123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546 |
- # Copyright 2015, 2016 OpenMarket Ltd
- #
- # Licensed under the Apache License, Version 2.0 (the 'License');
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an 'AS IS' BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from synapse.api.constants import EventContentFields
- from synapse.api.room_versions import RoomVersions
- from synapse.events import make_event_from_dict
- from synapse.events.utils import (
- copy_power_levels_contents,
- prune_event,
- serialize_event,
- )
- from synapse.util.frozenutils import freeze
- from tests import unittest
- def MockEvent(**kwargs):
- if "event_id" not in kwargs:
- kwargs["event_id"] = "fake_event_id"
- if "type" not in kwargs:
- kwargs["type"] = "fake_type"
- return make_event_from_dict(kwargs)
- class PruneEventTestCase(unittest.TestCase):
- def run_test(self, evdict, matchdict, **kwargs):
- """
- Asserts that a new event constructed with `evdict` will look like
- `matchdict` when it is redacted.
- Args:
- evdict: The dictionary to build the event from.
- matchdict: The expected resulting dictionary.
- kwargs: Additional keyword arguments used to create the event.
- """
- self.assertEqual(
- prune_event(make_event_from_dict(evdict, **kwargs)).get_dict(), matchdict
- )
- def test_minimal(self):
- self.run_test(
- {"type": "A", "event_id": "$test:domain"},
- {
- "type": "A",
- "event_id": "$test:domain",
- "content": {},
- "signatures": {},
- "unsigned": {},
- },
- )
- def test_basic_keys(self):
- """Ensure that the keys that should be untouched are kept."""
- # Note that some of the values below don't really make sense, but the
- # pruning of events doesn't worry about the values of any fields (with
- # the exception of the content field).
- self.run_test(
- {
- "event_id": "$3:domain",
- "type": "A",
- "room_id": "!1:domain",
- "sender": "@2:domain",
- "state_key": "B",
- "content": {"other_key": "foo"},
- "hashes": "hashes",
- "signatures": {"domain": {"algo:1": "sigs"}},
- "depth": 4,
- "prev_events": "prev_events",
- "prev_state": "prev_state",
- "auth_events": "auth_events",
- "origin": "domain",
- "origin_server_ts": 1234,
- "membership": "join",
- # Also include a key that should be removed.
- "other_key": "foo",
- },
- {
- "event_id": "$3:domain",
- "type": "A",
- "room_id": "!1:domain",
- "sender": "@2:domain",
- "state_key": "B",
- "hashes": "hashes",
- "depth": 4,
- "prev_events": "prev_events",
- "prev_state": "prev_state",
- "auth_events": "auth_events",
- "origin": "domain",
- "origin_server_ts": 1234,
- "membership": "join",
- "content": {},
- "signatures": {"domain": {"algo:1": "sigs"}},
- "unsigned": {},
- },
- )
- # As of MSC2176 we now redact the membership and prev_states keys.
- self.run_test(
- {"type": "A", "prev_state": "prev_state", "membership": "join"},
- {"type": "A", "content": {}, "signatures": {}, "unsigned": {}},
- room_version=RoomVersions.MSC2176,
- )
- def test_unsigned(self):
- """Ensure that unsigned properties get stripped (except age_ts and replaces_state)."""
- self.run_test(
- {
- "type": "B",
- "event_id": "$test:domain",
- "unsigned": {
- "age_ts": 20,
- "replaces_state": "$test2:domain",
- "other_key": "foo",
- },
- },
- {
- "type": "B",
- "event_id": "$test:domain",
- "content": {},
- "signatures": {},
- "unsigned": {"age_ts": 20, "replaces_state": "$test2:domain"},
- },
- )
- def test_content(self):
- """The content dictionary should be stripped in most cases."""
- self.run_test(
- {"type": "C", "event_id": "$test:domain", "content": {"things": "here"}},
- {
- "type": "C",
- "event_id": "$test:domain",
- "content": {},
- "signatures": {},
- "unsigned": {},
- },
- )
- # Some events keep a single content key/value.
- EVENT_KEEP_CONTENT_KEYS = [
- ("member", "membership", "join"),
- ("join_rules", "join_rule", "invite"),
- ("history_visibility", "history_visibility", "shared"),
- ]
- for event_type, key, value in EVENT_KEEP_CONTENT_KEYS:
- self.run_test(
- {
- "type": "m.room." + event_type,
- "event_id": "$test:domain",
- "content": {key: value, "other_key": "foo"},
- },
- {
- "type": "m.room." + event_type,
- "event_id": "$test:domain",
- "content": {key: value},
- "signatures": {},
- "unsigned": {},
- },
- )
- def test_create(self):
- """Create events are partially redacted until MSC2176."""
- self.run_test(
- {
- "type": "m.room.create",
- "event_id": "$test:domain",
- "content": {"creator": "@2:domain", "other_key": "foo"},
- },
- {
- "type": "m.room.create",
- "event_id": "$test:domain",
- "content": {"creator": "@2:domain"},
- "signatures": {},
- "unsigned": {},
- },
- )
- # After MSC2176, create events get nothing redacted.
- self.run_test(
- {"type": "m.room.create", "content": {"not_a_real_key": True}},
- {
- "type": "m.room.create",
- "content": {"not_a_real_key": True},
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.MSC2176,
- )
- def test_power_levels(self):
- """Power level events keep a variety of content keys."""
- self.run_test(
- {
- "type": "m.room.power_levels",
- "event_id": "$test:domain",
- "content": {
- "ban": 1,
- "events": {"m.room.name": 100},
- "events_default": 2,
- "invite": 3,
- "kick": 4,
- "redact": 5,
- "state_default": 6,
- "users": {"@admin:domain": 100},
- "users_default": 7,
- "other_key": 8,
- },
- },
- {
- "type": "m.room.power_levels",
- "event_id": "$test:domain",
- "content": {
- "ban": 1,
- "events": {"m.room.name": 100},
- "events_default": 2,
- # Note that invite is not here.
- "kick": 4,
- "redact": 5,
- "state_default": 6,
- "users": {"@admin:domain": 100},
- "users_default": 7,
- },
- "signatures": {},
- "unsigned": {},
- },
- )
- # After MSC2176, power levels events keep the invite key.
- self.run_test(
- {"type": "m.room.power_levels", "content": {"invite": 75}},
- {
- "type": "m.room.power_levels",
- "content": {"invite": 75},
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.MSC2176,
- )
- def test_alias_event(self):
- """Alias events have special behavior up through room version 6."""
- self.run_test(
- {
- "type": "m.room.aliases",
- "event_id": "$test:domain",
- "content": {"aliases": ["test"]},
- },
- {
- "type": "m.room.aliases",
- "event_id": "$test:domain",
- "content": {"aliases": ["test"]},
- "signatures": {},
- "unsigned": {},
- },
- )
- # After MSC2432, alias events have no special behavior.
- self.run_test(
- {"type": "m.room.aliases", "content": {"aliases": ["test"]}},
- {
- "type": "m.room.aliases",
- "content": {},
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.V6,
- )
- def test_redacts(self):
- """Redaction events have no special behaviour until MSC2174/MSC2176."""
- self.run_test(
- {"type": "m.room.redaction", "content": {"redacts": "$test2:domain"}},
- {
- "type": "m.room.redaction",
- "content": {},
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.V6,
- )
- # After MSC2174, redaction events keep the redacts content key.
- self.run_test(
- {"type": "m.room.redaction", "content": {"redacts": "$test2:domain"}},
- {
- "type": "m.room.redaction",
- "content": {"redacts": "$test2:domain"},
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.MSC2176,
- )
- def test_join_rules(self):
- """Join rules events have changed behavior starting with MSC3083."""
- self.run_test(
- {
- "type": "m.room.join_rules",
- "event_id": "$test:domain",
- "content": {
- "join_rule": "invite",
- "allow": [],
- "other_key": "stripped",
- },
- },
- {
- "type": "m.room.join_rules",
- "event_id": "$test:domain",
- "content": {"join_rule": "invite"},
- "signatures": {},
- "unsigned": {},
- },
- )
- # After MSC3083, the allow key is protected from redaction.
- self.run_test(
- {
- "type": "m.room.join_rules",
- "content": {
- "join_rule": "invite",
- "allow": [],
- "other_key": "stripped",
- },
- },
- {
- "type": "m.room.join_rules",
- "content": {
- "join_rule": "invite",
- "allow": [],
- },
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.V8,
- )
- def test_member(self):
- """Member events have changed behavior starting with MSC3375."""
- self.run_test(
- {
- "type": "m.room.member",
- "event_id": "$test:domain",
- "content": {
- "membership": "join",
- EventContentFields.AUTHORISING_USER: "@user:domain",
- "other_key": "stripped",
- },
- },
- {
- "type": "m.room.member",
- "event_id": "$test:domain",
- "content": {"membership": "join"},
- "signatures": {},
- "unsigned": {},
- },
- )
- # After MSC3375, the join_authorised_via_users_server key is protected
- # from redaction.
- self.run_test(
- {
- "type": "m.room.member",
- "content": {
- "membership": "join",
- EventContentFields.AUTHORISING_USER: "@user:domain",
- "other_key": "stripped",
- },
- },
- {
- "type": "m.room.member",
- "content": {
- "membership": "join",
- EventContentFields.AUTHORISING_USER: "@user:domain",
- },
- "signatures": {},
- "unsigned": {},
- },
- room_version=RoomVersions.V9,
- )
- class SerializeEventTestCase(unittest.TestCase):
- def serialize(self, ev, fields):
- return serialize_event(ev, 1479807801915, only_event_fields=fields)
- def test_event_fields_works_with_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(sender="@alice:localhost", room_id="!foo:bar"), ["room_id"]
- ),
- {"room_id": "!foo:bar"},
- )
- def test_event_fields_works_with_nested_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={"body": "A message"},
- ),
- ["content.body"],
- ),
- {"content": {"body": "A message"}},
- )
- def test_event_fields_works_with_dot_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={"key.with.dots": {}},
- ),
- [r"content.key\.with\.dots"],
- ),
- {"content": {"key.with.dots": {}}},
- )
- def test_event_fields_works_with_nested_dot_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={
- "not_me": 1,
- "nested.dot.key": {"leaf.key": 42, "not_me_either": 1},
- },
- ),
- [r"content.nested\.dot\.key.leaf\.key"],
- ),
- {"content": {"nested.dot.key": {"leaf.key": 42}}},
- )
- def test_event_fields_nops_with_unknown_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={"foo": "bar"},
- ),
- ["content.foo", "content.notexists"],
- ),
- {"content": {"foo": "bar"}},
- )
- def test_event_fields_nops_with_non_dict_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={"foo": ["I", "am", "an", "array"]},
- ),
- ["content.foo.am"],
- ),
- {},
- )
- def test_event_fields_nops_with_array_keys(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- sender="@alice:localhost",
- room_id="!foo:bar",
- content={"foo": ["I", "am", "an", "array"]},
- ),
- ["content.foo.1"],
- ),
- {},
- )
- def test_event_fields_all_fields_if_empty(self):
- self.assertEquals(
- self.serialize(
- MockEvent(
- type="foo",
- event_id="test",
- room_id="!foo:bar",
- content={"foo": "bar"},
- ),
- [],
- ),
- {
- "type": "foo",
- "event_id": "test",
- "room_id": "!foo:bar",
- "content": {"foo": "bar"},
- "unsigned": {},
- },
- )
- def test_event_fields_fail_if_fields_not_str(self):
- with self.assertRaises(TypeError):
- self.serialize(
- MockEvent(room_id="!foo:bar", content={"foo": "bar"}), ["room_id", 4]
- )
- class CopyPowerLevelsContentTestCase(unittest.TestCase):
- def setUp(self) -> None:
- self.test_content = {
- "ban": 50,
- "events": {"m.room.name": 100, "m.room.power_levels": 100},
- "events_default": 0,
- "invite": 50,
- "kick": 50,
- "notifications": {"room": 20},
- "redact": 50,
- "state_default": 50,
- "users": {"@example:localhost": 100},
- "users_default": 0,
- }
- def _test(self, input):
- a = copy_power_levels_contents(input)
- self.assertEqual(a["ban"], 50)
- self.assertEqual(a["events"]["m.room.name"], 100)
- # make sure that changing the copy changes the copy and not the orig
- a["ban"] = 10
- a["events"]["m.room.power_levels"] = 20
- self.assertEqual(input["ban"], 50)
- self.assertEqual(input["events"]["m.room.power_levels"], 100)
- def test_unfrozen(self):
- self._test(self.test_content)
- def test_frozen(self):
- input = freeze(self.test_content)
- self._test(input)
|