123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551 |
- # -*- coding: utf-8 -*-
- # Copyright 2018 New Vector
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from mock import Mock
- from twisted.internet import defer
- import synapse.rest.admin
- from synapse.api.constants import EventTypes, RoomEncryptionAlgorithms, UserTypes
- from synapse.rest.client.v1 import login, room
- from synapse.rest.client.v2_alpha import user_directory
- from synapse.storage.roommember import ProfileInfo
- from tests import unittest
- from tests.unittest import override_config
- class UserDirectoryTestCase(unittest.HomeserverTestCase):
- """
- Tests the UserDirectoryHandler.
- """
- servlets = [
- login.register_servlets,
- synapse.rest.admin.register_servlets_for_client_rest_resource,
- room.register_servlets,
- ]
- def make_homeserver(self, reactor, clock):
- config = self.default_config()
- config["update_user_directory"] = True
- return self.setup_test_homeserver(config=config)
- def prepare(self, reactor, clock, hs):
- self.store = hs.get_datastore()
- self.handler = hs.get_user_directory_handler()
- def test_handle_local_profile_change_with_support_user(self):
- support_user_id = "@support:test"
- self.get_success(
- self.store.register_user(
- user_id=support_user_id, password_hash=None, user_type=UserTypes.SUPPORT
- )
- )
- self.get_success(
- self.handler.handle_local_profile_change(support_user_id, None)
- )
- profile = self.get_success(self.store.get_user_in_directory(support_user_id))
- self.assertTrue(profile is None)
- display_name = "display_name"
- profile_info = ProfileInfo(avatar_url="avatar_url", display_name=display_name)
- regular_user_id = "@regular:test"
- self.get_success(
- self.handler.handle_local_profile_change(regular_user_id, profile_info)
- )
- profile = self.get_success(self.store.get_user_in_directory(regular_user_id))
- self.assertTrue(profile["display_name"] == display_name)
- def test_handle_user_deactivated_support_user(self):
- s_user_id = "@support:test"
- self.get_success(
- self.store.register_user(
- user_id=s_user_id, password_hash=None, user_type=UserTypes.SUPPORT
- )
- )
- self.store.remove_from_user_dir = Mock(return_value=defer.succeed(None))
- self.get_success(self.handler.handle_user_deactivated(s_user_id))
- self.store.remove_from_user_dir.not_called()
- def test_handle_user_deactivated_regular_user(self):
- r_user_id = "@regular:test"
- self.get_success(
- self.store.register_user(user_id=r_user_id, password_hash=None)
- )
- self.store.remove_from_user_dir = Mock(return_value=defer.succeed(None))
- self.get_success(self.handler.handle_user_deactivated(r_user_id))
- self.store.remove_from_user_dir.called_once_with(r_user_id)
- def test_private_room(self):
- """
- A user can be searched for only by people that are either in a public
- room, or that share a private chat.
- """
- u1 = self.register_user("user1", "pass")
- u1_token = self.login(u1, "pass")
- u2 = self.register_user("user2", "pass")
- u2_token = self.login(u2, "pass")
- u3 = self.register_user("user3", "pass")
- # We do not add users to the directory until they join a room.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- room = self.helper.create_room_as(u1, is_public=False, tok=u1_token)
- self.helper.invite(room, src=u1, targ=u2, tok=u1_token)
- self.helper.join(room, user=u2, tok=u2_token)
- # Check we have populated the database correctly.
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- self.assertEqual(
- self._compress_shared(shares_private), {(u1, u2, room), (u2, u1, room)}
- )
- self.assertEqual(public_users, [])
- # We get one search result when searching for user2 by user1.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 1)
- # We get NO search results when searching for user2 by user3.
- s = self.get_success(self.handler.search_users(u3, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- # We get NO search results when searching for user3 by user1.
- s = self.get_success(self.handler.search_users(u1, "user3", 10))
- self.assertEqual(len(s["results"]), 0)
- # User 2 then leaves.
- self.helper.leave(room, user=u2, tok=u2_token)
- # Check we have removed the values.
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- self.assertEqual(self._compress_shared(shares_private), set())
- self.assertEqual(public_users, [])
- # User1 now gets no search results for any of the other users.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- s = self.get_success(self.handler.search_users(u1, "user3", 10))
- self.assertEqual(len(s["results"]), 0)
- @override_config({"encryption_enabled_by_default_for_room_type": "all"})
- def test_encrypted_by_default_config_option_all(self):
- """Tests that invite-only and non-invite-only rooms have encryption enabled by
- default when the config option encryption_enabled_by_default_for_room_type is "all".
- """
- # Create a user
- user = self.register_user("user", "pass")
- user_token = self.login(user, "pass")
- # Create an invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=False, tok=user_token)
- # Check that the room has an encryption state event
- event_content = self.helper.get_state(
- room_id=room_id, event_type=EventTypes.RoomEncryption, tok=user_token,
- )
- self.assertEqual(event_content, {"algorithm": RoomEncryptionAlgorithms.DEFAULT})
- # Create a non invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=True, tok=user_token)
- # Check that the room has an encryption state event
- event_content = self.helper.get_state(
- room_id=room_id, event_type=EventTypes.RoomEncryption, tok=user_token,
- )
- self.assertEqual(event_content, {"algorithm": RoomEncryptionAlgorithms.DEFAULT})
- @override_config({"encryption_enabled_by_default_for_room_type": "invite"})
- def test_encrypted_by_default_config_option_invite(self):
- """Tests that only new, invite-only rooms have encryption enabled by default when
- the config option encryption_enabled_by_default_for_room_type is "invite".
- """
- # Create a user
- user = self.register_user("user", "pass")
- user_token = self.login(user, "pass")
- # Create an invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=False, tok=user_token)
- # Check that the room has an encryption state event
- event_content = self.helper.get_state(
- room_id=room_id, event_type=EventTypes.RoomEncryption, tok=user_token,
- )
- self.assertEqual(event_content, {"algorithm": RoomEncryptionAlgorithms.DEFAULT})
- # Create a non invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=True, tok=user_token)
- # Check that the room does not have an encryption state event
- self.helper.get_state(
- room_id=room_id,
- event_type=EventTypes.RoomEncryption,
- tok=user_token,
- expect_code=404,
- )
- @override_config({"encryption_enabled_by_default_for_room_type": "off"})
- def test_encrypted_by_default_config_option_off(self):
- """Tests that neither new invite-only nor non-invite-only rooms have encryption
- enabled by default when the config option
- encryption_enabled_by_default_for_room_type is "off".
- """
- # Create a user
- user = self.register_user("user", "pass")
- user_token = self.login(user, "pass")
- # Create an invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=False, tok=user_token)
- # Check that the room does not have an encryption state event
- self.helper.get_state(
- room_id=room_id,
- event_type=EventTypes.RoomEncryption,
- tok=user_token,
- expect_code=404,
- )
- # Create a non invite-only room as that user
- room_id = self.helper.create_room_as(user, is_public=True, tok=user_token)
- # Check that the room does not have an encryption state event
- self.helper.get_state(
- room_id=room_id,
- event_type=EventTypes.RoomEncryption,
- tok=user_token,
- expect_code=404,
- )
- def test_spam_checker(self):
- """
- A user which fails to the spam checks will not appear in search results.
- """
- u1 = self.register_user("user1", "pass")
- u1_token = self.login(u1, "pass")
- u2 = self.register_user("user2", "pass")
- u2_token = self.login(u2, "pass")
- # We do not add users to the directory until they join a room.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- room = self.helper.create_room_as(u1, is_public=False, tok=u1_token)
- self.helper.invite(room, src=u1, targ=u2, tok=u1_token)
- self.helper.join(room, user=u2, tok=u2_token)
- # Check we have populated the database correctly.
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- self.assertEqual(
- self._compress_shared(shares_private), {(u1, u2, room), (u2, u1, room)}
- )
- self.assertEqual(public_users, [])
- # We get one search result when searching for user2 by user1.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 1)
- # Configure a spam checker that does not filter any users.
- spam_checker = self.hs.get_spam_checker()
- class AllowAll(object):
- def check_username_for_spam(self, user_profile):
- # Allow all users.
- return False
- spam_checker.spam_checkers = [AllowAll()]
- # The results do not change:
- # We get one search result when searching for user2 by user1.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 1)
- # Configure a spam checker that filters all users.
- class BlockAll(object):
- def check_username_for_spam(self, user_profile):
- # All users are spammy.
- return True
- spam_checker.spam_checkers = [BlockAll()]
- # User1 now gets no search results for any of the other users.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- def test_legacy_spam_checker(self):
- """
- A spam checker without the expected method should be ignored.
- """
- u1 = self.register_user("user1", "pass")
- u1_token = self.login(u1, "pass")
- u2 = self.register_user("user2", "pass")
- u2_token = self.login(u2, "pass")
- # We do not add users to the directory until they join a room.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 0)
- room = self.helper.create_room_as(u1, is_public=False, tok=u1_token)
- self.helper.invite(room, src=u1, targ=u2, tok=u1_token)
- self.helper.join(room, user=u2, tok=u2_token)
- # Check we have populated the database correctly.
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- self.assertEqual(
- self._compress_shared(shares_private), {(u1, u2, room), (u2, u1, room)}
- )
- self.assertEqual(public_users, [])
- # Configure a spam checker.
- spam_checker = self.hs.get_spam_checker()
- # The spam checker doesn't need any methods, so create a bare object.
- spam_checker.spam_checker = object()
- # We get one search result when searching for user2 by user1.
- s = self.get_success(self.handler.search_users(u1, "user2", 10))
- self.assertEqual(len(s["results"]), 1)
- def _compress_shared(self, shared):
- """
- Compress a list of users who share rooms dicts to a list of tuples.
- """
- r = set()
- for i in shared:
- r.add((i["user_id"], i["other_user_id"], i["room_id"]))
- return r
- def get_users_in_public_rooms(self):
- r = self.get_success(
- self.store.db_pool.simple_select_list(
- "users_in_public_rooms", None, ("user_id", "room_id")
- )
- )
- retval = []
- for i in r:
- retval.append((i["user_id"], i["room_id"]))
- return retval
- def get_users_who_share_private_rooms(self):
- return self.get_success(
- self.store.db_pool.simple_select_list(
- "users_who_share_private_rooms",
- None,
- ["user_id", "other_user_id", "room_id"],
- )
- )
- def _add_background_updates(self):
- """
- Add the background updates we need to run.
- """
- # Ugh, have to reset this flag
- self.store.db_pool.updates._all_done = False
- self.get_success(
- self.store.db_pool.simple_insert(
- "background_updates",
- {
- "update_name": "populate_user_directory_createtables",
- "progress_json": "{}",
- },
- )
- )
- self.get_success(
- self.store.db_pool.simple_insert(
- "background_updates",
- {
- "update_name": "populate_user_directory_process_rooms",
- "progress_json": "{}",
- "depends_on": "populate_user_directory_createtables",
- },
- )
- )
- self.get_success(
- self.store.db_pool.simple_insert(
- "background_updates",
- {
- "update_name": "populate_user_directory_process_users",
- "progress_json": "{}",
- "depends_on": "populate_user_directory_process_rooms",
- },
- )
- )
- self.get_success(
- self.store.db_pool.simple_insert(
- "background_updates",
- {
- "update_name": "populate_user_directory_cleanup",
- "progress_json": "{}",
- "depends_on": "populate_user_directory_process_users",
- },
- )
- )
- def test_initial(self):
- """
- The user directory's initial handler correctly updates the search tables.
- """
- u1 = self.register_user("user1", "pass")
- u1_token = self.login(u1, "pass")
- u2 = self.register_user("user2", "pass")
- u2_token = self.login(u2, "pass")
- u3 = self.register_user("user3", "pass")
- u3_token = self.login(u3, "pass")
- room = self.helper.create_room_as(u1, is_public=True, tok=u1_token)
- self.helper.invite(room, src=u1, targ=u2, tok=u1_token)
- self.helper.join(room, user=u2, tok=u2_token)
- private_room = self.helper.create_room_as(u1, is_public=False, tok=u1_token)
- self.helper.invite(private_room, src=u1, targ=u3, tok=u1_token)
- self.helper.join(private_room, user=u3, tok=u3_token)
- self.get_success(self.store.update_user_directory_stream_pos(None))
- self.get_success(self.store.delete_all_from_user_dir())
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- # Nothing updated yet
- self.assertEqual(shares_private, [])
- self.assertEqual(public_users, [])
- # Do the initial population of the user directory via the background update
- self._add_background_updates()
- while not self.get_success(
- self.store.db_pool.updates.has_completed_background_updates()
- ):
- self.get_success(
- self.store.db_pool.updates.do_next_background_update(100), by=0.1
- )
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- # User 1 and User 2 are in the same public room
- self.assertEqual(set(public_users), {(u1, room), (u2, room)})
- # User 1 and User 3 share private rooms
- self.assertEqual(
- self._compress_shared(shares_private),
- {(u1, u3, private_room), (u3, u1, private_room)},
- )
- def test_initial_share_all_users(self):
- """
- Search all users = True means that a user does not have to share a
- private room with the searching user or be in a public room to be search
- visible.
- """
- self.handler.search_all_users = True
- self.hs.config.user_directory_search_all_users = True
- u1 = self.register_user("user1", "pass")
- self.register_user("user2", "pass")
- u3 = self.register_user("user3", "pass")
- # Wipe the user dir
- self.get_success(self.store.update_user_directory_stream_pos(None))
- self.get_success(self.store.delete_all_from_user_dir())
- # Do the initial population of the user directory via the background update
- self._add_background_updates()
- while not self.get_success(
- self.store.db_pool.updates.has_completed_background_updates()
- ):
- self.get_success(
- self.store.db_pool.updates.do_next_background_update(100), by=0.1
- )
- shares_private = self.get_users_who_share_private_rooms()
- public_users = self.get_users_in_public_rooms()
- # No users share rooms
- self.assertEqual(public_users, [])
- self.assertEqual(self._compress_shared(shares_private), set())
- # Despite not sharing a room, search_all_users means we get a search
- # result.
- s = self.get_success(self.handler.search_users(u1, u3, 10))
- self.assertEqual(len(s["results"]), 1)
- # We can find the other two users
- s = self.get_success(self.handler.search_users(u1, "user", 10))
- self.assertEqual(len(s["results"]), 2)
- # Registering a user and then searching for them works.
- u4 = self.register_user("user4", "pass")
- s = self.get_success(self.handler.search_users(u1, u4, 10))
- self.assertEqual(len(s["results"]), 1)
- class TestUserDirSearchDisabled(unittest.HomeserverTestCase):
- user_id = "@test:test"
- servlets = [
- user_directory.register_servlets,
- room.register_servlets,
- login.register_servlets,
- synapse.rest.admin.register_servlets_for_client_rest_resource,
- ]
- def make_homeserver(self, reactor, clock):
- config = self.default_config()
- config["update_user_directory"] = True
- hs = self.setup_test_homeserver(config=config)
- self.config = hs.config
- return hs
- def test_disabling_room_list(self):
- self.config.user_directory_search_enabled = True
- # First we create a room with another user so that user dir is non-empty
- # for our user
- self.helper.create_room_as(self.user_id)
- u2 = self.register_user("user2", "pass")
- room = self.helper.create_room_as(self.user_id)
- self.helper.join(room, user=u2)
- # Assert user directory is not empty
- request, channel = self.make_request(
- "POST", b"user_directory/search", b'{"search_term":"user2"}'
- )
- self.render(request)
- self.assertEquals(200, channel.code, channel.result)
- self.assertTrue(len(channel.json_body["results"]) > 0)
- # Disable user directory and check search returns nothing
- self.config.user_directory_search_enabled = False
- request, channel = self.make_request(
- "POST", b"user_directory/search", b'{"search_term":"user2"}'
- )
- self.render(request)
- self.assertEquals(200, channel.code, channel.result)
- self.assertTrue(len(channel.json_body["results"]) == 0)
|