You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2717 lines
97 KiB

  1. # Copyright 2020 Dirk Klimpel
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. import json
  15. import time
  16. import urllib.parse
  17. from typing import List, Optional
  18. from unittest.mock import Mock
  19. from parameterized import parameterized
  20. from twisted.test.proto_helpers import MemoryReactor
  21. import synapse.rest.admin
  22. from synapse.api.constants import EventTypes, Membership, RoomTypes
  23. from synapse.api.errors import Codes
  24. from synapse.handlers.pagination import PaginationHandler, PurgeStatus
  25. from synapse.rest.client import directory, events, login, room
  26. from synapse.server import HomeServer
  27. from synapse.util import Clock
  28. from synapse.util.stringutils import random_string
  29. from tests import unittest
  30. """Tests admin REST events for /rooms paths."""
  31. class DeleteRoomTestCase(unittest.HomeserverTestCase):
  32. servlets = [
  33. synapse.rest.admin.register_servlets,
  34. login.register_servlets,
  35. events.register_servlets,
  36. room.register_servlets,
  37. room.register_deprecated_servlets,
  38. ]
  39. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  40. self.event_creation_handler = hs.get_event_creation_handler()
  41. hs.config.consent.user_consent_version = "1"
  42. consent_uri_builder = Mock()
  43. consent_uri_builder.build_user_consent_uri.return_value = "http://example.com"
  44. self.event_creation_handler._consent_uri_builder = consent_uri_builder
  45. self.store = hs.get_datastores().main
  46. self.admin_user = self.register_user("admin", "pass", admin=True)
  47. self.admin_user_tok = self.login("admin", "pass")
  48. self.other_user = self.register_user("user", "pass")
  49. self.other_user_tok = self.login("user", "pass")
  50. # Mark the admin user as having consented
  51. self.get_success(self.store.user_set_consent_version(self.admin_user, "1"))
  52. self.room_id = self.helper.create_room_as(
  53. self.other_user, tok=self.other_user_tok
  54. )
  55. self.url = "/_synapse/admin/v1/rooms/%s" % self.room_id
  56. def test_requester_is_no_admin(self) -> None:
  57. """
  58. If the user is not a server admin, an error 403 is returned.
  59. """
  60. channel = self.make_request(
  61. "DELETE",
  62. self.url,
  63. {},
  64. access_token=self.other_user_tok,
  65. )
  66. self.assertEqual(403, channel.code, msg=channel.json_body)
  67. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  68. def test_room_does_not_exist(self) -> None:
  69. """
  70. Check that unknown rooms/server return 200
  71. """
  72. url = "/_synapse/admin/v1/rooms/%s" % "!unknown:test"
  73. channel = self.make_request(
  74. "DELETE",
  75. url,
  76. {},
  77. access_token=self.admin_user_tok,
  78. )
  79. self.assertEqual(200, channel.code, msg=channel.json_body)
  80. def test_room_is_not_valid(self) -> None:
  81. """
  82. Check that invalid room names, return an error 400.
  83. """
  84. url = "/_synapse/admin/v1/rooms/%s" % "invalidroom"
  85. channel = self.make_request(
  86. "DELETE",
  87. url,
  88. {},
  89. access_token=self.admin_user_tok,
  90. )
  91. self.assertEqual(400, channel.code, msg=channel.json_body)
  92. self.assertEqual(
  93. "invalidroom is not a legal room ID",
  94. channel.json_body["error"],
  95. )
  96. def test_new_room_user_does_not_exist(self) -> None:
  97. """
  98. Tests that the user ID must be from local server but it does not have to exist.
  99. """
  100. channel = self.make_request(
  101. "DELETE",
  102. self.url,
  103. content={"new_room_user_id": "@unknown:test"},
  104. access_token=self.admin_user_tok,
  105. )
  106. self.assertEqual(200, channel.code, msg=channel.json_body)
  107. self.assertIn("new_room_id", channel.json_body)
  108. self.assertIn("kicked_users", channel.json_body)
  109. self.assertIn("failed_to_kick_users", channel.json_body)
  110. self.assertIn("local_aliases", channel.json_body)
  111. def test_new_room_user_is_not_local(self) -> None:
  112. """
  113. Check that only local users can create new room to move members.
  114. """
  115. channel = self.make_request(
  116. "DELETE",
  117. self.url,
  118. content={"new_room_user_id": "@not:exist.bla"},
  119. access_token=self.admin_user_tok,
  120. )
  121. self.assertEqual(400, channel.code, msg=channel.json_body)
  122. self.assertEqual(
  123. "User must be our own: @not:exist.bla",
  124. channel.json_body["error"],
  125. )
  126. def test_block_is_not_bool(self) -> None:
  127. """
  128. If parameter `block` is not boolean, return an error
  129. """
  130. channel = self.make_request(
  131. "DELETE",
  132. self.url,
  133. content={"block": "NotBool"},
  134. access_token=self.admin_user_tok,
  135. )
  136. self.assertEqual(400, channel.code, msg=channel.json_body)
  137. self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
  138. def test_purge_is_not_bool(self) -> None:
  139. """
  140. If parameter `purge` is not boolean, return an error
  141. """
  142. channel = self.make_request(
  143. "DELETE",
  144. self.url,
  145. content={"purge": "NotBool"},
  146. access_token=self.admin_user_tok,
  147. )
  148. self.assertEqual(400, channel.code, msg=channel.json_body)
  149. self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
  150. def test_purge_room_and_block(self) -> None:
  151. """Test to purge a room and block it.
  152. Members will not be moved to a new room and will not receive a message.
  153. """
  154. # Test that room is not purged
  155. with self.assertRaises(AssertionError):
  156. self._is_purged(self.room_id)
  157. # Test that room is not blocked
  158. self._is_blocked(self.room_id, expect=False)
  159. # Assert one user in room
  160. self._is_member(room_id=self.room_id, user_id=self.other_user)
  161. channel = self.make_request(
  162. "DELETE",
  163. self.url.encode("ascii"),
  164. content={"block": True, "purge": True},
  165. access_token=self.admin_user_tok,
  166. )
  167. self.assertEqual(200, channel.code, msg=channel.json_body)
  168. self.assertEqual(None, channel.json_body["new_room_id"])
  169. self.assertEqual(self.other_user, channel.json_body["kicked_users"][0])
  170. self.assertIn("failed_to_kick_users", channel.json_body)
  171. self.assertIn("local_aliases", channel.json_body)
  172. self._is_purged(self.room_id)
  173. self._is_blocked(self.room_id, expect=True)
  174. self._has_no_members(self.room_id)
  175. def test_purge_room_and_not_block(self) -> None:
  176. """Test to purge a room and do not block it.
  177. Members will not be moved to a new room and will not receive a message.
  178. """
  179. # Test that room is not purged
  180. with self.assertRaises(AssertionError):
  181. self._is_purged(self.room_id)
  182. # Test that room is not blocked
  183. self._is_blocked(self.room_id, expect=False)
  184. # Assert one user in room
  185. self._is_member(room_id=self.room_id, user_id=self.other_user)
  186. channel = self.make_request(
  187. "DELETE",
  188. self.url.encode("ascii"),
  189. content={"block": False, "purge": True},
  190. access_token=self.admin_user_tok,
  191. )
  192. self.assertEqual(200, channel.code, msg=channel.json_body)
  193. self.assertEqual(None, channel.json_body["new_room_id"])
  194. self.assertEqual(self.other_user, channel.json_body["kicked_users"][0])
  195. self.assertIn("failed_to_kick_users", channel.json_body)
  196. self.assertIn("local_aliases", channel.json_body)
  197. self._is_purged(self.room_id)
  198. self._is_blocked(self.room_id, expect=False)
  199. self._has_no_members(self.room_id)
  200. def test_block_room_and_not_purge(self) -> None:
  201. """Test to block a room without purging it.
  202. Members will not be moved to a new room and will not receive a message.
  203. The room will not be purged.
  204. """
  205. # Test that room is not purged
  206. with self.assertRaises(AssertionError):
  207. self._is_purged(self.room_id)
  208. # Test that room is not blocked
  209. self._is_blocked(self.room_id, expect=False)
  210. # Assert one user in room
  211. self._is_member(room_id=self.room_id, user_id=self.other_user)
  212. channel = self.make_request(
  213. "DELETE",
  214. self.url.encode("ascii"),
  215. content={"block": True, "purge": False},
  216. access_token=self.admin_user_tok,
  217. )
  218. self.assertEqual(200, channel.code, msg=channel.json_body)
  219. self.assertEqual(None, channel.json_body["new_room_id"])
  220. self.assertEqual(self.other_user, channel.json_body["kicked_users"][0])
  221. self.assertIn("failed_to_kick_users", channel.json_body)
  222. self.assertIn("local_aliases", channel.json_body)
  223. with self.assertRaises(AssertionError):
  224. self._is_purged(self.room_id)
  225. self._is_blocked(self.room_id, expect=True)
  226. self._has_no_members(self.room_id)
  227. @parameterized.expand([(True,), (False,)])
  228. def test_block_unknown_room(self, purge: bool) -> None:
  229. """
  230. We can block an unknown room. In this case, the `purge` argument
  231. should be ignored.
  232. """
  233. room_id = "!unknown:test"
  234. # The room isn't already in the blocked rooms table
  235. self._is_blocked(room_id, expect=False)
  236. # Request the room be blocked.
  237. channel = self.make_request(
  238. "DELETE",
  239. f"/_synapse/admin/v1/rooms/{room_id}",
  240. {"block": True, "purge": purge},
  241. access_token=self.admin_user_tok,
  242. )
  243. # The room is now blocked.
  244. self.assertEqual(200, channel.code, msg=channel.json_body)
  245. self._is_blocked(room_id)
  246. def test_shutdown_room_consent(self) -> None:
  247. """Test that we can shutdown rooms with local users who have not
  248. yet accepted the privacy policy. This used to fail when we tried to
  249. force part the user from the old room.
  250. Members will be moved to a new room and will receive a message.
  251. """
  252. self.event_creation_handler._block_events_without_consent_error = None
  253. # Assert one user in room
  254. users_in_room = self.get_success(self.store.get_users_in_room(self.room_id))
  255. self.assertEqual([self.other_user], users_in_room)
  256. # Enable require consent to send events
  257. self.event_creation_handler._block_events_without_consent_error = "Error"
  258. # Assert that the user is getting consent error
  259. self.helper.send(
  260. self.room_id,
  261. body="foo",
  262. tok=self.other_user_tok,
  263. expect_code=403,
  264. )
  265. # Test that room is not purged
  266. with self.assertRaises(AssertionError):
  267. self._is_purged(self.room_id)
  268. # Assert one user in room
  269. self._is_member(room_id=self.room_id, user_id=self.other_user)
  270. # Test that the admin can still send shutdown
  271. channel = self.make_request(
  272. "DELETE",
  273. self.url,
  274. {"new_room_user_id": self.admin_user},
  275. access_token=self.admin_user_tok,
  276. )
  277. self.assertEqual(200, channel.code, msg=channel.json_body)
  278. self.assertEqual(self.other_user, channel.json_body["kicked_users"][0])
  279. self.assertIn("new_room_id", channel.json_body)
  280. self.assertIn("failed_to_kick_users", channel.json_body)
  281. self.assertIn("local_aliases", channel.json_body)
  282. # Test that member has moved to new room
  283. self._is_member(
  284. room_id=channel.json_body["new_room_id"], user_id=self.other_user
  285. )
  286. self._is_purged(self.room_id)
  287. self._has_no_members(self.room_id)
  288. def test_shutdown_room_block_peek(self) -> None:
  289. """Test that a world_readable room can no longer be peeked into after
  290. it has been shut down.
  291. Members will be moved to a new room and will receive a message.
  292. """
  293. self.event_creation_handler._block_events_without_consent_error = None
  294. # Enable world readable
  295. url = "rooms/%s/state/m.room.history_visibility" % (self.room_id,)
  296. channel = self.make_request(
  297. "PUT",
  298. url.encode("ascii"),
  299. {"history_visibility": "world_readable"},
  300. access_token=self.other_user_tok,
  301. )
  302. self.assertEqual(200, channel.code, msg=channel.json_body)
  303. # Test that room is not purged
  304. with self.assertRaises(AssertionError):
  305. self._is_purged(self.room_id)
  306. # Assert one user in room
  307. self._is_member(room_id=self.room_id, user_id=self.other_user)
  308. # Test that the admin can still send shutdown
  309. channel = self.make_request(
  310. "DELETE",
  311. self.url,
  312. {"new_room_user_id": self.admin_user},
  313. access_token=self.admin_user_tok,
  314. )
  315. self.assertEqual(200, channel.code, msg=channel.json_body)
  316. self.assertEqual(self.other_user, channel.json_body["kicked_users"][0])
  317. self.assertIn("new_room_id", channel.json_body)
  318. self.assertIn("failed_to_kick_users", channel.json_body)
  319. self.assertIn("local_aliases", channel.json_body)
  320. # Test that member has moved to new room
  321. self._is_member(
  322. room_id=channel.json_body["new_room_id"], user_id=self.other_user
  323. )
  324. self._is_purged(self.room_id)
  325. self._has_no_members(self.room_id)
  326. # Assert we can no longer peek into the room
  327. self._assert_peek(self.room_id, expect_code=403)
  328. def _is_blocked(self, room_id: str, expect: bool = True) -> None:
  329. """Assert that the room is blocked or not"""
  330. d = self.store.is_room_blocked(room_id)
  331. if expect:
  332. self.assertTrue(self.get_success(d))
  333. else:
  334. self.assertIsNone(self.get_success(d))
  335. def _has_no_members(self, room_id: str) -> None:
  336. """Assert there is now no longer anyone in the room"""
  337. users_in_room = self.get_success(self.store.get_users_in_room(room_id))
  338. self.assertEqual([], users_in_room)
  339. def _is_member(self, room_id: str, user_id: str) -> None:
  340. """Test that user is member of the room"""
  341. users_in_room = self.get_success(self.store.get_users_in_room(room_id))
  342. self.assertIn(user_id, users_in_room)
  343. def _is_purged(self, room_id: str) -> None:
  344. """Test that the following tables have been purged of all rows related to the room."""
  345. for table in PURGE_TABLES:
  346. count = self.get_success(
  347. self.store.db_pool.simple_select_one_onecol(
  348. table=table,
  349. keyvalues={"room_id": room_id},
  350. retcol="COUNT(*)",
  351. desc="test_purge_room",
  352. )
  353. )
  354. self.assertEqual(count, 0, msg=f"Rows not purged in {table}")
  355. def _assert_peek(self, room_id: str, expect_code: int) -> None:
  356. """Assert that the admin user can (or cannot) peek into the room."""
  357. url = "rooms/%s/initialSync" % (room_id,)
  358. channel = self.make_request(
  359. "GET", url.encode("ascii"), access_token=self.admin_user_tok
  360. )
  361. self.assertEqual(expect_code, channel.code, msg=channel.json_body)
  362. url = "events?timeout=0&room_id=" + room_id
  363. channel = self.make_request(
  364. "GET", url.encode("ascii"), access_token=self.admin_user_tok
  365. )
  366. self.assertEqual(expect_code, channel.code, msg=channel.json_body)
  367. class DeleteRoomV2TestCase(unittest.HomeserverTestCase):
  368. servlets = [
  369. synapse.rest.admin.register_servlets,
  370. login.register_servlets,
  371. events.register_servlets,
  372. room.register_servlets,
  373. room.register_deprecated_servlets,
  374. ]
  375. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  376. self.event_creation_handler = hs.get_event_creation_handler()
  377. hs.config.consent.user_consent_version = "1"
  378. consent_uri_builder = Mock()
  379. consent_uri_builder.build_user_consent_uri.return_value = "http://example.com"
  380. self.event_creation_handler._consent_uri_builder = consent_uri_builder
  381. self.store = hs.get_datastores().main
  382. self.admin_user = self.register_user("admin", "pass", admin=True)
  383. self.admin_user_tok = self.login("admin", "pass")
  384. self.other_user = self.register_user("user", "pass")
  385. self.other_user_tok = self.login("user", "pass")
  386. # Mark the admin user as having consented
  387. self.get_success(self.store.user_set_consent_version(self.admin_user, "1"))
  388. self.room_id = self.helper.create_room_as(
  389. self.other_user, tok=self.other_user_tok
  390. )
  391. self.url = f"/_synapse/admin/v2/rooms/{self.room_id}"
  392. self.url_status_by_room_id = (
  393. f"/_synapse/admin/v2/rooms/{self.room_id}/delete_status"
  394. )
  395. self.url_status_by_delete_id = "/_synapse/admin/v2/rooms/delete_status/"
  396. @parameterized.expand(
  397. [
  398. ("DELETE", "/_synapse/admin/v2/rooms/%s"),
  399. ("GET", "/_synapse/admin/v2/rooms/%s/delete_status"),
  400. ("GET", "/_synapse/admin/v2/rooms/delete_status/%s"),
  401. ]
  402. )
  403. def test_requester_is_no_admin(self, method: str, url: str) -> None:
  404. """
  405. If the user is not a server admin, an error 403 is returned.
  406. """
  407. channel = self.make_request(
  408. method,
  409. url % self.room_id,
  410. content={},
  411. access_token=self.other_user_tok,
  412. )
  413. self.assertEqual(403, channel.code, msg=channel.json_body)
  414. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  415. def test_room_does_not_exist(self) -> None:
  416. """
  417. Check that unknown rooms/server return 200
  418. This is important, as it allows incomplete vestiges of rooms to be cleared up
  419. even if the create event/etc is missing.
  420. """
  421. room_id = "!unknown:test"
  422. channel = self.make_request(
  423. "DELETE",
  424. f"/_synapse/admin/v2/rooms/{room_id}",
  425. content={},
  426. access_token=self.admin_user_tok,
  427. )
  428. self.assertEqual(200, channel.code, msg=channel.json_body)
  429. self.assertIn("delete_id", channel.json_body)
  430. delete_id = channel.json_body["delete_id"]
  431. # get status
  432. channel = self.make_request(
  433. "GET",
  434. f"/_synapse/admin/v2/rooms/{room_id}/delete_status",
  435. access_token=self.admin_user_tok,
  436. )
  437. self.assertEqual(200, channel.code, msg=channel.json_body)
  438. self.assertEqual(1, len(channel.json_body["results"]))
  439. self.assertEqual("complete", channel.json_body["results"][0]["status"])
  440. self.assertEqual(delete_id, channel.json_body["results"][0]["delete_id"])
  441. @parameterized.expand(
  442. [
  443. ("DELETE", "/_synapse/admin/v2/rooms/%s"),
  444. ("GET", "/_synapse/admin/v2/rooms/%s/delete_status"),
  445. ]
  446. )
  447. def test_room_is_not_valid(self, method: str, url: str) -> None:
  448. """
  449. Check that invalid room names, return an error 400.
  450. """
  451. channel = self.make_request(
  452. method,
  453. url % "invalidroom",
  454. content={},
  455. access_token=self.admin_user_tok,
  456. )
  457. self.assertEqual(400, channel.code, msg=channel.json_body)
  458. self.assertEqual(
  459. "invalidroom is not a legal room ID",
  460. channel.json_body["error"],
  461. )
  462. def test_new_room_user_does_not_exist(self) -> None:
  463. """
  464. Tests that the user ID must be from local server but it does not have to exist.
  465. """
  466. channel = self.make_request(
  467. "DELETE",
  468. self.url,
  469. content={"new_room_user_id": "@unknown:test"},
  470. access_token=self.admin_user_tok,
  471. )
  472. self.assertEqual(200, channel.code, msg=channel.json_body)
  473. self.assertIn("delete_id", channel.json_body)
  474. delete_id = channel.json_body["delete_id"]
  475. self._test_result(delete_id, self.other_user, expect_new_room=True)
  476. def test_new_room_user_is_not_local(self) -> None:
  477. """
  478. Check that only local users can create new room to move members.
  479. """
  480. channel = self.make_request(
  481. "DELETE",
  482. self.url,
  483. content={"new_room_user_id": "@not:exist.bla"},
  484. access_token=self.admin_user_tok,
  485. )
  486. self.assertEqual(400, channel.code, msg=channel.json_body)
  487. self.assertEqual(
  488. "User must be our own: @not:exist.bla",
  489. channel.json_body["error"],
  490. )
  491. def test_block_is_not_bool(self) -> None:
  492. """
  493. If parameter `block` is not boolean, return an error
  494. """
  495. channel = self.make_request(
  496. "DELETE",
  497. self.url,
  498. content={"block": "NotBool"},
  499. access_token=self.admin_user_tok,
  500. )
  501. self.assertEqual(400, channel.code, msg=channel.json_body)
  502. self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
  503. def test_purge_is_not_bool(self) -> None:
  504. """
  505. If parameter `purge` is not boolean, return an error
  506. """
  507. channel = self.make_request(
  508. "DELETE",
  509. self.url,
  510. content={"purge": "NotBool"},
  511. access_token=self.admin_user_tok,
  512. )
  513. self.assertEqual(400, channel.code, msg=channel.json_body)
  514. self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
  515. def test_delete_expired_status(self) -> None:
  516. """Test that the task status is removed after expiration."""
  517. # first task, do not purge, that we can create a second task
  518. channel = self.make_request(
  519. "DELETE",
  520. self.url.encode("ascii"),
  521. content={"purge": False},
  522. access_token=self.admin_user_tok,
  523. )
  524. self.assertEqual(200, channel.code, msg=channel.json_body)
  525. self.assertIn("delete_id", channel.json_body)
  526. delete_id1 = channel.json_body["delete_id"]
  527. # go ahead
  528. self.reactor.advance(PaginationHandler.CLEAR_PURGE_AFTER_MS / 1000 / 2)
  529. # second task
  530. channel = self.make_request(
  531. "DELETE",
  532. self.url.encode("ascii"),
  533. content={"purge": True},
  534. access_token=self.admin_user_tok,
  535. )
  536. self.assertEqual(200, channel.code, msg=channel.json_body)
  537. self.assertIn("delete_id", channel.json_body)
  538. delete_id2 = channel.json_body["delete_id"]
  539. # get status
  540. channel = self.make_request(
  541. "GET",
  542. self.url_status_by_room_id,
  543. access_token=self.admin_user_tok,
  544. )
  545. self.assertEqual(200, channel.code, msg=channel.json_body)
  546. self.assertEqual(2, len(channel.json_body["results"]))
  547. self.assertEqual("complete", channel.json_body["results"][0]["status"])
  548. self.assertEqual("complete", channel.json_body["results"][1]["status"])
  549. self.assertEqual(delete_id1, channel.json_body["results"][0]["delete_id"])
  550. self.assertEqual(delete_id2, channel.json_body["results"][1]["delete_id"])
  551. # get status after more than clearing time for first task
  552. # second task is not cleared
  553. self.reactor.advance(PaginationHandler.CLEAR_PURGE_AFTER_MS / 1000 / 2)
  554. channel = self.make_request(
  555. "GET",
  556. self.url_status_by_room_id,
  557. access_token=self.admin_user_tok,
  558. )
  559. self.assertEqual(200, channel.code, msg=channel.json_body)
  560. self.assertEqual(1, len(channel.json_body["results"]))
  561. self.assertEqual("complete", channel.json_body["results"][0]["status"])
  562. self.assertEqual(delete_id2, channel.json_body["results"][0]["delete_id"])
  563. # get status after more than clearing time for all tasks
  564. self.reactor.advance(PaginationHandler.CLEAR_PURGE_AFTER_MS / 1000 / 2)
  565. channel = self.make_request(
  566. "GET",
  567. self.url_status_by_room_id,
  568. access_token=self.admin_user_tok,
  569. )
  570. self.assertEqual(404, channel.code, msg=channel.json_body)
  571. self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
  572. def test_delete_same_room_twice(self) -> None:
  573. """Test that the call for delete a room at second time gives an exception."""
  574. body = {"new_room_user_id": self.admin_user}
  575. # first call to delete room
  576. # and do not wait for finish the task
  577. first_channel = self.make_request(
  578. "DELETE",
  579. self.url.encode("ascii"),
  580. content=body,
  581. access_token=self.admin_user_tok,
  582. await_result=False,
  583. )
  584. # second call to delete room
  585. second_channel = self.make_request(
  586. "DELETE",
  587. self.url.encode("ascii"),
  588. content=body,
  589. access_token=self.admin_user_tok,
  590. )
  591. self.assertEqual(400, second_channel.code, msg=second_channel.json_body)
  592. self.assertEqual(Codes.UNKNOWN, second_channel.json_body["errcode"])
  593. self.assertEqual(
  594. f"History purge already in progress for {self.room_id}",
  595. second_channel.json_body["error"],
  596. )
  597. # get result of first call
  598. first_channel.await_result()
  599. self.assertEqual(200, first_channel.code, msg=first_channel.json_body)
  600. self.assertIn("delete_id", first_channel.json_body)
  601. # check status after finish the task
  602. self._test_result(
  603. first_channel.json_body["delete_id"],
  604. self.other_user,
  605. expect_new_room=True,
  606. )
  607. def test_purge_room_and_block(self) -> None:
  608. """Test to purge a room and block it.
  609. Members will not be moved to a new room and will not receive a message.
  610. """
  611. # Test that room is not purged
  612. with self.assertRaises(AssertionError):
  613. self._is_purged(self.room_id)
  614. # Test that room is not blocked
  615. self._is_blocked(self.room_id, expect=False)
  616. # Assert one user in room
  617. self._is_member(room_id=self.room_id, user_id=self.other_user)
  618. channel = self.make_request(
  619. "DELETE",
  620. self.url.encode("ascii"),
  621. content={"block": True, "purge": True},
  622. access_token=self.admin_user_tok,
  623. )
  624. self.assertEqual(200, channel.code, msg=channel.json_body)
  625. self.assertIn("delete_id", channel.json_body)
  626. delete_id = channel.json_body["delete_id"]
  627. self._test_result(delete_id, self.other_user)
  628. self._is_purged(self.room_id)
  629. self._is_blocked(self.room_id, expect=True)
  630. self._has_no_members(self.room_id)
  631. def test_purge_room_and_not_block(self) -> None:
  632. """Test to purge a room and do not block it.
  633. Members will not be moved to a new room and will not receive a message.
  634. """
  635. # Test that room is not purged
  636. with self.assertRaises(AssertionError):
  637. self._is_purged(self.room_id)
  638. # Test that room is not blocked
  639. self._is_blocked(self.room_id, expect=False)
  640. # Assert one user in room
  641. self._is_member(room_id=self.room_id, user_id=self.other_user)
  642. channel = self.make_request(
  643. "DELETE",
  644. self.url.encode("ascii"),
  645. content={"block": False, "purge": True},
  646. access_token=self.admin_user_tok,
  647. )
  648. self.assertEqual(200, channel.code, msg=channel.json_body)
  649. self.assertIn("delete_id", channel.json_body)
  650. delete_id = channel.json_body["delete_id"]
  651. self._test_result(delete_id, self.other_user)
  652. self._is_purged(self.room_id)
  653. self._is_blocked(self.room_id, expect=False)
  654. self._has_no_members(self.room_id)
  655. def test_block_room_and_not_purge(self) -> None:
  656. """Test to block a room without purging it.
  657. Members will not be moved to a new room and will not receive a message.
  658. The room will not be purged.
  659. """
  660. # Test that room is not purged
  661. with self.assertRaises(AssertionError):
  662. self._is_purged(self.room_id)
  663. # Test that room is not blocked
  664. self._is_blocked(self.room_id, expect=False)
  665. # Assert one user in room
  666. self._is_member(room_id=self.room_id, user_id=self.other_user)
  667. channel = self.make_request(
  668. "DELETE",
  669. self.url.encode("ascii"),
  670. content={"block": True, "purge": False},
  671. access_token=self.admin_user_tok,
  672. )
  673. self.assertEqual(200, channel.code, msg=channel.json_body)
  674. self.assertIn("delete_id", channel.json_body)
  675. delete_id = channel.json_body["delete_id"]
  676. self._test_result(delete_id, self.other_user)
  677. with self.assertRaises(AssertionError):
  678. self._is_purged(self.room_id)
  679. self._is_blocked(self.room_id, expect=True)
  680. self._has_no_members(self.room_id)
  681. def test_shutdown_room_consent(self) -> None:
  682. """Test that we can shutdown rooms with local users who have not
  683. yet accepted the privacy policy. This used to fail when we tried to
  684. force part the user from the old room.
  685. Members will be moved to a new room and will receive a message.
  686. """
  687. self.event_creation_handler._block_events_without_consent_error = None
  688. # Assert one user in room
  689. users_in_room = self.get_success(self.store.get_users_in_room(self.room_id))
  690. self.assertEqual([self.other_user], users_in_room)
  691. # Enable require consent to send events
  692. self.event_creation_handler._block_events_without_consent_error = "Error"
  693. # Assert that the user is getting consent error
  694. self.helper.send(
  695. self.room_id,
  696. body="foo",
  697. tok=self.other_user_tok,
  698. expect_code=403,
  699. )
  700. # Test that room is not purged
  701. with self.assertRaises(AssertionError):
  702. self._is_purged(self.room_id)
  703. # Assert one user in room
  704. self._is_member(room_id=self.room_id, user_id=self.other_user)
  705. # Test that the admin can still send shutdown
  706. channel = self.make_request(
  707. "DELETE",
  708. self.url,
  709. content={"new_room_user_id": self.admin_user},
  710. access_token=self.admin_user_tok,
  711. )
  712. self.assertEqual(200, channel.code, msg=channel.json_body)
  713. self.assertIn("delete_id", channel.json_body)
  714. delete_id = channel.json_body["delete_id"]
  715. self._test_result(delete_id, self.other_user, expect_new_room=True)
  716. channel = self.make_request(
  717. "GET",
  718. self.url_status_by_room_id,
  719. access_token=self.admin_user_tok,
  720. )
  721. self.assertEqual(200, channel.code, msg=channel.json_body)
  722. self.assertEqual(1, len(channel.json_body["results"]))
  723. # Test that member has moved to new room
  724. self._is_member(
  725. room_id=channel.json_body["results"][0]["shutdown_room"]["new_room_id"],
  726. user_id=self.other_user,
  727. )
  728. self._is_purged(self.room_id)
  729. self._has_no_members(self.room_id)
  730. def test_shutdown_room_block_peek(self) -> None:
  731. """Test that a world_readable room can no longer be peeked into after
  732. it has been shut down.
  733. Members will be moved to a new room and will receive a message.
  734. """
  735. self.event_creation_handler._block_events_without_consent_error = None
  736. # Enable world readable
  737. url = "rooms/%s/state/m.room.history_visibility" % (self.room_id,)
  738. channel = self.make_request(
  739. "PUT",
  740. url.encode("ascii"),
  741. content={"history_visibility": "world_readable"},
  742. access_token=self.other_user_tok,
  743. )
  744. self.assertEqual(200, channel.code, msg=channel.json_body)
  745. # Test that room is not purged
  746. with self.assertRaises(AssertionError):
  747. self._is_purged(self.room_id)
  748. # Assert one user in room
  749. self._is_member(room_id=self.room_id, user_id=self.other_user)
  750. # Test that the admin can still send shutdown
  751. channel = self.make_request(
  752. "DELETE",
  753. self.url,
  754. content={"new_room_user_id": self.admin_user},
  755. access_token=self.admin_user_tok,
  756. )
  757. self.assertEqual(200, channel.code, msg=channel.json_body)
  758. self.assertIn("delete_id", channel.json_body)
  759. delete_id = channel.json_body["delete_id"]
  760. self._test_result(delete_id, self.other_user, expect_new_room=True)
  761. channel = self.make_request(
  762. "GET",
  763. self.url_status_by_room_id,
  764. access_token=self.admin_user_tok,
  765. )
  766. self.assertEqual(200, channel.code, msg=channel.json_body)
  767. self.assertEqual(1, len(channel.json_body["results"]))
  768. # Test that member has moved to new room
  769. self._is_member(
  770. room_id=channel.json_body["results"][0]["shutdown_room"]["new_room_id"],
  771. user_id=self.other_user,
  772. )
  773. self._is_purged(self.room_id)
  774. self._has_no_members(self.room_id)
  775. # Assert we can no longer peek into the room
  776. self._assert_peek(self.room_id, expect_code=403)
  777. def _is_blocked(self, room_id: str, expect: bool = True) -> None:
  778. """Assert that the room is blocked or not"""
  779. d = self.store.is_room_blocked(room_id)
  780. if expect:
  781. self.assertTrue(self.get_success(d))
  782. else:
  783. self.assertIsNone(self.get_success(d))
  784. def _has_no_members(self, room_id: str) -> None:
  785. """Assert there is now no longer anyone in the room"""
  786. users_in_room = self.get_success(self.store.get_users_in_room(room_id))
  787. self.assertEqual([], users_in_room)
  788. def _is_member(self, room_id: str, user_id: str) -> None:
  789. """Test that user is member of the room"""
  790. users_in_room = self.get_success(self.store.get_users_in_room(room_id))
  791. self.assertIn(user_id, users_in_room)
  792. def _is_purged(self, room_id: str) -> None:
  793. """Test that the following tables have been purged of all rows related to the room."""
  794. for table in PURGE_TABLES:
  795. count = self.get_success(
  796. self.store.db_pool.simple_select_one_onecol(
  797. table=table,
  798. keyvalues={"room_id": room_id},
  799. retcol="COUNT(*)",
  800. desc="test_purge_room",
  801. )
  802. )
  803. self.assertEqual(count, 0, msg=f"Rows not purged in {table}")
  804. def _assert_peek(self, room_id: str, expect_code: int) -> None:
  805. """Assert that the admin user can (or cannot) peek into the room."""
  806. url = f"rooms/{room_id}/initialSync"
  807. channel = self.make_request(
  808. "GET", url.encode("ascii"), access_token=self.admin_user_tok
  809. )
  810. self.assertEqual(expect_code, channel.code, msg=channel.json_body)
  811. url = "events?timeout=0&room_id=" + room_id
  812. channel = self.make_request(
  813. "GET", url.encode("ascii"), access_token=self.admin_user_tok
  814. )
  815. self.assertEqual(expect_code, channel.code, msg=channel.json_body)
  816. def _test_result(
  817. self,
  818. delete_id: str,
  819. kicked_user: str,
  820. expect_new_room: bool = False,
  821. ) -> None:
  822. """
  823. Test that the result is the expected.
  824. Uses both APIs (status by room_id and delete_id)
  825. Args:
  826. delete_id: id of this purge
  827. kicked_user: a user_id which is kicked from the room
  828. expect_new_room: if we expect that a new room was created
  829. """
  830. # get information by room_id
  831. channel_room_id = self.make_request(
  832. "GET",
  833. self.url_status_by_room_id,
  834. access_token=self.admin_user_tok,
  835. )
  836. self.assertEqual(200, channel_room_id.code, msg=channel_room_id.json_body)
  837. self.assertEqual(1, len(channel_room_id.json_body["results"]))
  838. self.assertEqual(
  839. delete_id, channel_room_id.json_body["results"][0]["delete_id"]
  840. )
  841. # get information by delete_id
  842. channel_delete_id = self.make_request(
  843. "GET",
  844. self.url_status_by_delete_id + delete_id,
  845. access_token=self.admin_user_tok,
  846. )
  847. self.assertEqual(
  848. 200,
  849. channel_delete_id.code,
  850. msg=channel_delete_id.json_body,
  851. )
  852. # test values that are the same in both responses
  853. for content in [
  854. channel_room_id.json_body["results"][0],
  855. channel_delete_id.json_body,
  856. ]:
  857. self.assertEqual("complete", content["status"])
  858. self.assertEqual(kicked_user, content["shutdown_room"]["kicked_users"][0])
  859. self.assertIn("failed_to_kick_users", content["shutdown_room"])
  860. self.assertIn("local_aliases", content["shutdown_room"])
  861. self.assertNotIn("error", content)
  862. if expect_new_room:
  863. self.assertIsNotNone(content["shutdown_room"]["new_room_id"])
  864. else:
  865. self.assertIsNone(content["shutdown_room"]["new_room_id"])
  866. class RoomTestCase(unittest.HomeserverTestCase):
  867. """Test /room admin API."""
  868. servlets = [
  869. synapse.rest.admin.register_servlets,
  870. login.register_servlets,
  871. room.register_servlets,
  872. directory.register_servlets,
  873. ]
  874. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  875. # Create user
  876. self.admin_user = self.register_user("admin", "pass", admin=True)
  877. self.admin_user_tok = self.login("admin", "pass")
  878. def test_list_rooms(self) -> None:
  879. """Test that we can list rooms"""
  880. # Create 3 test rooms
  881. total_rooms = 3
  882. room_ids = []
  883. for _ in range(total_rooms):
  884. room_id = self.helper.create_room_as(
  885. self.admin_user,
  886. tok=self.admin_user_tok,
  887. is_public=True,
  888. )
  889. room_ids.append(room_id)
  890. room_ids.sort()
  891. # Request the list of rooms
  892. url = "/_synapse/admin/v1/rooms"
  893. channel = self.make_request(
  894. "GET",
  895. url.encode("ascii"),
  896. access_token=self.admin_user_tok,
  897. )
  898. # Check request completed successfully
  899. self.assertEqual(200, channel.code, msg=channel.json_body)
  900. # Check that response json body contains a "rooms" key
  901. self.assertTrue(
  902. "rooms" in channel.json_body,
  903. msg="Response body does not " "contain a 'rooms' key",
  904. )
  905. # Check that 3 rooms were returned
  906. self.assertEqual(3, len(channel.json_body["rooms"]), msg=channel.json_body)
  907. # Check their room_ids match
  908. returned_room_ids = [room["room_id"] for room in channel.json_body["rooms"]]
  909. self.assertEqual(room_ids, returned_room_ids)
  910. # Check that all fields are available
  911. for r in channel.json_body["rooms"]:
  912. self.assertIn("name", r)
  913. self.assertIn("canonical_alias", r)
  914. self.assertIn("joined_members", r)
  915. self.assertIn("joined_local_members", r)
  916. self.assertIn("version", r)
  917. self.assertIn("creator", r)
  918. self.assertIn("encryption", r)
  919. self.assertIs(r["federatable"], True)
  920. self.assertIs(r["public"], True)
  921. self.assertIn("join_rules", r)
  922. self.assertIn("guest_access", r)
  923. self.assertIn("history_visibility", r)
  924. self.assertIn("state_events", r)
  925. self.assertIn("room_type", r)
  926. self.assertIsNone(r["room_type"])
  927. # Check that the correct number of total rooms was returned
  928. self.assertEqual(channel.json_body["total_rooms"], total_rooms)
  929. # Check that the offset is correct
  930. # Should be 0 as we aren't paginating
  931. self.assertEqual(channel.json_body["offset"], 0)
  932. # Check that the prev_batch parameter is not present
  933. self.assertNotIn("prev_batch", channel.json_body)
  934. # We shouldn't receive a next token here as there's no further rooms to show
  935. self.assertNotIn("next_batch", channel.json_body)
  936. def test_list_rooms_pagination(self) -> None:
  937. """Test that we can get a full list of rooms through pagination"""
  938. # Create 5 test rooms
  939. total_rooms = 5
  940. room_ids = []
  941. for _ in range(total_rooms):
  942. room_id = self.helper.create_room_as(
  943. self.admin_user, tok=self.admin_user_tok
  944. )
  945. room_ids.append(room_id)
  946. # Set the name of the rooms so we get a consistent returned ordering
  947. for idx, room_id in enumerate(room_ids):
  948. self.helper.send_state(
  949. room_id,
  950. "m.room.name",
  951. {"name": str(idx)},
  952. tok=self.admin_user_tok,
  953. )
  954. # Request the list of rooms
  955. returned_room_ids = []
  956. start = 0
  957. limit = 2
  958. run_count = 0
  959. should_repeat = True
  960. while should_repeat:
  961. run_count += 1
  962. url = "/_synapse/admin/v1/rooms?from=%d&limit=%d&order_by=%s" % (
  963. start,
  964. limit,
  965. "name",
  966. )
  967. channel = self.make_request(
  968. "GET",
  969. url.encode("ascii"),
  970. access_token=self.admin_user_tok,
  971. )
  972. self.assertEqual(200, channel.code, msg=channel.json_body)
  973. self.assertTrue("rooms" in channel.json_body)
  974. for r in channel.json_body["rooms"]:
  975. returned_room_ids.append(r["room_id"])
  976. # Check that the correct number of total rooms was returned
  977. self.assertEqual(channel.json_body["total_rooms"], total_rooms)
  978. # Check that the offset is correct
  979. # We're only getting 2 rooms each page, so should be 2 * last run_count
  980. self.assertEqual(channel.json_body["offset"], 2 * (run_count - 1))
  981. if run_count > 1:
  982. # Check the value of prev_batch is correct
  983. self.assertEqual(channel.json_body["prev_batch"], 2 * (run_count - 2))
  984. if "next_batch" not in channel.json_body:
  985. # We have reached the end of the list
  986. should_repeat = False
  987. else:
  988. # Make another query with an updated start value
  989. start = channel.json_body["next_batch"]
  990. # We should've queried the endpoint 3 times
  991. self.assertEqual(
  992. run_count,
  993. 3,
  994. msg="Should've queried 3 times for 5 rooms with limit 2 per query",
  995. )
  996. # Check that we received all of the room ids
  997. self.assertEqual(room_ids, returned_room_ids)
  998. url = "/_synapse/admin/v1/rooms?from=%d&limit=%d" % (start, limit)
  999. channel = self.make_request(
  1000. "GET",
  1001. url.encode("ascii"),
  1002. access_token=self.admin_user_tok,
  1003. )
  1004. self.assertEqual(200, channel.code, msg=channel.json_body)
  1005. def test_correct_room_attributes(self) -> None:
  1006. """Test the correct attributes for a room are returned"""
  1007. # Create a test room
  1008. room_id = self.helper.create_room_as(
  1009. self.admin_user,
  1010. tok=self.admin_user_tok,
  1011. extra_content={"creation_content": {"type": RoomTypes.SPACE}},
  1012. )
  1013. test_alias = "#test:test"
  1014. test_room_name = "something"
  1015. # Have another user join the room
  1016. user_2 = self.register_user("user4", "pass")
  1017. user_tok_2 = self.login("user4", "pass")
  1018. self.helper.join(room_id, user_2, tok=user_tok_2)
  1019. # Create a new alias to this room
  1020. url = "/_matrix/client/r0/directory/room/%s" % (urllib.parse.quote(test_alias),)
  1021. channel = self.make_request(
  1022. "PUT",
  1023. url.encode("ascii"),
  1024. {"room_id": room_id},
  1025. access_token=self.admin_user_tok,
  1026. )
  1027. self.assertEqual(200, channel.code, msg=channel.json_body)
  1028. # Set this new alias as the canonical alias for this room
  1029. self.helper.send_state(
  1030. room_id,
  1031. "m.room.aliases",
  1032. {"aliases": [test_alias]},
  1033. tok=self.admin_user_tok,
  1034. state_key="test",
  1035. )
  1036. self.helper.send_state(
  1037. room_id,
  1038. "m.room.canonical_alias",
  1039. {"alias": test_alias},
  1040. tok=self.admin_user_tok,
  1041. )
  1042. # Set a name for the room
  1043. self.helper.send_state(
  1044. room_id,
  1045. "m.room.name",
  1046. {"name": test_room_name},
  1047. tok=self.admin_user_tok,
  1048. )
  1049. # Request the list of rooms
  1050. url = "/_synapse/admin/v1/rooms"
  1051. channel = self.make_request(
  1052. "GET",
  1053. url.encode("ascii"),
  1054. access_token=self.admin_user_tok,
  1055. )
  1056. self.assertEqual(200, channel.code, msg=channel.json_body)
  1057. # Check that rooms were returned
  1058. self.assertTrue("rooms" in channel.json_body)
  1059. rooms = channel.json_body["rooms"]
  1060. # Check that only one room was returned
  1061. self.assertEqual(len(rooms), 1)
  1062. # And that the value of the total_rooms key was correct
  1063. self.assertEqual(channel.json_body["total_rooms"], 1)
  1064. # Check that the offset is correct
  1065. # We're not paginating, so should be 0
  1066. self.assertEqual(channel.json_body["offset"], 0)
  1067. # Check that there is no `prev_batch`
  1068. self.assertNotIn("prev_batch", channel.json_body)
  1069. # Check that there is no `next_batch`
  1070. self.assertNotIn("next_batch", channel.json_body)
  1071. # Check that all provided attributes are set
  1072. r = rooms[0]
  1073. self.assertEqual(room_id, r["room_id"])
  1074. self.assertEqual(test_room_name, r["name"])
  1075. self.assertEqual(test_alias, r["canonical_alias"])
  1076. self.assertEqual(RoomTypes.SPACE, r["room_type"])
  1077. def test_room_list_sort_order(self) -> None:
  1078. """Test room list sort ordering. alphabetical name versus number of members,
  1079. reversing the order, etc.
  1080. """
  1081. def _order_test(
  1082. order_type: str,
  1083. expected_room_list: List[str],
  1084. reverse: bool = False,
  1085. ) -> None:
  1086. """Request the list of rooms in a certain order. Assert that order is what
  1087. we expect
  1088. Args:
  1089. order_type: The type of ordering to give the server
  1090. expected_room_list: The list of room_ids in the order we expect to get
  1091. back from the server
  1092. """
  1093. # Request the list of rooms in the given order
  1094. url = "/_synapse/admin/v1/rooms?order_by=%s" % (order_type,)
  1095. if reverse:
  1096. url += "&dir=b"
  1097. channel = self.make_request(
  1098. "GET",
  1099. url.encode("ascii"),
  1100. access_token=self.admin_user_tok,
  1101. )
  1102. self.assertEqual(200, channel.code, msg=channel.json_body)
  1103. # Check that rooms were returned
  1104. self.assertTrue("rooms" in channel.json_body)
  1105. rooms = channel.json_body["rooms"]
  1106. # Check for the correct total_rooms value
  1107. self.assertEqual(channel.json_body["total_rooms"], 3)
  1108. # Check that the offset is correct
  1109. # We're not paginating, so should be 0
  1110. self.assertEqual(channel.json_body["offset"], 0)
  1111. # Check that there is no `prev_batch`
  1112. self.assertNotIn("prev_batch", channel.json_body)
  1113. # Check that there is no `next_batch`
  1114. self.assertNotIn("next_batch", channel.json_body)
  1115. # Check that rooms were returned in alphabetical order
  1116. returned_order = [r["room_id"] for r in rooms]
  1117. self.assertListEqual(expected_room_list, returned_order) # order is checked
  1118. # Create 3 test rooms
  1119. room_id_1 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1120. room_id_2 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1121. room_id_3 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1122. # Also create a list sorted by IDs for properties that are equal (and thus sorted by room_id)
  1123. sorted_by_room_id_asc = [room_id_1, room_id_2, room_id_3]
  1124. sorted_by_room_id_asc.sort()
  1125. sorted_by_room_id_desc = sorted_by_room_id_asc.copy()
  1126. sorted_by_room_id_desc.reverse()
  1127. # Set room names in alphabetical order. room 1 -> A, 2 -> B, 3 -> C
  1128. self.helper.send_state(
  1129. room_id_1,
  1130. "m.room.name",
  1131. {"name": "A"},
  1132. tok=self.admin_user_tok,
  1133. )
  1134. self.helper.send_state(
  1135. room_id_2,
  1136. "m.room.name",
  1137. {"name": "B"},
  1138. tok=self.admin_user_tok,
  1139. )
  1140. self.helper.send_state(
  1141. room_id_3,
  1142. "m.room.name",
  1143. {"name": "C"},
  1144. tok=self.admin_user_tok,
  1145. )
  1146. # Set room canonical room aliases
  1147. self._set_canonical_alias(room_id_1, "#A_alias:test", self.admin_user_tok)
  1148. self._set_canonical_alias(room_id_2, "#B_alias:test", self.admin_user_tok)
  1149. self._set_canonical_alias(room_id_3, "#C_alias:test", self.admin_user_tok)
  1150. # Set room member size in the reverse order. room 1 -> 1 member, 2 -> 2, 3 -> 3
  1151. user_1 = self.register_user("bob1", "pass")
  1152. user_1_tok = self.login("bob1", "pass")
  1153. self.helper.join(room_id_2, user_1, tok=user_1_tok)
  1154. user_2 = self.register_user("bob2", "pass")
  1155. user_2_tok = self.login("bob2", "pass")
  1156. self.helper.join(room_id_3, user_2, tok=user_2_tok)
  1157. user_3 = self.register_user("bob3", "pass")
  1158. user_3_tok = self.login("bob3", "pass")
  1159. self.helper.join(room_id_3, user_3, tok=user_3_tok)
  1160. # Test different sort orders, with forward and reverse directions
  1161. _order_test("name", [room_id_1, room_id_2, room_id_3])
  1162. _order_test("name", [room_id_3, room_id_2, room_id_1], reverse=True)
  1163. _order_test("canonical_alias", [room_id_1, room_id_2, room_id_3])
  1164. _order_test("canonical_alias", [room_id_3, room_id_2, room_id_1], reverse=True)
  1165. # Note: joined_member counts are sorted in descending order when dir=f
  1166. _order_test("joined_members", [room_id_3, room_id_2, room_id_1])
  1167. _order_test("joined_members", [room_id_1, room_id_2, room_id_3], reverse=True)
  1168. # Note: joined_local_member counts are sorted in descending order when dir=f
  1169. _order_test("joined_local_members", [room_id_3, room_id_2, room_id_1])
  1170. _order_test(
  1171. "joined_local_members", [room_id_1, room_id_2, room_id_3], reverse=True
  1172. )
  1173. # Note: versions are sorted in descending order when dir=f
  1174. _order_test("version", sorted_by_room_id_asc, reverse=True)
  1175. _order_test("version", sorted_by_room_id_desc)
  1176. _order_test("creator", sorted_by_room_id_asc)
  1177. _order_test("creator", sorted_by_room_id_desc, reverse=True)
  1178. _order_test("encryption", sorted_by_room_id_asc)
  1179. _order_test("encryption", sorted_by_room_id_desc, reverse=True)
  1180. _order_test("federatable", sorted_by_room_id_asc)
  1181. _order_test("federatable", sorted_by_room_id_desc, reverse=True)
  1182. _order_test("public", sorted_by_room_id_asc)
  1183. _order_test("public", sorted_by_room_id_desc, reverse=True)
  1184. _order_test("join_rules", sorted_by_room_id_asc)
  1185. _order_test("join_rules", sorted_by_room_id_desc, reverse=True)
  1186. _order_test("guest_access", sorted_by_room_id_asc)
  1187. _order_test("guest_access", sorted_by_room_id_desc, reverse=True)
  1188. _order_test("history_visibility", sorted_by_room_id_asc)
  1189. _order_test("history_visibility", sorted_by_room_id_desc, reverse=True)
  1190. # Note: state_event counts are sorted in descending order when dir=f
  1191. _order_test("state_events", [room_id_3, room_id_2, room_id_1])
  1192. _order_test("state_events", [room_id_1, room_id_2, room_id_3], reverse=True)
  1193. def test_search_term(self) -> None:
  1194. """Test that searching for a room works correctly"""
  1195. # Create two test rooms
  1196. room_id_1 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1197. room_id_2 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1198. room_name_1 = "something"
  1199. room_name_2 = "LoremIpsum"
  1200. # Set the name for each room
  1201. self.helper.send_state(
  1202. room_id_1,
  1203. "m.room.name",
  1204. {"name": room_name_1},
  1205. tok=self.admin_user_tok,
  1206. )
  1207. self.helper.send_state(
  1208. room_id_2,
  1209. "m.room.name",
  1210. {"name": room_name_2},
  1211. tok=self.admin_user_tok,
  1212. )
  1213. self._set_canonical_alias(room_id_1, "#Room_Alias1:test", self.admin_user_tok)
  1214. def _search_test(
  1215. expected_room_id: Optional[str],
  1216. search_term: str,
  1217. expected_http_code: int = 200,
  1218. ) -> None:
  1219. """Search for a room and check that the returned room's id is a match
  1220. Args:
  1221. expected_room_id: The room_id expected to be returned by the API. Set
  1222. to None to expect zero results for the search
  1223. search_term: The term to search for room names with
  1224. expected_http_code: The expected http code for the request
  1225. """
  1226. url = "/_synapse/admin/v1/rooms?search_term=%s" % (search_term,)
  1227. channel = self.make_request(
  1228. "GET",
  1229. url.encode("ascii"),
  1230. access_token=self.admin_user_tok,
  1231. )
  1232. self.assertEqual(expected_http_code, channel.code, msg=channel.json_body)
  1233. if expected_http_code != 200:
  1234. return
  1235. # Check that rooms were returned
  1236. self.assertTrue("rooms" in channel.json_body)
  1237. rooms = channel.json_body["rooms"]
  1238. # Check that the expected number of rooms were returned
  1239. expected_room_count = 1 if expected_room_id else 0
  1240. self.assertEqual(len(rooms), expected_room_count)
  1241. self.assertEqual(channel.json_body["total_rooms"], expected_room_count)
  1242. # Check that the offset is correct
  1243. # We're not paginating, so should be 0
  1244. self.assertEqual(channel.json_body["offset"], 0)
  1245. # Check that there is no `prev_batch`
  1246. self.assertNotIn("prev_batch", channel.json_body)
  1247. # Check that there is no `next_batch`
  1248. self.assertNotIn("next_batch", channel.json_body)
  1249. if expected_room_id:
  1250. # Check that the first returned room id is correct
  1251. r = rooms[0]
  1252. self.assertEqual(expected_room_id, r["room_id"])
  1253. # Test searching by room name
  1254. _search_test(room_id_1, "something")
  1255. _search_test(room_id_1, "thing")
  1256. _search_test(room_id_2, "LoremIpsum")
  1257. _search_test(room_id_2, "lorem")
  1258. # Test case insensitive
  1259. _search_test(room_id_1, "SOMETHING")
  1260. _search_test(room_id_1, "THING")
  1261. _search_test(room_id_2, "LOREMIPSUM")
  1262. _search_test(room_id_2, "LOREM")
  1263. _search_test(None, "foo")
  1264. _search_test(None, "bar")
  1265. _search_test(None, "", expected_http_code=400)
  1266. # Test that the whole room id returns the room
  1267. _search_test(room_id_1, room_id_1)
  1268. # Test that the search by room_id is case sensitive
  1269. _search_test(None, room_id_1.lower())
  1270. # Test search part of local part of room id do not match
  1271. _search_test(None, room_id_1[1:10])
  1272. # Test that whole room alias return no result, because of domain
  1273. _search_test(None, "#Room_Alias1:test")
  1274. # Test search local part of alias
  1275. _search_test(room_id_1, "alias1")
  1276. def test_search_term_non_ascii(self) -> None:
  1277. """Test that searching for a room with non-ASCII characters works correctly"""
  1278. # Create test room
  1279. room_id = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1280. room_name = "ж"
  1281. # Set the name for the room
  1282. self.helper.send_state(
  1283. room_id,
  1284. "m.room.name",
  1285. {"name": room_name},
  1286. tok=self.admin_user_tok,
  1287. )
  1288. # make the request and test that the response is what we wanted
  1289. search_term = urllib.parse.quote("ж", "utf-8")
  1290. url = "/_synapse/admin/v1/rooms?search_term=%s" % (search_term,)
  1291. channel = self.make_request(
  1292. "GET",
  1293. url.encode("ascii"),
  1294. access_token=self.admin_user_tok,
  1295. )
  1296. self.assertEqual(200, channel.code, msg=channel.json_body)
  1297. self.assertEqual(room_id, channel.json_body["rooms"][0].get("room_id"))
  1298. self.assertEqual("ж", channel.json_body["rooms"][0].get("name"))
  1299. def test_single_room(self) -> None:
  1300. """Test that a single room can be requested correctly"""
  1301. # Create two test rooms
  1302. room_id_1 = self.helper.create_room_as(
  1303. self.admin_user, tok=self.admin_user_tok, is_public=True
  1304. )
  1305. room_id_2 = self.helper.create_room_as(
  1306. self.admin_user, tok=self.admin_user_tok, is_public=False
  1307. )
  1308. room_name_1 = "something"
  1309. room_name_2 = "else"
  1310. # Set the name for each room
  1311. self.helper.send_state(
  1312. room_id_1,
  1313. "m.room.name",
  1314. {"name": room_name_1},
  1315. tok=self.admin_user_tok,
  1316. )
  1317. self.helper.send_state(
  1318. room_id_2,
  1319. "m.room.name",
  1320. {"name": room_name_2},
  1321. tok=self.admin_user_tok,
  1322. )
  1323. url = "/_synapse/admin/v1/rooms/%s" % (room_id_1,)
  1324. channel = self.make_request(
  1325. "GET",
  1326. url.encode("ascii"),
  1327. access_token=self.admin_user_tok,
  1328. )
  1329. self.assertEqual(200, channel.code, msg=channel.json_body)
  1330. self.assertIn("room_id", channel.json_body)
  1331. self.assertIn("name", channel.json_body)
  1332. self.assertIn("topic", channel.json_body)
  1333. self.assertIn("avatar", channel.json_body)
  1334. self.assertIn("canonical_alias", channel.json_body)
  1335. self.assertIn("joined_members", channel.json_body)
  1336. self.assertIn("joined_local_members", channel.json_body)
  1337. self.assertIn("joined_local_devices", channel.json_body)
  1338. self.assertIn("version", channel.json_body)
  1339. self.assertIn("creator", channel.json_body)
  1340. self.assertIn("encryption", channel.json_body)
  1341. self.assertIn("federatable", channel.json_body)
  1342. self.assertIn("public", channel.json_body)
  1343. self.assertIn("join_rules", channel.json_body)
  1344. self.assertIn("guest_access", channel.json_body)
  1345. self.assertIn("history_visibility", channel.json_body)
  1346. self.assertIn("state_events", channel.json_body)
  1347. self.assertIn("room_type", channel.json_body)
  1348. self.assertIn("forgotten", channel.json_body)
  1349. self.assertEqual(room_id_1, channel.json_body["room_id"])
  1350. self.assertIs(True, channel.json_body["federatable"])
  1351. self.assertIs(True, channel.json_body["public"])
  1352. def test_single_room_devices(self) -> None:
  1353. """Test that `joined_local_devices` can be requested correctly"""
  1354. room_id_1 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1355. url = "/_synapse/admin/v1/rooms/%s" % (room_id_1,)
  1356. channel = self.make_request(
  1357. "GET",
  1358. url.encode("ascii"),
  1359. access_token=self.admin_user_tok,
  1360. )
  1361. self.assertEqual(200, channel.code, msg=channel.json_body)
  1362. self.assertEqual(1, channel.json_body["joined_local_devices"])
  1363. # Have another user join the room
  1364. user_1 = self.register_user("foo", "pass")
  1365. user_tok_1 = self.login("foo", "pass")
  1366. self.helper.join(room_id_1, user_1, tok=user_tok_1)
  1367. url = "/_synapse/admin/v1/rooms/%s" % (room_id_1,)
  1368. channel = self.make_request(
  1369. "GET",
  1370. url.encode("ascii"),
  1371. access_token=self.admin_user_tok,
  1372. )
  1373. self.assertEqual(200, channel.code, msg=channel.json_body)
  1374. self.assertEqual(2, channel.json_body["joined_local_devices"])
  1375. # leave room
  1376. self.helper.leave(room_id_1, self.admin_user, tok=self.admin_user_tok)
  1377. self.helper.leave(room_id_1, user_1, tok=user_tok_1)
  1378. url = "/_synapse/admin/v1/rooms/%s" % (room_id_1,)
  1379. channel = self.make_request(
  1380. "GET",
  1381. url.encode("ascii"),
  1382. access_token=self.admin_user_tok,
  1383. )
  1384. self.assertEqual(200, channel.code, msg=channel.json_body)
  1385. self.assertEqual(0, channel.json_body["joined_local_devices"])
  1386. def test_room_members(self) -> None:
  1387. """Test that room members can be requested correctly"""
  1388. # Create two test rooms
  1389. room_id_1 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1390. room_id_2 = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1391. # Have another user join the room
  1392. user_1 = self.register_user("foo", "pass")
  1393. user_tok_1 = self.login("foo", "pass")
  1394. self.helper.join(room_id_1, user_1, tok=user_tok_1)
  1395. # Have another user join the room
  1396. user_2 = self.register_user("bar", "pass")
  1397. user_tok_2 = self.login("bar", "pass")
  1398. self.helper.join(room_id_1, user_2, tok=user_tok_2)
  1399. self.helper.join(room_id_2, user_2, tok=user_tok_2)
  1400. # Have another user join the room
  1401. user_3 = self.register_user("foobar", "pass")
  1402. user_tok_3 = self.login("foobar", "pass")
  1403. self.helper.join(room_id_2, user_3, tok=user_tok_3)
  1404. url = "/_synapse/admin/v1/rooms/%s/members" % (room_id_1,)
  1405. channel = self.make_request(
  1406. "GET",
  1407. url.encode("ascii"),
  1408. access_token=self.admin_user_tok,
  1409. )
  1410. self.assertEqual(200, channel.code, msg=channel.json_body)
  1411. self.assertCountEqual(
  1412. ["@admin:test", "@foo:test", "@bar:test"], channel.json_body["members"]
  1413. )
  1414. self.assertEqual(channel.json_body["total"], 3)
  1415. url = "/_synapse/admin/v1/rooms/%s/members" % (room_id_2,)
  1416. channel = self.make_request(
  1417. "GET",
  1418. url.encode("ascii"),
  1419. access_token=self.admin_user_tok,
  1420. )
  1421. self.assertEqual(200, channel.code, msg=channel.json_body)
  1422. self.assertCountEqual(
  1423. ["@admin:test", "@bar:test", "@foobar:test"], channel.json_body["members"]
  1424. )
  1425. self.assertEqual(channel.json_body["total"], 3)
  1426. def test_room_state(self) -> None:
  1427. """Test that room state can be requested correctly"""
  1428. # Create two test rooms
  1429. room_id = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  1430. url = "/_synapse/admin/v1/rooms/%s/state" % (room_id,)
  1431. channel = self.make_request(
  1432. "GET",
  1433. url.encode("ascii"),
  1434. access_token=self.admin_user_tok,
  1435. )
  1436. self.assertEqual(200, channel.code, msg=channel.json_body)
  1437. self.assertIn("state", channel.json_body)
  1438. # testing that the state events match is painful and not done here. We assume that
  1439. # the create_room already does the right thing, so no need to verify that we got
  1440. # the state events it created.
  1441. def _set_canonical_alias(
  1442. self, room_id: str, test_alias: str, admin_user_tok: str
  1443. ) -> None:
  1444. # Create a new alias to this room
  1445. url = "/_matrix/client/r0/directory/room/%s" % (urllib.parse.quote(test_alias),)
  1446. channel = self.make_request(
  1447. "PUT",
  1448. url.encode("ascii"),
  1449. {"room_id": room_id},
  1450. access_token=admin_user_tok,
  1451. )
  1452. self.assertEqual(200, channel.code, msg=channel.json_body)
  1453. # Set this new alias as the canonical alias for this room
  1454. self.helper.send_state(
  1455. room_id,
  1456. "m.room.aliases",
  1457. {"aliases": [test_alias]},
  1458. tok=admin_user_tok,
  1459. state_key="test",
  1460. )
  1461. self.helper.send_state(
  1462. room_id,
  1463. "m.room.canonical_alias",
  1464. {"alias": test_alias},
  1465. tok=admin_user_tok,
  1466. )
  1467. def test_get_joined_members_after_leave_room(self) -> None:
  1468. """Test that requesting room members after leaving the room raises a 403 error."""
  1469. # create the room
  1470. user = self.register_user("foo", "pass")
  1471. user_tok = self.login("foo", "pass")
  1472. room_id = self.helper.create_room_as(user, tok=user_tok)
  1473. self.helper.leave(room_id, user, tok=user_tok)
  1474. # delete the rooms and get joined roomed membership
  1475. url = f"/_matrix/client/r0/rooms/{room_id}/joined_members"
  1476. channel = self.make_request("GET", url.encode("ascii"), access_token=user_tok)
  1477. self.assertEqual(403, channel.code, msg=channel.json_body)
  1478. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  1479. class RoomMessagesTestCase(unittest.HomeserverTestCase):
  1480. servlets = [
  1481. synapse.rest.admin.register_servlets,
  1482. login.register_servlets,
  1483. room.register_servlets,
  1484. ]
  1485. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  1486. self.admin_user = self.register_user("admin", "pass", admin=True)
  1487. self.admin_user_tok = self.login("admin", "pass")
  1488. self.user = self.register_user("foo", "pass")
  1489. self.user_tok = self.login("foo", "pass")
  1490. self.room_id = self.helper.create_room_as(self.user, tok=self.user_tok)
  1491. def test_timestamp_to_event(self) -> None:
  1492. """Test that providing the current timestamp can get the last event."""
  1493. self.helper.send(self.room_id, body="message 1", tok=self.user_tok)
  1494. second_event_id = self.helper.send(
  1495. self.room_id, body="message 2", tok=self.user_tok
  1496. )["event_id"]
  1497. ts = str(round(time.time() * 1000))
  1498. channel = self.make_request(
  1499. "GET",
  1500. "/_synapse/admin/v1/rooms/%s/timestamp_to_event?dir=b&ts=%s"
  1501. % (self.room_id, ts),
  1502. access_token=self.admin_user_tok,
  1503. )
  1504. self.assertEqual(200, channel.code)
  1505. self.assertIn("event_id", channel.json_body)
  1506. self.assertEqual(second_event_id, channel.json_body["event_id"])
  1507. def test_topo_token_is_accepted(self) -> None:
  1508. """Test Topo Token is accepted."""
  1509. token = "t1-0_0_0_0_0_0_0_0_0_0"
  1510. channel = self.make_request(
  1511. "GET",
  1512. "/_synapse/admin/v1/rooms/%s/messages?from=%s" % (self.room_id, token),
  1513. access_token=self.admin_user_tok,
  1514. )
  1515. self.assertEqual(200, channel.code)
  1516. self.assertIn("start", channel.json_body)
  1517. self.assertEqual(token, channel.json_body["start"])
  1518. self.assertIn("chunk", channel.json_body)
  1519. self.assertIn("end", channel.json_body)
  1520. def test_stream_token_is_accepted_for_fwd_pagianation(self) -> None:
  1521. """Test that stream token is accepted for forward pagination."""
  1522. token = "s0_0_0_0_0_0_0_0_0_0"
  1523. channel = self.make_request(
  1524. "GET",
  1525. "/_synapse/admin/v1/rooms/%s/messages?from=%s" % (self.room_id, token),
  1526. access_token=self.admin_user_tok,
  1527. )
  1528. self.assertEqual(200, channel.code)
  1529. self.assertIn("start", channel.json_body)
  1530. self.assertEqual(token, channel.json_body["start"])
  1531. self.assertIn("chunk", channel.json_body)
  1532. self.assertIn("end", channel.json_body)
  1533. def test_room_messages_backward(self) -> None:
  1534. """Test room messages can be retrieved by an admin that isn't in the room."""
  1535. latest_event_id = self.helper.send(
  1536. self.room_id, body="message 1", tok=self.user_tok
  1537. )["event_id"]
  1538. # Check that we get the first and second message when querying /messages.
  1539. channel = self.make_request(
  1540. "GET",
  1541. "/_synapse/admin/v1/rooms/%s/messages?dir=b" % (self.room_id,),
  1542. access_token=self.admin_user_tok,
  1543. )
  1544. self.assertEqual(channel.code, 200, channel.json_body)
  1545. chunk = channel.json_body["chunk"]
  1546. self.assertEqual(len(chunk), 6, [event["content"] for event in chunk])
  1547. # in backwards, this is the first event
  1548. self.assertEqual(chunk[0]["event_id"], latest_event_id)
  1549. def test_room_messages_forward(self) -> None:
  1550. """Test room messages can be retrieved by an admin that isn't in the room."""
  1551. latest_event_id = self.helper.send(
  1552. self.room_id, body="message 1", tok=self.user_tok
  1553. )["event_id"]
  1554. # Check that we get the first and second message when querying /messages.
  1555. channel = self.make_request(
  1556. "GET",
  1557. "/_synapse/admin/v1/rooms/%s/messages?dir=f" % (self.room_id,),
  1558. access_token=self.admin_user_tok,
  1559. )
  1560. self.assertEqual(channel.code, 200, channel.json_body)
  1561. chunk = channel.json_body["chunk"]
  1562. self.assertEqual(len(chunk), 6, [event["content"] for event in chunk])
  1563. # in forward, this is the last event
  1564. self.assertEqual(chunk[5]["event_id"], latest_event_id)
  1565. def test_room_messages_purge(self) -> None:
  1566. """Test room messages can be retrieved by an admin that isn't in the room."""
  1567. store = self.hs.get_datastores().main
  1568. pagination_handler = self.hs.get_pagination_handler()
  1569. # Send a first message in the room, which will be removed by the purge.
  1570. first_event_id = self.helper.send(
  1571. self.room_id, body="message 1", tok=self.user_tok
  1572. )["event_id"]
  1573. first_token = self.get_success(
  1574. store.get_topological_token_for_event(first_event_id)
  1575. )
  1576. first_token_str = self.get_success(first_token.to_string(store))
  1577. # Send a second message in the room, which won't be removed, and which we'll
  1578. # use as the marker to purge events before.
  1579. second_event_id = self.helper.send(
  1580. self.room_id, body="message 2", tok=self.user_tok
  1581. )["event_id"]
  1582. second_token = self.get_success(
  1583. store.get_topological_token_for_event(second_event_id)
  1584. )
  1585. second_token_str = self.get_success(second_token.to_string(store))
  1586. # Send a third event in the room to ensure we don't fall under any edge case
  1587. # due to our marker being the latest forward extremity in the room.
  1588. self.helper.send(self.room_id, body="message 3", tok=self.user_tok)
  1589. # Check that we get the first and second message when querying /messages.
  1590. channel = self.make_request(
  1591. "GET",
  1592. "/_synapse/admin/v1/rooms/%s/messages?from=%s&dir=b&filter=%s"
  1593. % (
  1594. self.room_id,
  1595. second_token_str,
  1596. json.dumps({"types": [EventTypes.Message]}),
  1597. ),
  1598. access_token=self.admin_user_tok,
  1599. )
  1600. self.assertEqual(channel.code, 200, channel.json_body)
  1601. chunk = channel.json_body["chunk"]
  1602. self.assertEqual(len(chunk), 2, [event["content"] for event in chunk])
  1603. # Purge every event before the second event.
  1604. purge_id = random_string(16)
  1605. pagination_handler._purges_by_id[purge_id] = PurgeStatus()
  1606. self.get_success(
  1607. pagination_handler._purge_history(
  1608. purge_id=purge_id,
  1609. room_id=self.room_id,
  1610. token=second_token_str,
  1611. delete_local_events=True,
  1612. )
  1613. )
  1614. # Check that we only get the second message through /message now that the first
  1615. # has been purged.
  1616. channel = self.make_request(
  1617. "GET",
  1618. "/_synapse/admin/v1/rooms/%s/messages?from=%s&dir=b&filter=%s"
  1619. % (
  1620. self.room_id,
  1621. second_token_str,
  1622. json.dumps({"types": [EventTypes.Message]}),
  1623. ),
  1624. access_token=self.admin_user_tok,
  1625. )
  1626. self.assertEqual(channel.code, 200, channel.json_body)
  1627. chunk = channel.json_body["chunk"]
  1628. self.assertEqual(len(chunk), 1, [event["content"] for event in chunk])
  1629. # Check that we get no event, but also no error, when querying /messages with
  1630. # the token that was pointing at the first event, because we don't have it
  1631. # anymore.
  1632. channel = self.make_request(
  1633. "GET",
  1634. "/_synapse/admin/v1/rooms/%s/messages?from=%s&dir=b&filter=%s"
  1635. % (
  1636. self.room_id,
  1637. first_token_str,
  1638. json.dumps({"types": [EventTypes.Message]}),
  1639. ),
  1640. access_token=self.admin_user_tok,
  1641. )
  1642. self.assertEqual(channel.code, 200, channel.json_body)
  1643. chunk = channel.json_body["chunk"]
  1644. self.assertEqual(len(chunk), 0, [event["content"] for event in chunk])
  1645. class JoinAliasRoomTestCase(unittest.HomeserverTestCase):
  1646. servlets = [
  1647. synapse.rest.admin.register_servlets,
  1648. room.register_servlets,
  1649. login.register_servlets,
  1650. ]
  1651. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  1652. self.admin_user = self.register_user("admin", "pass", admin=True)
  1653. self.admin_user_tok = self.login("admin", "pass")
  1654. self.creator = self.register_user("creator", "test")
  1655. self.creator_tok = self.login("creator", "test")
  1656. self.second_user_id = self.register_user("second", "test")
  1657. self.second_tok = self.login("second", "test")
  1658. self.public_room_id = self.helper.create_room_as(
  1659. self.creator, tok=self.creator_tok, is_public=True
  1660. )
  1661. self.url = f"/_synapse/admin/v1/join/{self.public_room_id}"
  1662. def test_requester_is_no_admin(self) -> None:
  1663. """
  1664. If the user is not a server admin, an error 403 is returned.
  1665. """
  1666. channel = self.make_request(
  1667. "POST",
  1668. self.url,
  1669. content={"user_id": self.second_user_id},
  1670. access_token=self.second_tok,
  1671. )
  1672. self.assertEqual(403, channel.code, msg=channel.json_body)
  1673. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  1674. def test_invalid_parameter(self) -> None:
  1675. """
  1676. If a parameter is missing, return an error
  1677. """
  1678. channel = self.make_request(
  1679. "POST",
  1680. self.url,
  1681. content={"unknown_parameter": "@unknown:test"},
  1682. access_token=self.admin_user_tok,
  1683. )
  1684. self.assertEqual(400, channel.code, msg=channel.json_body)
  1685. self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
  1686. def test_local_user_does_not_exist(self) -> None:
  1687. """
  1688. Tests that a lookup for a user that does not exist returns a 404
  1689. """
  1690. channel = self.make_request(
  1691. "POST",
  1692. self.url,
  1693. content={"user_id": "@unknown:test"},
  1694. access_token=self.admin_user_tok,
  1695. )
  1696. self.assertEqual(404, channel.code, msg=channel.json_body)
  1697. self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
  1698. def test_remote_user(self) -> None:
  1699. """
  1700. Check that only local user can join rooms.
  1701. """
  1702. channel = self.make_request(
  1703. "POST",
  1704. self.url,
  1705. content={"user_id": "@not:exist.bla"},
  1706. access_token=self.admin_user_tok,
  1707. )
  1708. self.assertEqual(400, channel.code, msg=channel.json_body)
  1709. self.assertEqual(
  1710. "This endpoint can only be used with local users",
  1711. channel.json_body["error"],
  1712. )
  1713. def test_room_does_not_exist(self) -> None:
  1714. """
  1715. Check that unknown rooms/server return error 404.
  1716. """
  1717. url = "/_synapse/admin/v1/join/!unknown:test"
  1718. channel = self.make_request(
  1719. "POST",
  1720. url,
  1721. content={"user_id": self.second_user_id},
  1722. access_token=self.admin_user_tok,
  1723. )
  1724. self.assertEqual(404, channel.code, msg=channel.json_body)
  1725. self.assertEqual(
  1726. "Can't join remote room because no servers that are in the room have been provided.",
  1727. channel.json_body["error"],
  1728. )
  1729. def test_room_is_not_valid(self) -> None:
  1730. """
  1731. Check that invalid room names, return an error 400.
  1732. """
  1733. url = "/_synapse/admin/v1/join/invalidroom"
  1734. channel = self.make_request(
  1735. "POST",
  1736. url,
  1737. content={"user_id": self.second_user_id},
  1738. access_token=self.admin_user_tok,
  1739. )
  1740. self.assertEqual(400, channel.code, msg=channel.json_body)
  1741. self.assertEqual(
  1742. "invalidroom was not legal room ID or room alias",
  1743. channel.json_body["error"],
  1744. )
  1745. def test_join_public_room(self) -> None:
  1746. """
  1747. Test joining a local user to a public room with "JoinRules.PUBLIC"
  1748. """
  1749. channel = self.make_request(
  1750. "POST",
  1751. self.url,
  1752. content={"user_id": self.second_user_id},
  1753. access_token=self.admin_user_tok,
  1754. )
  1755. self.assertEqual(200, channel.code, msg=channel.json_body)
  1756. self.assertEqual(self.public_room_id, channel.json_body["room_id"])
  1757. # Validate if user is a member of the room
  1758. channel = self.make_request(
  1759. "GET",
  1760. "/_matrix/client/r0/joined_rooms",
  1761. access_token=self.second_tok,
  1762. )
  1763. self.assertEqual(200, channel.code, msg=channel.json_body)
  1764. self.assertEqual(self.public_room_id, channel.json_body["joined_rooms"][0])
  1765. def test_join_private_room_if_not_member(self) -> None:
  1766. """
  1767. Test joining a local user to a private room with "JoinRules.INVITE"
  1768. when server admin is not member of this room.
  1769. """
  1770. private_room_id = self.helper.create_room_as(
  1771. self.creator, tok=self.creator_tok, is_public=False
  1772. )
  1773. url = f"/_synapse/admin/v1/join/{private_room_id}"
  1774. channel = self.make_request(
  1775. "POST",
  1776. url,
  1777. content={"user_id": self.second_user_id},
  1778. access_token=self.admin_user_tok,
  1779. )
  1780. self.assertEqual(403, channel.code, msg=channel.json_body)
  1781. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  1782. def test_join_private_room_if_member(self) -> None:
  1783. """
  1784. Test joining a local user to a private room with "JoinRules.INVITE",
  1785. when server admin is member of this room.
  1786. """
  1787. private_room_id = self.helper.create_room_as(
  1788. self.creator, tok=self.creator_tok, is_public=False
  1789. )
  1790. self.helper.invite(
  1791. room=private_room_id,
  1792. src=self.creator,
  1793. targ=self.admin_user,
  1794. tok=self.creator_tok,
  1795. )
  1796. self.helper.join(
  1797. room=private_room_id, user=self.admin_user, tok=self.admin_user_tok
  1798. )
  1799. # Validate if server admin is a member of the room
  1800. channel = self.make_request(
  1801. "GET",
  1802. "/_matrix/client/r0/joined_rooms",
  1803. access_token=self.admin_user_tok,
  1804. )
  1805. self.assertEqual(200, channel.code, msg=channel.json_body)
  1806. self.assertEqual(private_room_id, channel.json_body["joined_rooms"][0])
  1807. # Join user to room.
  1808. url = f"/_synapse/admin/v1/join/{private_room_id}"
  1809. channel = self.make_request(
  1810. "POST",
  1811. url,
  1812. content={"user_id": self.second_user_id},
  1813. access_token=self.admin_user_tok,
  1814. )
  1815. self.assertEqual(200, channel.code, msg=channel.json_body)
  1816. self.assertEqual(private_room_id, channel.json_body["room_id"])
  1817. # Validate if user is a member of the room
  1818. channel = self.make_request(
  1819. "GET",
  1820. "/_matrix/client/r0/joined_rooms",
  1821. access_token=self.second_tok,
  1822. )
  1823. self.assertEqual(200, channel.code, msg=channel.json_body)
  1824. self.assertEqual(private_room_id, channel.json_body["joined_rooms"][0])
  1825. def test_join_private_room_if_owner(self) -> None:
  1826. """
  1827. Test joining a local user to a private room with "JoinRules.INVITE",
  1828. when server admin is owner of this room.
  1829. """
  1830. private_room_id = self.helper.create_room_as(
  1831. self.admin_user, tok=self.admin_user_tok, is_public=False
  1832. )
  1833. url = f"/_synapse/admin/v1/join/{private_room_id}"
  1834. channel = self.make_request(
  1835. "POST",
  1836. url,
  1837. content={"user_id": self.second_user_id},
  1838. access_token=self.admin_user_tok,
  1839. )
  1840. self.assertEqual(200, channel.code, msg=channel.json_body)
  1841. self.assertEqual(private_room_id, channel.json_body["room_id"])
  1842. # Validate if user is a member of the room
  1843. channel = self.make_request(
  1844. "GET",
  1845. "/_matrix/client/r0/joined_rooms",
  1846. access_token=self.second_tok,
  1847. )
  1848. self.assertEqual(200, channel.code, msg=channel.json_body)
  1849. self.assertEqual(private_room_id, channel.json_body["joined_rooms"][0])
  1850. def test_context_as_non_admin(self) -> None:
  1851. """
  1852. Test that, without being admin, one cannot use the context admin API
  1853. """
  1854. # Create a room.
  1855. user_id = self.register_user("test", "test")
  1856. user_tok = self.login("test", "test")
  1857. self.register_user("test_2", "test")
  1858. user_tok_2 = self.login("test_2", "test")
  1859. room_id = self.helper.create_room_as(user_id, tok=user_tok)
  1860. # Populate the room with events.
  1861. events = []
  1862. for i in range(30):
  1863. events.append(
  1864. self.helper.send_event(
  1865. room_id, "com.example.test", content={"index": i}, tok=user_tok
  1866. )
  1867. )
  1868. # Now attempt to find the context using the admin API without being admin.
  1869. midway = (len(events) - 1) // 2
  1870. for tok in [user_tok, user_tok_2]:
  1871. channel = self.make_request(
  1872. "GET",
  1873. "/_synapse/admin/v1/rooms/%s/context/%s"
  1874. % (room_id, events[midway]["event_id"]),
  1875. access_token=tok,
  1876. )
  1877. self.assertEqual(403, channel.code, msg=channel.json_body)
  1878. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  1879. def test_context_as_admin(self) -> None:
  1880. """
  1881. Test that, as admin, we can find the context of an event without having joined the room.
  1882. """
  1883. # Create a room. We're not part of it.
  1884. user_id = self.register_user("test", "test")
  1885. user_tok = self.login("test", "test")
  1886. room_id = self.helper.create_room_as(user_id, tok=user_tok)
  1887. # Populate the room with events.
  1888. events = []
  1889. for i in range(30):
  1890. events.append(
  1891. self.helper.send_event(
  1892. room_id, "com.example.test", content={"index": i}, tok=user_tok
  1893. )
  1894. )
  1895. # Now let's fetch the context for this room.
  1896. midway = (len(events) - 1) // 2
  1897. channel = self.make_request(
  1898. "GET",
  1899. "/_synapse/admin/v1/rooms/%s/context/%s"
  1900. % (room_id, events[midway]["event_id"]),
  1901. access_token=self.admin_user_tok,
  1902. )
  1903. self.assertEqual(200, channel.code, msg=channel.json_body)
  1904. self.assertEqual(
  1905. channel.json_body["event"]["event_id"], events[midway]["event_id"]
  1906. )
  1907. for found_event in channel.json_body["events_before"]:
  1908. for j, posted_event in enumerate(events):
  1909. if found_event["event_id"] == posted_event["event_id"]:
  1910. self.assertTrue(j < midway)
  1911. break
  1912. else:
  1913. self.fail("Event %s from events_before not found" % j)
  1914. for found_event in channel.json_body["events_after"]:
  1915. for j, posted_event in enumerate(events):
  1916. if found_event["event_id"] == posted_event["event_id"]:
  1917. self.assertTrue(j > midway)
  1918. break
  1919. else:
  1920. self.fail("Event %s from events_after not found" % j)
  1921. class MakeRoomAdminTestCase(unittest.HomeserverTestCase):
  1922. servlets = [
  1923. synapse.rest.admin.register_servlets,
  1924. room.register_servlets,
  1925. login.register_servlets,
  1926. ]
  1927. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  1928. self.admin_user = self.register_user("admin", "pass", admin=True)
  1929. self.admin_user_tok = self.login("admin", "pass")
  1930. self.creator = self.register_user("creator", "test")
  1931. self.creator_tok = self.login("creator", "test")
  1932. self.second_user_id = self.register_user("second", "test")
  1933. self.second_tok = self.login("second", "test")
  1934. self.public_room_id = self.helper.create_room_as(
  1935. self.creator, tok=self.creator_tok, is_public=True
  1936. )
  1937. self.url = "/_synapse/admin/v1/rooms/{}/make_room_admin".format(
  1938. self.public_room_id
  1939. )
  1940. def test_public_room(self) -> None:
  1941. """Test that getting admin in a public room works."""
  1942. room_id = self.helper.create_room_as(
  1943. self.creator, tok=self.creator_tok, is_public=True
  1944. )
  1945. channel = self.make_request(
  1946. "POST",
  1947. f"/_synapse/admin/v1/rooms/{room_id}/make_room_admin",
  1948. content={},
  1949. access_token=self.admin_user_tok,
  1950. )
  1951. self.assertEqual(200, channel.code, msg=channel.json_body)
  1952. # Now we test that we can join the room and ban a user.
  1953. self.helper.join(room_id, self.admin_user, tok=self.admin_user_tok)
  1954. self.helper.change_membership(
  1955. room_id,
  1956. self.admin_user,
  1957. "@test:test",
  1958. Membership.BAN,
  1959. tok=self.admin_user_tok,
  1960. )
  1961. def test_private_room(self) -> None:
  1962. """Test that getting admin in a private room works and we get invited."""
  1963. room_id = self.helper.create_room_as(
  1964. self.creator,
  1965. tok=self.creator_tok,
  1966. is_public=False,
  1967. )
  1968. channel = self.make_request(
  1969. "POST",
  1970. f"/_synapse/admin/v1/rooms/{room_id}/make_room_admin",
  1971. content={},
  1972. access_token=self.admin_user_tok,
  1973. )
  1974. self.assertEqual(200, channel.code, msg=channel.json_body)
  1975. # Now we test that we can join the room (we should have received an
  1976. # invite) and can ban a user.
  1977. self.helper.join(room_id, self.admin_user, tok=self.admin_user_tok)
  1978. self.helper.change_membership(
  1979. room_id,
  1980. self.admin_user,
  1981. "@test:test",
  1982. Membership.BAN,
  1983. tok=self.admin_user_tok,
  1984. )
  1985. def test_other_user(self) -> None:
  1986. """Test that giving admin in a public room works to a non-admin user works."""
  1987. room_id = self.helper.create_room_as(
  1988. self.creator, tok=self.creator_tok, is_public=True
  1989. )
  1990. channel = self.make_request(
  1991. "POST",
  1992. f"/_synapse/admin/v1/rooms/{room_id}/make_room_admin",
  1993. content={"user_id": self.second_user_id},
  1994. access_token=self.admin_user_tok,
  1995. )
  1996. self.assertEqual(200, channel.code, msg=channel.json_body)
  1997. # Now we test that we can join the room and ban a user.
  1998. self.helper.join(room_id, self.second_user_id, tok=self.second_tok)
  1999. self.helper.change_membership(
  2000. room_id,
  2001. self.second_user_id,
  2002. "@test:test",
  2003. Membership.BAN,
  2004. tok=self.second_tok,
  2005. )
  2006. def test_not_enough_power(self) -> None:
  2007. """Test that we get a sensible error if there are no local room admins."""
  2008. room_id = self.helper.create_room_as(
  2009. self.creator, tok=self.creator_tok, is_public=True
  2010. )
  2011. # The creator drops admin rights in the room.
  2012. pl = self.helper.get_state(
  2013. room_id, EventTypes.PowerLevels, tok=self.creator_tok
  2014. )
  2015. pl["users"][self.creator] = 0
  2016. self.helper.send_state(
  2017. room_id, EventTypes.PowerLevels, body=pl, tok=self.creator_tok
  2018. )
  2019. channel = self.make_request(
  2020. "POST",
  2021. f"/_synapse/admin/v1/rooms/{room_id}/make_room_admin",
  2022. content={},
  2023. access_token=self.admin_user_tok,
  2024. )
  2025. # We expect this to fail with a 400 as there are no room admins.
  2026. #
  2027. # (Note we assert the error message to ensure that it's not denied for
  2028. # some other reason)
  2029. self.assertEqual(400, channel.code, msg=channel.json_body)
  2030. self.assertEqual(
  2031. channel.json_body["error"],
  2032. "No local admin user in room with power to update power levels.",
  2033. )
  2034. class BlockRoomTestCase(unittest.HomeserverTestCase):
  2035. servlets = [
  2036. synapse.rest.admin.register_servlets,
  2037. room.register_servlets,
  2038. login.register_servlets,
  2039. ]
  2040. def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
  2041. self._store = hs.get_datastores().main
  2042. self.admin_user = self.register_user("admin", "pass", admin=True)
  2043. self.admin_user_tok = self.login("admin", "pass")
  2044. self.other_user = self.register_user("user", "pass")
  2045. self.other_user_tok = self.login("user", "pass")
  2046. self.room_id = self.helper.create_room_as(
  2047. self.other_user, tok=self.other_user_tok
  2048. )
  2049. self.url = "/_synapse/admin/v1/rooms/%s/block"
  2050. @parameterized.expand([("PUT",), ("GET",)])
  2051. def test_requester_is_no_admin(self, method: str) -> None:
  2052. """If the user is not a server admin, an error 403 is returned."""
  2053. channel = self.make_request(
  2054. method,
  2055. self.url % self.room_id,
  2056. content={},
  2057. access_token=self.other_user_tok,
  2058. )
  2059. self.assertEqual(403, channel.code, msg=channel.json_body)
  2060. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  2061. @parameterized.expand([("PUT",), ("GET",)])
  2062. def test_room_is_not_valid(self, method: str) -> None:
  2063. """Check that invalid room names, return an error 400."""
  2064. channel = self.make_request(
  2065. method,
  2066. self.url % "invalidroom",
  2067. content={},
  2068. access_token=self.admin_user_tok,
  2069. )
  2070. self.assertEqual(400, channel.code, msg=channel.json_body)
  2071. self.assertEqual(
  2072. "invalidroom is not a legal room ID",
  2073. channel.json_body["error"],
  2074. )
  2075. def test_block_is_not_valid(self) -> None:
  2076. """If parameter `block` is not valid, return an error."""
  2077. # `block` is not valid
  2078. channel = self.make_request(
  2079. "PUT",
  2080. self.url % self.room_id,
  2081. content={"block": "NotBool"},
  2082. access_token=self.admin_user_tok,
  2083. )
  2084. self.assertEqual(400, channel.code, msg=channel.json_body)
  2085. self.assertEqual(Codes.BAD_JSON, channel.json_body["errcode"])
  2086. # `block` is not set
  2087. channel = self.make_request(
  2088. "PUT",
  2089. self.url % self.room_id,
  2090. content={},
  2091. access_token=self.admin_user_tok,
  2092. )
  2093. self.assertEqual(400, channel.code, msg=channel.json_body)
  2094. self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
  2095. # no content is send
  2096. channel = self.make_request(
  2097. "PUT",
  2098. self.url % self.room_id,
  2099. access_token=self.admin_user_tok,
  2100. )
  2101. self.assertEqual(400, channel.code, msg=channel.json_body)
  2102. self.assertEqual(Codes.NOT_JSON, channel.json_body["errcode"])
  2103. def test_block_room(self) -> None:
  2104. """Test that block a room is successful."""
  2105. def _request_and_test_block_room(room_id: str) -> None:
  2106. self._is_blocked(room_id, expect=False)
  2107. channel = self.make_request(
  2108. "PUT",
  2109. self.url % room_id,
  2110. content={"block": True},
  2111. access_token=self.admin_user_tok,
  2112. )
  2113. self.assertEqual(200, channel.code, msg=channel.json_body)
  2114. self.assertTrue(channel.json_body["block"])
  2115. self._is_blocked(room_id, expect=True)
  2116. # known internal room
  2117. _request_and_test_block_room(self.room_id)
  2118. # unknown internal room
  2119. _request_and_test_block_room("!unknown:test")
  2120. # unknown remote room
  2121. _request_and_test_block_room("!unknown:remote")
  2122. def test_block_room_twice(self) -> None:
  2123. """Test that block a room that is already blocked is successful."""
  2124. self._is_blocked(self.room_id, expect=False)
  2125. for _ in range(2):
  2126. channel = self.make_request(
  2127. "PUT",
  2128. self.url % self.room_id,
  2129. content={"block": True},
  2130. access_token=self.admin_user_tok,
  2131. )
  2132. self.assertEqual(200, channel.code, msg=channel.json_body)
  2133. self.assertTrue(channel.json_body["block"])
  2134. self._is_blocked(self.room_id, expect=True)
  2135. def test_unblock_room(self) -> None:
  2136. """Test that unblock a room is successful."""
  2137. def _request_and_test_unblock_room(room_id: str) -> None:
  2138. self._block_room(room_id)
  2139. channel = self.make_request(
  2140. "PUT",
  2141. self.url % room_id,
  2142. content={"block": False},
  2143. access_token=self.admin_user_tok,
  2144. )
  2145. self.assertEqual(200, channel.code, msg=channel.json_body)
  2146. self.assertFalse(channel.json_body["block"])
  2147. self._is_blocked(room_id, expect=False)
  2148. # known internal room
  2149. _request_and_test_unblock_room(self.room_id)
  2150. # unknown internal room
  2151. _request_and_test_unblock_room("!unknown:test")
  2152. # unknown remote room
  2153. _request_and_test_unblock_room("!unknown:remote")
  2154. def test_unblock_room_twice(self) -> None:
  2155. """Test that unblock a room that is not blocked is successful."""
  2156. self._block_room(self.room_id)
  2157. for _ in range(2):
  2158. channel = self.make_request(
  2159. "PUT",
  2160. self.url % self.room_id,
  2161. content={"block": False},
  2162. access_token=self.admin_user_tok,
  2163. )
  2164. self.assertEqual(200, channel.code, msg=channel.json_body)
  2165. self.assertFalse(channel.json_body["block"])
  2166. self._is_blocked(self.room_id, expect=False)
  2167. def test_get_blocked_room(self) -> None:
  2168. """Test get status of a blocked room"""
  2169. def _request_blocked_room(room_id: str) -> None:
  2170. self._block_room(room_id)
  2171. channel = self.make_request(
  2172. "GET",
  2173. self.url % room_id,
  2174. access_token=self.admin_user_tok,
  2175. )
  2176. self.assertEqual(200, channel.code, msg=channel.json_body)
  2177. self.assertTrue(channel.json_body["block"])
  2178. self.assertEqual(self.other_user, channel.json_body["user_id"])
  2179. # known internal room
  2180. _request_blocked_room(self.room_id)
  2181. # unknown internal room
  2182. _request_blocked_room("!unknown:test")
  2183. # unknown remote room
  2184. _request_blocked_room("!unknown:remote")
  2185. def test_get_unblocked_room(self) -> None:
  2186. """Test get status of a unblocked room"""
  2187. def _request_unblocked_room(room_id: str) -> None:
  2188. self._is_blocked(room_id, expect=False)
  2189. channel = self.make_request(
  2190. "GET",
  2191. self.url % room_id,
  2192. access_token=self.admin_user_tok,
  2193. )
  2194. self.assertEqual(200, channel.code, msg=channel.json_body)
  2195. self.assertFalse(channel.json_body["block"])
  2196. self.assertNotIn("user_id", channel.json_body)
  2197. # known internal room
  2198. _request_unblocked_room(self.room_id)
  2199. # unknown internal room
  2200. _request_unblocked_room("!unknown:test")
  2201. # unknown remote room
  2202. _request_unblocked_room("!unknown:remote")
  2203. def _is_blocked(self, room_id: str, expect: bool = True) -> None:
  2204. """Assert that the room is blocked or not"""
  2205. d = self._store.is_room_blocked(room_id)
  2206. if expect:
  2207. self.assertTrue(self.get_success(d))
  2208. else:
  2209. self.assertIsNone(self.get_success(d))
  2210. def _block_room(self, room_id: str) -> None:
  2211. """Block a room in database"""
  2212. self.get_success(self._store.block_room(room_id, self.other_user))
  2213. self._is_blocked(room_id, expect=True)
  2214. PURGE_TABLES = [
  2215. "current_state_events",
  2216. "event_backward_extremities",
  2217. "event_forward_extremities",
  2218. "event_json",
  2219. "event_push_actions",
  2220. "event_search",
  2221. "events",
  2222. "receipts_graph",
  2223. "receipts_linearized",
  2224. "room_aliases",
  2225. "room_depth",
  2226. "room_memberships",
  2227. "room_stats_state",
  2228. "room_stats_current",
  2229. "room_stats_earliest_token",
  2230. "rooms",
  2231. "stream_ordering_to_exterm",
  2232. "users_in_public_rooms",
  2233. "users_who_share_private_rooms",
  2234. "appservice_room_list",
  2235. "e2e_room_keys",
  2236. "event_push_summary",
  2237. "pusher_throttle",
  2238. "room_account_data",
  2239. "room_tags",
  2240. # "state_groups", # Current impl leaves orphaned state groups around.
  2241. "state_groups_state",
  2242. "federation_inbound_events_staging",
  2243. ]