Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.
 
 
 
 
 
 

1153 rindas
40 KiB

  1. # Copyright 2014-2016 OpenMarket Ltd
  2. # Copyright 2018 New Vector Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. """ This module contains REST servlets to do with rooms: /rooms/<paths> """
  16. import logging
  17. import re
  18. from typing import TYPE_CHECKING, Dict, List, Optional, Tuple
  19. from urllib import parse as urlparse
  20. from synapse.api.constants import EventTypes, Membership
  21. from synapse.api.errors import (
  22. AuthError,
  23. Codes,
  24. InvalidClientCredentialsError,
  25. MissingClientTokenError,
  26. ShadowBanError,
  27. SynapseError,
  28. )
  29. from synapse.api.filtering import Filter
  30. from synapse.events.utils import format_event_for_client_v2
  31. from synapse.http.servlet import (
  32. ResolveRoomIdMixin,
  33. RestServlet,
  34. assert_params_in_dict,
  35. parse_boolean,
  36. parse_integer,
  37. parse_json_object_from_request,
  38. parse_string,
  39. parse_strings_from_args,
  40. )
  41. from synapse.http.site import SynapseRequest
  42. from synapse.logging.opentracing import set_tag
  43. from synapse.rest.client._base import client_patterns
  44. from synapse.rest.client.transactions import HttpTransactionCache
  45. from synapse.storage.state import StateFilter
  46. from synapse.streams.config import PaginationConfig
  47. from synapse.types import JsonDict, StreamToken, ThirdPartyInstanceID, UserID
  48. from synapse.util import json_decoder
  49. from synapse.util.stringutils import parse_and_validate_server_name, random_string
  50. if TYPE_CHECKING:
  51. from synapse.server import HomeServer
  52. logger = logging.getLogger(__name__)
  53. class TransactionRestServlet(RestServlet):
  54. def __init__(self, hs):
  55. super().__init__()
  56. self.txns = HttpTransactionCache(hs)
  57. class RoomCreateRestServlet(TransactionRestServlet):
  58. # No PATTERN; we have custom dispatch rules here
  59. def __init__(self, hs):
  60. super().__init__(hs)
  61. self._room_creation_handler = hs.get_room_creation_handler()
  62. self.auth = hs.get_auth()
  63. def register(self, http_server):
  64. PATTERNS = "/createRoom"
  65. register_txn_path(self, PATTERNS, http_server)
  66. def on_PUT(self, request, txn_id):
  67. set_tag("txn_id", txn_id)
  68. return self.txns.fetch_or_execute_request(request, self.on_POST, request)
  69. async def on_POST(self, request):
  70. requester = await self.auth.get_user_by_req(request)
  71. info, _ = await self._room_creation_handler.create_room(
  72. requester, self.get_room_config(request)
  73. )
  74. return 200, info
  75. def get_room_config(self, request):
  76. user_supplied_config = parse_json_object_from_request(request)
  77. return user_supplied_config
  78. # TODO: Needs unit testing for generic events
  79. class RoomStateEventRestServlet(TransactionRestServlet):
  80. def __init__(self, hs):
  81. super().__init__(hs)
  82. self.event_creation_handler = hs.get_event_creation_handler()
  83. self.room_member_handler = hs.get_room_member_handler()
  84. self.message_handler = hs.get_message_handler()
  85. self.auth = hs.get_auth()
  86. def register(self, http_server):
  87. # /room/$roomid/state/$eventtype
  88. no_state_key = "/rooms/(?P<room_id>[^/]*)/state/(?P<event_type>[^/]*)$"
  89. # /room/$roomid/state/$eventtype/$statekey
  90. state_key = (
  91. "/rooms/(?P<room_id>[^/]*)/state/"
  92. "(?P<event_type>[^/]*)/(?P<state_key>[^/]*)$"
  93. )
  94. http_server.register_paths(
  95. "GET",
  96. client_patterns(state_key, v1=True),
  97. self.on_GET,
  98. self.__class__.__name__,
  99. )
  100. http_server.register_paths(
  101. "PUT",
  102. client_patterns(state_key, v1=True),
  103. self.on_PUT,
  104. self.__class__.__name__,
  105. )
  106. http_server.register_paths(
  107. "GET",
  108. client_patterns(no_state_key, v1=True),
  109. self.on_GET_no_state_key,
  110. self.__class__.__name__,
  111. )
  112. http_server.register_paths(
  113. "PUT",
  114. client_patterns(no_state_key, v1=True),
  115. self.on_PUT_no_state_key,
  116. self.__class__.__name__,
  117. )
  118. def on_GET_no_state_key(self, request, room_id, event_type):
  119. return self.on_GET(request, room_id, event_type, "")
  120. def on_PUT_no_state_key(self, request, room_id, event_type):
  121. return self.on_PUT(request, room_id, event_type, "")
  122. async def on_GET(self, request, room_id, event_type, state_key):
  123. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  124. format = parse_string(
  125. request, "format", default="content", allowed_values=["content", "event"]
  126. )
  127. msg_handler = self.message_handler
  128. data = await msg_handler.get_room_data(
  129. user_id=requester.user.to_string(),
  130. room_id=room_id,
  131. event_type=event_type,
  132. state_key=state_key,
  133. )
  134. if not data:
  135. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  136. if format == "event":
  137. event = format_event_for_client_v2(data.get_dict())
  138. return 200, event
  139. elif format == "content":
  140. return 200, data.get_dict()["content"]
  141. async def on_PUT(self, request, room_id, event_type, state_key, txn_id=None):
  142. requester = await self.auth.get_user_by_req(request)
  143. if txn_id:
  144. set_tag("txn_id", txn_id)
  145. content = parse_json_object_from_request(request)
  146. event_dict = {
  147. "type": event_type,
  148. "content": content,
  149. "room_id": room_id,
  150. "sender": requester.user.to_string(),
  151. }
  152. if state_key is not None:
  153. event_dict["state_key"] = state_key
  154. try:
  155. if event_type == EventTypes.Member:
  156. membership = content.get("membership", None)
  157. event_id, _ = await self.room_member_handler.update_membership(
  158. requester,
  159. target=UserID.from_string(state_key),
  160. room_id=room_id,
  161. action=membership,
  162. content=content,
  163. )
  164. else:
  165. (
  166. event,
  167. _,
  168. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  169. requester, event_dict, txn_id=txn_id
  170. )
  171. event_id = event.event_id
  172. except ShadowBanError:
  173. event_id = "$" + random_string(43)
  174. set_tag("event_id", event_id)
  175. ret = {"event_id": event_id}
  176. return 200, ret
  177. # TODO: Needs unit testing for generic events + feedback
  178. class RoomSendEventRestServlet(TransactionRestServlet):
  179. def __init__(self, hs):
  180. super().__init__(hs)
  181. self.event_creation_handler = hs.get_event_creation_handler()
  182. self.auth = hs.get_auth()
  183. def register(self, http_server):
  184. # /rooms/$roomid/send/$event_type[/$txn_id]
  185. PATTERNS = "/rooms/(?P<room_id>[^/]*)/send/(?P<event_type>[^/]*)"
  186. register_txn_path(self, PATTERNS, http_server, with_get=True)
  187. async def on_POST(self, request, room_id, event_type, txn_id=None):
  188. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  189. content = parse_json_object_from_request(request)
  190. event_dict = {
  191. "type": event_type,
  192. "content": content,
  193. "room_id": room_id,
  194. "sender": requester.user.to_string(),
  195. }
  196. if b"ts" in request.args and requester.app_service:
  197. event_dict["origin_server_ts"] = parse_integer(request, "ts", 0)
  198. try:
  199. (
  200. event,
  201. _,
  202. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  203. requester, event_dict, txn_id=txn_id
  204. )
  205. event_id = event.event_id
  206. except ShadowBanError:
  207. event_id = "$" + random_string(43)
  208. set_tag("event_id", event_id)
  209. return 200, {"event_id": event_id}
  210. def on_GET(self, request, room_id, event_type, txn_id):
  211. return 200, "Not implemented"
  212. def on_PUT(self, request, room_id, event_type, txn_id):
  213. set_tag("txn_id", txn_id)
  214. return self.txns.fetch_or_execute_request(
  215. request, self.on_POST, request, room_id, event_type, txn_id
  216. )
  217. # TODO: Needs unit testing for room ID + alias joins
  218. class JoinRoomAliasServlet(ResolveRoomIdMixin, TransactionRestServlet):
  219. def __init__(self, hs):
  220. super().__init__(hs)
  221. super(ResolveRoomIdMixin, self).__init__(hs) # ensure the Mixin is set up
  222. self.auth = hs.get_auth()
  223. def register(self, http_server):
  224. # /join/$room_identifier[/$txn_id]
  225. PATTERNS = "/join/(?P<room_identifier>[^/]*)"
  226. register_txn_path(self, PATTERNS, http_server)
  227. async def on_POST(
  228. self,
  229. request: SynapseRequest,
  230. room_identifier: str,
  231. txn_id: Optional[str] = None,
  232. ):
  233. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  234. try:
  235. content = parse_json_object_from_request(request)
  236. except Exception:
  237. # Turns out we used to ignore the body entirely, and some clients
  238. # cheekily send invalid bodies.
  239. content = {}
  240. # twisted.web.server.Request.args is incorrectly defined as Optional[Any]
  241. args: Dict[bytes, List[bytes]] = request.args # type: ignore
  242. remote_room_hosts = parse_strings_from_args(args, "server_name", required=False)
  243. room_id, remote_room_hosts = await self.resolve_room_id(
  244. room_identifier,
  245. remote_room_hosts,
  246. )
  247. await self.room_member_handler.update_membership(
  248. requester=requester,
  249. target=requester.user,
  250. room_id=room_id,
  251. action="join",
  252. txn_id=txn_id,
  253. remote_room_hosts=remote_room_hosts,
  254. content=content,
  255. third_party_signed=content.get("third_party_signed", None),
  256. )
  257. return 200, {"room_id": room_id}
  258. def on_PUT(self, request, room_identifier, txn_id):
  259. set_tag("txn_id", txn_id)
  260. return self.txns.fetch_or_execute_request(
  261. request, self.on_POST, request, room_identifier, txn_id
  262. )
  263. # TODO: Needs unit testing
  264. class PublicRoomListRestServlet(TransactionRestServlet):
  265. PATTERNS = client_patterns("/publicRooms$", v1=True)
  266. def __init__(self, hs):
  267. super().__init__(hs)
  268. self.hs = hs
  269. self.auth = hs.get_auth()
  270. async def on_GET(self, request):
  271. server = parse_string(request, "server")
  272. try:
  273. await self.auth.get_user_by_req(request, allow_guest=True)
  274. except InvalidClientCredentialsError as e:
  275. # Option to allow servers to require auth when accessing
  276. # /publicRooms via CS API. This is especially helpful in private
  277. # federations.
  278. if not self.hs.config.allow_public_rooms_without_auth:
  279. raise
  280. # We allow people to not be authed if they're just looking at our
  281. # room list, but require auth when we proxy the request.
  282. # In both cases we call the auth function, as that has the side
  283. # effect of logging who issued this request if an access token was
  284. # provided.
  285. if server:
  286. raise e
  287. limit: Optional[int] = parse_integer(request, "limit", 0)
  288. since_token = parse_string(request, "since")
  289. if limit == 0:
  290. # zero is a special value which corresponds to no limit.
  291. limit = None
  292. handler = self.hs.get_room_list_handler()
  293. if server and server != self.hs.config.server_name:
  294. # Ensure the server is valid.
  295. try:
  296. parse_and_validate_server_name(server)
  297. except ValueError:
  298. raise SynapseError(
  299. 400,
  300. "Invalid server name: %s" % (server,),
  301. Codes.INVALID_PARAM,
  302. )
  303. data = await handler.get_remote_public_room_list(
  304. server, limit=limit, since_token=since_token
  305. )
  306. else:
  307. data = await handler.get_local_public_room_list(
  308. limit=limit, since_token=since_token
  309. )
  310. return 200, data
  311. async def on_POST(self, request):
  312. await self.auth.get_user_by_req(request, allow_guest=True)
  313. server = parse_string(request, "server")
  314. content = parse_json_object_from_request(request)
  315. limit: Optional[int] = int(content.get("limit", 100))
  316. since_token = content.get("since", None)
  317. search_filter = content.get("filter", None)
  318. include_all_networks = content.get("include_all_networks", False)
  319. third_party_instance_id = content.get("third_party_instance_id", None)
  320. if include_all_networks:
  321. network_tuple = None
  322. if third_party_instance_id is not None:
  323. raise SynapseError(
  324. 400, "Can't use include_all_networks with an explicit network"
  325. )
  326. elif third_party_instance_id is None:
  327. network_tuple = ThirdPartyInstanceID(None, None)
  328. else:
  329. network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
  330. if limit == 0:
  331. # zero is a special value which corresponds to no limit.
  332. limit = None
  333. handler = self.hs.get_room_list_handler()
  334. if server and server != self.hs.config.server_name:
  335. # Ensure the server is valid.
  336. try:
  337. parse_and_validate_server_name(server)
  338. except ValueError:
  339. raise SynapseError(
  340. 400,
  341. "Invalid server name: %s" % (server,),
  342. Codes.INVALID_PARAM,
  343. )
  344. data = await handler.get_remote_public_room_list(
  345. server,
  346. limit=limit,
  347. since_token=since_token,
  348. search_filter=search_filter,
  349. include_all_networks=include_all_networks,
  350. third_party_instance_id=third_party_instance_id,
  351. )
  352. else:
  353. data = await handler.get_local_public_room_list(
  354. limit=limit,
  355. since_token=since_token,
  356. search_filter=search_filter,
  357. network_tuple=network_tuple,
  358. )
  359. return 200, data
  360. # TODO: Needs unit testing
  361. class RoomMemberListRestServlet(RestServlet):
  362. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/members$", v1=True)
  363. def __init__(self, hs):
  364. super().__init__()
  365. self.message_handler = hs.get_message_handler()
  366. self.auth = hs.get_auth()
  367. self.store = hs.get_datastore()
  368. async def on_GET(self, request, room_id):
  369. # TODO support Pagination stream API (limit/tokens)
  370. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  371. handler = self.message_handler
  372. # request the state as of a given event, as identified by a stream token,
  373. # for consistency with /messages etc.
  374. # useful for getting the membership in retrospect as of a given /sync
  375. # response.
  376. at_token_string = parse_string(request, "at")
  377. if at_token_string is None:
  378. at_token = None
  379. else:
  380. at_token = await StreamToken.from_string(self.store, at_token_string)
  381. # let you filter down on particular memberships.
  382. # XXX: this may not be the best shape for this API - we could pass in a filter
  383. # instead, except filters aren't currently aware of memberships.
  384. # See https://github.com/matrix-org/matrix-doc/issues/1337 for more details.
  385. membership = parse_string(request, "membership")
  386. not_membership = parse_string(request, "not_membership")
  387. events = await handler.get_state_events(
  388. room_id=room_id,
  389. user_id=requester.user.to_string(),
  390. at_token=at_token,
  391. state_filter=StateFilter.from_types([(EventTypes.Member, None)]),
  392. )
  393. chunk = []
  394. for event in events:
  395. if (membership and event["content"].get("membership") != membership) or (
  396. not_membership and event["content"].get("membership") == not_membership
  397. ):
  398. continue
  399. chunk.append(event)
  400. return 200, {"chunk": chunk}
  401. # deprecated in favour of /members?membership=join?
  402. # except it does custom AS logic and has a simpler return format
  403. class JoinedRoomMemberListRestServlet(RestServlet):
  404. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/joined_members$", v1=True)
  405. def __init__(self, hs):
  406. super().__init__()
  407. self.message_handler = hs.get_message_handler()
  408. self.auth = hs.get_auth()
  409. async def on_GET(self, request, room_id):
  410. requester = await self.auth.get_user_by_req(request)
  411. users_with_profile = await self.message_handler.get_joined_members(
  412. requester, room_id
  413. )
  414. return 200, {"joined": users_with_profile}
  415. # TODO: Needs better unit testing
  416. class RoomMessageListRestServlet(RestServlet):
  417. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/messages$", v1=True)
  418. def __init__(self, hs):
  419. super().__init__()
  420. self.pagination_handler = hs.get_pagination_handler()
  421. self.auth = hs.get_auth()
  422. self.store = hs.get_datastore()
  423. async def on_GET(self, request, room_id):
  424. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  425. pagination_config = await PaginationConfig.from_request(
  426. self.store, request, default_limit=10
  427. )
  428. as_client_event = b"raw" not in request.args
  429. filter_str = parse_string(request, "filter", encoding="utf-8")
  430. if filter_str:
  431. filter_json = urlparse.unquote(filter_str)
  432. event_filter: Optional[Filter] = Filter(json_decoder.decode(filter_json))
  433. if (
  434. event_filter
  435. and event_filter.filter_json.get("event_format", "client")
  436. == "federation"
  437. ):
  438. as_client_event = False
  439. else:
  440. event_filter = None
  441. msgs = await self.pagination_handler.get_messages(
  442. room_id=room_id,
  443. requester=requester,
  444. pagin_config=pagination_config,
  445. as_client_event=as_client_event,
  446. event_filter=event_filter,
  447. )
  448. return 200, msgs
  449. # TODO: Needs unit testing
  450. class RoomStateRestServlet(RestServlet):
  451. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/state$", v1=True)
  452. def __init__(self, hs):
  453. super().__init__()
  454. self.message_handler = hs.get_message_handler()
  455. self.auth = hs.get_auth()
  456. async def on_GET(self, request, room_id):
  457. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  458. # Get all the current state for this room
  459. events = await self.message_handler.get_state_events(
  460. room_id=room_id,
  461. user_id=requester.user.to_string(),
  462. is_guest=requester.is_guest,
  463. )
  464. return 200, events
  465. # TODO: Needs unit testing
  466. class RoomInitialSyncRestServlet(RestServlet):
  467. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/initialSync$", v1=True)
  468. def __init__(self, hs):
  469. super().__init__()
  470. self.initial_sync_handler = hs.get_initial_sync_handler()
  471. self.auth = hs.get_auth()
  472. self.store = hs.get_datastore()
  473. async def on_GET(self, request, room_id):
  474. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  475. pagination_config = await PaginationConfig.from_request(self.store, request)
  476. content = await self.initial_sync_handler.room_initial_sync(
  477. room_id=room_id, requester=requester, pagin_config=pagination_config
  478. )
  479. return 200, content
  480. class RoomEventServlet(RestServlet):
  481. PATTERNS = client_patterns(
  482. "/rooms/(?P<room_id>[^/]*)/event/(?P<event_id>[^/]*)$", v1=True
  483. )
  484. def __init__(self, hs):
  485. super().__init__()
  486. self.clock = hs.get_clock()
  487. self.event_handler = hs.get_event_handler()
  488. self._event_serializer = hs.get_event_client_serializer()
  489. self.auth = hs.get_auth()
  490. async def on_GET(self, request, room_id, event_id):
  491. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  492. try:
  493. event = await self.event_handler.get_event(
  494. requester.user, room_id, event_id
  495. )
  496. except AuthError:
  497. # This endpoint is supposed to return a 404 when the requester does
  498. # not have permission to access the event
  499. # https://matrix.org/docs/spec/client_server/r0.5.0#get-matrix-client-r0-rooms-roomid-event-eventid
  500. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  501. time_now = self.clock.time_msec()
  502. if event:
  503. event = await self._event_serializer.serialize_event(event, time_now)
  504. return 200, event
  505. return SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  506. class RoomEventContextServlet(RestServlet):
  507. PATTERNS = client_patterns(
  508. "/rooms/(?P<room_id>[^/]*)/context/(?P<event_id>[^/]*)$", v1=True
  509. )
  510. def __init__(self, hs):
  511. super().__init__()
  512. self.clock = hs.get_clock()
  513. self.room_context_handler = hs.get_room_context_handler()
  514. self._event_serializer = hs.get_event_client_serializer()
  515. self.auth = hs.get_auth()
  516. async def on_GET(self, request, room_id, event_id):
  517. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  518. limit = parse_integer(request, "limit", default=10)
  519. # picking the API shape for symmetry with /messages
  520. filter_str = parse_string(request, "filter", encoding="utf-8")
  521. if filter_str:
  522. filter_json = urlparse.unquote(filter_str)
  523. event_filter: Optional[Filter] = Filter(json_decoder.decode(filter_json))
  524. else:
  525. event_filter = None
  526. results = await self.room_context_handler.get_event_context(
  527. requester, room_id, event_id, limit, event_filter
  528. )
  529. if not results:
  530. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  531. time_now = self.clock.time_msec()
  532. results["events_before"] = await self._event_serializer.serialize_events(
  533. results["events_before"], time_now
  534. )
  535. results["event"] = await self._event_serializer.serialize_event(
  536. results["event"], time_now
  537. )
  538. results["events_after"] = await self._event_serializer.serialize_events(
  539. results["events_after"], time_now
  540. )
  541. results["state"] = await self._event_serializer.serialize_events(
  542. results["state"],
  543. time_now,
  544. # No need to bundle aggregations for state events
  545. bundle_aggregations=False,
  546. )
  547. return 200, results
  548. class RoomForgetRestServlet(TransactionRestServlet):
  549. def __init__(self, hs):
  550. super().__init__(hs)
  551. self.room_member_handler = hs.get_room_member_handler()
  552. self.auth = hs.get_auth()
  553. def register(self, http_server):
  554. PATTERNS = "/rooms/(?P<room_id>[^/]*)/forget"
  555. register_txn_path(self, PATTERNS, http_server)
  556. async def on_POST(self, request, room_id, txn_id=None):
  557. requester = await self.auth.get_user_by_req(request, allow_guest=False)
  558. await self.room_member_handler.forget(user=requester.user, room_id=room_id)
  559. return 200, {}
  560. def on_PUT(self, request, room_id, txn_id):
  561. set_tag("txn_id", txn_id)
  562. return self.txns.fetch_or_execute_request(
  563. request, self.on_POST, request, room_id, txn_id
  564. )
  565. # TODO: Needs unit testing
  566. class RoomMembershipRestServlet(TransactionRestServlet):
  567. def __init__(self, hs):
  568. super().__init__(hs)
  569. self.room_member_handler = hs.get_room_member_handler()
  570. self.auth = hs.get_auth()
  571. def register(self, http_server):
  572. # /rooms/$roomid/[invite|join|leave]
  573. PATTERNS = (
  574. "/rooms/(?P<room_id>[^/]*)/"
  575. "(?P<membership_action>join|invite|leave|ban|unban|kick)"
  576. )
  577. register_txn_path(self, PATTERNS, http_server)
  578. async def on_POST(self, request, room_id, membership_action, txn_id=None):
  579. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  580. if requester.is_guest and membership_action not in {
  581. Membership.JOIN,
  582. Membership.LEAVE,
  583. }:
  584. raise AuthError(403, "Guest access not allowed")
  585. try:
  586. content = parse_json_object_from_request(request)
  587. except Exception:
  588. # Turns out we used to ignore the body entirely, and some clients
  589. # cheekily send invalid bodies.
  590. content = {}
  591. if membership_action == "invite" and self._has_3pid_invite_keys(content):
  592. try:
  593. await self.room_member_handler.do_3pid_invite(
  594. room_id,
  595. requester.user,
  596. content["medium"],
  597. content["address"],
  598. content["id_server"],
  599. requester,
  600. txn_id,
  601. content.get("id_access_token"),
  602. )
  603. except ShadowBanError:
  604. # Pretend the request succeeded.
  605. pass
  606. return 200, {}
  607. target = requester.user
  608. if membership_action in ["invite", "ban", "unban", "kick"]:
  609. assert_params_in_dict(content, ["user_id"])
  610. target = UserID.from_string(content["user_id"])
  611. event_content = None
  612. if "reason" in content:
  613. event_content = {"reason": content["reason"]}
  614. try:
  615. await self.room_member_handler.update_membership(
  616. requester=requester,
  617. target=target,
  618. room_id=room_id,
  619. action=membership_action,
  620. txn_id=txn_id,
  621. third_party_signed=content.get("third_party_signed", None),
  622. content=event_content,
  623. )
  624. except ShadowBanError:
  625. # Pretend the request succeeded.
  626. pass
  627. return_value = {}
  628. if membership_action == "join":
  629. return_value["room_id"] = room_id
  630. return 200, return_value
  631. def _has_3pid_invite_keys(self, content):
  632. for key in {"id_server", "medium", "address"}:
  633. if key not in content:
  634. return False
  635. return True
  636. def on_PUT(self, request, room_id, membership_action, txn_id):
  637. set_tag("txn_id", txn_id)
  638. return self.txns.fetch_or_execute_request(
  639. request, self.on_POST, request, room_id, membership_action, txn_id
  640. )
  641. class RoomRedactEventRestServlet(TransactionRestServlet):
  642. def __init__(self, hs):
  643. super().__init__(hs)
  644. self.event_creation_handler = hs.get_event_creation_handler()
  645. self.auth = hs.get_auth()
  646. def register(self, http_server):
  647. PATTERNS = "/rooms/(?P<room_id>[^/]*)/redact/(?P<event_id>[^/]*)"
  648. register_txn_path(self, PATTERNS, http_server)
  649. async def on_POST(self, request, room_id, event_id, txn_id=None):
  650. requester = await self.auth.get_user_by_req(request)
  651. content = parse_json_object_from_request(request)
  652. try:
  653. (
  654. event,
  655. _,
  656. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  657. requester,
  658. {
  659. "type": EventTypes.Redaction,
  660. "content": content,
  661. "room_id": room_id,
  662. "sender": requester.user.to_string(),
  663. "redacts": event_id,
  664. },
  665. txn_id=txn_id,
  666. )
  667. event_id = event.event_id
  668. except ShadowBanError:
  669. event_id = "$" + random_string(43)
  670. set_tag("event_id", event_id)
  671. return 200, {"event_id": event_id}
  672. def on_PUT(self, request, room_id, event_id, txn_id):
  673. set_tag("txn_id", txn_id)
  674. return self.txns.fetch_or_execute_request(
  675. request, self.on_POST, request, room_id, event_id, txn_id
  676. )
  677. class RoomTypingRestServlet(RestServlet):
  678. PATTERNS = client_patterns(
  679. "/rooms/(?P<room_id>[^/]*)/typing/(?P<user_id>[^/]*)$", v1=True
  680. )
  681. def __init__(self, hs: "HomeServer"):
  682. super().__init__()
  683. self.hs = hs
  684. self.presence_handler = hs.get_presence_handler()
  685. self.auth = hs.get_auth()
  686. # If we're not on the typing writer instance we should scream if we get
  687. # requests.
  688. self._is_typing_writer = (
  689. hs.config.worker.writers.typing == hs.get_instance_name()
  690. )
  691. async def on_PUT(self, request, room_id, user_id):
  692. requester = await self.auth.get_user_by_req(request)
  693. if not self._is_typing_writer:
  694. raise Exception("Got /typing request on instance that is not typing writer")
  695. room_id = urlparse.unquote(room_id)
  696. target_user = UserID.from_string(urlparse.unquote(user_id))
  697. content = parse_json_object_from_request(request)
  698. await self.presence_handler.bump_presence_active_time(requester.user)
  699. # Limit timeout to stop people from setting silly typing timeouts.
  700. timeout = min(content.get("timeout", 30000), 120000)
  701. # Defer getting the typing handler since it will raise on workers.
  702. typing_handler = self.hs.get_typing_writer_handler()
  703. try:
  704. if content["typing"]:
  705. await typing_handler.started_typing(
  706. target_user=target_user,
  707. requester=requester,
  708. room_id=room_id,
  709. timeout=timeout,
  710. )
  711. else:
  712. await typing_handler.stopped_typing(
  713. target_user=target_user, requester=requester, room_id=room_id
  714. )
  715. except ShadowBanError:
  716. # Pretend this worked without error.
  717. pass
  718. return 200, {}
  719. class RoomAliasListServlet(RestServlet):
  720. PATTERNS = [
  721. re.compile(
  722. r"^/_matrix/client/unstable/org\.matrix\.msc2432"
  723. r"/rooms/(?P<room_id>[^/]*)/aliases"
  724. ),
  725. ] + list(client_patterns("/rooms/(?P<room_id>[^/]*)/aliases$", unstable=False))
  726. def __init__(self, hs: "HomeServer"):
  727. super().__init__()
  728. self.auth = hs.get_auth()
  729. self.directory_handler = hs.get_directory_handler()
  730. async def on_GET(self, request, room_id):
  731. requester = await self.auth.get_user_by_req(request)
  732. alias_list = await self.directory_handler.get_aliases_for_room(
  733. requester, room_id
  734. )
  735. return 200, {"aliases": alias_list}
  736. class SearchRestServlet(RestServlet):
  737. PATTERNS = client_patterns("/search$", v1=True)
  738. def __init__(self, hs):
  739. super().__init__()
  740. self.search_handler = hs.get_search_handler()
  741. self.auth = hs.get_auth()
  742. async def on_POST(self, request):
  743. requester = await self.auth.get_user_by_req(request)
  744. content = parse_json_object_from_request(request)
  745. batch = parse_string(request, "next_batch")
  746. results = await self.search_handler.search(requester.user, content, batch)
  747. return 200, results
  748. class JoinedRoomsRestServlet(RestServlet):
  749. PATTERNS = client_patterns("/joined_rooms$", v1=True)
  750. def __init__(self, hs):
  751. super().__init__()
  752. self.store = hs.get_datastore()
  753. self.auth = hs.get_auth()
  754. async def on_GET(self, request):
  755. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  756. room_ids = await self.store.get_rooms_for_user(requester.user.to_string())
  757. return 200, {"joined_rooms": list(room_ids)}
  758. def register_txn_path(servlet, regex_string, http_server, with_get=False):
  759. """Registers a transaction-based path.
  760. This registers two paths:
  761. PUT regex_string/$txnid
  762. POST regex_string
  763. Args:
  764. regex_string (str): The regex string to register. Must NOT have a
  765. trailing $ as this string will be appended to.
  766. http_server : The http_server to register paths with.
  767. with_get: True to also register respective GET paths for the PUTs.
  768. """
  769. http_server.register_paths(
  770. "POST",
  771. client_patterns(regex_string + "$", v1=True),
  772. servlet.on_POST,
  773. servlet.__class__.__name__,
  774. )
  775. http_server.register_paths(
  776. "PUT",
  777. client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
  778. servlet.on_PUT,
  779. servlet.__class__.__name__,
  780. )
  781. if with_get:
  782. http_server.register_paths(
  783. "GET",
  784. client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
  785. servlet.on_GET,
  786. servlet.__class__.__name__,
  787. )
  788. class RoomSpaceSummaryRestServlet(RestServlet):
  789. PATTERNS = (
  790. re.compile(
  791. "^/_matrix/client/unstable/org.matrix.msc2946"
  792. "/rooms/(?P<room_id>[^/]*)/spaces$"
  793. ),
  794. )
  795. def __init__(self, hs: "HomeServer"):
  796. super().__init__()
  797. self._auth = hs.get_auth()
  798. self._room_summary_handler = hs.get_room_summary_handler()
  799. async def on_GET(
  800. self, request: SynapseRequest, room_id: str
  801. ) -> Tuple[int, JsonDict]:
  802. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  803. max_rooms_per_space = parse_integer(request, "max_rooms_per_space")
  804. if max_rooms_per_space is not None and max_rooms_per_space < 0:
  805. raise SynapseError(
  806. 400,
  807. "Value for 'max_rooms_per_space' must be a non-negative integer",
  808. Codes.BAD_JSON,
  809. )
  810. return 200, await self._room_summary_handler.get_space_summary(
  811. requester.user.to_string(),
  812. room_id,
  813. suggested_only=parse_boolean(request, "suggested_only", default=False),
  814. max_rooms_per_space=max_rooms_per_space,
  815. )
  816. # TODO When switching to the stable endpoint, remove the POST handler.
  817. async def on_POST(
  818. self, request: SynapseRequest, room_id: str
  819. ) -> Tuple[int, JsonDict]:
  820. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  821. content = parse_json_object_from_request(request)
  822. suggested_only = content.get("suggested_only", False)
  823. if not isinstance(suggested_only, bool):
  824. raise SynapseError(
  825. 400, "'suggested_only' must be a boolean", Codes.BAD_JSON
  826. )
  827. max_rooms_per_space = content.get("max_rooms_per_space")
  828. if max_rooms_per_space is not None:
  829. if not isinstance(max_rooms_per_space, int):
  830. raise SynapseError(
  831. 400, "'max_rooms_per_space' must be an integer", Codes.BAD_JSON
  832. )
  833. if max_rooms_per_space < 0:
  834. raise SynapseError(
  835. 400,
  836. "Value for 'max_rooms_per_space' must be a non-negative integer",
  837. Codes.BAD_JSON,
  838. )
  839. return 200, await self._room_summary_handler.get_space_summary(
  840. requester.user.to_string(),
  841. room_id,
  842. suggested_only=suggested_only,
  843. max_rooms_per_space=max_rooms_per_space,
  844. )
  845. class RoomHierarchyRestServlet(RestServlet):
  846. PATTERNS = (
  847. re.compile(
  848. "^/_matrix/client/unstable/org.matrix.msc2946"
  849. "/rooms/(?P<room_id>[^/]*)/hierarchy$"
  850. ),
  851. )
  852. def __init__(self, hs: "HomeServer"):
  853. super().__init__()
  854. self._auth = hs.get_auth()
  855. self._room_summary_handler = hs.get_room_summary_handler()
  856. async def on_GET(
  857. self, request: SynapseRequest, room_id: str
  858. ) -> Tuple[int, JsonDict]:
  859. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  860. max_depth = parse_integer(request, "max_depth")
  861. if max_depth is not None and max_depth < 0:
  862. raise SynapseError(
  863. 400, "'max_depth' must be a non-negative integer", Codes.BAD_JSON
  864. )
  865. limit = parse_integer(request, "limit")
  866. if limit is not None and limit <= 0:
  867. raise SynapseError(
  868. 400, "'limit' must be a positive integer", Codes.BAD_JSON
  869. )
  870. return 200, await self._room_summary_handler.get_room_hierarchy(
  871. requester.user.to_string(),
  872. room_id,
  873. suggested_only=parse_boolean(request, "suggested_only", default=False),
  874. max_depth=max_depth,
  875. limit=limit,
  876. from_token=parse_string(request, "from"),
  877. )
  878. class RoomSummaryRestServlet(ResolveRoomIdMixin, RestServlet):
  879. PATTERNS = (
  880. re.compile(
  881. "^/_matrix/client/unstable/im.nheko.summary"
  882. "/rooms/(?P<room_identifier>[^/]*)/summary$"
  883. ),
  884. )
  885. def __init__(self, hs: "HomeServer"):
  886. super().__init__(hs)
  887. self._auth = hs.get_auth()
  888. self._room_summary_handler = hs.get_room_summary_handler()
  889. async def on_GET(
  890. self, request: SynapseRequest, room_identifier: str
  891. ) -> Tuple[int, JsonDict]:
  892. try:
  893. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  894. requester_user_id: Optional[str] = requester.user.to_string()
  895. except MissingClientTokenError:
  896. # auth is optional
  897. requester_user_id = None
  898. # twisted.web.server.Request.args is incorrectly defined as Optional[Any]
  899. args: Dict[bytes, List[bytes]] = request.args # type: ignore
  900. remote_room_hosts = parse_strings_from_args(args, "via", required=False)
  901. room_id, remote_room_hosts = await self.resolve_room_id(
  902. room_identifier,
  903. remote_room_hosts,
  904. )
  905. return 200, await self._room_summary_handler.get_room_summary(
  906. requester_user_id,
  907. room_id,
  908. remote_room_hosts,
  909. )
  910. def register_servlets(hs: "HomeServer", http_server, is_worker=False):
  911. RoomStateEventRestServlet(hs).register(http_server)
  912. RoomMemberListRestServlet(hs).register(http_server)
  913. JoinedRoomMemberListRestServlet(hs).register(http_server)
  914. RoomMessageListRestServlet(hs).register(http_server)
  915. JoinRoomAliasServlet(hs).register(http_server)
  916. RoomMembershipRestServlet(hs).register(http_server)
  917. RoomSendEventRestServlet(hs).register(http_server)
  918. PublicRoomListRestServlet(hs).register(http_server)
  919. RoomStateRestServlet(hs).register(http_server)
  920. RoomRedactEventRestServlet(hs).register(http_server)
  921. RoomTypingRestServlet(hs).register(http_server)
  922. RoomEventContextServlet(hs).register(http_server)
  923. RoomSpaceSummaryRestServlet(hs).register(http_server)
  924. RoomHierarchyRestServlet(hs).register(http_server)
  925. if hs.config.experimental.msc3266_enabled:
  926. RoomSummaryRestServlet(hs).register(http_server)
  927. RoomEventServlet(hs).register(http_server)
  928. JoinedRoomsRestServlet(hs).register(http_server)
  929. RoomAliasListServlet(hs).register(http_server)
  930. SearchRestServlet(hs).register(http_server)
  931. # Some servlets only get registered for the main process.
  932. if not is_worker:
  933. RoomCreateRestServlet(hs).register(http_server)
  934. RoomForgetRestServlet(hs).register(http_server)
  935. def register_deprecated_servlets(hs, http_server):
  936. RoomInitialSyncRestServlet(hs).register(http_server)