mirror of https://github.com/watcha-fr/synapse
Remove backing code for groups/communities (#12558)
Including handlers, configuration code, appservice support, and the GroupID construct.code_spécifique_watcha
parent
1cba285a79
commit
49f06866e4
@ -0,0 +1 @@ |
||||
Remove support for the non-standard groups/communities feature from Synapse. |
@ -1,27 +0,0 @@ |
||||
# Copyright 2017 New Vector Ltd |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
from typing import Any |
||||
|
||||
from synapse.types import JsonDict |
||||
|
||||
from ._base import Config |
||||
|
||||
|
||||
class GroupsConfig(Config): |
||||
section = "groups" |
||||
|
||||
def read_config(self, config: JsonDict, **kwargs: Any) -> None: |
||||
self.enable_group_creation = config.get("enable_group_creation", False) |
||||
self.group_creation_prefix = config.get("group_creation_prefix", "") |
@ -1,218 +0,0 @@ |
||||
# Copyright 2017 Vector Creations Ltd |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
"""Attestations ensure that users and groups can't lie about their memberships. |
||||
|
||||
When a user joins a group the HS and GS swap attestations, which allow them |
||||
both to independently prove to third parties their membership.These |
||||
attestations have a validity period so need to be periodically renewed. |
||||
|
||||
If a user leaves (or gets kicked out of) a group, either side can still use |
||||
their attestation to "prove" their membership, until the attestation expires. |
||||
Therefore attestations shouldn't be relied on to prove membership in important |
||||
cases, but can for less important situations, e.g. showing a users membership |
||||
of groups on their profile, showing flairs, etc. |
||||
|
||||
An attestation is a signed blob of json that looks like: |
||||
|
||||
{ |
||||
"user_id": "@foo:a.example.com", |
||||
"group_id": "+bar:b.example.com", |
||||
"valid_until_ms": 1507994728530, |
||||
"signatures":{"matrix.org":{"ed25519:auto":"..."}} |
||||
} |
||||
""" |
||||
|
||||
import logging |
||||
import random |
||||
from typing import TYPE_CHECKING, Optional, Tuple |
||||
|
||||
from signedjson.sign import sign_json |
||||
|
||||
from twisted.internet.defer import Deferred |
||||
|
||||
from synapse.api.errors import HttpResponseException, RequestSendFailed, SynapseError |
||||
from synapse.metrics.background_process_metrics import run_as_background_process |
||||
from synapse.types import JsonDict, get_domain_from_id |
||||
|
||||
if TYPE_CHECKING: |
||||
from synapse.server import HomeServer |
||||
|
||||
logger = logging.getLogger(__name__) |
||||
|
||||
|
||||
# Default validity duration for new attestations we create |
||||
DEFAULT_ATTESTATION_LENGTH_MS = 3 * 24 * 60 * 60 * 1000 |
||||
|
||||
# We add some jitter to the validity duration of attestations so that if we |
||||
# add lots of users at once we don't need to renew them all at once. |
||||
# The jitter is a multiplier picked randomly between the first and second number |
||||
DEFAULT_ATTESTATION_JITTER = (0.9, 1.3) |
||||
|
||||
# Start trying to update our attestations when they come this close to expiring |
||||
UPDATE_ATTESTATION_TIME_MS = 1 * 24 * 60 * 60 * 1000 |
||||
|
||||
|
||||
class GroupAttestationSigning: |
||||
"""Creates and verifies group attestations.""" |
||||
|
||||
def __init__(self, hs: "HomeServer"): |
||||
self.keyring = hs.get_keyring() |
||||
self.clock = hs.get_clock() |
||||
self.server_name = hs.hostname |
||||
self.signing_key = hs.signing_key |
||||
|
||||
async def verify_attestation( |
||||
self, |
||||
attestation: JsonDict, |
||||
group_id: str, |
||||
user_id: str, |
||||
server_name: Optional[str] = None, |
||||
) -> None: |
||||
"""Verifies that the given attestation matches the given parameters. |
||||
|
||||
An optional server_name can be supplied to explicitly set which server's |
||||
signature is expected. Otherwise assumes that either the group_id or user_id |
||||
is local and uses the other's server as the one to check. |
||||
""" |
||||
|
||||
if not server_name: |
||||
if get_domain_from_id(group_id) == self.server_name: |
||||
server_name = get_domain_from_id(user_id) |
||||
elif get_domain_from_id(user_id) == self.server_name: |
||||
server_name = get_domain_from_id(group_id) |
||||
else: |
||||
raise Exception("Expected either group_id or user_id to be local") |
||||
|
||||
if user_id != attestation["user_id"]: |
||||
raise SynapseError(400, "Attestation has incorrect user_id") |
||||
|
||||
if group_id != attestation["group_id"]: |
||||
raise SynapseError(400, "Attestation has incorrect group_id") |
||||
valid_until_ms = attestation["valid_until_ms"] |
||||
|
||||
# TODO: We also want to check that *new* attestations that people give |
||||
# us to store are valid for at least a little while. |
||||
now = self.clock.time_msec() |
||||
if valid_until_ms < now: |
||||
raise SynapseError(400, "Attestation expired") |
||||
|
||||
assert server_name is not None |
||||
await self.keyring.verify_json_for_server( |
||||
server_name, |
||||
attestation, |
||||
now, |
||||
) |
||||
|
||||
def create_attestation(self, group_id: str, user_id: str) -> JsonDict: |
||||
"""Create an attestation for the group_id and user_id with default |
||||
validity length. |
||||
""" |
||||
validity_period = DEFAULT_ATTESTATION_LENGTH_MS * random.uniform( |
||||
*DEFAULT_ATTESTATION_JITTER |
||||
) |
||||
valid_until_ms = int(self.clock.time_msec() + validity_period) |
||||
|
||||
return sign_json( |
||||
{ |
||||
"group_id": group_id, |
||||
"user_id": user_id, |
||||
"valid_until_ms": valid_until_ms, |
||||
}, |
||||
self.server_name, |
||||
self.signing_key, |
||||
) |
||||
|
||||
|
||||
class GroupAttestionRenewer: |
||||
"""Responsible for sending and receiving attestation updates.""" |
||||
|
||||
def __init__(self, hs: "HomeServer"): |
||||
self.clock = hs.get_clock() |
||||
self.store = hs.get_datastores().main |
||||
self.assestations = hs.get_groups_attestation_signing() |
||||
self.transport_client = hs.get_federation_transport_client() |
||||
self.is_mine_id = hs.is_mine_id |
||||
self.attestations = hs.get_groups_attestation_signing() |
||||
|
||||
if not hs.config.worker.worker_app: |
||||
self._renew_attestations_loop = self.clock.looping_call( |
||||
self._start_renew_attestations, 30 * 60 * 1000 |
||||
) |
||||
|
||||
async def on_renew_attestation( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""When a remote updates an attestation""" |
||||
attestation = content["attestation"] |
||||
|
||||
if not self.is_mine_id(group_id) and not self.is_mine_id(user_id): |
||||
raise SynapseError(400, "Neither user not group are on this server") |
||||
|
||||
await self.attestations.verify_attestation( |
||||
attestation, user_id=user_id, group_id=group_id |
||||
) |
||||
|
||||
await self.store.update_remote_attestion(group_id, user_id, attestation) |
||||
|
||||
return {} |
||||
|
||||
def _start_renew_attestations(self) -> "Deferred[None]": |
||||
return run_as_background_process("renew_attestations", self._renew_attestations) |
||||
|
||||
async def _renew_attestations(self) -> None: |
||||
"""Called periodically to check if we need to update any of our attestations""" |
||||
|
||||
now = self.clock.time_msec() |
||||
|
||||
rows = await self.store.get_attestations_need_renewals( |
||||
now + UPDATE_ATTESTATION_TIME_MS |
||||
) |
||||
|
||||
async def _renew_attestation(group_user: Tuple[str, str]) -> None: |
||||
group_id, user_id = group_user |
||||
try: |
||||
if not self.is_mine_id(group_id): |
||||
destination = get_domain_from_id(group_id) |
||||
elif not self.is_mine_id(user_id): |
||||
destination = get_domain_from_id(user_id) |
||||
else: |
||||
logger.warning( |
||||
"Incorrectly trying to do attestations for user: %r in %r", |
||||
user_id, |
||||
group_id, |
||||
) |
||||
await self.store.remove_attestation_renewal(group_id, user_id) |
||||
return |
||||
|
||||
attestation = self.attestations.create_attestation(group_id, user_id) |
||||
|
||||
await self.transport_client.renew_group_attestation( |
||||
destination, group_id, user_id, content={"attestation": attestation} |
||||
) |
||||
|
||||
await self.store.update_attestation_renewal( |
||||
group_id, user_id, attestation |
||||
) |
||||
except (RequestSendFailed, HttpResponseException) as e: |
||||
logger.warning( |
||||
"Failed to renew attestation of %r in %r: %s", user_id, group_id, e |
||||
) |
||||
except Exception: |
||||
logger.exception( |
||||
"Error renewing attestation of %r in %r", user_id, group_id |
||||
) |
||||
|
||||
for row in rows: |
||||
await _renew_attestation((row["group_id"], row["user_id"])) |
File diff suppressed because it is too large
Load Diff
@ -1,503 +0,0 @@ |
||||
# Copyright 2017 Vector Creations Ltd |
||||
# Copyright 2018 New Vector Ltd |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
import logging |
||||
from typing import TYPE_CHECKING, Any, Awaitable, Callable, Dict, Iterable, List, Set |
||||
|
||||
from synapse.api.errors import HttpResponseException, RequestSendFailed, SynapseError |
||||
from synapse.types import GroupID, JsonDict, get_domain_from_id |
||||
|
||||
if TYPE_CHECKING: |
||||
from synapse.server import HomeServer |
||||
|
||||
logger = logging.getLogger(__name__) |
||||
|
||||
|
||||
def _create_rerouter(func_name: str) -> Callable[..., Awaitable[JsonDict]]: |
||||
"""Returns an async function that looks at the group id and calls the function |
||||
on federation or the local group server if the group is local |
||||
""" |
||||
|
||||
async def f( |
||||
self: "GroupsLocalWorkerHandler", group_id: str, *args: Any, **kwargs: Any |
||||
) -> JsonDict: |
||||
if not GroupID.is_valid(group_id): |
||||
raise SynapseError(400, "%s is not a legal group ID" % (group_id,)) |
||||
|
||||
if self.is_mine_id(group_id): |
||||
return await getattr(self.groups_server_handler, func_name)( |
||||
group_id, *args, **kwargs |
||||
) |
||||
else: |
||||
destination = get_domain_from_id(group_id) |
||||
|
||||
try: |
||||
return await getattr(self.transport_client, func_name)( |
||||
destination, group_id, *args, **kwargs |
||||
) |
||||
except HttpResponseException as e: |
||||
# Capture errors returned by the remote homeserver and |
||||
# re-throw specific errors as SynapseErrors. This is so |
||||
# when the remote end responds with things like 403 Not |
||||
# In Group, we can communicate that to the client instead |
||||
# of a 500. |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
return f |
||||
|
||||
|
||||
class GroupsLocalWorkerHandler: |
||||
def __init__(self, hs: "HomeServer"): |
||||
self.hs = hs |
||||
self.store = hs.get_datastores().main |
||||
self.room_list_handler = hs.get_room_list_handler() |
||||
self.groups_server_handler = hs.get_groups_server_handler() |
||||
self.transport_client = hs.get_federation_transport_client() |
||||
self.auth = hs.get_auth() |
||||
self.clock = hs.get_clock() |
||||
self.keyring = hs.get_keyring() |
||||
self.is_mine_id = hs.is_mine_id |
||||
self.signing_key = hs.signing_key |
||||
self.server_name = hs.hostname |
||||
self.notifier = hs.get_notifier() |
||||
self.attestations = hs.get_groups_attestation_signing() |
||||
|
||||
self.profile_handler = hs.get_profile_handler() |
||||
|
||||
# The following functions merely route the query to the local groups server |
||||
# or federation depending on if the group is local or remote |
||||
|
||||
get_group_profile = _create_rerouter("get_group_profile") |
||||
get_rooms_in_group = _create_rerouter("get_rooms_in_group") |
||||
get_invited_users_in_group = _create_rerouter("get_invited_users_in_group") |
||||
get_group_category = _create_rerouter("get_group_category") |
||||
get_group_categories = _create_rerouter("get_group_categories") |
||||
get_group_role = _create_rerouter("get_group_role") |
||||
get_group_roles = _create_rerouter("get_group_roles") |
||||
|
||||
async def get_group_summary( |
||||
self, group_id: str, requester_user_id: str |
||||
) -> JsonDict: |
||||
"""Get the group summary for a group. |
||||
|
||||
If the group is remote we check that the users have valid attestations. |
||||
""" |
||||
if self.is_mine_id(group_id): |
||||
res = await self.groups_server_handler.get_group_summary( |
||||
group_id, requester_user_id |
||||
) |
||||
else: |
||||
try: |
||||
res = await self.transport_client.get_group_summary( |
||||
get_domain_from_id(group_id), group_id, requester_user_id |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
group_server_name = get_domain_from_id(group_id) |
||||
|
||||
# Loop through the users and validate the attestations. |
||||
chunk = res["users_section"]["users"] |
||||
valid_users = [] |
||||
for entry in chunk: |
||||
g_user_id = entry["user_id"] |
||||
attestation = entry.pop("attestation", {}) |
||||
try: |
||||
if get_domain_from_id(g_user_id) != group_server_name: |
||||
await self.attestations.verify_attestation( |
||||
attestation, |
||||
group_id=group_id, |
||||
user_id=g_user_id, |
||||
server_name=get_domain_from_id(g_user_id), |
||||
) |
||||
valid_users.append(entry) |
||||
except Exception as e: |
||||
logger.info("Failed to verify user is in group: %s", e) |
||||
|
||||
res["users_section"]["users"] = valid_users |
||||
|
||||
res["users_section"]["users"].sort(key=lambda e: e.get("order", 0)) |
||||
res["rooms_section"]["rooms"].sort(key=lambda e: e.get("order", 0)) |
||||
|
||||
# Add `is_publicised` flag to indicate whether the user has publicised their |
||||
# membership of the group on their profile |
||||
result = await self.store.get_publicised_groups_for_user(requester_user_id) |
||||
is_publicised = group_id in result |
||||
|
||||
res.setdefault("user", {})["is_publicised"] = is_publicised |
||||
|
||||
return res |
||||
|
||||
async def get_users_in_group( |
||||
self, group_id: str, requester_user_id: str |
||||
) -> JsonDict: |
||||
"""Get users in a group""" |
||||
if self.is_mine_id(group_id): |
||||
return await self.groups_server_handler.get_users_in_group( |
||||
group_id, requester_user_id |
||||
) |
||||
|
||||
group_server_name = get_domain_from_id(group_id) |
||||
|
||||
try: |
||||
res = await self.transport_client.get_users_in_group( |
||||
get_domain_from_id(group_id), group_id, requester_user_id |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
chunk = res["chunk"] |
||||
valid_entries = [] |
||||
for entry in chunk: |
||||
g_user_id = entry["user_id"] |
||||
attestation = entry.pop("attestation", {}) |
||||
try: |
||||
if get_domain_from_id(g_user_id) != group_server_name: |
||||
await self.attestations.verify_attestation( |
||||
attestation, |
||||
group_id=group_id, |
||||
user_id=g_user_id, |
||||
server_name=get_domain_from_id(g_user_id), |
||||
) |
||||
valid_entries.append(entry) |
||||
except Exception as e: |
||||
logger.info("Failed to verify user is in group: %s", e) |
||||
|
||||
res["chunk"] = valid_entries |
||||
|
||||
return res |
||||
|
||||
async def get_joined_groups(self, user_id: str) -> JsonDict: |
||||
group_ids = await self.store.get_joined_groups(user_id) |
||||
return {"groups": group_ids} |
||||
|
||||
async def get_publicised_groups_for_user(self, user_id: str) -> JsonDict: |
||||
if self.hs.is_mine_id(user_id): |
||||
result = await self.store.get_publicised_groups_for_user(user_id) |
||||
|
||||
# Check AS associated groups for this user - this depends on the |
||||
# RegExps in the AS registration file (under `users`) |
||||
for app_service in self.store.get_app_services(): |
||||
result.extend(app_service.get_groups_for_user(user_id)) |
||||
|
||||
return {"groups": result} |
||||
else: |
||||
try: |
||||
bulk_result = await self.transport_client.bulk_get_publicised_groups( |
||||
get_domain_from_id(user_id), [user_id] |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
result = bulk_result.get("users", {}).get(user_id) |
||||
# TODO: Verify attestations |
||||
return {"groups": result} |
||||
|
||||
async def bulk_get_publicised_groups( |
||||
self, user_ids: Iterable[str], proxy: bool = True |
||||
) -> JsonDict: |
||||
destinations: Dict[str, Set[str]] = {} |
||||
local_users = set() |
||||
|
||||
for user_id in user_ids: |
||||
if self.hs.is_mine_id(user_id): |
||||
local_users.add(user_id) |
||||
else: |
||||
destinations.setdefault(get_domain_from_id(user_id), set()).add(user_id) |
||||
|
||||
if not proxy and destinations: |
||||
raise SynapseError(400, "Some user_ids are not local") |
||||
|
||||
results = {} |
||||
failed_results: List[str] = [] |
||||
for destination, dest_user_ids in destinations.items(): |
||||
try: |
||||
r = await self.transport_client.bulk_get_publicised_groups( |
||||
destination, list(dest_user_ids) |
||||
) |
||||
results.update(r["users"]) |
||||
except Exception: |
||||
failed_results.extend(dest_user_ids) |
||||
|
||||
for uid in local_users: |
||||
results[uid] = await self.store.get_publicised_groups_for_user(uid) |
||||
|
||||
# Check AS associated groups for this user - this depends on the |
||||
# RegExps in the AS registration file (under `users`) |
||||
for app_service in self.store.get_app_services(): |
||||
results[uid].extend(app_service.get_groups_for_user(uid)) |
||||
|
||||
return {"users": results} |
||||
|
||||
|
||||
class GroupsLocalHandler(GroupsLocalWorkerHandler): |
||||
def __init__(self, hs: "HomeServer"): |
||||
super().__init__(hs) |
||||
|
||||
# Ensure attestations get renewed |
||||
hs.get_groups_attestation_renewer() |
||||
|
||||
# The following functions merely route the query to the local groups server |
||||
# or federation depending on if the group is local or remote |
||||
|
||||
update_group_profile = _create_rerouter("update_group_profile") |
||||
|
||||
add_room_to_group = _create_rerouter("add_room_to_group") |
||||
update_room_in_group = _create_rerouter("update_room_in_group") |
||||
remove_room_from_group = _create_rerouter("remove_room_from_group") |
||||
|
||||
update_group_summary_room = _create_rerouter("update_group_summary_room") |
||||
delete_group_summary_room = _create_rerouter("delete_group_summary_room") |
||||
|
||||
update_group_category = _create_rerouter("update_group_category") |
||||
delete_group_category = _create_rerouter("delete_group_category") |
||||
|
||||
update_group_summary_user = _create_rerouter("update_group_summary_user") |
||||
delete_group_summary_user = _create_rerouter("delete_group_summary_user") |
||||
|
||||
update_group_role = _create_rerouter("update_group_role") |
||||
delete_group_role = _create_rerouter("delete_group_role") |
||||
|
||||
set_group_join_policy = _create_rerouter("set_group_join_policy") |
||||
|
||||
async def create_group( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""Create a group""" |
||||
|
||||
logger.info("Asking to create group with ID: %r", group_id) |
||||
|
||||
if self.is_mine_id(group_id): |
||||
res = await self.groups_server_handler.create_group( |
||||
group_id, user_id, content |
||||
) |
||||
local_attestation = None |
||||
remote_attestation = None |
||||
else: |
||||
raise SynapseError(400, "Unable to create remote groups") |
||||
|
||||
is_publicised = content.get("publicise", False) |
||||
token = await self.store.register_user_group_membership( |
||||
group_id, |
||||
user_id, |
||||
membership="join", |
||||
is_admin=True, |
||||
local_attestation=local_attestation, |
||||
remote_attestation=remote_attestation, |
||||
is_publicised=is_publicised, |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
||||
|
||||
return res |
||||
|
||||
async def join_group( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""Request to join a group""" |
||||
if self.is_mine_id(group_id): |
||||
await self.groups_server_handler.join_group(group_id, user_id, content) |
||||
local_attestation = None |
||||
remote_attestation = None |
||||
else: |
||||
local_attestation = self.attestations.create_attestation(group_id, user_id) |
||||
content["attestation"] = local_attestation |
||||
|
||||
try: |
||||
res = await self.transport_client.join_group( |
||||
get_domain_from_id(group_id), group_id, user_id, content |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
remote_attestation = res["attestation"] |
||||
|
||||
await self.attestations.verify_attestation( |
||||
remote_attestation, |
||||
group_id=group_id, |
||||
user_id=user_id, |
||||
server_name=get_domain_from_id(group_id), |
||||
) |
||||
|
||||
# TODO: Check that the group is public and we're being added publicly |
||||
is_publicised = content.get("publicise", False) |
||||
|
||||
token = await self.store.register_user_group_membership( |
||||
group_id, |
||||
user_id, |
||||
membership="join", |
||||
is_admin=False, |
||||
local_attestation=local_attestation, |
||||
remote_attestation=remote_attestation, |
||||
is_publicised=is_publicised, |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
||||
|
||||
return {} |
||||
|
||||
async def accept_invite( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""Accept an invite to a group""" |
||||
if self.is_mine_id(group_id): |
||||
await self.groups_server_handler.accept_invite(group_id, user_id, content) |
||||
local_attestation = None |
||||
remote_attestation = None |
||||
else: |
||||
local_attestation = self.attestations.create_attestation(group_id, user_id) |
||||
content["attestation"] = local_attestation |
||||
|
||||
try: |
||||
res = await self.transport_client.accept_group_invite( |
||||
get_domain_from_id(group_id), group_id, user_id, content |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
remote_attestation = res["attestation"] |
||||
|
||||
await self.attestations.verify_attestation( |
||||
remote_attestation, |
||||
group_id=group_id, |
||||
user_id=user_id, |
||||
server_name=get_domain_from_id(group_id), |
||||
) |
||||
|
||||
# TODO: Check that the group is public and we're being added publicly |
||||
is_publicised = content.get("publicise", False) |
||||
|
||||
token = await self.store.register_user_group_membership( |
||||
group_id, |
||||
user_id, |
||||
membership="join", |
||||
is_admin=False, |
||||
local_attestation=local_attestation, |
||||
remote_attestation=remote_attestation, |
||||
is_publicised=is_publicised, |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
||||
|
||||
return {} |
||||
|
||||
async def invite( |
||||
self, group_id: str, user_id: str, requester_user_id: str, config: JsonDict |
||||
) -> JsonDict: |
||||
"""Invite a user to a group""" |
||||
content = {"requester_user_id": requester_user_id, "config": config} |
||||
if self.is_mine_id(group_id): |
||||
res = await self.groups_server_handler.invite_to_group( |
||||
group_id, user_id, requester_user_id, content |
||||
) |
||||
else: |
||||
try: |
||||
res = await self.transport_client.invite_to_group( |
||||
get_domain_from_id(group_id), |
||||
group_id, |
||||
user_id, |
||||
requester_user_id, |
||||
content, |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
return res |
||||
|
||||
async def on_invite( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""One of our users were invited to a group""" |
||||
# TODO: Support auto join and rejection |
||||
|
||||
if not self.is_mine_id(user_id): |
||||
raise SynapseError(400, "User not on this server") |
||||
|
||||
local_profile = {} |
||||
if "profile" in content: |
||||
if "name" in content["profile"]: |
||||
local_profile["name"] = content["profile"]["name"] |
||||
if "avatar_url" in content["profile"]: |
||||
local_profile["avatar_url"] = content["profile"]["avatar_url"] |
||||
|
||||
token = await self.store.register_user_group_membership( |
||||
group_id, |
||||
user_id, |
||||
membership="invite", |
||||
content={"profile": local_profile, "inviter": content["inviter"]}, |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
||||
try: |
||||
user_profile = await self.profile_handler.get_profile(user_id) |
||||
except Exception as e: |
||||
logger.warning("No profile for user %s: %s", user_id, e) |
||||
user_profile = {} |
||||
|
||||
return {"state": "invite", "user_profile": user_profile} |
||||
|
||||
async def remove_user_from_group( |
||||
self, group_id: str, user_id: str, requester_user_id: str, content: JsonDict |
||||
) -> JsonDict: |
||||
"""Remove a user from a group""" |
||||
if user_id == requester_user_id: |
||||
token = await self.store.register_user_group_membership( |
||||
group_id, user_id, membership="leave" |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
||||
|
||||
# TODO: Should probably remember that we tried to leave so that we can |
||||
# retry if the group server is currently down. |
||||
|
||||
if self.is_mine_id(group_id): |
||||
res = await self.groups_server_handler.remove_user_from_group( |
||||
group_id, user_id, requester_user_id, content |
||||
) |
||||
else: |
||||
content["requester_user_id"] = requester_user_id |
||||
try: |
||||
res = await self.transport_client.remove_user_from_group( |
||||
get_domain_from_id(group_id), |
||||
group_id, |
||||
requester_user_id, |
||||
user_id, |
||||
content, |
||||
) |
||||
except HttpResponseException as e: |
||||
raise e.to_synapse_error() |
||||
except RequestSendFailed: |
||||
raise SynapseError(502, "Failed to contact group server") |
||||
|
||||
return res |
||||
|
||||
async def user_removed_from_group( |
||||
self, group_id: str, user_id: str, content: JsonDict |
||||
) -> None: |
||||
"""One of our users was removed/kicked from a group""" |
||||
# TODO: Check if user in group |
||||
token = await self.store.register_user_group_membership( |
||||
group_id, user_id, membership="leave" |
||||
) |
||||
self.notifier.on_new_event("groups_key", token, users=[user_id]) |
Loading…
Reference in new issue