This repository has been archived by the owner on Apr 26, 2024. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Do not propagate profile changes of shadow-banned users into rooms #8157
Merged
Merged
Changes from all commits
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
f34650b
Move tests to separate file.
clokep 81f432e
Do not allow profile changes to propagate to rooms.
clokep 237f5c8
Add a newsfragment.
clokep 580c0f8
Fix copy and paste errors
clokep 0274414
Ensure the display name in the room was not updated.
clokep 37af103
Also handle directly changing the state for a room.
clokep a2cfbff
Merge remote-tracking branch 'origin/develop' into clokep/shadow-bann…
clokep a4a8c2c
Clarify comment.
clokep c21729d
Merge remote-tracking branch 'origin/develop' into clokep/shadow-bann…
clokep File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
Add support for shadow-banning users (ignoring any message send requests). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,272 @@ | ||
# Copyright 2020 The Matrix.org Foundation C.I.C. | ||
# | ||
# Licensed under the Apache License, Version 2.0 (the "License"); | ||
# you may not use this file except in compliance with the License. | ||
# You may obtain a copy of the License at | ||
# | ||
# http://www.apache.org/licenses/LICENSE-2.0 | ||
# | ||
# Unless required by applicable law or agreed to in writing, software | ||
# distributed under the License is distributed on an "AS IS" BASIS, | ||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
# See the License for the specific language governing permissions and | ||
# limitations under the License. | ||
|
||
from mock import Mock, patch | ||
|
||
import synapse.rest.admin | ||
from synapse.api.constants import EventTypes | ||
from synapse.rest.client.v1 import directory, login, profile, room | ||
from synapse.rest.client.v2_alpha import room_upgrade_rest_servlet | ||
|
||
from tests import unittest | ||
|
||
|
||
class _ShadowBannedBase(unittest.HomeserverTestCase): | ||
def prepare(self, reactor, clock, homeserver): | ||
# Create two users, one of which is shadow-banned. | ||
self.banned_user_id = self.register_user("banned", "test") | ||
self.banned_access_token = self.login("banned", "test") | ||
|
||
self.store = self.hs.get_datastore() | ||
|
||
self.get_success( | ||
self.store.db_pool.simple_update( | ||
table="users", | ||
keyvalues={"name": self.banned_user_id}, | ||
updatevalues={"shadow_banned": True}, | ||
desc="shadow_ban", | ||
) | ||
) | ||
|
||
self.other_user_id = self.register_user("otheruser", "pass") | ||
self.other_access_token = self.login("otheruser", "pass") | ||
|
||
|
||
# To avoid the tests timing out don't add a delay to "annoy the requester". | ||
@patch("random.randint", new=lambda a, b: 0) | ||
class RoomTestCase(_ShadowBannedBase): | ||
servlets = [ | ||
synapse.rest.admin.register_servlets_for_client_rest_resource, | ||
directory.register_servlets, | ||
login.register_servlets, | ||
room.register_servlets, | ||
room_upgrade_rest_servlet.register_servlets, | ||
] | ||
|
||
def test_invite(self): | ||
"""Invites from shadow-banned users don't actually get sent.""" | ||
|
||
# The create works fine. | ||
room_id = self.helper.create_room_as( | ||
self.banned_user_id, tok=self.banned_access_token | ||
) | ||
|
||
# Inviting the user completes successfully. | ||
self.helper.invite( | ||
room=room_id, | ||
src=self.banned_user_id, | ||
tok=self.banned_access_token, | ||
targ=self.other_user_id, | ||
) | ||
|
||
# But the user wasn't actually invited. | ||
invited_rooms = self.get_success( | ||
self.store.get_invited_rooms_for_local_user(self.other_user_id) | ||
) | ||
self.assertEqual(invited_rooms, []) | ||
|
||
def test_invite_3pid(self): | ||
"""Ensure that a 3PID invite does not attempt to contact the identity server.""" | ||
identity_handler = self.hs.get_handlers().identity_handler | ||
identity_handler.lookup_3pid = Mock( | ||
side_effect=AssertionError("This should not get called") | ||
) | ||
|
||
# The create works fine. | ||
room_id = self.helper.create_room_as( | ||
self.banned_user_id, tok=self.banned_access_token | ||
) | ||
|
||
# Inviting the user completes successfully. | ||
request, channel = self.make_request( | ||
"POST", | ||
"/rooms/%s/invite" % (room_id,), | ||
{"id_server": "test", "medium": "email", "address": "test@test.test"}, | ||
access_token=self.banned_access_token, | ||
) | ||
self.render(request) | ||
self.assertEquals(200, channel.code, channel.result) | ||
|
||
# This should have raised an error earlier, but double check this wasn't called. | ||
identity_handler.lookup_3pid.assert_not_called() | ||
|
||
def test_create_room(self): | ||
"""Invitations during a room creation should be discarded, but the room still gets created.""" | ||
# The room creation is successful. | ||
request, channel = self.make_request( | ||
"POST", | ||
"/_matrix/client/r0/createRoom", | ||
{"visibility": "public", "invite": [self.other_user_id]}, | ||
access_token=self.banned_access_token, | ||
) | ||
self.render(request) | ||
self.assertEquals(200, channel.code, channel.result) | ||
room_id = channel.json_body["room_id"] | ||
|
||
# But the user wasn't actually invited. | ||
invited_rooms = self.get_success( | ||
self.store.get_invited_rooms_for_local_user(self.other_user_id) | ||
) | ||
self.assertEqual(invited_rooms, []) | ||
|
||
# Since a real room was created, the other user should be able to join it. | ||
self.helper.join(room_id, self.other_user_id, tok=self.other_access_token) | ||
|
||
# Both users should be in the room. | ||
users = self.get_success(self.store.get_users_in_room(room_id)) | ||
self.assertCountEqual(users, ["@banned:test", "@otheruser:test"]) | ||
|
||
def test_message(self): | ||
"""Messages from shadow-banned users don't actually get sent.""" | ||
|
||
room_id = self.helper.create_room_as( | ||
self.other_user_id, tok=self.other_access_token | ||
) | ||
|
||
# The user should be in the room. | ||
self.helper.join(room_id, self.banned_user_id, tok=self.banned_access_token) | ||
|
||
# Sending a message should complete successfully. | ||
result = self.helper.send_event( | ||
room_id=room_id, | ||
type=EventTypes.Message, | ||
content={"msgtype": "m.text", "body": "with right label"}, | ||
tok=self.banned_access_token, | ||
) | ||
self.assertIn("event_id", result) | ||
event_id = result["event_id"] | ||
|
||
latest_events = self.get_success( | ||
self.store.get_latest_event_ids_in_room(room_id) | ||
) | ||
self.assertNotIn(event_id, latest_events) | ||
|
||
def test_upgrade(self): | ||
"""A room upgrade should fail, but look like it succeeded.""" | ||
|
||
# The create works fine. | ||
room_id = self.helper.create_room_as( | ||
self.banned_user_id, tok=self.banned_access_token | ||
) | ||
|
||
request, channel = self.make_request( | ||
"POST", | ||
"/_matrix/client/r0/rooms/%s/upgrade" % (room_id,), | ||
{"new_version": "6"}, | ||
access_token=self.banned_access_token, | ||
) | ||
self.render(request) | ||
self.assertEquals(200, channel.code, channel.result) | ||
# A new room_id should be returned. | ||
self.assertIn("replacement_room", channel.json_body) | ||
|
||
new_room_id = channel.json_body["replacement_room"] | ||
|
||
# It doesn't really matter what API we use here, we just want to assert | ||
# that the room doesn't exist. | ||
summary = self.get_success(self.store.get_room_summary(new_room_id)) | ||
# The summary should be empty since the room doesn't exist. | ||
self.assertEqual(summary, {}) | ||
|
||
|
||
# To avoid the tests timing out don't add a delay to "annoy the requester". | ||
@patch("random.randint", new=lambda a, b: 0) | ||
class ProfileTestCase(_ShadowBannedBase): | ||
servlets = [ | ||
synapse.rest.admin.register_servlets_for_client_rest_resource, | ||
login.register_servlets, | ||
profile.register_servlets, | ||
room.register_servlets, | ||
] | ||
|
||
def test_displayname(self): | ||
"""Profile changes should succeed, but don't end up in a room.""" | ||
original_display_name = "banned" | ||
new_display_name = "new name" | ||
|
||
# Join a room. | ||
room_id = self.helper.create_room_as( | ||
self.banned_user_id, tok=self.banned_access_token | ||
) | ||
|
||
# The update should succeed. | ||
request, channel = self.make_request( | ||
"PUT", | ||
"/_matrix/client/r0/profile/%s/displayname" % (self.banned_user_id,), | ||
{"displayname": new_display_name}, | ||
access_token=self.banned_access_token, | ||
) | ||
self.render(request) | ||
self.assertEquals(200, channel.code, channel.result) | ||
self.assertEqual(channel.json_body, {}) | ||
|
||
# The user's display name should be updated. | ||
request, channel = self.make_request( | ||
"GET", "/profile/%s/displayname" % (self.banned_user_id,) | ||
) | ||
self.render(request) | ||
self.assertEqual(channel.code, 200, channel.result) | ||
self.assertEqual(channel.json_body["displayname"], new_display_name) | ||
|
||
# But the display name in the room should not be. | ||
message_handler = self.hs.get_message_handler() | ||
event = self.get_success( | ||
message_handler.get_room_data( | ||
self.banned_user_id, | ||
room_id, | ||
"m.room.member", | ||
self.banned_user_id, | ||
False, | ||
) | ||
) | ||
self.assertEqual( | ||
event.content, {"membership": "join", "displayname": original_display_name} | ||
) | ||
|
||
def test_room_displayname(self): | ||
"""Changes to state events for a room should be processed, but not end up in the room.""" | ||
original_display_name = "banned" | ||
new_display_name = "new name" | ||
|
||
# Join a room. | ||
room_id = self.helper.create_room_as( | ||
self.banned_user_id, tok=self.banned_access_token | ||
) | ||
|
||
# The update should succeed. | ||
request, channel = self.make_request( | ||
"PUT", | ||
"/_matrix/client/r0/rooms/%s/state/m.room.member/%s" | ||
% (room_id, self.banned_user_id), | ||
{"membership": "join", "displayname": new_display_name}, | ||
access_token=self.banned_access_token, | ||
) | ||
self.render(request) | ||
self.assertEquals(200, channel.code, channel.result) | ||
self.assertIn("event_id", channel.json_body) | ||
|
||
# The display name in the room should not be changed. | ||
message_handler = self.hs.get_message_handler() | ||
event = self.get_success( | ||
message_handler.get_room_data( | ||
self.banned_user_id, | ||
room_id, | ||
"m.room.member", | ||
self.banned_user_id, | ||
False, | ||
) | ||
) | ||
self.assertEqual( | ||
event.content, {"membership": "join", "displayname": original_display_name} | ||
) |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Elegant way to break the classes up 👍