2014-08-12 08:10:52 -06:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-02-06 09:40:38 -07:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 08:10:52 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-12 20:14:34 -06:00
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
""" This module contains REST servlets to do with rooms: /rooms/<paths> """
|
2020-07-15 11:40:54 -06:00
|
|
|
|
2018-07-09 00:09:20 -06:00
|
|
|
import logging
|
2020-02-19 03:40:27 -07:00
|
|
|
import re
|
2020-01-20 10:38:21 -07:00
|
|
|
from typing import List, Optional
|
2020-06-16 06:51:47 -06:00
|
|
|
from urllib import parse as urlparse
|
2018-07-09 00:09:20 -06:00
|
|
|
|
2014-12-16 04:29:05 -07:00
|
|
|
from synapse.api.constants import EventTypes, Membership
|
2019-07-11 04:06:23 -06:00
|
|
|
from synapse.api.errors import (
|
|
|
|
AuthError,
|
|
|
|
Codes,
|
2020-04-06 05:35:30 -06:00
|
|
|
HttpResponseException,
|
2019-07-11 04:06:23 -06:00
|
|
|
InvalidClientCredentialsError,
|
2020-08-20 13:07:42 -06:00
|
|
|
ShadowBanError,
|
2019-07-11 04:06:23 -06:00
|
|
|
SynapseError,
|
|
|
|
)
|
2016-07-14 08:59:25 -06:00
|
|
|
from synapse.api.filtering import Filter
|
2019-05-09 06:21:57 -06:00
|
|
|
from synapse.events.utils import format_event_for_client_v2
|
2016-09-15 03:15:37 -06:00
|
|
|
from synapse.http.servlet import (
|
2019-06-03 05:28:59 -06:00
|
|
|
RestServlet,
|
2018-07-13 13:53:01 -06:00
|
|
|
assert_params_in_dict,
|
2018-07-09 00:09:20 -06:00
|
|
|
parse_integer,
|
|
|
|
parse_json_object_from_request,
|
|
|
|
parse_string,
|
2016-09-15 03:15:37 -06:00
|
|
|
)
|
2019-09-25 04:59:05 -06:00
|
|
|
from synapse.logging.opentracing import set_tag
|
2019-06-03 05:28:59 -06:00
|
|
|
from synapse.rest.client.transactions import HttpTransactionCache
|
|
|
|
from synapse.rest.client.v2_alpha._base import client_patterns
|
2018-10-25 10:49:55 -06:00
|
|
|
from synapse.storage.state import StateFilter
|
2018-07-09 00:09:20 -06:00
|
|
|
from synapse.streams.config import PaginationConfig
|
2018-08-15 09:35:22 -06:00
|
|
|
from synapse.types import RoomAlias, RoomID, StreamToken, ThirdPartyInstanceID, UserID
|
2020-08-19 05:26:03 -06:00
|
|
|
from synapse.util import json_decoder
|
2020-08-20 13:07:42 -06:00
|
|
|
from synapse.util.stringutils import random_string
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2020-02-18 09:23:25 -07:00
|
|
|
MYPY = False
|
|
|
|
if MYPY:
|
|
|
|
import synapse.server
|
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class TransactionRestServlet(RestServlet):
|
|
|
|
def __init__(self, hs):
|
|
|
|
super(TransactionRestServlet, self).__init__()
|
|
|
|
self.txns = HttpTransactionCache(hs)
|
|
|
|
|
|
|
|
|
|
|
|
class RoomCreateRestServlet(TransactionRestServlet):
|
2014-08-12 08:10:52 -06:00
|
|
|
# No PATTERN; we have custom dispatch rules here
|
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomCreateRestServlet, self).__init__(hs)
|
2018-05-17 02:01:09 -06:00
|
|
|
self._room_creation_handler = hs.get_room_creation_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
def register(self, http_server):
|
2015-12-01 10:34:32 -07:00
|
|
|
PATTERNS = "/createRoom"
|
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-12 08:10:52 -06:00
|
|
|
# define CORS for all of /rooms in RoomCreateRestServlet for simplicity
|
2019-06-20 03:32:02 -06:00
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"OPTIONS",
|
|
|
|
client_patterns("/rooms(?:/.*)?$", v1=True),
|
|
|
|
self.on_OPTIONS,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
2014-08-27 04:33:56 -06:00
|
|
|
# define CORS for /createRoom[/txnid]
|
2019-06-20 03:32:02 -06:00
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"OPTIONS",
|
|
|
|
client_patterns("/createRoom(?:/.*)?$", v1=True),
|
|
|
|
self.on_OPTIONS,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-27 04:33:56 -06:00
|
|
|
def on_PUT(self, request, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
2019-06-20 03:32:02 -06:00
|
|
|
return self.txns.fetch_or_execute_request(request, self.on_POST, request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2020-05-22 07:21:54 -06:00
|
|
|
info, _ = await self._room_creation_handler.create_room(
|
2016-02-15 11:13:10 -07:00
|
|
|
requester, self.get_room_config(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
)
|
2016-02-15 11:13:10 -07:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, info
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
def get_room_config(self, request):
|
2016-03-11 09:41:03 -07:00
|
|
|
user_supplied_config = parse_json_object_from_request(request)
|
|
|
|
return user_supplied_config
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
def on_OPTIONS(self, request):
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {}
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2014-08-26 10:54:18 -06:00
|
|
|
# TODO: Needs unit testing for generic events
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomStateEventRestServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomStateEventRestServlet, self).__init__(hs)
|
|
|
|
self.handlers = hs.get_handlers()
|
2019-01-18 08:27:11 -07:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2018-03-01 03:54:37 -07:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2018-07-18 08:22:02 -06:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2014-08-22 08:59:15 -06:00
|
|
|
def register(self, http_server):
|
|
|
|
# /room/$roomid/state/$eventtype
|
|
|
|
no_state_key = "/rooms/(?P<room_id>[^/]*)/state/(?P<event_type>[^/]*)$"
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-22 08:59:15 -06:00
|
|
|
# /room/$roomid/state/$eventtype/$statekey
|
2019-06-20 03:32:02 -06:00
|
|
|
state_key = (
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/state/"
|
|
|
|
"(?P<event_type>[^/]*)/(?P<state_key>[^/]*)$"
|
|
|
|
)
|
|
|
|
|
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"GET",
|
|
|
|
client_patterns(state_key, v1=True),
|
|
|
|
self.on_GET,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"PUT",
|
|
|
|
client_patterns(state_key, v1=True),
|
|
|
|
self.on_PUT,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"GET",
|
|
|
|
client_patterns(no_state_key, v1=True),
|
|
|
|
self.on_GET_no_state_key,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"PUT",
|
|
|
|
client_patterns(no_state_key, v1=True),
|
|
|
|
self.on_PUT_no_state_key,
|
|
|
|
self.__class__.__name__,
|
2019-06-20 03:32:02 -06:00
|
|
|
)
|
2014-08-22 08:59:15 -06:00
|
|
|
|
|
|
|
def on_GET_no_state_key(self, request, room_id, event_type):
|
2014-12-10 07:49:52 -07:00
|
|
|
return self.on_GET(request, room_id, event_type, "")
|
2014-08-22 08:59:15 -06:00
|
|
|
|
|
|
|
def on_PUT_no_state_key(self, request, room_id, event_type):
|
2014-12-10 07:49:52 -07:00
|
|
|
return self.on_PUT(request, room_id, event_type, "")
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id, event_type, state_key):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-06-20 03:32:02 -06:00
|
|
|
format = parse_string(
|
|
|
|
request, "format", default="content", allowed_values=["content", "event"]
|
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2018-07-18 08:22:02 -06:00
|
|
|
msg_handler = self.message_handler
|
2019-10-29 07:09:24 -06:00
|
|
|
data = await msg_handler.get_room_data(
|
2016-01-11 08:29:57 -07:00
|
|
|
user_id=requester.user.to_string(),
|
2014-12-12 08:05:37 -07:00
|
|
|
room_id=room_id,
|
|
|
|
event_type=event_type,
|
|
|
|
state_key=state_key,
|
2014-08-12 08:10:52 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
if not data:
|
2019-06-20 03:32:02 -06:00
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2016-09-09 07:34:29 -06:00
|
|
|
|
|
|
|
if format == "event":
|
2016-09-09 07:40:15 -06:00
|
|
|
event = format_event_for_client_v2(data.get_dict())
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, event
|
2016-09-09 07:34:29 -06:00
|
|
|
elif format == "content":
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, data.get_dict()["content"]
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_PUT(self, request, room_id, event_type, state_key, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-09-25 04:39:15 -06:00
|
|
|
if txn_id:
|
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-12-10 07:02:48 -07:00
|
|
|
event_dict = {
|
|
|
|
"type": event_type,
|
|
|
|
"content": content,
|
2014-12-12 08:05:37 -07:00
|
|
|
"room_id": room_id,
|
2016-01-11 08:29:57 -07:00
|
|
|
"sender": requester.user.to_string(),
|
2014-12-10 07:02:48 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if state_key is not None:
|
2014-12-12 08:05:37 -07:00
|
|
|
event_dict["state_key"] = state_key
|
2014-12-10 07:02:48 -07:00
|
|
|
|
2020-08-24 11:58:56 -06:00
|
|
|
try:
|
|
|
|
if event_type == EventTypes.Member:
|
2020-08-20 13:07:42 -06:00
|
|
|
membership = content.get("membership", None)
|
|
|
|
event_id, _ = await self.room_member_handler.update_membership(
|
|
|
|
requester,
|
|
|
|
target=UserID.from_string(state_key),
|
|
|
|
room_id=room_id,
|
|
|
|
action=membership,
|
|
|
|
content=content,
|
|
|
|
)
|
2020-08-24 11:58:56 -06:00
|
|
|
else:
|
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
|
|
|
requester, event_dict, txn_id=txn_id
|
|
|
|
)
|
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2017-01-09 11:25:13 -07:00
|
|
|
|
2020-07-09 06:01:42 -06:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
ret = {"event_id": event_id}
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, ret
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2014-08-26 10:54:18 -06:00
|
|
|
# TODO: Needs unit testing for generic events + feedback
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomSendEventRestServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomSendEventRestServlet, self).__init__(hs)
|
2019-01-18 08:27:11 -07:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2014-08-26 10:00:24 -06:00
|
|
|
def register(self, http_server):
|
|
|
|
# /rooms/$roomid/send/$event_type[/$txn_id]
|
2019-06-20 03:32:02 -06:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/send/(?P<event_type>[^/]*)"
|
2015-12-01 10:34:32 -07:00
|
|
|
register_txn_path(self, PATTERNS, http_server, with_get=True)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request, room_id, event_type, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2018-01-23 01:59:06 -07:00
|
|
|
event_dict = {
|
|
|
|
"type": event_type,
|
|
|
|
"content": content,
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": requester.user.to_string(),
|
|
|
|
}
|
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
if b"ts" in request.args and requester.app_service:
|
|
|
|
event_dict["origin_server_ts"] = parse_integer(request, "ts", 0)
|
2018-01-23 01:59:06 -07:00
|
|
|
|
2020-08-24 11:58:56 -06:00
|
|
|
try:
|
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
|
|
|
requester, event_dict, txn_id=txn_id
|
|
|
|
)
|
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2020-08-24 11:58:56 -06:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
return 200, {"event_id": event_id}
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-26 10:00:24 -06:00
|
|
|
def on_GET(self, request, room_id, event_type, txn_id):
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, "Not implemented"
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-26 10:00:24 -06:00
|
|
|
def on_PUT(self, request, room_id, event_type, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-11-14 02:52:41 -07:00
|
|
|
return self.txns.fetch_or_execute_request(
|
2016-11-11 10:47:03 -07:00
|
|
|
request, self.on_POST, request, room_id, event_type, txn_id
|
2016-11-11 08:02:29 -07:00
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2014-08-27 02:43:42 -06:00
|
|
|
# TODO: Needs unit testing for room ID + alias joins
|
2019-06-03 05:28:59 -06:00
|
|
|
class JoinRoomAliasServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(JoinRoomAliasServlet, self).__init__(hs)
|
2018-03-01 03:54:37 -07:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-02-12 09:17:24 -07:00
|
|
|
|
|
|
|
def register(self, http_server):
|
|
|
|
# /join/$room_identifier[/$txn_id]
|
2019-06-20 03:32:02 -06:00
|
|
|
PATTERNS = "/join/(?P<room_identifier>[^/]*)"
|
2016-02-12 09:17:24 -07:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request, room_identifier, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2016-02-24 01:50:28 -07:00
|
|
|
try:
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2017-10-23 08:52:32 -06:00
|
|
|
except Exception:
|
2016-02-24 01:50:28 -07:00
|
|
|
# Turns out we used to ignore the body entirely, and some clients
|
|
|
|
# cheekily send invalid bodies.
|
|
|
|
content = {}
|
2016-02-23 08:11:25 -07:00
|
|
|
|
2016-02-15 08:39:16 -07:00
|
|
|
if RoomID.is_valid(room_identifier):
|
|
|
|
room_id = room_identifier
|
2016-05-19 06:50:52 -06:00
|
|
|
try:
|
2018-09-12 04:41:31 -06:00
|
|
|
remote_room_hosts = [
|
2019-06-20 03:32:02 -06:00
|
|
|
x.decode("ascii") for x in request.args[b"server_name"]
|
2020-01-20 10:38:21 -07:00
|
|
|
] # type: Optional[List[str]]
|
2017-10-23 08:52:32 -06:00
|
|
|
except Exception:
|
2016-05-19 06:50:52 -06:00
|
|
|
remote_room_hosts = None
|
2016-02-15 08:39:16 -07:00
|
|
|
elif RoomAlias.is_valid(room_identifier):
|
2018-03-01 03:54:37 -07:00
|
|
|
handler = self.room_member_handler
|
2016-02-15 08:39:16 -07:00
|
|
|
room_alias = RoomAlias.from_string(room_identifier)
|
2019-10-29 07:09:24 -06:00
|
|
|
room_id, remote_room_hosts = await handler.lookup_room_alias(room_alias)
|
2016-02-15 08:39:16 -07:00
|
|
|
room_id = room_id.to_string()
|
|
|
|
else:
|
2019-06-20 03:32:02 -06:00
|
|
|
raise SynapseError(
|
|
|
|
400, "%s was not legal room ID or room alias" % (room_identifier,)
|
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
await self.room_member_handler.update_membership(
|
2016-02-15 09:16:03 -07:00
|
|
|
requester=requester,
|
|
|
|
target=requester.user,
|
|
|
|
room_id=room_id,
|
|
|
|
action="join",
|
2016-02-15 08:39:16 -07:00
|
|
|
txn_id=txn_id,
|
2016-02-17 08:50:13 -07:00
|
|
|
remote_room_hosts=remote_room_hosts,
|
2016-08-23 09:32:04 -06:00
|
|
|
content=content,
|
2016-02-23 08:11:25 -07:00
|
|
|
third_party_signed=content.get("third_party_signed", None),
|
2016-02-15 08:39:16 -07:00
|
|
|
)
|
2016-02-12 09:17:24 -07:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {"room_id": room_id}
|
2016-02-12 09:17:24 -07:00
|
|
|
|
|
|
|
def on_PUT(self, request, room_identifier, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-11-14 02:52:41 -07:00
|
|
|
return self.txns.fetch_or_execute_request(
|
2016-11-11 10:47:03 -07:00
|
|
|
request, self.on_POST, request, room_identifier, txn_id
|
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2014-08-27 07:51:59 -06:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class PublicRoomListRestServlet(TransactionRestServlet):
|
|
|
|
PATTERNS = client_patterns("/publicRooms$", v1=True)
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
|
|
|
super(PublicRoomListRestServlet, self).__init__(hs)
|
|
|
|
self.hs = hs
|
|
|
|
self.auth = hs.get_auth()
|
2014-08-27 07:51:59 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request):
|
2016-09-08 08:51:10 -06:00
|
|
|
server = parse_string(request, "server", default=None)
|
2016-09-08 04:53:05 -06:00
|
|
|
|
2016-06-08 07:23:15 -06:00
|
|
|
try:
|
2019-10-29 07:09:24 -06:00
|
|
|
await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-07-11 04:06:23 -06:00
|
|
|
except InvalidClientCredentialsError as e:
|
2019-05-08 11:26:56 -06:00
|
|
|
# Option to allow servers to require auth when accessing
|
|
|
|
# /publicRooms via CS API. This is especially helpful in private
|
|
|
|
# federations.
|
2019-06-24 04:45:11 -06:00
|
|
|
if not self.hs.config.allow_public_rooms_without_auth:
|
2019-05-08 11:26:56 -06:00
|
|
|
raise
|
|
|
|
|
2016-09-08 04:53:05 -06:00
|
|
|
# We allow people to not be authed if they're just looking at our
|
|
|
|
# room list, but require auth when we proxy the request.
|
|
|
|
# In both cases we call the auth function, as that has the side
|
|
|
|
# effect of logging who issued this request if an access token was
|
|
|
|
# provided.
|
|
|
|
if server:
|
|
|
|
raise e
|
|
|
|
else:
|
|
|
|
pass
|
2016-06-08 07:23:15 -06:00
|
|
|
|
2016-09-15 06:56:20 -06:00
|
|
|
limit = parse_integer(request, "limit", 0)
|
2016-09-15 03:36:19 -06:00
|
|
|
since_token = parse_string(request, "since", None)
|
2016-09-15 03:15:37 -06:00
|
|
|
|
2019-10-02 07:08:35 -06:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2016-05-31 04:05:16 -06:00
|
|
|
handler = self.hs.get_room_list_handler()
|
2020-04-06 05:35:30 -06:00
|
|
|
if server and server != self.hs.config.server_name:
|
|
|
|
try:
|
|
|
|
data = await handler.get_remote_public_room_list(
|
|
|
|
server, limit=limit, since_token=since_token
|
|
|
|
)
|
|
|
|
except HttpResponseException as e:
|
|
|
|
raise e.to_synapse_error()
|
2016-09-08 04:53:05 -06:00
|
|
|
else:
|
2019-10-29 07:09:24 -06:00
|
|
|
data = await handler.get_local_public_room_list(
|
2019-06-20 03:32:02 -06:00
|
|
|
limit=limit, since_token=since_token
|
2016-09-15 03:15:37 -06:00
|
|
|
)
|
2016-05-31 10:20:07 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, data
|
2014-08-27 07:51:59 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request):
|
|
|
|
await self.auth.get_user_by_req(request, allow_guest=True)
|
2016-09-15 10:35:20 -06:00
|
|
|
|
|
|
|
server = parse_string(request, "server", default=None)
|
|
|
|
content = parse_json_object_from_request(request)
|
|
|
|
|
2020-01-20 10:38:21 -07:00
|
|
|
limit = int(content.get("limit", 100)) # type: Optional[int]
|
2016-09-15 10:35:20 -06:00
|
|
|
since_token = content.get("since", None)
|
|
|
|
search_filter = content.get("filter", None)
|
|
|
|
|
2016-12-06 03:43:48 -07:00
|
|
|
include_all_networks = content.get("include_all_networks", False)
|
|
|
|
third_party_instance_id = content.get("third_party_instance_id", None)
|
|
|
|
|
|
|
|
if include_all_networks:
|
|
|
|
network_tuple = None
|
|
|
|
if third_party_instance_id is not None:
|
|
|
|
raise SynapseError(
|
|
|
|
400, "Can't use include_all_networks with an explicit network"
|
|
|
|
)
|
|
|
|
elif third_party_instance_id is None:
|
|
|
|
network_tuple = ThirdPartyInstanceID(None, None)
|
|
|
|
else:
|
|
|
|
network_tuple = ThirdPartyInstanceID.from_string(third_party_instance_id)
|
|
|
|
|
2019-10-02 07:08:35 -06:00
|
|
|
if limit == 0:
|
|
|
|
# zero is a special value which corresponds to no limit.
|
|
|
|
limit = None
|
|
|
|
|
2016-09-15 10:35:20 -06:00
|
|
|
handler = self.hs.get_room_list_handler()
|
2020-04-06 05:35:30 -06:00
|
|
|
if server and server != self.hs.config.server_name:
|
|
|
|
try:
|
|
|
|
data = await handler.get_remote_public_room_list(
|
|
|
|
server,
|
|
|
|
limit=limit,
|
|
|
|
since_token=since_token,
|
|
|
|
search_filter=search_filter,
|
|
|
|
include_all_networks=include_all_networks,
|
|
|
|
third_party_instance_id=third_party_instance_id,
|
|
|
|
)
|
|
|
|
except HttpResponseException as e:
|
|
|
|
raise e.to_synapse_error()
|
2016-09-15 10:35:20 -06:00
|
|
|
else:
|
2019-10-29 07:09:24 -06:00
|
|
|
data = await handler.get_local_public_room_list(
|
2016-09-15 10:35:20 -06:00
|
|
|
limit=limit,
|
|
|
|
since_token=since_token,
|
|
|
|
search_filter=search_filter,
|
2016-12-06 03:43:48 -07:00
|
|
|
network_tuple=network_tuple,
|
2016-09-15 10:35:20 -06:00
|
|
|
)
|
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, data
|
2016-09-15 10:35:20 -06:00
|
|
|
|
2014-08-27 07:51:59 -06:00
|
|
|
|
2014-08-26 10:54:18 -06:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomMemberListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/members$", v1=True)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomMemberListRestServlet, self).__init__()
|
2018-07-18 08:22:02 -06:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id):
|
2014-08-12 08:10:52 -06:00
|
|
|
# TODO support Pagination stream API (limit/tokens)
|
2020-08-03 05:13:49 -06:00
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2018-08-15 09:35:22 -06:00
|
|
|
handler = self.message_handler
|
|
|
|
|
|
|
|
# request the state as of a given event, as identified by a stream token,
|
|
|
|
# for consistency with /messages etc.
|
|
|
|
# useful for getting the membership in retrospect as of a given /sync
|
|
|
|
# response.
|
|
|
|
at_token_string = parse_string(request, "at")
|
|
|
|
if at_token_string is None:
|
|
|
|
at_token = None
|
|
|
|
else:
|
|
|
|
at_token = StreamToken.from_string(at_token_string)
|
|
|
|
|
|
|
|
# let you filter down on particular memberships.
|
|
|
|
# XXX: this may not be the best shape for this API - we could pass in a filter
|
|
|
|
# instead, except filters aren't currently aware of memberships.
|
|
|
|
# See https://github.com/matrix-org/matrix-doc/issues/1337 for more details.
|
|
|
|
membership = parse_string(request, "membership")
|
|
|
|
not_membership = parse_string(request, "not_membership")
|
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
events = await handler.get_state_events(
|
2014-12-12 08:05:37 -07:00
|
|
|
room_id=room_id,
|
2016-01-11 08:29:57 -07:00
|
|
|
user_id=requester.user.to_string(),
|
2018-08-15 09:35:22 -06:00
|
|
|
at_token=at_token,
|
2018-10-25 10:49:55 -06:00
|
|
|
state_filter=StateFilter.from_types([(EventTypes.Member, None)]),
|
2015-09-09 08:42:16 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
chunk = []
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2015-09-09 08:42:16 -06:00
|
|
|
for event in events:
|
2019-06-20 03:32:02 -06:00
|
|
|
if (membership and event["content"].get("membership") != membership) or (
|
|
|
|
not_membership and event["content"].get("membership") == not_membership
|
2018-08-15 09:35:22 -06:00
|
|
|
):
|
2015-09-09 08:42:16 -06:00
|
|
|
continue
|
|
|
|
chunk.append(event)
|
2014-08-15 09:47:50 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {"chunk": chunk}
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2018-08-15 09:35:22 -06:00
|
|
|
# deprecated in favour of /members?membership=join?
|
|
|
|
# except it does custom AS logic and has a simpler return format
|
2019-06-03 05:28:59 -06:00
|
|
|
class JoinedRoomMemberListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/joined_members$", v1=True)
|
2016-12-08 06:32:05 -07:00
|
|
|
|
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(JoinedRoomMemberListRestServlet, self).__init__()
|
2018-07-18 08:22:02 -06:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-12-08 06:32:05 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2016-12-08 06:32:05 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
users_with_profile = await self.message_handler.get_joined_members(
|
2019-06-20 03:32:02 -06:00
|
|
|
requester, room_id
|
2017-09-27 08:01:25 -06:00
|
|
|
)
|
2016-12-08 06:32:05 -07:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {"joined": users_with_profile}
|
2016-12-08 06:32:05 -07:00
|
|
|
|
|
|
|
|
2015-11-05 09:56:40 -07:00
|
|
|
# TODO: Needs better unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomMessageListRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/messages$", v1=True)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomMessageListRestServlet, self).__init__()
|
2018-07-18 08:22:02 -06:00
|
|
|
self.pagination_handler = hs.get_pagination_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-06-20 03:32:02 -06:00
|
|
|
pagination_config = PaginationConfig.from_request(request, default_limit=10)
|
2018-09-12 04:41:31 -06:00
|
|
|
as_client_event = b"raw" not in request.args
|
2020-07-15 11:40:54 -06:00
|
|
|
filter_str = parse_string(request, b"filter", encoding="utf-8")
|
|
|
|
if filter_str:
|
|
|
|
filter_json = urlparse.unquote(filter_str)
|
2020-08-19 05:26:03 -06:00
|
|
|
event_filter = Filter(
|
|
|
|
json_decoder.decode(filter_json)
|
|
|
|
) # type: Optional[Filter]
|
2020-01-20 10:38:21 -07:00
|
|
|
if (
|
|
|
|
event_filter
|
|
|
|
and event_filter.filter_json.get("event_format", "client")
|
|
|
|
== "federation"
|
|
|
|
):
|
2019-05-30 08:58:53 -06:00
|
|
|
as_client_event = False
|
2016-07-14 08:59:25 -06:00
|
|
|
else:
|
|
|
|
event_filter = None
|
2020-01-20 10:38:21 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
msgs = await self.pagination_handler.get_messages(
|
2014-12-12 08:05:37 -07:00
|
|
|
room_id=room_id,
|
2016-01-20 08:34:07 -07:00
|
|
|
requester=requester,
|
2014-08-12 08:10:52 -06:00
|
|
|
pagin_config=pagination_config,
|
2016-07-14 08:59:25 -06:00
|
|
|
as_client_event=as_client_event,
|
|
|
|
event_filter=event_filter,
|
2015-01-08 07:36:33 -07:00
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, msgs
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2014-08-27 09:42:33 -06:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomStateRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/state$", v1=True)
|
2014-08-27 09:42:33 -06:00
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomStateRestServlet, self).__init__()
|
2018-07-18 08:22:02 -06:00
|
|
|
self.message_handler = hs.get_message_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2014-09-23 08:35:58 -06:00
|
|
|
# Get all the current state for this room
|
2019-10-29 07:09:24 -06:00
|
|
|
events = await self.message_handler.get_state_events(
|
2014-12-12 08:05:37 -07:00
|
|
|
room_id=room_id,
|
2016-01-11 08:29:57 -07:00
|
|
|
user_id=requester.user.to_string(),
|
|
|
|
is_guest=requester.is_guest,
|
2014-09-23 08:35:58 -06:00
|
|
|
)
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, events
|
2014-08-27 09:42:33 -06:00
|
|
|
|
|
|
|
|
2014-08-27 09:49:01 -06:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomInitialSyncRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/rooms/(?P<room_id>[^/]*)/initialSync$", v1=True)
|
2014-08-27 09:49:01 -06:00
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomInitialSyncRestServlet, self).__init__()
|
2016-09-21 04:46:28 -06:00
|
|
|
self.initial_sync_handler = hs.get_initial_sync_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2014-11-18 09:34:43 -07:00
|
|
|
pagination_config = PaginationConfig.from_request(request)
|
2019-10-29 07:09:24 -06:00
|
|
|
content = await self.initial_sync_handler.room_initial_sync(
|
2019-06-20 03:32:02 -06:00
|
|
|
room_id=room_id, requester=requester, pagin_config=pagination_config
|
2014-11-10 12:02:19 -07:00
|
|
|
)
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, content
|
2014-08-27 09:49:01 -06:00
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomEventServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/event/(?P<event_id>[^/]*)$", v1=True
|
2018-01-09 07:39:12 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomEventServlet, self).__init__()
|
2018-01-09 07:39:12 -07:00
|
|
|
self.clock = hs.get_clock()
|
|
|
|
self.event_handler = hs.get_event_handler()
|
2019-05-09 06:21:57 -06:00
|
|
|
self._event_serializer = hs.get_event_client_serializer()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2018-01-09 07:39:12 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id, event_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2019-08-06 06:33:55 -06:00
|
|
|
try:
|
2019-10-29 07:09:24 -06:00
|
|
|
event = await self.event_handler.get_event(
|
2019-08-06 06:33:55 -06:00
|
|
|
requester.user, room_id, event_id
|
|
|
|
)
|
|
|
|
except AuthError:
|
|
|
|
# This endpoint is supposed to return a 404 when the requester does
|
|
|
|
# not have permission to access the event
|
|
|
|
# https://matrix.org/docs/spec/client_server/r0.5.0#get-matrix-client-r0-rooms-roomid-event-eventid
|
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2018-01-09 07:39:12 -07:00
|
|
|
|
|
|
|
time_now = self.clock.time_msec()
|
|
|
|
if event:
|
2019-10-29 07:09:24 -06:00
|
|
|
event = await self._event_serializer.serialize_event(event, time_now)
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, event
|
2019-08-06 06:33:55 -06:00
|
|
|
|
|
|
|
return SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2018-01-09 07:39:12 -07:00
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomEventContextServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/context/(?P<event_id>[^/]*)$", v1=True
|
2015-10-28 07:45:56 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomEventContextServlet, self).__init__()
|
2015-10-28 07:45:56 -06:00
|
|
|
self.clock = hs.get_clock()
|
2018-07-18 08:29:45 -06:00
|
|
|
self.room_context_handler = hs.get_room_context_handler()
|
2019-05-09 06:21:57 -06:00
|
|
|
self._event_serializer = hs.get_event_client_serializer()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2015-10-28 07:45:56 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request, room_id, event_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2015-10-28 07:45:56 -06:00
|
|
|
|
2018-07-13 13:40:14 -06:00
|
|
|
limit = parse_integer(request, "limit", default=10)
|
2015-10-28 07:45:56 -06:00
|
|
|
|
2018-07-27 08:12:50 -06:00
|
|
|
# picking the API shape for symmetry with /messages
|
2020-07-15 11:40:54 -06:00
|
|
|
filter_str = parse_string(request, b"filter", encoding="utf-8")
|
|
|
|
if filter_str:
|
|
|
|
filter_json = urlparse.unquote(filter_str)
|
2020-08-19 05:26:03 -06:00
|
|
|
event_filter = Filter(
|
|
|
|
json_decoder.decode(filter_json)
|
|
|
|
) # type: Optional[Filter]
|
2018-07-27 08:12:50 -06:00
|
|
|
else:
|
|
|
|
event_filter = None
|
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
results = await self.room_context_handler.get_event_context(
|
2019-06-20 03:32:02 -06:00
|
|
|
requester.user, room_id, event_id, limit, event_filter
|
2015-10-28 07:45:56 -06:00
|
|
|
)
|
|
|
|
|
2016-01-13 07:19:22 -07:00
|
|
|
if not results:
|
2019-06-20 03:32:02 -06:00
|
|
|
raise SynapseError(404, "Event not found.", errcode=Codes.NOT_FOUND)
|
2016-01-13 07:19:22 -07:00
|
|
|
|
2015-10-28 07:45:56 -06:00
|
|
|
time_now = self.clock.time_msec()
|
2019-10-29 07:09:24 -06:00
|
|
|
results["events_before"] = await self._event_serializer.serialize_events(
|
2019-06-20 03:32:02 -06:00
|
|
|
results["events_before"], time_now
|
2019-05-09 06:21:57 -06:00
|
|
|
)
|
2019-10-29 07:09:24 -06:00
|
|
|
results["event"] = await self._event_serializer.serialize_event(
|
2019-06-20 03:32:02 -06:00
|
|
|
results["event"], time_now
|
2019-05-09 06:21:57 -06:00
|
|
|
)
|
2019-10-29 07:09:24 -06:00
|
|
|
results["events_after"] = await self._event_serializer.serialize_events(
|
2019-06-20 03:32:02 -06:00
|
|
|
results["events_after"], time_now
|
2019-05-09 06:21:57 -06:00
|
|
|
)
|
2019-10-29 07:09:24 -06:00
|
|
|
results["state"] = await self._event_serializer.serialize_events(
|
2019-06-20 03:32:02 -06:00
|
|
|
results["state"], time_now
|
2019-05-09 06:21:57 -06:00
|
|
|
)
|
2015-10-28 07:45:56 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, results
|
2015-10-28 07:45:56 -06:00
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomForgetRestServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomForgetRestServlet, self).__init__(hs)
|
2018-03-01 03:54:37 -07:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2016-03-30 03:54:01 -06:00
|
|
|
def register(self, http_server):
|
2019-06-20 03:32:02 -06:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/forget"
|
2016-03-30 03:54:01 -06:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request, room_id, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=False)
|
2016-03-30 03:54:01 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
await self.room_member_handler.forget(user=requester.user, room_id=room_id)
|
2016-03-30 03:54:01 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {}
|
2016-03-30 03:54:01 -06:00
|
|
|
|
|
|
|
def on_PUT(self, request, room_id, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-11-14 02:52:41 -07:00
|
|
|
return self.txns.fetch_or_execute_request(
|
2016-11-11 10:47:03 -07:00
|
|
|
request, self.on_POST, request, room_id, txn_id
|
|
|
|
)
|
2016-03-30 03:54:01 -06:00
|
|
|
|
|
|
|
|
2014-08-26 10:54:18 -06:00
|
|
|
# TODO: Needs unit testing
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomMembershipRestServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomMembershipRestServlet, self).__init__(hs)
|
2018-03-01 03:54:37 -07:00
|
|
|
self.room_member_handler = hs.get_room_member_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2014-08-26 05:54:43 -06:00
|
|
|
def register(self, http_server):
|
|
|
|
# /rooms/$roomid/[invite|join|leave]
|
2019-06-20 03:32:02 -06:00
|
|
|
PATTERNS = (
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/"
|
|
|
|
"(?P<membership_action>join|invite|leave|ban|unban|kick)"
|
|
|
|
)
|
2015-12-01 10:34:32 -07:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-08-26 05:54:43 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request, room_id, membership_action, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2015-11-17 15:17:30 -07:00
|
|
|
|
2016-01-11 08:29:57 -07:00
|
|
|
if requester.is_guest and membership_action not in {
|
|
|
|
Membership.JOIN,
|
2019-06-20 03:32:02 -06:00
|
|
|
Membership.LEAVE,
|
2016-01-11 08:29:57 -07:00
|
|
|
}:
|
2015-11-13 04:56:58 -07:00
|
|
|
raise AuthError(403, "Guest access not allowed")
|
2014-08-26 07:49:44 -06:00
|
|
|
|
2016-02-24 01:50:28 -07:00
|
|
|
try:
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2017-10-23 08:52:32 -06:00
|
|
|
except Exception:
|
2016-02-24 01:50:28 -07:00
|
|
|
# Turns out we used to ignore the body entirely, and some clients
|
|
|
|
# cheekily send invalid bodies.
|
|
|
|
content = {}
|
2014-08-26 05:54:43 -06:00
|
|
|
|
2015-11-05 09:43:19 -07:00
|
|
|
if membership_action == "invite" and self._has_3pid_invite_keys(content):
|
2020-08-20 13:07:42 -06:00
|
|
|
try:
|
|
|
|
await self.room_member_handler.do_3pid_invite(
|
|
|
|
room_id,
|
|
|
|
requester.user,
|
|
|
|
content["medium"],
|
|
|
|
content["address"],
|
|
|
|
content["id_server"],
|
|
|
|
requester,
|
|
|
|
txn_id,
|
|
|
|
content.get("id_access_token"),
|
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend the request succeeded.
|
|
|
|
pass
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {}
|
2014-08-26 07:49:44 -06:00
|
|
|
|
2016-01-15 09:27:26 -07:00
|
|
|
target = requester.user
|
|
|
|
if membership_action in ["invite", "ban", "unban", "kick"]:
|
2018-07-13 13:53:01 -06:00
|
|
|
assert_params_in_dict(content, ["user_id"])
|
2016-01-15 09:27:26 -07:00
|
|
|
target = UserID.from_string(content["user_id"])
|
2015-11-13 04:56:58 -07:00
|
|
|
|
2017-02-14 08:10:55 -07:00
|
|
|
event_content = None
|
2019-11-28 04:02:04 -07:00
|
|
|
if "reason" in content:
|
2019-06-20 03:32:02 -06:00
|
|
|
event_content = {"reason": content["reason"]}
|
2017-02-14 08:10:55 -07:00
|
|
|
|
2020-08-20 13:07:42 -06:00
|
|
|
try:
|
|
|
|
await self.room_member_handler.update_membership(
|
|
|
|
requester=requester,
|
|
|
|
target=target,
|
|
|
|
room_id=room_id,
|
|
|
|
action=membership_action,
|
|
|
|
txn_id=txn_id,
|
|
|
|
third_party_signed=content.get("third_party_signed", None),
|
|
|
|
content=event_content,
|
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend the request succeeded.
|
|
|
|
pass
|
2014-11-10 11:24:43 -07:00
|
|
|
|
2018-03-13 07:10:07 -06:00
|
|
|
return_value = {}
|
|
|
|
|
|
|
|
if membership_action == "join":
|
|
|
|
return_value["room_id"] = room_id
|
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, return_value
|
2014-08-26 07:49:44 -06:00
|
|
|
|
2015-11-05 09:43:19 -07:00
|
|
|
def _has_3pid_invite_keys(self, content):
|
2015-11-09 10:26:43 -07:00
|
|
|
for key in {"id_server", "medium", "address"}:
|
2015-11-05 09:43:19 -07:00
|
|
|
if key not in content:
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
2014-08-26 05:54:43 -06:00
|
|
|
def on_PUT(self, request, room_id, membership_action, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-11-14 02:52:41 -07:00
|
|
|
return self.txns.fetch_or_execute_request(
|
2016-11-11 10:47:03 -07:00
|
|
|
request, self.on_POST, request, room_id, membership_action, txn_id
|
2016-11-11 08:08:24 -07:00
|
|
|
)
|
2014-08-26 05:54:43 -06:00
|
|
|
|
2014-10-30 05:10:17 -06:00
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomRedactEventRestServlet(TransactionRestServlet):
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(RoomRedactEventRestServlet, self).__init__(hs)
|
|
|
|
self.handlers = hs.get_handlers()
|
2018-01-15 09:52:07 -07:00
|
|
|
self.event_creation_handler = hs.get_event_creation_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2014-09-23 08:28:32 -06:00
|
|
|
def register(self, http_server):
|
2019-06-20 03:32:02 -06:00
|
|
|
PATTERNS = "/rooms/(?P<room_id>[^/]*)/redact/(?P<event_id>[^/]*)"
|
2015-12-01 10:34:32 -07:00
|
|
|
register_txn_path(self, PATTERNS, http_server)
|
2014-09-23 08:28:32 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request, room_id, event_id, txn_id=None):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-09-23 08:28:32 -06:00
|
|
|
|
2020-08-24 11:58:56 -06:00
|
|
|
try:
|
|
|
|
(
|
|
|
|
event,
|
|
|
|
_,
|
|
|
|
) = await self.event_creation_handler.create_and_send_nonmember_event(
|
|
|
|
requester,
|
|
|
|
{
|
|
|
|
"type": EventTypes.Redaction,
|
|
|
|
"content": content,
|
|
|
|
"room_id": room_id,
|
|
|
|
"sender": requester.user.to_string(),
|
|
|
|
"redacts": event_id,
|
|
|
|
},
|
|
|
|
txn_id=txn_id,
|
|
|
|
)
|
|
|
|
event_id = event.event_id
|
|
|
|
except ShadowBanError:
|
|
|
|
event_id = "$" + random_string(43)
|
2014-09-23 08:28:32 -06:00
|
|
|
|
2020-08-24 11:58:56 -06:00
|
|
|
set_tag("event_id", event_id)
|
|
|
|
return 200, {"event_id": event_id}
|
2014-09-23 08:28:32 -06:00
|
|
|
|
|
|
|
def on_PUT(self, request, room_id, event_id, txn_id):
|
2019-09-25 04:39:15 -06:00
|
|
|
set_tag("txn_id", txn_id)
|
|
|
|
|
2016-11-14 02:52:41 -07:00
|
|
|
return self.txns.fetch_or_execute_request(
|
2016-11-11 10:47:03 -07:00
|
|
|
request, self.on_POST, request, room_id, event_id, txn_id
|
2016-11-11 08:02:29 -07:00
|
|
|
)
|
2014-09-23 08:28:32 -06:00
|
|
|
|
2014-08-26 05:54:43 -06:00
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class RoomTypingRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns(
|
|
|
|
"/rooms/(?P<room_id>[^/]*)/typing/(?P<user_id>[^/]*)$", v1=True
|
2014-12-16 08:24:03 -07:00
|
|
|
)
|
2014-12-11 03:55:36 -07:00
|
|
|
|
2016-02-15 10:10:40 -07:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(RoomTypingRestServlet, self).__init__()
|
2016-05-16 11:56:37 -06:00
|
|
|
self.presence_handler = hs.get_presence_handler()
|
2016-05-17 08:58:46 -06:00
|
|
|
self.typing_handler = hs.get_typing_handler()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-02-15 10:10:40 -07:00
|
|
|
|
2020-07-16 08:12:54 -06:00
|
|
|
# If we're not on the typing writer instance we should scream if we get
|
|
|
|
# requests.
|
|
|
|
self._is_typing_writer = (
|
|
|
|
hs.config.worker.writers.typing == hs.get_instance_name()
|
|
|
|
)
|
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_PUT(self, request, room_id, user_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2014-12-11 03:55:36 -07:00
|
|
|
|
2020-07-16 08:12:54 -06:00
|
|
|
if not self._is_typing_writer:
|
|
|
|
raise Exception("Got /typing request on instance that is not typing writer")
|
|
|
|
|
2018-04-15 09:15:16 -06:00
|
|
|
room_id = urlparse.unquote(room_id)
|
|
|
|
target_user = UserID.from_string(urlparse.unquote(user_id))
|
2014-12-11 03:55:36 -07:00
|
|
|
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2014-12-11 03:55:36 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
await self.presence_handler.bump_presence_active_time(requester.user)
|
2016-02-15 10:10:40 -07:00
|
|
|
|
2016-09-23 06:56:14 -06:00
|
|
|
# Limit timeout to stop people from setting silly typing timeouts.
|
|
|
|
timeout = min(content.get("timeout", 30000), 120000)
|
|
|
|
|
2020-08-26 10:05:36 -06:00
|
|
|
try:
|
|
|
|
if content["typing"]:
|
|
|
|
await self.typing_handler.started_typing(
|
|
|
|
target_user=target_user,
|
|
|
|
requester=requester,
|
|
|
|
room_id=room_id,
|
|
|
|
timeout=timeout,
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
await self.typing_handler.stopped_typing(
|
|
|
|
target_user=target_user, requester=requester, room_id=room_id
|
|
|
|
)
|
|
|
|
except ShadowBanError:
|
|
|
|
# Pretend this worked without error.
|
|
|
|
pass
|
2014-12-11 03:55:36 -07:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {}
|
2014-12-11 03:55:36 -07:00
|
|
|
|
|
|
|
|
2020-02-18 09:23:25 -07:00
|
|
|
class RoomAliasListServlet(RestServlet):
|
2020-02-19 03:40:27 -07:00
|
|
|
PATTERNS = [
|
|
|
|
re.compile(
|
|
|
|
r"^/_matrix/client/unstable/org\.matrix\.msc2432"
|
|
|
|
r"/rooms/(?P<room_id>[^/]*)/aliases"
|
|
|
|
),
|
|
|
|
]
|
2020-02-18 09:23:25 -07:00
|
|
|
|
|
|
|
def __init__(self, hs: "synapse.server.HomeServer"):
|
|
|
|
super().__init__()
|
|
|
|
self.auth = hs.get_auth()
|
|
|
|
self.directory_handler = hs.get_handlers().directory_handler
|
|
|
|
|
|
|
|
async def on_GET(self, request, room_id):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
|
|
|
|
|
|
|
alias_list = await self.directory_handler.get_aliases_for_room(
|
|
|
|
requester, room_id
|
|
|
|
)
|
|
|
|
|
|
|
|
return 200, {"aliases": alias_list}
|
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class SearchRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/search$", v1=True)
|
2015-10-09 08:48:31 -06:00
|
|
|
|
2016-08-12 03:03:19 -06:00
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(SearchRestServlet, self).__init__()
|
2016-08-12 03:03:19 -06:00
|
|
|
self.handlers = hs.get_handlers()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-08-12 03:03:19 -06:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_POST(self, request):
|
|
|
|
requester = await self.auth.get_user_by_req(request)
|
2015-10-09 08:48:31 -06:00
|
|
|
|
2016-03-09 04:26:26 -07:00
|
|
|
content = parse_json_object_from_request(request)
|
2015-10-09 08:48:31 -06:00
|
|
|
|
2018-07-13 13:40:14 -06:00
|
|
|
batch = parse_string(request, "next_batch")
|
2019-10-29 07:09:24 -06:00
|
|
|
results = await self.handlers.search_handler.search(
|
2019-06-20 03:32:02 -06:00
|
|
|
requester.user, content, batch
|
2016-01-11 08:29:57 -07:00
|
|
|
)
|
2015-10-09 08:48:31 -06:00
|
|
|
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, results
|
2015-10-09 08:48:31 -06:00
|
|
|
|
|
|
|
|
2019-06-03 05:28:59 -06:00
|
|
|
class JoinedRoomsRestServlet(RestServlet):
|
|
|
|
PATTERNS = client_patterns("/joined_rooms$", v1=True)
|
2016-12-08 04:39:03 -07:00
|
|
|
|
|
|
|
def __init__(self, hs):
|
2019-06-03 05:28:59 -06:00
|
|
|
super(JoinedRoomsRestServlet, self).__init__()
|
2016-12-08 04:39:03 -07:00
|
|
|
self.store = hs.get_datastore()
|
2019-06-03 05:28:59 -06:00
|
|
|
self.auth = hs.get_auth()
|
2016-12-08 04:39:03 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
async def on_GET(self, request):
|
|
|
|
requester = await self.auth.get_user_by_req(request, allow_guest=True)
|
2016-12-08 04:39:03 -07:00
|
|
|
|
2019-10-29 07:09:24 -06:00
|
|
|
room_ids = await self.store.get_rooms_for_user(requester.user.to_string())
|
2019-08-30 09:28:26 -06:00
|
|
|
return 200, {"joined_rooms": list(room_ids)}
|
2016-12-08 04:39:03 -07:00
|
|
|
|
|
|
|
|
2014-08-26 10:00:24 -06:00
|
|
|
def register_txn_path(servlet, regex_string, http_server, with_get=False):
|
2014-08-26 05:54:43 -06:00
|
|
|
"""Registers a transaction-based path.
|
|
|
|
|
|
|
|
This registers two paths:
|
|
|
|
PUT regex_string/$txnid
|
|
|
|
POST regex_string
|
|
|
|
|
|
|
|
Args:
|
|
|
|
regex_string (str): The regex string to register. Must NOT have a
|
|
|
|
trailing $ as this string will be appended to.
|
|
|
|
http_server : The http_server to register paths with.
|
2014-08-26 10:00:24 -06:00
|
|
|
with_get: True to also register respective GET paths for the PUTs.
|
2014-08-26 05:54:43 -06:00
|
|
|
"""
|
2015-12-01 10:34:32 -07:00
|
|
|
http_server.register_paths(
|
2019-07-24 06:07:35 -06:00
|
|
|
"POST",
|
|
|
|
client_patterns(regex_string + "$", v1=True),
|
|
|
|
servlet.on_POST,
|
|
|
|
servlet.__class__.__name__,
|
2014-08-26 05:54:43 -06:00
|
|
|
)
|
2015-12-01 10:34:32 -07:00
|
|
|
http_server.register_paths(
|
2014-08-26 05:54:43 -06:00
|
|
|
"PUT",
|
2019-06-03 05:28:59 -06:00
|
|
|
client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
|
2019-06-20 03:32:02 -06:00
|
|
|
servlet.on_PUT,
|
2019-07-24 06:07:35 -06:00
|
|
|
servlet.__class__.__name__,
|
2014-08-26 05:54:43 -06:00
|
|
|
)
|
2014-08-26 10:00:24 -06:00
|
|
|
if with_get:
|
2015-12-01 10:34:32 -07:00
|
|
|
http_server.register_paths(
|
2014-10-30 05:10:17 -06:00
|
|
|
"GET",
|
2019-06-03 05:28:59 -06:00
|
|
|
client_patterns(regex_string + "/(?P<txn_id>[^/]*)$", v1=True),
|
2019-06-20 03:32:02 -06:00
|
|
|
servlet.on_GET,
|
2019-07-24 06:07:35 -06:00
|
|
|
servlet.__class__.__name__,
|
2014-10-30 05:10:17 -06:00
|
|
|
)
|
2014-08-26 05:54:43 -06:00
|
|
|
|
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
def register_servlets(hs, http_server):
|
2014-08-22 08:59:15 -06:00
|
|
|
RoomStateEventRestServlet(hs).register(http_server)
|
2014-08-12 08:10:52 -06:00
|
|
|
RoomCreateRestServlet(hs).register(http_server)
|
|
|
|
RoomMemberListRestServlet(hs).register(http_server)
|
2016-12-08 06:32:05 -07:00
|
|
|
JoinedRoomMemberListRestServlet(hs).register(http_server)
|
2014-08-12 08:10:52 -06:00
|
|
|
RoomMessageListRestServlet(hs).register(http_server)
|
|
|
|
JoinRoomAliasServlet(hs).register(http_server)
|
2016-03-30 03:54:01 -06:00
|
|
|
RoomForgetRestServlet(hs).register(http_server)
|
2014-08-26 05:54:43 -06:00
|
|
|
RoomMembershipRestServlet(hs).register(http_server)
|
2014-08-26 10:00:24 -06:00
|
|
|
RoomSendEventRestServlet(hs).register(http_server)
|
2014-08-27 07:51:59 -06:00
|
|
|
PublicRoomListRestServlet(hs).register(http_server)
|
2014-08-27 09:42:33 -06:00
|
|
|
RoomStateRestServlet(hs).register(http_server)
|
2014-09-24 08:27:59 -06:00
|
|
|
RoomRedactEventRestServlet(hs).register(http_server)
|
2014-12-11 03:55:36 -07:00
|
|
|
RoomTypingRestServlet(hs).register(http_server)
|
2015-10-09 08:48:31 -06:00
|
|
|
SearchRestServlet(hs).register(http_server)
|
2016-12-08 04:39:03 -07:00
|
|
|
JoinedRoomsRestServlet(hs).register(http_server)
|
2018-01-09 07:39:12 -07:00
|
|
|
RoomEventServlet(hs).register(http_server)
|
|
|
|
RoomEventContextServlet(hs).register(http_server)
|
2020-02-18 09:23:25 -07:00
|
|
|
RoomAliasListServlet(hs).register(http_server)
|
2018-07-19 04:03:33 -06:00
|
|
|
|
|
|
|
|
|
|
|
def register_deprecated_servlets(hs, http_server):
|
|
|
|
RoomInitialSyncRestServlet(hs).register(http_server)
|