -38,6 +39,7 @@ class ModuleApiTestCase(HomeserverTestCase):
|
||||||
room.register_servlets,
|
room.register_servlets,
|
||||||
presence.register_servlets,
|
presence.register_servlets,
|
||||||
profile.register_servlets,
|
profile.register_servlets,
|
||||||
|
notifications.register_servlets,
|
||||||
]
|
]
|
||||||
|
|
||||||
def prepare(self, reactor, clock, homeserver):
|
def prepare(self, reactor, clock, homeserver):
|
||||||
|
@ -553,6 +555,86 @@ class ModuleApiTestCase(HomeserverTestCase):
|
||||||
self.assertEqual(state[("org.matrix.test", "")].state_key, "")
|
self.assertEqual(state[("org.matrix.test", "")].state_key, "")
|
||||||
self.assertEqual(state[("org.matrix.test", "")].content, {})
|
self.assertEqual(state[("org.matrix.test", "")].content, {})
|
||||||
|
|
||||||
|
def test_set_push_rules_action(self) -> None:
|
||||||
|
"""Test that a module can change the actions of an existing push rule for a user."""
|
||||||
|
|
||||||
|
# Create a room with 2 users in it. Push rules must not match if the user is the
|
||||||
|
# event's sender, so we need one user to send messages and one user to receive
|
||||||
|
# notifications.
|
||||||
|
user_id = self.register_user("user", "password")
|
||||||
|
tok = self.login("user", "password")
|
||||||
|
|
||||||
|
room_id = self.helper.create_room_as(user_id, is_public=True, tok=tok)
|
||||||
|
|
||||||
|
user_id2 = self.register_user("user2", "password")
|
||||||
|
tok2 = self.login("user2", "password")
|
||||||
|
self.helper.join(room_id, user_id2, tok=tok2)
|
||||||
|
|
||||||
|
# Register a 3rd user and join them to the room, so that we don't accidentally
|
||||||
|
# trigger 1:1 push rules.
|
||||||
|
user_id3 = self.register_user("user3", "password")
|
||||||
|
tok3 = self.login("user3", "password")
|
||||||
|
self.helper.join(room_id, user_id3, tok=tok3)
|
||||||
|
|
||||||
|
# Send a message as the second user and check that it notifies.
|
||||||
|
res = self.helper.send(room_id=room_id, body="here's a message", tok=tok2)
|
||||||
|
event_id = res["event_id"]
|
||||||
|
|
||||||
|
channel = self.make_request(
|
||||||
|
"GET",
|
||||||
|
"/notifications",
|
||||||
|
access_token=tok,
|
||||||
|
)
|
||||||
|
self.assertEqual(channel.code, 200, channel.result)
|
||||||
|
|
||||||
|
self.assertEqual(len(channel.json_body["notifications"]), 1, channel.json_body)
|
||||||
|
self.assertEqual(
|
||||||
|
channel.json_body["notifications"][0]["event"]["event_id"],
|
||||||
|
event_id,
|
||||||
|
channel.json_body,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Change the .m.rule.message actions to not notify on new messages.
|
||||||
|
self.get_success(
|
||||||
|
defer.ensureDeferred(
|
||||||
|
self.module_api.set_push_rule_action(
|
||||||
|
user_id=user_id,
|
||||||
|
scope="global",
|
||||||
|
kind="underride",
|
||||||
|
rule_id=".m.rule.message",
|
||||||
|
actions=["dont_notify"],
|
||||||
|
)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
# Send another message as the second user and check that the number of
|
||||||
|
# notifications didn't change.
|
||||||
|
self.helper.send(room_id=room_id, body="here's another message", tok=tok2)
|
||||||
|
|
||||||
|
channel = self.make_request(
|
||||||
|
"GET",
|
||||||
|
"/notifications?from=",
|
||||||
|
access_token=tok,
|
||||||
|
)
|
||||||
|
self.assertEqual(channel.code, 200, channel.result)
|
||||||
|
self.assertEqual(len(channel.json_body["notifications"]), 1, channel.json_body)
|
||||||
|
|
||||||
|
def test_check_push_rules_actions(self) -> None:
|
||||||
|
"""Test that modules can check whether a list of push rules actions are spec
|
||||||
|
compliant.
|
||||||
|
"""
|
||||||
|
with self.assertRaises(InvalidRuleException):
|
||||||
|
self.module_api.check_push_rule_actions(["foo"])
|
||||||
|
|
||||||
|
with self.assertRaises(InvalidRuleException):
|
||||||
|
self.module_api.check_push_rule_actions({"foo": "bar"})
|
||||||
|
|
||||||
|
self.module_api.check_push_rule_actions(["notify"])
|
||||||
|
|
||||||
|
self.module_api.check_push_rule_actions(
|
||||||
|
[{"set_tweak": "sound", "value": "default"}]
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class ModuleApiWorkerTestCase(BaseMultiWorkerStreamTestCase):
|
class ModuleApiWorkerTestCase(BaseMultiWorkerStreamTestCase):
|
||||||
"""For testing ModuleApi functionality in a multi-worker setup"""
|
"""For testing ModuleApi functionality in a multi-worker setup"""
|
||||||
|
|
Loading…
Reference in a new issue