429 lines
16 KiB
Python
429 lines
16 KiB
Python
# Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
from typing import Any, Optional
|
|
from unittest.mock import patch
|
|
|
|
from parameterized import parameterized
|
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
from synapse.api.constants import EventContentFields, RelationTypes
|
|
from synapse.api.room_versions import RoomVersions
|
|
from synapse.push.bulk_push_rule_evaluator import BulkPushRuleEvaluator
|
|
from synapse.rest import admin
|
|
from synapse.rest.client import login, register, room
|
|
from synapse.server import HomeServer
|
|
from synapse.types import JsonDict, create_requester
|
|
from synapse.util import Clock
|
|
|
|
from tests.test_utils import simple_async_mock
|
|
from tests.unittest import HomeserverTestCase, override_config
|
|
|
|
|
|
class TestBulkPushRuleEvaluator(HomeserverTestCase):
|
|
servlets = [
|
|
admin.register_servlets_for_client_rest_resource,
|
|
room.register_servlets,
|
|
login.register_servlets,
|
|
register.register_servlets,
|
|
]
|
|
|
|
def prepare(
|
|
self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
|
|
) -> None:
|
|
# Create a new user and room.
|
|
self.alice = self.register_user("alice", "pass")
|
|
self.token = self.login(self.alice, "pass")
|
|
self.requester = create_requester(self.alice)
|
|
|
|
self.room_id = self.helper.create_room_as(
|
|
# This is deliberately set to V9, because we want to test the logic which
|
|
# handles stringy power levels. Stringy power levels were outlawed in V10.
|
|
self.alice,
|
|
room_version=RoomVersions.V9.identifier,
|
|
tok=self.token,
|
|
)
|
|
|
|
self.event_creation_handler = self.hs.get_event_creation_handler()
|
|
|
|
@parameterized.expand(
|
|
[
|
|
# The historically-permitted bad values. Alice's notification should be
|
|
# allowed if this threshold is at or below her power level (60)
|
|
("100", False),
|
|
("0", True),
|
|
(12.34, True),
|
|
(60.0, True),
|
|
(67.89, False),
|
|
# Values that int(...) would not successfully cast should be ignored.
|
|
# The room notification level should then default to 50, per the spec, so
|
|
# Alice's notification is allowed.
|
|
(None, True),
|
|
# We haven't seen `"room": []` or `"room": {}` in the wild (yet), but
|
|
# let's check them for paranoia's sake.
|
|
([], True),
|
|
({}, True),
|
|
]
|
|
)
|
|
def test_action_for_event_by_user_handles_noninteger_room_power_levels(
|
|
self, bad_room_level: object, should_permit: bool
|
|
) -> None:
|
|
"""We should convert strings in `room` to integers before passing to Rust.
|
|
|
|
Test this as follows:
|
|
- Create a room as Alice and invite two other users Bob and Charlie.
|
|
- Set PLs so that Alice has PL 60 and `notifications.room` is set to a bad value.
|
|
- Have Alice create a message notifying @room.
|
|
- Evaluate notification actions for that message. This should not raise.
|
|
- Look in the DB to see if that message triggered a highlight for Bob.
|
|
|
|
The test is parameterised with two arguments:
|
|
- the bad power level value for "room", before JSON serisalistion
|
|
- whether Bob should expect the message to be highlighted
|
|
|
|
Reproduces #14060.
|
|
|
|
A lack of validation: the gift that keeps on giving.
|
|
"""
|
|
# Join another user to the room, so that there is someone to see Alice's
|
|
# @room notification.
|
|
bob = self.register_user("bob", "pass")
|
|
bob_token = self.login(bob, "pass")
|
|
self.helper.join(self.room_id, bob, tok=bob_token)
|
|
|
|
# Alter the power levels in that room to include the bad @room notification
|
|
# level. We need to suppress
|
|
#
|
|
# - canonicaljson validation, because canonicaljson forbids floats;
|
|
# - the event jsonschema validation, because it will forbid bad values; and
|
|
# - the auth rules checks, because they stop us from creating power levels
|
|
# with `"room": null`. (We want to test this case, because we have seen it
|
|
# in the wild.)
|
|
#
|
|
# We have seen stringy and null values for "room" in the wild, so presumably
|
|
# some of this validation was missing in the past.
|
|
with patch("synapse.events.validator.validate_canonicaljson"), patch(
|
|
"synapse.events.validator.jsonschema.validate"
|
|
), patch("synapse.handlers.event_auth.check_state_dependent_auth_rules"):
|
|
pl_event_id = self.helper.send_state(
|
|
self.room_id,
|
|
"m.room.power_levels",
|
|
{
|
|
"users": {self.alice: 60},
|
|
"notifications": {"room": bad_room_level},
|
|
},
|
|
self.token,
|
|
state_key="",
|
|
)["event_id"]
|
|
|
|
# Create a new message event, and try to evaluate it under the dodgy
|
|
# power level event.
|
|
event, unpersisted_context = self.get_success(
|
|
self.event_creation_handler.create_event(
|
|
self.requester,
|
|
{
|
|
"type": "m.room.message",
|
|
"room_id": self.room_id,
|
|
"content": {
|
|
"msgtype": "m.text",
|
|
"body": "helo @room",
|
|
},
|
|
"sender": self.alice,
|
|
},
|
|
prev_event_ids=[pl_event_id],
|
|
)
|
|
)
|
|
context = self.get_success(unpersisted_context.persist(event))
|
|
|
|
bulk_evaluator = BulkPushRuleEvaluator(self.hs)
|
|
# should not raise
|
|
self.get_success(bulk_evaluator.action_for_events_by_user([(event, context)]))
|
|
|
|
# Did Bob see Alice's @room notification?
|
|
highlighted_actions = self.get_success(
|
|
self.hs.get_datastores().main.db_pool.simple_select_list(
|
|
table="event_push_actions_staging",
|
|
keyvalues={
|
|
"event_id": event.event_id,
|
|
"user_id": bob,
|
|
"highlight": 1,
|
|
},
|
|
retcols=("*",),
|
|
desc="get_event_push_actions_staging",
|
|
)
|
|
)
|
|
self.assertEqual(len(highlighted_actions), int(should_permit))
|
|
|
|
@override_config({"push": {"enabled": False}})
|
|
def test_action_for_event_by_user_disabled_by_config(self) -> None:
|
|
"""Ensure that push rules are not calculated when disabled in the config"""
|
|
|
|
# Create a new message event which should cause a notification.
|
|
event, unpersisted_context = self.get_success(
|
|
self.event_creation_handler.create_event(
|
|
self.requester,
|
|
{
|
|
"type": "m.room.message",
|
|
"room_id": self.room_id,
|
|
"content": {
|
|
"msgtype": "m.text",
|
|
"body": "helo",
|
|
},
|
|
"sender": self.alice,
|
|
},
|
|
)
|
|
)
|
|
context = self.get_success(unpersisted_context.persist(event))
|
|
|
|
bulk_evaluator = BulkPushRuleEvaluator(self.hs)
|
|
# Mock the method which calculates push rules -- we do this instead of
|
|
# e.g. checking the results in the database because we want to ensure
|
|
# that code isn't even running.
|
|
bulk_evaluator._action_for_event_by_user = simple_async_mock() # type: ignore[assignment]
|
|
|
|
# Ensure no actions are generated!
|
|
self.get_success(bulk_evaluator.action_for_events_by_user([(event, context)]))
|
|
bulk_evaluator._action_for_event_by_user.assert_not_called()
|
|
|
|
def _create_and_process(
|
|
self, bulk_evaluator: BulkPushRuleEvaluator, content: Optional[JsonDict] = None
|
|
) -> bool:
|
|
"""Returns true iff the `mentions` trigger an event push action."""
|
|
# Create a new message event which should cause a notification.
|
|
event, unpersisted_context = self.get_success(
|
|
self.event_creation_handler.create_event(
|
|
self.requester,
|
|
{
|
|
"type": "test",
|
|
"room_id": self.room_id,
|
|
"content": content or {},
|
|
"sender": f"@bob:{self.hs.hostname}",
|
|
},
|
|
)
|
|
)
|
|
context = self.get_success(unpersisted_context.persist(event))
|
|
# Execute the push rule machinery.
|
|
self.get_success(bulk_evaluator.action_for_events_by_user([(event, context)]))
|
|
|
|
# If any actions are generated for this event, return true.
|
|
result = self.get_success(
|
|
self.hs.get_datastores().main.db_pool.simple_select_list(
|
|
table="event_push_actions_staging",
|
|
keyvalues={"event_id": event.event_id},
|
|
retcols=("*",),
|
|
desc="get_event_push_actions_staging",
|
|
)
|
|
)
|
|
return len(result) > 0
|
|
|
|
@override_config(
|
|
{
|
|
"experimental_features": {
|
|
"msc3758_exact_event_match": True,
|
|
"msc3952_intentional_mentions": True,
|
|
}
|
|
}
|
|
)
|
|
def test_user_mentions(self) -> None:
|
|
"""Test the behavior of an event which includes invalid user mentions."""
|
|
bulk_evaluator = BulkPushRuleEvaluator(self.hs)
|
|
|
|
# Not including the mentions field should not notify.
|
|
self.assertFalse(self._create_and_process(bulk_evaluator))
|
|
# An empty mentions field should not notify.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator, {EventContentFields.MSC3952_MENTIONS: {}}
|
|
)
|
|
)
|
|
|
|
# Non-dict mentions should be ignored.
|
|
mentions: Any
|
|
for mentions in (None, True, False, 1, "foo", []):
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator, {EventContentFields.MSC3952_MENTIONS: mentions}
|
|
)
|
|
)
|
|
|
|
# A non-list should be ignored.
|
|
for mentions in (None, True, False, 1, "foo", {}):
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{EventContentFields.MSC3952_MENTIONS: {"user_ids": mentions}},
|
|
)
|
|
)
|
|
|
|
# The Matrix ID appearing anywhere in the list should notify.
|
|
self.assertTrue(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{EventContentFields.MSC3952_MENTIONS: {"user_ids": [self.alice]}},
|
|
)
|
|
)
|
|
self.assertTrue(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
EventContentFields.MSC3952_MENTIONS: {
|
|
"user_ids": ["@another:test", self.alice]
|
|
}
|
|
},
|
|
)
|
|
)
|
|
|
|
# Duplicate user IDs should notify.
|
|
self.assertTrue(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
EventContentFields.MSC3952_MENTIONS: {
|
|
"user_ids": [self.alice, self.alice]
|
|
}
|
|
},
|
|
)
|
|
)
|
|
|
|
# Invalid entries in the list are ignored.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
EventContentFields.MSC3952_MENTIONS: {
|
|
"user_ids": [None, True, False, {}, []]
|
|
}
|
|
},
|
|
)
|
|
)
|
|
self.assertTrue(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
EventContentFields.MSC3952_MENTIONS: {
|
|
"user_ids": [None, True, False, {}, [], self.alice]
|
|
}
|
|
},
|
|
)
|
|
)
|
|
|
|
# The legacy push rule should not mention if the mentions field exists.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
"body": self.alice,
|
|
"msgtype": "m.text",
|
|
EventContentFields.MSC3952_MENTIONS: {},
|
|
},
|
|
)
|
|
)
|
|
|
|
@override_config(
|
|
{
|
|
"experimental_features": {
|
|
"msc3758_exact_event_match": True,
|
|
"msc3952_intentional_mentions": True,
|
|
}
|
|
}
|
|
)
|
|
def test_room_mentions(self) -> None:
|
|
"""Test the behavior of an event which includes invalid room mentions."""
|
|
bulk_evaluator = BulkPushRuleEvaluator(self.hs)
|
|
|
|
# Room mentions from those without power should not notify.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator, {EventContentFields.MSC3952_MENTIONS: {"room": True}}
|
|
)
|
|
)
|
|
|
|
# Room mentions from those with power should notify.
|
|
self.helper.send_state(
|
|
self.room_id,
|
|
"m.room.power_levels",
|
|
{"notifications": {"room": 0}},
|
|
self.token,
|
|
state_key="",
|
|
)
|
|
self.assertTrue(
|
|
self._create_and_process(
|
|
bulk_evaluator, {EventContentFields.MSC3952_MENTIONS: {"room": True}}
|
|
)
|
|
)
|
|
|
|
# Invalid data should not notify.
|
|
mentions: Any
|
|
for mentions in (None, False, 1, "foo", [], {}):
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{EventContentFields.MSC3952_MENTIONS: {"room": mentions}},
|
|
)
|
|
)
|
|
|
|
# The legacy push rule should not mention if the mentions field exists.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
"body": "@room",
|
|
"msgtype": "m.text",
|
|
EventContentFields.MSC3952_MENTIONS: {},
|
|
},
|
|
)
|
|
)
|
|
|
|
@override_config({"experimental_features": {"msc3958_supress_edit_notifs": True}})
|
|
def test_suppress_edits(self) -> None:
|
|
"""Under the default push rules, event edits should not generate notifications."""
|
|
bulk_evaluator = BulkPushRuleEvaluator(self.hs)
|
|
|
|
# Create & persist an event to use as the parent of the relation.
|
|
event, unpersisted_context = self.get_success(
|
|
self.event_creation_handler.create_event(
|
|
self.requester,
|
|
{
|
|
"type": "m.room.message",
|
|
"room_id": self.room_id,
|
|
"content": {
|
|
"msgtype": "m.text",
|
|
"body": "helo",
|
|
},
|
|
"sender": self.alice,
|
|
},
|
|
)
|
|
)
|
|
context = self.get_success(unpersisted_context.persist(event))
|
|
self.get_success(
|
|
self.event_creation_handler.handle_new_client_event(
|
|
self.requester, events_and_context=[(event, context)]
|
|
)
|
|
)
|
|
|
|
# Room mentions from those without power should not notify.
|
|
self.assertFalse(
|
|
self._create_and_process(
|
|
bulk_evaluator,
|
|
{
|
|
"body": self.alice,
|
|
"m.relates_to": {
|
|
"rel_type": RelationTypes.REPLACE,
|
|
"event_id": event.event_id,
|
|
},
|
|
},
|
|
)
|
|
)
|