You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1517 lines
53 KiB

  1. # Copyright 2014-2016 OpenMarket Ltd
  2. # Copyright 2018 New Vector Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. """ This module contains REST servlets to do with rooms: /rooms/<paths> """
  16. import logging
  17. import re
  18. from enum import Enum
  19. from http import HTTPStatus
  20. from typing import TYPE_CHECKING, Awaitable, Dict, List, Optional, Tuple
  21. from urllib import parse as urlparse
  22. from prometheus_client.core import Histogram
  23. from twisted.web.server import Request
  24. from synapse import event_auth
  25. from synapse.api.constants import Direction, EventTypes, Membership
  26. from synapse.api.errors import (
  27. AuthError,
  28. Codes,
  29. InvalidClientCredentialsError,
  30. MissingClientTokenError,
  31. ShadowBanError,
  32. SynapseError,
  33. UnredactedContentDeletedError,
  34. )
  35. from synapse.api.filtering import Filter
  36. from synapse.events.utils import SerializeEventConfig, format_event_for_client_v2
  37. from synapse.http.server import HttpServer
  38. from synapse.http.servlet import (
  39. ResolveRoomIdMixin,
  40. RestServlet,
  41. assert_params_in_dict,
  42. parse_boolean,
  43. parse_enum,
  44. parse_integer,
  45. parse_json_object_from_request,
  46. parse_string,
  47. parse_strings_from_args,
  48. )
  49. from synapse.http.site import SynapseRequest
  50. from synapse.logging.context import make_deferred_yieldable, run_in_background
  51. from synapse.logging.opentracing import set_tag
  52. from synapse.metrics.background_process_metrics import run_as_background_process
  53. from synapse.rest.client._base import client_patterns
  54. from synapse.rest.client.transactions import HttpTransactionCache
  55. from synapse.streams.config import PaginationConfig
  56. from synapse.types import JsonDict, Requester, StreamToken, ThirdPartyInstanceID, UserID
  57. from synapse.types.state import StateFilter
  58. from synapse.util import json_decoder
  59. from synapse.util.cancellation import cancellable
  60. from synapse.util.stringutils import parse_and_validate_server_name, random_string
  61. if TYPE_CHECKING:
  62. from synapse.server import HomeServer
  63. logger = logging.getLogger(__name__)
  64. class _RoomSize(Enum):
  65. """
  66. Enum to differentiate sizes of rooms. This is a pretty good approximation
  67. about how hard it will be to get events in the room. We could also look at
  68. room "complexity".
  69. """
  70. # This doesn't necessarily mean the room is a DM, just that there is a DM
  71. # amount of people there.
  72. DM_SIZE = "direct_message_size"
  73. SMALL = "small"
  74. SUBSTANTIAL = "substantial"
  75. LARGE = "large"
  76. @staticmethod
  77. def from_member_count(member_count: int) -> "_RoomSize":
  78. if member_count <= 2:
  79. return _RoomSize.DM_SIZE
  80. elif member_count < 100:
  81. return _RoomSize.SMALL
  82. elif member_count < 1000:
  83. return _RoomSize.SUBSTANTIAL
  84. else:
  85. return _RoomSize.LARGE
  86. # This is an extra metric on top of `synapse_http_server_response_time_seconds`
  87. # which times the same sort of thing but this one allows us to see values
  88. # greater than 10s. We use a separate dedicated histogram with its own buckets
  89. # so that we don't increase the cardinality of the general one because it's
  90. # multiplied across hundreds of servlets.
  91. messsages_response_timer = Histogram(
  92. "synapse_room_message_list_rest_servlet_response_time_seconds",
  93. "sec",
  94. # We have a label for room size so we can try to see a more realistic
  95. # picture of /messages response time for bigger rooms. We don't want the
  96. # tiny rooms that can always respond fast skewing our results when we're trying
  97. # to optimize the bigger cases.
  98. ["room_size"],
  99. buckets=(
  100. 0.005,
  101. 0.01,
  102. 0.025,
  103. 0.05,
  104. 0.1,
  105. 0.25,
  106. 0.5,
  107. 1.0,
  108. 2.5,
  109. 5.0,
  110. 10.0,
  111. 20.0,
  112. 30.0,
  113. 60.0,
  114. 80.0,
  115. 100.0,
  116. 120.0,
  117. 150.0,
  118. 180.0,
  119. "+Inf",
  120. ),
  121. )
  122. class TransactionRestServlet(RestServlet):
  123. def __init__(self, hs: "HomeServer"):
  124. super().__init__()
  125. self.txns = HttpTransactionCache(hs)
  126. class RoomCreateRestServlet(TransactionRestServlet):
  127. CATEGORY = "Client API requests"
  128. def __init__(self, hs: "HomeServer"):
  129. super().__init__(hs)
  130. self._room_creation_handler = hs.get_room_creation_handler()
  131. self.auth = hs.get_auth()
  132. def register(self, http_server: HttpServer) -> None:
  133. PATTERNS = "/createRoom"
  134. register_txn_path(self, PATTERNS, http_server)
  135. async def on_PUT(
  136. self, request: SynapseRequest, txn_id: str
  137. ) -> Tuple[int, JsonDict]:
  138. requester = await self.auth.get_user_by_req(request)
  139. set_tag("txn_id", txn_id)
  140. return await self.txns.fetch_or_execute_request(
  141. request, requester, self._do, request, requester
  142. )
  143. async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
  144. requester = await self.auth.get_user_by_req(request)
  145. return await self._do(request, requester)
  146. async def _do(
  147. self, request: SynapseRequest, requester: Requester
  148. ) -> Tuple[int, JsonDict]:
  149. room_id, _, _ = await self._room_creation_handler.create_room(
  150. requester, self.get_room_config(request)
  151. )
  152. return 200, {"room_id": room_id}
  153. def get_room_config(self, request: Request) -> JsonDict:
  154. user_supplied_config = parse_json_object_from_request(request)
  155. return user_supplied_config
  156. # TODO: Needs unit testing for generic events
  157. class RoomStateEventRestServlet(RestServlet):
  158. CATEGORY = "Event sending requests"
  159. def __init__(self, hs: "HomeServer"):
  160. super().__init__()
  161. self.event_creation_handler = hs.get_event_creation_handler()
  162. self.room_member_handler = hs.get_room_member_handler()
  163. self.message_handler = hs.get_message_handler()
  164. self.auth = hs.get_auth()
  165. def register(self, http_server: HttpServer) -> None:
  166. # /rooms/$roomid/state/$eventtype
  167. no_state_key = "/rooms/(?P<room_id>[^/]*)/state/(?P<event_type>[^/]*)$"
  168. # /rooms/$roomid/state/$eventtype/$statekey
  169. state_key = (
  170. "/rooms/(?P<room_id>[^/]*)/state/"
  171. "(?P<event_type>[^/]*)/(?P<state_key>[^/]*)$"
  172. )
  173. http_server.register_paths(
  174. "GET",
  175. client_patterns(state_key, v1=True),
  176. self.on_GET,
  177. self.__class__.__name__,
  178. )
  179. http_server.register_paths(
  180. "PUT",
  181. client_patterns(state_key, v1=True),
  182. self.on_PUT,
  183. self.__class__.__name__,
  184. )
  185. http_server.register_paths(
  186. "GET",
  187. client_patterns(no_state_key, v1=True),
  188. self.on_GET_no_state_key,
  189. self.__class__.__name__,
  190. )
  191. http_server.register_paths(
  192. "PUT",
  193. client_patterns(no_state_key, v1=True),
  194. self.on_PUT_no_state_key,
  195. self.__class__.__name__,
  196. )
  197. @cancellable
  198. def on_GET_no_state_key(
  199. self, request: SynapseRequest, room_id: str, event_type: str
  200. ) -> Awaitable[Tuple[int, JsonDict]]:
  201. return self.on_GET(request, room_id, event_type, "")
  202. def on_PUT_no_state_key(
  203. self, request: SynapseRequest, room_id: str, event_type: str
  204. ) -> Awaitable[Tuple[int, JsonDict]]:
  205. return self.on_PUT(request, room_id, event_type, "")
  206. @cancellable
  207. async def on_GET(
  208. self, request: SynapseRequest, room_id: str, event_type: str, state_key: str
  209. ) -> Tuple[int, JsonDict]:
  210. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  211. format = parse_string(
  212. request, "format", default="content", allowed_values=["content", "event"]
  213. )
  214. msg_handler = self.message_handler
  215. data = await msg_handler.get_room_data(
  216. requester=requester,
  217. room_id=room_id,
  218. event_type=event_type,
  219. state_key=state_key,
  220. )
  221. if not data:
  222. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  223. if format == "event":
  224. event = format_event_for_client_v2(data.get_dict())
  225. return 200, event
  226. elif format == "content":
  227. return 200, data.get_dict()["content"]
  228. # Format must be event or content, per the parse_string call above.
  229. raise RuntimeError(f"Unknown format: {format:r}.")
  230. async def on_PUT(
  231. self,
  232. request: SynapseRequest,
  233. room_id: str,
  234. event_type: str,
  235. state_key: str,
  236. txn_id: Optional[str] = None,
  237. ) -> Tuple[int, JsonDict]:
  238. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  239. if txn_id:
  240. set_tag("txn_id", txn_id)
  241. content = parse_json_object_from_request(request)
  242. origin_server_ts = None
  243. if requester.app_service:
  244. origin_server_ts = parse_integer(request, "ts")
  245. try:
  246. if event_type == EventTypes.Member:
  247. membership = content.get("membership", None)
  248. event_id, _ = await self.room_member_handler.update_membership(
  249. requester,
  250. target=UserID.from_string(state_key),
  251. room_id=room_id,
  252. action=membership,
  253. content=content,
  254. origin_server_ts=origin_server_ts,
  255. )
  256. else:
  257. event_dict: JsonDict = {
  258. "type": event_type,
  259. "content": content,
  260. "room_id": room_id,
  261. "sender": requester.user.to_string(),
  262. }
  263. if state_key is not None:
  264. event_dict["state_key"] = state_key
  265. if origin_server_ts is not None:
  266. event_dict["origin_server_ts"] = origin_server_ts
  267. (
  268. event,
  269. _,
  270. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  271. requester, event_dict, txn_id=txn_id
  272. )
  273. event_id = event.event_id
  274. except ShadowBanError:
  275. event_id = "$" + random_string(43)
  276. set_tag("event_id", event_id)
  277. ret = {"event_id": event_id}
  278. return 200, ret
  279. # TODO: Needs unit testing for generic events + feedback
  280. class RoomSendEventRestServlet(TransactionRestServlet):
  281. CATEGORY = "Event sending requests"
  282. def __init__(self, hs: "HomeServer"):
  283. super().__init__(hs)
  284. self.event_creation_handler = hs.get_event_creation_handler()
  285. self.auth = hs.get_auth()
  286. def register(self, http_server: HttpServer) -> None:
  287. # /rooms/$roomid/send/$event_type[/$txn_id]
  288. PATTERNS = "/rooms/(?P<room_id>[^/]*)/send/(?P<event_type>[^/]*)"
  289. register_txn_path(self, PATTERNS, http_server)
  290. async def _do(
  291. self,
  292. request: SynapseRequest,
  293. requester: Requester,
  294. room_id: str,
  295. event_type: str,
  296. txn_id: Optional[str],
  297. ) -> Tuple[int, JsonDict]:
  298. content = parse_json_object_from_request(request)
  299. event_dict: JsonDict = {
  300. "type": event_type,
  301. "content": content,
  302. "room_id": room_id,
  303. "sender": requester.user.to_string(),
  304. }
  305. if requester.app_service:
  306. origin_server_ts = parse_integer(request, "ts")
  307. if origin_server_ts is not None:
  308. event_dict["origin_server_ts"] = origin_server_ts
  309. try:
  310. (
  311. event,
  312. _,
  313. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  314. requester, event_dict, txn_id=txn_id
  315. )
  316. event_id = event.event_id
  317. except ShadowBanError:
  318. event_id = "$" + random_string(43)
  319. set_tag("event_id", event_id)
  320. return 200, {"event_id": event_id}
  321. async def on_POST(
  322. self,
  323. request: SynapseRequest,
  324. room_id: str,
  325. event_type: str,
  326. ) -> Tuple[int, JsonDict]:
  327. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  328. return await self._do(request, requester, room_id, event_type, None)
  329. async def on_PUT(
  330. self, request: SynapseRequest, room_id: str, event_type: str, txn_id: str
  331. ) -> Tuple[int, JsonDict]:
  332. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  333. set_tag("txn_id", txn_id)
  334. return await self.txns.fetch_or_execute_request(
  335. request,
  336. requester,
  337. self._do,
  338. request,
  339. requester,
  340. room_id,
  341. event_type,
  342. txn_id,
  343. )
  344. # TODO: Needs unit testing for room ID + alias joins
  345. class JoinRoomAliasServlet(ResolveRoomIdMixin, TransactionRestServlet):
  346. CATEGORY = "Event sending requests"
  347. def __init__(self, hs: "HomeServer"):
  348. super().__init__(hs)
  349. super(ResolveRoomIdMixin, self).__init__(hs) # ensure the Mixin is set up
  350. self.auth = hs.get_auth()
  351. def register(self, http_server: HttpServer) -> None:
  352. # /join/$room_identifier[/$txn_id]
  353. PATTERNS = "/join/(?P<room_identifier>[^/]*)"
  354. register_txn_path(self, PATTERNS, http_server)
  355. async def _do(
  356. self,
  357. request: SynapseRequest,
  358. requester: Requester,
  359. room_identifier: str,
  360. txn_id: Optional[str],
  361. ) -> Tuple[int, JsonDict]:
  362. content = parse_json_object_from_request(request, allow_empty_body=True)
  363. # twisted.web.server.Request.args is incorrectly defined as Optional[Any]
  364. args: Dict[bytes, List[bytes]] = request.args # type: ignore
  365. remote_room_hosts = parse_strings_from_args(args, "server_name", required=False)
  366. room_id, remote_room_hosts = await self.resolve_room_id(
  367. room_identifier,
  368. remote_room_hosts,
  369. )
  370. await self.room_member_handler.update_membership(
  371. requester=requester,
  372. target=requester.user,
  373. room_id=room_id,
  374. action="join",
  375. txn_id=txn_id,
  376. remote_room_hosts=remote_room_hosts,
  377. content=content,
  378. third_party_signed=content.get("third_party_signed", None),
  379. )
  380. return 200, {"room_id": room_id}
  381. async def on_POST(
  382. self,
  383. request: SynapseRequest,
  384. room_identifier: str,
  385. ) -> Tuple[int, JsonDict]:
  386. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  387. return await self._do(request, requester, room_identifier, None)
  388. async def on_PUT(
  389. self, request: SynapseRequest, room_identifier: str, txn_id: str
  390. ) -> Tuple[int, JsonDict]:
  391. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  392. set_tag("txn_id", txn_id)
  393. return await self.txns.fetch_or_execute_request(
  394. request, requester, self._do, request, requester, room_identifier, txn_id
  395. )
  396. # TODO: Needs unit testing
  397. class PublicRoomListRestServlet(RestServlet):
  398. PATTERNS = client_patterns("/publicRooms$", v1=True)
  399. CATEGORY = "Client API requests"
  400. def __init__(self, hs: "HomeServer"):
  401. super().__init__()
  402. self.hs = hs
  403. self.auth = hs.get_auth()
  404. async def on_GET(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
  405. server = parse_string(request, "server")
  406. try:
  407. await self.auth.get_user_by_req(request, allow_guest=True)
  408. except InvalidClientCredentialsError as e:
  409. # Option to allow servers to require auth when accessing
  410. # /publicRooms via CS API. This is especially helpful in private
  411. # federations.
  412. if not self.hs.config.server.allow_public_rooms_without_auth:
  413. raise
  414. # We allow people to not be authed if they're just looking at our
  415. # room list, but require auth when we proxy the request.
  416. # In both cases we call the auth function, as that has the side
  417. # effect of logging who issued this request if an access token was
  418. # provided.
  419. if server:
  420. raise e
  421. limit: Optional[int] = parse_integer(request, "limit", 0)
  422. since_token = parse_string(request, "since")
  423. if limit == 0:
  424. # zero is a special value which corresponds to no limit.
  425. limit = None
  426. handler = self.hs.get_room_list_handler()
  427. if server and not self.hs.is_mine_server_name(server):
  428. # Ensure the server is valid.
  429. try:
  430. parse_and_validate_server_name(server)
  431. except ValueError:
  432. raise SynapseError(
  433. 400,
  434. "Invalid server name: %s" % (server,),
  435. Codes.INVALID_PARAM,
  436. )
  437. data = await handler.get_remote_public_room_list(
  438. server, limit=limit, since_token=since_token
  439. )
  440. else:
  441. data = await handler.get_local_public_room_list(
  442. limit=limit, since_token=since_token
  443. )
  444. return 200, data
  445. async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
  446. await self.auth.get_user_by_req(request, allow_guest=True)
  447. server = parse_string(request, "server")
  448. content = parse_json_object_from_request(request)
  449. limit: Optional[int] = int(content.get("limit", 100))
  450. since_token = content.get("since", None)
  451. search_filter = content.get("filter", None)
  452. include_all_networks = content.get("include_all_networks", False)
  453. third_party_instance_id = content.get("third_party_instance_id", None)
  454. if include_all_networks:
  455. network_tuple = None
  456. if third_party_instance_id is not None:
  457. raise SynapseError(
  458. 400, "Can't use include_all_networks with an explicit network"
  459. )
  460. elif third_party_instance_id is None:
  461. network_tuple = ThirdPartyInstanceID(None, None)
  462. else:
  463. network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
  464. if limit == 0:
  465. # zero is a special value which corresponds to no limit.
  466. limit = None
  467. handler = self.hs.get_room_list_handler()
  468. if server and not self.hs.is_mine_server_name(server):
  469. # Ensure the server is valid.
  470. try:
  471. parse_and_validate_server_name(server)
  472. except ValueError:
  473. raise SynapseError(
  474. 400,
  475. "Invalid server name: %s" % (server,),
  476. Codes.INVALID_PARAM,
  477. )
  478. data = await handler.get_remote_public_room_list(
  479. server,
  480. limit=limit,
  481. since_token=since_token,
  482. search_filter=search_filter,
  483. include_all_networks=include_all_networks,
  484. third_party_instance_id=third_party_instance_id,
  485. )
  486. else:
  487. data = await handler.get_local_public_room_list(
  488. limit=limit,
  489. since_token=since_token,
  490. search_filter=search_filter,
  491. network_tuple=network_tuple,
  492. )
  493. return 200, data
  494. # TODO: Needs unit testing
  495. class RoomMemberListRestServlet(RestServlet):
  496. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/members$", v1=True)
  497. CATEGORY = "Client API requests"
  498. def __init__(self, hs: "HomeServer"):
  499. super().__init__()
  500. self.message_handler = hs.get_message_handler()
  501. self.auth = hs.get_auth()
  502. self.store = hs.get_datastores().main
  503. @cancellable
  504. async def on_GET(
  505. self, request: SynapseRequest, room_id: str
  506. ) -> Tuple[int, JsonDict]:
  507. # TODO support Pagination stream API (limit/tokens)
  508. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  509. handler = self.message_handler
  510. # request the state as of a given event, as identified by a stream token,
  511. # for consistency with /messages etc.
  512. # useful for getting the membership in retrospect as of a given /sync
  513. # response.
  514. at_token_string = parse_string(request, "at")
  515. if at_token_string is None:
  516. at_token = None
  517. else:
  518. at_token = await StreamToken.from_string(self.store, at_token_string)
  519. # let you filter down on particular memberships.
  520. # XXX: this may not be the best shape for this API - we could pass in a filter
  521. # instead, except filters aren't currently aware of memberships.
  522. # See https://github.com/matrix-org/matrix-doc/issues/1337 for more details.
  523. membership = parse_string(request, "membership")
  524. not_membership = parse_string(request, "not_membership")
  525. events = await handler.get_state_events(
  526. room_id=room_id,
  527. requester=requester,
  528. at_token=at_token,
  529. state_filter=StateFilter.from_types([(EventTypes.Member, None)]),
  530. )
  531. chunk = []
  532. for event in events:
  533. if (membership and event["content"].get("membership") != membership) or (
  534. not_membership and event["content"].get("membership") == not_membership
  535. ):
  536. continue
  537. chunk.append(event)
  538. return 200, {"chunk": chunk}
  539. # deprecated in favour of /members?membership=join?
  540. # except it does custom AS logic and has a simpler return format
  541. class JoinedRoomMemberListRestServlet(RestServlet):
  542. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/joined_members$", v1=True)
  543. CATEGORY = "Client API requests"
  544. def __init__(self, hs: "HomeServer"):
  545. super().__init__()
  546. self.message_handler = hs.get_message_handler()
  547. self.auth = hs.get_auth()
  548. async def on_GET(
  549. self, request: SynapseRequest, room_id: str
  550. ) -> Tuple[int, JsonDict]:
  551. requester = await self.auth.get_user_by_req(request)
  552. users_with_profile = await self.message_handler.get_joined_members(
  553. requester, room_id
  554. )
  555. return 200, {"joined": users_with_profile}
  556. # TODO: Needs better unit testing
  557. class RoomMessageListRestServlet(RestServlet):
  558. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/messages$", v1=True)
  559. # TODO The routing information should be exposed programatically.
  560. # I want to do this but for now I felt bad about leaving this without
  561. # at least a visible warning on it.
  562. CATEGORY = "Client API requests (ALL FOR SAME ROOM MUST GO TO SAME WORKER)"
  563. def __init__(self, hs: "HomeServer"):
  564. super().__init__()
  565. self._hs = hs
  566. self.clock = hs.get_clock()
  567. self.pagination_handler = hs.get_pagination_handler()
  568. self.auth = hs.get_auth()
  569. self.store = hs.get_datastores().main
  570. async def on_GET(
  571. self, request: SynapseRequest, room_id: str
  572. ) -> Tuple[int, JsonDict]:
  573. processing_start_time = self.clock.time_msec()
  574. # Fire off and hope that we get a result by the end.
  575. #
  576. # We're using the mypy type ignore comment because the `@cached`
  577. # decorator on `get_number_joined_users_in_room` doesn't play well with
  578. # the type system. Maybe in the future, it can use some ParamSpec
  579. # wizardry to fix it up.
  580. room_member_count_deferred = run_in_background( # type: ignore[call-arg]
  581. self.store.get_number_joined_users_in_room,
  582. room_id, # type: ignore[arg-type]
  583. )
  584. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  585. pagination_config = await PaginationConfig.from_request(
  586. self.store, request, default_limit=10
  587. )
  588. # Twisted will have processed the args by now.
  589. assert request.args is not None
  590. as_client_event = b"raw" not in request.args
  591. filter_str = parse_string(request, "filter", encoding="utf-8")
  592. if filter_str:
  593. filter_json = urlparse.unquote(filter_str)
  594. event_filter: Optional[Filter] = Filter(
  595. self._hs, json_decoder.decode(filter_json)
  596. )
  597. if (
  598. event_filter
  599. and event_filter.filter_json.get("event_format", "client")
  600. == "federation"
  601. ):
  602. as_client_event = False
  603. else:
  604. event_filter = None
  605. msgs = await self.pagination_handler.get_messages(
  606. room_id=room_id,
  607. requester=requester,
  608. pagin_config=pagination_config,
  609. as_client_event=as_client_event,
  610. event_filter=event_filter,
  611. )
  612. processing_end_time = self.clock.time_msec()
  613. room_member_count = await make_deferred_yieldable(room_member_count_deferred)
  614. messsages_response_timer.labels(
  615. room_size=_RoomSize.from_member_count(room_member_count)
  616. ).observe((processing_end_time - processing_start_time) / 1000)
  617. return 200, msgs
  618. # TODO: Needs unit testing
  619. class RoomStateRestServlet(RestServlet):
  620. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/state$", v1=True)
  621. CATEGORY = "Client API requests"
  622. def __init__(self, hs: "HomeServer"):
  623. super().__init__()
  624. self.message_handler = hs.get_message_handler()
  625. self.auth = hs.get_auth()
  626. @cancellable
  627. async def on_GET(
  628. self, request: SynapseRequest, room_id: str
  629. ) -> Tuple[int, List[JsonDict]]:
  630. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  631. # Get all the current state for this room
  632. events = await self.message_handler.get_state_events(
  633. room_id=room_id,
  634. requester=requester,
  635. )
  636. return 200, events
  637. # TODO: Needs unit testing
  638. class RoomInitialSyncRestServlet(RestServlet):
  639. PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/initialSync$", v1=True)
  640. CATEGORY = "Sync requests"
  641. def __init__(self, hs: "HomeServer"):
  642. super().__init__()
  643. self.initial_sync_handler = hs.get_initial_sync_handler()
  644. self.auth = hs.get_auth()
  645. self.store = hs.get_datastores().main
  646. async def on_GET(
  647. self, request: SynapseRequest, room_id: str
  648. ) -> Tuple[int, JsonDict]:
  649. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  650. pagination_config = await PaginationConfig.from_request(
  651. self.store, request, default_limit=10
  652. )
  653. content = await self.initial_sync_handler.room_initial_sync(
  654. room_id=room_id, requester=requester, pagin_config=pagination_config
  655. )
  656. return 200, content
  657. class RoomEventServlet(RestServlet):
  658. PATTERNS = client_patterns(
  659. "/rooms/(?P<room_id>[^/]*)/event/(?P<event_id>[^/]*)$", v1=True
  660. )
  661. CATEGORY = "Client API requests"
  662. def __init__(self, hs: "HomeServer"):
  663. super().__init__()
  664. self.clock = hs.get_clock()
  665. self._store = hs.get_datastores().main
  666. self._state = hs.get_state_handler()
  667. self._storage_controllers = hs.get_storage_controllers()
  668. self.event_handler = hs.get_event_handler()
  669. self._event_serializer = hs.get_event_client_serializer()
  670. self._relations_handler = hs.get_relations_handler()
  671. self.auth = hs.get_auth()
  672. self.content_keep_ms = hs.config.server.redaction_retention_period
  673. self.msc2815_enabled = hs.config.experimental.msc2815_enabled
  674. async def on_GET(
  675. self, request: SynapseRequest, room_id: str, event_id: str
  676. ) -> Tuple[int, JsonDict]:
  677. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  678. include_unredacted_content = self.msc2815_enabled and (
  679. parse_string(
  680. request,
  681. "fi.mau.msc2815.include_unredacted_content",
  682. allowed_values=("true", "false"),
  683. )
  684. == "true"
  685. )
  686. if include_unredacted_content and not await self.auth.is_server_admin(
  687. requester
  688. ):
  689. power_level_event = (
  690. await self._storage_controllers.state.get_current_state_event(
  691. room_id, EventTypes.PowerLevels, ""
  692. )
  693. )
  694. auth_events = {}
  695. if power_level_event:
  696. auth_events[(EventTypes.PowerLevels, "")] = power_level_event
  697. redact_level = event_auth.get_named_level(auth_events, "redact", 50)
  698. user_level = event_auth.get_user_power_level(
  699. requester.user.to_string(), auth_events
  700. )
  701. if user_level < redact_level:
  702. raise SynapseError(
  703. 403,
  704. "You don't have permission to view redacted events in this room.",
  705. errcode=Codes.FORBIDDEN,
  706. )
  707. try:
  708. event = await self.event_handler.get_event(
  709. requester.user,
  710. room_id,
  711. event_id,
  712. show_redacted=include_unredacted_content,
  713. )
  714. except AuthError:
  715. # This endpoint is supposed to return a 404 when the requester does
  716. # not have permission to access the event
  717. # https://matrix.org/docs/spec/client_server/r0.5.0#get-matrix-client-r0-rooms-roomid-event-eventid
  718. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  719. if event:
  720. if include_unredacted_content and await self._store.have_censored_event(
  721. event_id
  722. ):
  723. raise UnredactedContentDeletedError(self.content_keep_ms)
  724. # Ensure there are bundled aggregations available.
  725. aggregations = await self._relations_handler.get_bundled_aggregations(
  726. [event], requester.user.to_string()
  727. )
  728. # per MSC2676, /rooms/{roomId}/event/{eventId}, should return the
  729. # *original* event, rather than the edited version
  730. event_dict = await self._event_serializer.serialize_event(
  731. event,
  732. self.clock.time_msec(),
  733. bundle_aggregations=aggregations,
  734. config=SerializeEventConfig(requester=requester),
  735. )
  736. return 200, event_dict
  737. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  738. class RoomEventContextServlet(RestServlet):
  739. PATTERNS = client_patterns(
  740. "/rooms/(?P<room_id>[^/]*)/context/(?P<event_id>[^/]*)$", v1=True
  741. )
  742. CATEGORY = "Client API requests"
  743. def __init__(self, hs: "HomeServer"):
  744. super().__init__()
  745. self._hs = hs
  746. self.clock = hs.get_clock()
  747. self.room_context_handler = hs.get_room_context_handler()
  748. self._event_serializer = hs.get_event_client_serializer()
  749. self.auth = hs.get_auth()
  750. async def on_GET(
  751. self, request: SynapseRequest, room_id: str, event_id: str
  752. ) -> Tuple[int, JsonDict]:
  753. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  754. limit = parse_integer(request, "limit", default=10)
  755. # picking the API shape for symmetry with /messages
  756. filter_str = parse_string(request, "filter", encoding="utf-8")
  757. if filter_str:
  758. filter_json = urlparse.unquote(filter_str)
  759. event_filter: Optional[Filter] = Filter(
  760. self._hs, json_decoder.decode(filter_json)
  761. )
  762. else:
  763. event_filter = None
  764. event_context = await self.room_context_handler.get_event_context(
  765. requester, room_id, event_id, limit, event_filter
  766. )
  767. if not event_context:
  768. raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
  769. time_now = self.clock.time_msec()
  770. serializer_options = SerializeEventConfig(requester=requester)
  771. results = {
  772. "events_before": await self._event_serializer.serialize_events(
  773. event_context.events_before,
  774. time_now,
  775. bundle_aggregations=event_context.aggregations,
  776. config=serializer_options,
  777. ),
  778. "event": await self._event_serializer.serialize_event(
  779. event_context.event,
  780. time_now,
  781. bundle_aggregations=event_context.aggregations,
  782. config=serializer_options,
  783. ),
  784. "events_after": await self._event_serializer.serialize_events(
  785. event_context.events_after,
  786. time_now,
  787. bundle_aggregations=event_context.aggregations,
  788. config=serializer_options,
  789. ),
  790. "state": await self._event_serializer.serialize_events(
  791. event_context.state,
  792. time_now,
  793. config=serializer_options,
  794. ),
  795. "start": event_context.start,
  796. "end": event_context.end,
  797. }
  798. return 200, results
  799. class RoomForgetRestServlet(TransactionRestServlet):
  800. def __init__(self, hs: "HomeServer"):
  801. super().__init__(hs)
  802. self.room_member_handler = hs.get_room_member_handler()
  803. self.auth = hs.get_auth()
  804. def register(self, http_server: HttpServer) -> None:
  805. PATTERNS = "/rooms/(?P<room_id>[^/]*)/forget"
  806. register_txn_path(self, PATTERNS, http_server)
  807. async def _do(self, requester: Requester, room_id: str) -> Tuple[int, JsonDict]:
  808. await self.room_member_handler.forget(user=requester.user, room_id=room_id)
  809. return 200, {}
  810. async def on_POST(
  811. self, request: SynapseRequest, room_id: str
  812. ) -> Tuple[int, JsonDict]:
  813. requester = await self.auth.get_user_by_req(request, allow_guest=False)
  814. return await self._do(requester, room_id)
  815. async def on_PUT(
  816. self, request: SynapseRequest, room_id: str, txn_id: str
  817. ) -> Tuple[int, JsonDict]:
  818. requester = await self.auth.get_user_by_req(request, allow_guest=False)
  819. set_tag("txn_id", txn_id)
  820. return await self.txns.fetch_or_execute_request(
  821. request, requester, self._do, requester, room_id
  822. )
  823. # TODO: Needs unit testing
  824. class RoomMembershipRestServlet(TransactionRestServlet):
  825. CATEGORY = "Event sending requests"
  826. def __init__(self, hs: "HomeServer"):
  827. super().__init__(hs)
  828. self.room_member_handler = hs.get_room_member_handler()
  829. self.auth = hs.get_auth()
  830. def register(self, http_server: HttpServer) -> None:
  831. # /rooms/$roomid/[join|invite|leave|ban|unban|kick]
  832. PATTERNS = (
  833. "/rooms/(?P<room_id>[^/]*)/"
  834. "(?P<membership_action>join|invite|leave|ban|unban|kick)"
  835. )
  836. register_txn_path(self, PATTERNS, http_server)
  837. async def _do(
  838. self,
  839. request: SynapseRequest,
  840. requester: Requester,
  841. room_id: str,
  842. membership_action: str,
  843. txn_id: Optional[str],
  844. ) -> Tuple[int, JsonDict]:
  845. if requester.is_guest and membership_action not in {
  846. Membership.JOIN,
  847. Membership.LEAVE,
  848. }:
  849. raise AuthError(403, "Guest access not allowed")
  850. content = parse_json_object_from_request(request, allow_empty_body=True)
  851. if membership_action == "invite" and all(
  852. key in content for key in ("medium", "address")
  853. ):
  854. if not all(key in content for key in ("id_server", "id_access_token")):
  855. raise SynapseError(
  856. HTTPStatus.BAD_REQUEST,
  857. "`id_server` and `id_access_token` are required when doing 3pid invite",
  858. Codes.MISSING_PARAM,
  859. )
  860. try:
  861. await self.room_member_handler.do_3pid_invite(
  862. room_id,
  863. requester.user,
  864. content["medium"],
  865. content["address"],
  866. content["id_server"],
  867. requester,
  868. txn_id,
  869. content["id_access_token"],
  870. )
  871. except ShadowBanError:
  872. # Pretend the request succeeded.
  873. pass
  874. return 200, {}
  875. target = requester.user
  876. if membership_action in ["invite", "ban", "unban", "kick"]:
  877. assert_params_in_dict(content, ["user_id"])
  878. target = UserID.from_string(content["user_id"])
  879. event_content = None
  880. if "reason" in content:
  881. event_content = {"reason": content["reason"]}
  882. try:
  883. await self.room_member_handler.update_membership(
  884. requester=requester,
  885. target=target,
  886. room_id=room_id,
  887. action=membership_action,
  888. txn_id=txn_id,
  889. third_party_signed=content.get("third_party_signed", None),
  890. content=event_content,
  891. )
  892. except ShadowBanError:
  893. # Pretend the request succeeded.
  894. pass
  895. return_value = {}
  896. if membership_action == "join":
  897. return_value["room_id"] = room_id
  898. return 200, return_value
  899. async def on_POST(
  900. self,
  901. request: SynapseRequest,
  902. room_id: str,
  903. membership_action: str,
  904. ) -> Tuple[int, JsonDict]:
  905. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  906. return await self._do(request, requester, room_id, membership_action, None)
  907. async def on_PUT(
  908. self, request: SynapseRequest, room_id: str, membership_action: str, txn_id: str
  909. ) -> Tuple[int, JsonDict]:
  910. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  911. set_tag("txn_id", txn_id)
  912. return await self.txns.fetch_or_execute_request(
  913. request,
  914. requester,
  915. self._do,
  916. request,
  917. requester,
  918. room_id,
  919. membership_action,
  920. txn_id,
  921. )
  922. class RoomRedactEventRestServlet(TransactionRestServlet):
  923. CATEGORY = "Event sending requests"
  924. def __init__(self, hs: "HomeServer"):
  925. super().__init__(hs)
  926. self.event_creation_handler = hs.get_event_creation_handler()
  927. self.auth = hs.get_auth()
  928. self._store = hs.get_datastores().main
  929. self._relation_handler = hs.get_relations_handler()
  930. self._msc3912_enabled = hs.config.experimental.msc3912_enabled
  931. def register(self, http_server: HttpServer) -> None:
  932. PATTERNS = "/rooms/(?P<room_id>[^/]*)/redact/(?P<event_id>[^/]*)"
  933. register_txn_path(self, PATTERNS, http_server)
  934. async def _do(
  935. self,
  936. request: SynapseRequest,
  937. requester: Requester,
  938. room_id: str,
  939. event_id: str,
  940. txn_id: Optional[str],
  941. ) -> Tuple[int, JsonDict]:
  942. content = parse_json_object_from_request(request)
  943. # Ensure the redacts property in the content matches the one provided in
  944. # the URL.
  945. room_version = await self._store.get_room_version(room_id)
  946. if room_version.updated_redaction_rules:
  947. if "redacts" in content and content["redacts"] != event_id:
  948. raise SynapseError(
  949. 400,
  950. "Cannot provide a redacts value incoherent with the event_id of the URL parameter",
  951. Codes.INVALID_PARAM,
  952. )
  953. else:
  954. content["redacts"] = event_id
  955. try:
  956. with_relations = None
  957. if self._msc3912_enabled and "org.matrix.msc3912.with_relations" in content:
  958. with_relations = content["org.matrix.msc3912.with_relations"]
  959. del content["org.matrix.msc3912.with_relations"]
  960. # Check if there's an existing event for this transaction now (even though
  961. # create_and_send_nonmember_event also does it) because, if there's one,
  962. # then we want to skip the call to redact_events_related_to.
  963. event = None
  964. if txn_id:
  965. event = await self.event_creation_handler.get_event_from_transaction(
  966. requester, txn_id, room_id
  967. )
  968. # Event is not yet redacted, create a new event to redact it.
  969. if event is None:
  970. event_dict = {
  971. "type": EventTypes.Redaction,
  972. "content": content,
  973. "room_id": room_id,
  974. "sender": requester.user.to_string(),
  975. }
  976. # Earlier room versions had a top-level redacts property.
  977. if not room_version.updated_redaction_rules:
  978. event_dict["redacts"] = event_id
  979. (
  980. event,
  981. _,
  982. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  983. requester, event_dict, txn_id=txn_id
  984. )
  985. if with_relations:
  986. run_as_background_process(
  987. "redact_related_events",
  988. self._relation_handler.redact_events_related_to,
  989. requester=requester,
  990. event_id=event_id,
  991. initial_redaction_event=event,
  992. relation_types=with_relations,
  993. )
  994. event_id = event.event_id
  995. except ShadowBanError:
  996. event_id = "$" + random_string(43)
  997. set_tag("event_id", event_id)
  998. return 200, {"event_id": event_id}
  999. async def on_POST(
  1000. self,
  1001. request: SynapseRequest,
  1002. room_id: str,
  1003. event_id: str,
  1004. ) -> Tuple[int, JsonDict]:
  1005. requester = await self.auth.get_user_by_req(request)
  1006. return await self._do(request, requester, room_id, event_id, None)
  1007. async def on_PUT(
  1008. self, request: SynapseRequest, room_id: str, event_id: str, txn_id: str
  1009. ) -> Tuple[int, JsonDict]:
  1010. requester = await self.auth.get_user_by_req(request)
  1011. set_tag("txn_id", txn_id)
  1012. return await self.txns.fetch_or_execute_request(
  1013. request, requester, self._do, request, requester, room_id, event_id, txn_id
  1014. )
  1015. class RoomTypingRestServlet(RestServlet):
  1016. PATTERNS = client_patterns(
  1017. "/rooms/(?P<room_id>[^/]*)/typing/(?P<user_id>[^/]*)$", v1=True
  1018. )
  1019. CATEGORY = "The typing stream"
  1020. def __init__(self, hs: "HomeServer"):
  1021. super().__init__()
  1022. self.hs = hs
  1023. self.presence_handler = hs.get_presence_handler()
  1024. self.auth = hs.get_auth()
  1025. # If we're not on the typing writer instance we should scream if we get
  1026. # requests.
  1027. self._is_typing_writer = (
  1028. hs.get_instance_name() in hs.config.worker.writers.typing
  1029. )
  1030. async def on_PUT(
  1031. self, request: SynapseRequest, room_id: str, user_id: str
  1032. ) -> Tuple[int, JsonDict]:
  1033. requester = await self.auth.get_user_by_req(request)
  1034. if not self._is_typing_writer:
  1035. raise Exception("Got /typing request on instance that is not typing writer")
  1036. room_id = urlparse.unquote(room_id)
  1037. target_user = UserID.from_string(urlparse.unquote(user_id))
  1038. content = parse_json_object_from_request(request)
  1039. await self.presence_handler.bump_presence_active_time(
  1040. requester.user, requester.device_id
  1041. )
  1042. # Limit timeout to stop people from setting silly typing timeouts.
  1043. timeout = min(content.get("timeout", 30000), 120000)
  1044. # Defer getting the typing handler since it will raise on WORKER_PATTERNS.
  1045. typing_handler = self.hs.get_typing_writer_handler()
  1046. try:
  1047. if content["typing"]:
  1048. await typing_handler.started_typing(
  1049. target_user=target_user,
  1050. requester=requester,
  1051. room_id=room_id,
  1052. timeout=timeout,
  1053. )
  1054. else:
  1055. await typing_handler.stopped_typing(
  1056. target_user=target_user, requester=requester, room_id=room_id
  1057. )
  1058. except ShadowBanError:
  1059. # Pretend this worked without error.
  1060. pass
  1061. return 200, {}
  1062. class RoomAliasListServlet(RestServlet):
  1063. PATTERNS = [
  1064. re.compile(
  1065. r"^/_matrix/client/unstable/org\.matrix\.msc2432"
  1066. r"/rooms/(?P<room_id>[^/]*)/aliases"
  1067. ),
  1068. ] + list(client_patterns("/rooms/(?P<room_id>[^/]*)/aliases$", unstable=False))
  1069. CATEGORY = "Client API requests"
  1070. def __init__(self, hs: "HomeServer"):
  1071. super().__init__()
  1072. self.auth = hs.get_auth()
  1073. self.directory_handler = hs.get_directory_handler()
  1074. async def on_GET(
  1075. self, request: SynapseRequest, room_id: str
  1076. ) -> Tuple[int, JsonDict]:
  1077. requester = await self.auth.get_user_by_req(request)
  1078. alias_list = await self.directory_handler.get_aliases_for_room(
  1079. requester, room_id
  1080. )
  1081. return 200, {"aliases": alias_list}
  1082. class SearchRestServlet(RestServlet):
  1083. PATTERNS = client_patterns("/search$", v1=True)
  1084. CATEGORY = "Client API requests"
  1085. def __init__(self, hs: "HomeServer"):
  1086. super().__init__()
  1087. self.search_handler = hs.get_search_handler()
  1088. self.auth = hs.get_auth()
  1089. async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
  1090. requester = await self.auth.get_user_by_req(request)
  1091. content = parse_json_object_from_request(request)
  1092. batch = parse_string(request, "next_batch")
  1093. results = await self.search_handler.search(requester, content, batch)
  1094. return 200, results
  1095. class JoinedRoomsRestServlet(RestServlet):
  1096. PATTERNS = client_patterns("/joined_rooms$", v1=True)
  1097. CATEGORY = "Client API requests"
  1098. def __init__(self, hs: "HomeServer"):
  1099. super().__init__()
  1100. self.store = hs.get_datastores().main
  1101. self.auth = hs.get_auth()
  1102. async def on_GET(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
  1103. requester = await self.auth.get_user_by_req(request, allow_guest=True)
  1104. room_ids = await self.store.get_rooms_for_user(requester.user.to_string())
  1105. return 200, {"joined_rooms": list(room_ids)}
  1106. def register_txn_path(
  1107. servlet: RestServlet,
  1108. regex_string: str,
  1109. http_server: HttpServer,
  1110. ) -> None:
  1111. """Registers a transaction-based path.
  1112. This registers two paths:
  1113. PUT regex_string/$txnid
  1114. POST regex_string
  1115. Args:
  1116. regex_string: The regex string to register. Must NOT have a
  1117. trailing $ as this string will be appended to.
  1118. http_server: The http_server to register paths with.
  1119. """
  1120. on_POST = getattr(servlet, "on_POST", None)
  1121. on_PUT = getattr(servlet, "on_PUT", None)
  1122. if on_POST is None or on_PUT is None:
  1123. raise RuntimeError("on_POST and on_PUT must exist when using register_txn_path")
  1124. http_server.register_paths(
  1125. "POST",
  1126. client_patterns(regex_string + "$", v1=True),
  1127. on_POST,
  1128. servlet.__class__.__name__,
  1129. )
  1130. http_server.register_paths(
  1131. "PUT",
  1132. client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
  1133. on_PUT,
  1134. servlet.__class__.__name__,
  1135. )
  1136. class TimestampLookupRestServlet(RestServlet):
  1137. """
  1138. API endpoint to fetch the `event_id` of the closest event to the given
  1139. timestamp (`ts` query parameter) in the given direction (`dir` query
  1140. parameter).
  1141. Useful for cases like jump to date so you can start paginating messages from
  1142. a given date in the archive.
  1143. `ts` is a timestamp in milliseconds where we will find the closest event in
  1144. the given direction.
  1145. `dir` can be `f` or `b` to indicate forwards and backwards in time from the
  1146. given timestamp.
  1147. GET /_matrix/client/v1/rooms/<roomID>/timestamp_to_event?ts=<timestamp>&dir=<direction>
  1148. {
  1149. "event_id": ...
  1150. }
  1151. """
  1152. PATTERNS = (
  1153. re.compile("^/_matrix/client/v1/rooms/(?P<room_id>[^/]*)/timestamp_to_event$"),
  1154. )
  1155. CATEGORY = "Client API requests"
  1156. def __init__(self, hs: "HomeServer"):
  1157. super().__init__()
  1158. self._auth = hs.get_auth()
  1159. self._store = hs.get_datastores().main
  1160. self.timestamp_lookup_handler = hs.get_timestamp_lookup_handler()
  1161. async def on_GET(
  1162. self, request: SynapseRequest, room_id: str
  1163. ) -> Tuple[int, JsonDict]:
  1164. requester = await self._auth.get_user_by_req(request)
  1165. await self._auth.check_user_in_room_or_world_readable(room_id, requester)
  1166. timestamp = parse_integer(request, "ts", required=True)
  1167. direction = parse_enum(request, "dir", Direction, default=Direction.FORWARDS)
  1168. (
  1169. event_id,
  1170. origin_server_ts,
  1171. ) = await self.timestamp_lookup_handler.get_event_for_timestamp(
  1172. requester, room_id, timestamp, direction
  1173. )
  1174. return 200, {
  1175. "event_id": event_id,
  1176. "origin_server_ts": origin_server_ts,
  1177. }
  1178. class RoomHierarchyRestServlet(RestServlet):
  1179. PATTERNS = (re.compile("^/_matrix/client/v1/rooms/(?P<room_id>[^/]*)/hierarchy$"),)
  1180. WORKERS = PATTERNS
  1181. CATEGORY = "Client API requests"
  1182. def __init__(self, hs: "HomeServer"):
  1183. super().__init__()
  1184. self._auth = hs.get_auth()
  1185. self._room_summary_handler = hs.get_room_summary_handler()
  1186. async def on_GET(
  1187. self, request: SynapseRequest, room_id: str
  1188. ) -> Tuple[int, JsonDict]:
  1189. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  1190. max_depth = parse_integer(request, "max_depth")
  1191. if max_depth is not None and max_depth < 0:
  1192. raise SynapseError(
  1193. 400, "'max_depth' must be a non-negative integer", Codes.BAD_JSON
  1194. )
  1195. limit = parse_integer(request, "limit")
  1196. if limit is not None and limit <= 0:
  1197. raise SynapseError(
  1198. 400, "'limit' must be a positive integer", Codes.BAD_JSON
  1199. )
  1200. return 200, await self._room_summary_handler.get_room_hierarchy(
  1201. requester,
  1202. room_id,
  1203. suggested_only=parse_boolean(request, "suggested_only", default=False),
  1204. max_depth=max_depth,
  1205. limit=limit,
  1206. from_token=parse_string(request, "from"),
  1207. )
  1208. class RoomSummaryRestServlet(ResolveRoomIdMixin, RestServlet):
  1209. PATTERNS = (
  1210. re.compile(
  1211. "^/_matrix/client/unstable/im.nheko.summary"
  1212. "/rooms/(?P<room_identifier>[^/]*)/summary$"
  1213. ),
  1214. )
  1215. CATEGORY = "Client API requests"
  1216. def __init__(self, hs: "HomeServer"):
  1217. super().__init__(hs)
  1218. self._auth = hs.get_auth()
  1219. self._room_summary_handler = hs.get_room_summary_handler()
  1220. async def on_GET(
  1221. self, request: SynapseRequest, room_identifier: str
  1222. ) -> Tuple[int, JsonDict]:
  1223. try:
  1224. requester = await self._auth.get_user_by_req(request, allow_guest=True)
  1225. requester_user_id: Optional[str] = requester.user.to_string()
  1226. except MissingClientTokenError:
  1227. # auth is optional
  1228. requester_user_id = None
  1229. # twisted.web.server.Request.args is incorrectly defined as Optional[Any]
  1230. args: Dict[bytes, List[bytes]] = request.args # type: ignore
  1231. remote_room_hosts = parse_strings_from_args(args, "via", required=False)
  1232. room_id, remote_room_hosts = await self.resolve_room_id(
  1233. room_identifier,
  1234. remote_room_hosts,
  1235. )
  1236. return 200, await self._room_summary_handler.get_room_summary(
  1237. requester_user_id,
  1238. room_id,
  1239. remote_room_hosts,
  1240. )
  1241. def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
  1242. RoomStateEventRestServlet(hs).register(http_server)
  1243. RoomMemberListRestServlet(hs).register(http_server)
  1244. JoinedRoomMemberListRestServlet(hs).register(http_server)
  1245. RoomMessageListRestServlet(hs).register(http_server)
  1246. JoinRoomAliasServlet(hs).register(http_server)
  1247. RoomMembershipRestServlet(hs).register(http_server)
  1248. RoomSendEventRestServlet(hs).register(http_server)
  1249. PublicRoomListRestServlet(hs).register(http_server)
  1250. RoomStateRestServlet(hs).register(http_server)
  1251. RoomRedactEventRestServlet(hs).register(http_server)
  1252. RoomTypingRestServlet(hs).register(http_server)
  1253. RoomEventContextServlet(hs).register(http_server)
  1254. RoomHierarchyRestServlet(hs).register(http_server)
  1255. if hs.config.experimental.msc3266_enabled:
  1256. RoomSummaryRestServlet(hs).register(http_server)
  1257. RoomEventServlet(hs).register(http_server)
  1258. JoinedRoomsRestServlet(hs).register(http_server)
  1259. RoomAliasListServlet(hs).register(http_server)
  1260. SearchRestServlet(hs).register(http_server)
  1261. RoomCreateRestServlet(hs).register(http_server)
  1262. TimestampLookupRestServlet(hs).register(http_server)
  1263. # Some servlets only get registered for the main process.
  1264. if hs.config.worker.worker_app is None:
  1265. RoomForgetRestServlet(hs).register(http_server)
  1266. def register_deprecated_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
  1267. RoomInitialSyncRestServlet(hs).register(http_server)