test_media.py 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867
  1. # Copyright 2020 Dirk Klimpel
  2. # Copyright 2021 The Matrix.org Foundation C.I.C.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. import json
  16. import os
  17. from parameterized import parameterized
  18. import synapse.rest.admin
  19. from synapse.api.errors import Codes
  20. from synapse.rest.client import login, profile, room
  21. from synapse.rest.media.v1.filepath import MediaFilePaths
  22. from tests import unittest
  23. from tests.server import FakeSite, make_request
  24. from tests.test_utils import SMALL_PNG
  25. VALID_TIMESTAMP = 1609459200000 # 2021-01-01 in milliseconds
  26. INVALID_TIMESTAMP_IN_S = 1893456000 # 2030-01-01 in seconds
  27. class DeleteMediaByIDTestCase(unittest.HomeserverTestCase):
  28. servlets = [
  29. synapse.rest.admin.register_servlets,
  30. synapse.rest.admin.register_servlets_for_media_repo,
  31. login.register_servlets,
  32. ]
  33. def prepare(self, reactor, clock, hs):
  34. self.media_repo = hs.get_media_repository_resource()
  35. self.server_name = hs.hostname
  36. self.admin_user = self.register_user("admin", "pass", admin=True)
  37. self.admin_user_tok = self.login("admin", "pass")
  38. self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
  39. def test_no_auth(self):
  40. """
  41. Try to delete media without authentication.
  42. """
  43. url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
  44. channel = self.make_request("DELETE", url, b"{}")
  45. self.assertEqual(401, int(channel.result["code"]), msg=channel.result["body"])
  46. self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
  47. def test_requester_is_no_admin(self):
  48. """
  49. If the user is not a server admin, an error is returned.
  50. """
  51. self.other_user = self.register_user("user", "pass")
  52. self.other_user_token = self.login("user", "pass")
  53. url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
  54. channel = self.make_request(
  55. "DELETE",
  56. url,
  57. access_token=self.other_user_token,
  58. )
  59. self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
  60. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  61. def test_media_does_not_exist(self):
  62. """
  63. Tests that a lookup for a media that does not exist returns a 404
  64. """
  65. url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
  66. channel = self.make_request(
  67. "DELETE",
  68. url,
  69. access_token=self.admin_user_tok,
  70. )
  71. self.assertEqual(404, channel.code, msg=channel.json_body)
  72. self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
  73. def test_media_is_not_local(self):
  74. """
  75. Tests that a lookup for a media that is not a local returns a 400
  76. """
  77. url = "/_synapse/admin/v1/media/%s/%s" % ("unknown_domain", "12345")
  78. channel = self.make_request(
  79. "DELETE",
  80. url,
  81. access_token=self.admin_user_tok,
  82. )
  83. self.assertEqual(400, channel.code, msg=channel.json_body)
  84. self.assertEqual("Can only delete local media", channel.json_body["error"])
  85. def test_delete_media(self):
  86. """
  87. Tests that delete a media is successfully
  88. """
  89. download_resource = self.media_repo.children[b"download"]
  90. upload_resource = self.media_repo.children[b"upload"]
  91. # Upload some media into the room
  92. response = self.helper.upload_media(
  93. upload_resource, SMALL_PNG, tok=self.admin_user_tok, expect_code=200
  94. )
  95. # Extract media ID from the response
  96. server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
  97. server_name, media_id = server_and_media_id.split("/")
  98. self.assertEqual(server_name, self.server_name)
  99. # Attempt to access media
  100. channel = make_request(
  101. self.reactor,
  102. FakeSite(download_resource, self.reactor),
  103. "GET",
  104. server_and_media_id,
  105. shorthand=False,
  106. access_token=self.admin_user_tok,
  107. )
  108. # Should be successful
  109. self.assertEqual(
  110. 200,
  111. channel.code,
  112. msg=(
  113. "Expected to receive a 200 on accessing media: %s" % server_and_media_id
  114. ),
  115. )
  116. # Test if the file exists
  117. local_path = self.filepaths.local_media_filepath(media_id)
  118. self.assertTrue(os.path.exists(local_path))
  119. url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, media_id)
  120. # Delete media
  121. channel = self.make_request(
  122. "DELETE",
  123. url,
  124. access_token=self.admin_user_tok,
  125. )
  126. self.assertEqual(200, channel.code, msg=channel.json_body)
  127. self.assertEqual(1, channel.json_body["total"])
  128. self.assertEqual(
  129. media_id,
  130. channel.json_body["deleted_media"][0],
  131. )
  132. # Attempt to access media
  133. channel = make_request(
  134. self.reactor,
  135. FakeSite(download_resource, self.reactor),
  136. "GET",
  137. server_and_media_id,
  138. shorthand=False,
  139. access_token=self.admin_user_tok,
  140. )
  141. self.assertEqual(
  142. 404,
  143. channel.code,
  144. msg=(
  145. "Expected to receive a 404 on accessing deleted media: %s"
  146. % server_and_media_id
  147. ),
  148. )
  149. # Test if the file is deleted
  150. self.assertFalse(os.path.exists(local_path))
  151. class DeleteMediaByDateSizeTestCase(unittest.HomeserverTestCase):
  152. servlets = [
  153. synapse.rest.admin.register_servlets,
  154. synapse.rest.admin.register_servlets_for_media_repo,
  155. login.register_servlets,
  156. profile.register_servlets,
  157. room.register_servlets,
  158. ]
  159. def prepare(self, reactor, clock, hs):
  160. self.media_repo = hs.get_media_repository_resource()
  161. self.server_name = hs.hostname
  162. self.admin_user = self.register_user("admin", "pass", admin=True)
  163. self.admin_user_tok = self.login("admin", "pass")
  164. self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
  165. self.url = "/_synapse/admin/v1/media/%s/delete" % self.server_name
  166. # Move clock up to somewhat realistic time
  167. self.reactor.advance(1000000000)
  168. def test_no_auth(self):
  169. """
  170. Try to delete media without authentication.
  171. """
  172. channel = self.make_request("POST", self.url, b"{}")
  173. self.assertEqual(401, int(channel.result["code"]), msg=channel.result["body"])
  174. self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
  175. def test_requester_is_no_admin(self):
  176. """
  177. If the user is not a server admin, an error is returned.
  178. """
  179. self.other_user = self.register_user("user", "pass")
  180. self.other_user_token = self.login("user", "pass")
  181. channel = self.make_request(
  182. "POST",
  183. self.url,
  184. access_token=self.other_user_token,
  185. )
  186. self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
  187. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  188. def test_media_is_not_local(self):
  189. """
  190. Tests that a lookup for media that is not local returns a 400
  191. """
  192. url = "/_synapse/admin/v1/media/%s/delete" % "unknown_domain"
  193. channel = self.make_request(
  194. "POST",
  195. url + f"?before_ts={VALID_TIMESTAMP}",
  196. access_token=self.admin_user_tok,
  197. )
  198. self.assertEqual(400, channel.code, msg=channel.json_body)
  199. self.assertEqual("Can only delete local media", channel.json_body["error"])
  200. def test_missing_parameter(self):
  201. """
  202. If the parameter `before_ts` is missing, an error is returned.
  203. """
  204. channel = self.make_request(
  205. "POST",
  206. self.url,
  207. access_token=self.admin_user_tok,
  208. )
  209. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  210. self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
  211. self.assertEqual(
  212. "Missing integer query parameter 'before_ts'", channel.json_body["error"]
  213. )
  214. def test_invalid_parameter(self):
  215. """
  216. If parameters are invalid, an error is returned.
  217. """
  218. channel = self.make_request(
  219. "POST",
  220. self.url + "?before_ts=-1234",
  221. access_token=self.admin_user_tok,
  222. )
  223. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  224. self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
  225. self.assertEqual(
  226. "Query parameter before_ts must be a positive integer.",
  227. channel.json_body["error"],
  228. )
  229. channel = self.make_request(
  230. "POST",
  231. self.url + f"?before_ts={INVALID_TIMESTAMP_IN_S}",
  232. access_token=self.admin_user_tok,
  233. )
  234. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  235. self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
  236. self.assertEqual(
  237. "Query parameter before_ts you provided is from the year 1970. "
  238. + "Double check that you are providing a timestamp in milliseconds.",
  239. channel.json_body["error"],
  240. )
  241. channel = self.make_request(
  242. "POST",
  243. self.url + f"?before_ts={VALID_TIMESTAMP}&size_gt=-1234",
  244. access_token=self.admin_user_tok,
  245. )
  246. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  247. self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
  248. self.assertEqual(
  249. "Query parameter size_gt must be a string representing a positive integer.",
  250. channel.json_body["error"],
  251. )
  252. channel = self.make_request(
  253. "POST",
  254. self.url + f"?before_ts={VALID_TIMESTAMP}&keep_profiles=not_bool",
  255. access_token=self.admin_user_tok,
  256. )
  257. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  258. self.assertEqual(Codes.UNKNOWN, channel.json_body["errcode"])
  259. self.assertEqual(
  260. "Boolean query parameter 'keep_profiles' must be one of ['true', 'false']",
  261. channel.json_body["error"],
  262. )
  263. def test_delete_media_never_accessed(self):
  264. """
  265. Tests that media deleted if it is older than `before_ts` and never accessed
  266. `last_access_ts` is `NULL` and `created_ts` < `before_ts`
  267. """
  268. # upload and do not access
  269. server_and_media_id = self._create_media()
  270. self.pump(1.0)
  271. # test that the file exists
  272. media_id = server_and_media_id.split("/")[1]
  273. local_path = self.filepaths.local_media_filepath(media_id)
  274. self.assertTrue(os.path.exists(local_path))
  275. # timestamp after upload/create
  276. now_ms = self.clock.time_msec()
  277. channel = self.make_request(
  278. "POST",
  279. self.url + "?before_ts=" + str(now_ms),
  280. access_token=self.admin_user_tok,
  281. )
  282. self.assertEqual(200, channel.code, msg=channel.json_body)
  283. self.assertEqual(1, channel.json_body["total"])
  284. self.assertEqual(
  285. media_id,
  286. channel.json_body["deleted_media"][0],
  287. )
  288. self._access_media(server_and_media_id, False)
  289. def test_keep_media_by_date(self):
  290. """
  291. Tests that media is not deleted if it is newer than `before_ts`
  292. """
  293. # timestamp before upload
  294. now_ms = self.clock.time_msec()
  295. server_and_media_id = self._create_media()
  296. self._access_media(server_and_media_id)
  297. channel = self.make_request(
  298. "POST",
  299. self.url + "?before_ts=" + str(now_ms),
  300. access_token=self.admin_user_tok,
  301. )
  302. self.assertEqual(200, channel.code, msg=channel.json_body)
  303. self.assertEqual(0, channel.json_body["total"])
  304. self._access_media(server_and_media_id)
  305. # timestamp after upload
  306. now_ms = self.clock.time_msec()
  307. channel = self.make_request(
  308. "POST",
  309. self.url + "?before_ts=" + str(now_ms),
  310. access_token=self.admin_user_tok,
  311. )
  312. self.assertEqual(200, channel.code, msg=channel.json_body)
  313. self.assertEqual(1, channel.json_body["total"])
  314. self.assertEqual(
  315. server_and_media_id.split("/")[1],
  316. channel.json_body["deleted_media"][0],
  317. )
  318. self._access_media(server_and_media_id, False)
  319. def test_keep_media_by_size(self):
  320. """
  321. Tests that media is not deleted if its size is smaller than or equal
  322. to `size_gt`
  323. """
  324. server_and_media_id = self._create_media()
  325. self._access_media(server_and_media_id)
  326. now_ms = self.clock.time_msec()
  327. channel = self.make_request(
  328. "POST",
  329. self.url + "?before_ts=" + str(now_ms) + "&size_gt=67",
  330. access_token=self.admin_user_tok,
  331. )
  332. self.assertEqual(200, channel.code, msg=channel.json_body)
  333. self.assertEqual(0, channel.json_body["total"])
  334. self._access_media(server_and_media_id)
  335. now_ms = self.clock.time_msec()
  336. channel = self.make_request(
  337. "POST",
  338. self.url + "?before_ts=" + str(now_ms) + "&size_gt=66",
  339. access_token=self.admin_user_tok,
  340. )
  341. self.assertEqual(200, channel.code, msg=channel.json_body)
  342. self.assertEqual(1, channel.json_body["total"])
  343. self.assertEqual(
  344. server_and_media_id.split("/")[1],
  345. channel.json_body["deleted_media"][0],
  346. )
  347. self._access_media(server_and_media_id, False)
  348. def test_keep_media_by_user_avatar(self):
  349. """
  350. Tests that we do not delete media if is used as a user avatar
  351. Tests parameter `keep_profiles`
  352. """
  353. server_and_media_id = self._create_media()
  354. self._access_media(server_and_media_id)
  355. # set media as avatar
  356. channel = self.make_request(
  357. "PUT",
  358. "/profile/%s/avatar_url" % (self.admin_user,),
  359. content=json.dumps({"avatar_url": "mxc://%s" % (server_and_media_id,)}),
  360. access_token=self.admin_user_tok,
  361. )
  362. self.assertEqual(200, channel.code, msg=channel.json_body)
  363. now_ms = self.clock.time_msec()
  364. channel = self.make_request(
  365. "POST",
  366. self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=true",
  367. access_token=self.admin_user_tok,
  368. )
  369. self.assertEqual(200, channel.code, msg=channel.json_body)
  370. self.assertEqual(0, channel.json_body["total"])
  371. self._access_media(server_and_media_id)
  372. now_ms = self.clock.time_msec()
  373. channel = self.make_request(
  374. "POST",
  375. self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=false",
  376. access_token=self.admin_user_tok,
  377. )
  378. self.assertEqual(200, channel.code, msg=channel.json_body)
  379. self.assertEqual(1, channel.json_body["total"])
  380. self.assertEqual(
  381. server_and_media_id.split("/")[1],
  382. channel.json_body["deleted_media"][0],
  383. )
  384. self._access_media(server_and_media_id, False)
  385. def test_keep_media_by_room_avatar(self):
  386. """
  387. Tests that we do not delete media if it is used as a room avatar
  388. Tests parameter `keep_profiles`
  389. """
  390. server_and_media_id = self._create_media()
  391. self._access_media(server_and_media_id)
  392. # set media as room avatar
  393. room_id = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
  394. channel = self.make_request(
  395. "PUT",
  396. "/rooms/%s/state/m.room.avatar" % (room_id,),
  397. content=json.dumps({"url": "mxc://%s" % (server_and_media_id,)}),
  398. access_token=self.admin_user_tok,
  399. )
  400. self.assertEqual(200, channel.code, msg=channel.json_body)
  401. now_ms = self.clock.time_msec()
  402. channel = self.make_request(
  403. "POST",
  404. self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=true",
  405. access_token=self.admin_user_tok,
  406. )
  407. self.assertEqual(200, channel.code, msg=channel.json_body)
  408. self.assertEqual(0, channel.json_body["total"])
  409. self._access_media(server_and_media_id)
  410. now_ms = self.clock.time_msec()
  411. channel = self.make_request(
  412. "POST",
  413. self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=false",
  414. access_token=self.admin_user_tok,
  415. )
  416. self.assertEqual(200, channel.code, msg=channel.json_body)
  417. self.assertEqual(1, channel.json_body["total"])
  418. self.assertEqual(
  419. server_and_media_id.split("/")[1],
  420. channel.json_body["deleted_media"][0],
  421. )
  422. self._access_media(server_and_media_id, False)
  423. def _create_media(self):
  424. """
  425. Create a media and return media_id and server_and_media_id
  426. """
  427. upload_resource = self.media_repo.children[b"upload"]
  428. # Upload some media into the room
  429. response = self.helper.upload_media(
  430. upload_resource, SMALL_PNG, tok=self.admin_user_tok, expect_code=200
  431. )
  432. # Extract media ID from the response
  433. server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
  434. server_name = server_and_media_id.split("/")[0]
  435. # Check that new media is a local and not remote
  436. self.assertEqual(server_name, self.server_name)
  437. return server_and_media_id
  438. def _access_media(self, server_and_media_id, expect_success=True):
  439. """
  440. Try to access a media and check the result
  441. """
  442. download_resource = self.media_repo.children[b"download"]
  443. media_id = server_and_media_id.split("/")[1]
  444. local_path = self.filepaths.local_media_filepath(media_id)
  445. channel = make_request(
  446. self.reactor,
  447. FakeSite(download_resource, self.reactor),
  448. "GET",
  449. server_and_media_id,
  450. shorthand=False,
  451. access_token=self.admin_user_tok,
  452. )
  453. if expect_success:
  454. self.assertEqual(
  455. 200,
  456. channel.code,
  457. msg=(
  458. "Expected to receive a 200 on accessing media: %s"
  459. % server_and_media_id
  460. ),
  461. )
  462. # Test that the file exists
  463. self.assertTrue(os.path.exists(local_path))
  464. else:
  465. self.assertEqual(
  466. 404,
  467. channel.code,
  468. msg=(
  469. "Expected to receive a 404 on accessing deleted media: %s"
  470. % (server_and_media_id)
  471. ),
  472. )
  473. # Test that the file is deleted
  474. self.assertFalse(os.path.exists(local_path))
  475. class QuarantineMediaByIDTestCase(unittest.HomeserverTestCase):
  476. servlets = [
  477. synapse.rest.admin.register_servlets,
  478. synapse.rest.admin.register_servlets_for_media_repo,
  479. login.register_servlets,
  480. ]
  481. def prepare(self, reactor, clock, hs):
  482. media_repo = hs.get_media_repository_resource()
  483. self.store = hs.get_datastore()
  484. self.server_name = hs.hostname
  485. self.admin_user = self.register_user("admin", "pass", admin=True)
  486. self.admin_user_tok = self.login("admin", "pass")
  487. # Create media
  488. upload_resource = media_repo.children[b"upload"]
  489. # Upload some media into the room
  490. response = self.helper.upload_media(
  491. upload_resource, SMALL_PNG, tok=self.admin_user_tok, expect_code=200
  492. )
  493. # Extract media ID from the response
  494. server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
  495. self.media_id = server_and_media_id.split("/")[1]
  496. self.url = "/_synapse/admin/v1/media/%s/%s/%s"
  497. @parameterized.expand(["quarantine", "unquarantine"])
  498. def test_no_auth(self, action: str):
  499. """
  500. Try to protect media without authentication.
  501. """
  502. channel = self.make_request(
  503. "POST",
  504. self.url % (action, self.server_name, self.media_id),
  505. b"{}",
  506. )
  507. self.assertEqual(401, int(channel.result["code"]), msg=channel.result["body"])
  508. self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
  509. @parameterized.expand(["quarantine", "unquarantine"])
  510. def test_requester_is_no_admin(self, action: str):
  511. """
  512. If the user is not a server admin, an error is returned.
  513. """
  514. self.other_user = self.register_user("user", "pass")
  515. self.other_user_token = self.login("user", "pass")
  516. channel = self.make_request(
  517. "POST",
  518. self.url % (action, self.server_name, self.media_id),
  519. access_token=self.other_user_token,
  520. )
  521. self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
  522. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  523. def test_quarantine_media(self):
  524. """
  525. Tests that quarantining and remove from quarantine a media is successfully
  526. """
  527. media_info = self.get_success(self.store.get_local_media(self.media_id))
  528. self.assertFalse(media_info["quarantined_by"])
  529. # quarantining
  530. channel = self.make_request(
  531. "POST",
  532. self.url % ("quarantine", self.server_name, self.media_id),
  533. access_token=self.admin_user_tok,
  534. )
  535. self.assertEqual(200, channel.code, msg=channel.json_body)
  536. self.assertFalse(channel.json_body)
  537. media_info = self.get_success(self.store.get_local_media(self.media_id))
  538. self.assertTrue(media_info["quarantined_by"])
  539. # remove from quarantine
  540. channel = self.make_request(
  541. "POST",
  542. self.url % ("unquarantine", self.server_name, self.media_id),
  543. access_token=self.admin_user_tok,
  544. )
  545. self.assertEqual(200, channel.code, msg=channel.json_body)
  546. self.assertFalse(channel.json_body)
  547. media_info = self.get_success(self.store.get_local_media(self.media_id))
  548. self.assertFalse(media_info["quarantined_by"])
  549. def test_quarantine_protected_media(self):
  550. """
  551. Tests that quarantining from protected media fails
  552. """
  553. # protect
  554. self.get_success(self.store.mark_local_media_as_safe(self.media_id, safe=True))
  555. # verify protection
  556. media_info = self.get_success(self.store.get_local_media(self.media_id))
  557. self.assertTrue(media_info["safe_from_quarantine"])
  558. # quarantining
  559. channel = self.make_request(
  560. "POST",
  561. self.url % ("quarantine", self.server_name, self.media_id),
  562. access_token=self.admin_user_tok,
  563. )
  564. self.assertEqual(200, channel.code, msg=channel.json_body)
  565. self.assertFalse(channel.json_body)
  566. # verify that is not in quarantine
  567. media_info = self.get_success(self.store.get_local_media(self.media_id))
  568. self.assertFalse(media_info["quarantined_by"])
  569. class ProtectMediaByIDTestCase(unittest.HomeserverTestCase):
  570. servlets = [
  571. synapse.rest.admin.register_servlets,
  572. synapse.rest.admin.register_servlets_for_media_repo,
  573. login.register_servlets,
  574. ]
  575. def prepare(self, reactor, clock, hs):
  576. media_repo = hs.get_media_repository_resource()
  577. self.store = hs.get_datastore()
  578. self.admin_user = self.register_user("admin", "pass", admin=True)
  579. self.admin_user_tok = self.login("admin", "pass")
  580. # Create media
  581. upload_resource = media_repo.children[b"upload"]
  582. # Upload some media into the room
  583. response = self.helper.upload_media(
  584. upload_resource, SMALL_PNG, tok=self.admin_user_tok, expect_code=200
  585. )
  586. # Extract media ID from the response
  587. server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
  588. self.media_id = server_and_media_id.split("/")[1]
  589. self.url = "/_synapse/admin/v1/media/%s/%s"
  590. @parameterized.expand(["protect", "unprotect"])
  591. def test_no_auth(self, action: str):
  592. """
  593. Try to protect media without authentication.
  594. """
  595. channel = self.make_request("POST", self.url % (action, self.media_id), b"{}")
  596. self.assertEqual(401, int(channel.result["code"]), msg=channel.result["body"])
  597. self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
  598. @parameterized.expand(["protect", "unprotect"])
  599. def test_requester_is_no_admin(self, action: str):
  600. """
  601. If the user is not a server admin, an error is returned.
  602. """
  603. self.other_user = self.register_user("user", "pass")
  604. self.other_user_token = self.login("user", "pass")
  605. channel = self.make_request(
  606. "POST",
  607. self.url % (action, self.media_id),
  608. access_token=self.other_user_token,
  609. )
  610. self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
  611. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  612. def test_protect_media(self):
  613. """
  614. Tests that protect and unprotect a media is successfully
  615. """
  616. media_info = self.get_success(self.store.get_local_media(self.media_id))
  617. self.assertFalse(media_info["safe_from_quarantine"])
  618. # protect
  619. channel = self.make_request(
  620. "POST",
  621. self.url % ("protect", self.media_id),
  622. access_token=self.admin_user_tok,
  623. )
  624. self.assertEqual(200, channel.code, msg=channel.json_body)
  625. self.assertFalse(channel.json_body)
  626. media_info = self.get_success(self.store.get_local_media(self.media_id))
  627. self.assertTrue(media_info["safe_from_quarantine"])
  628. # unprotect
  629. channel = self.make_request(
  630. "POST",
  631. self.url % ("unprotect", self.media_id),
  632. access_token=self.admin_user_tok,
  633. )
  634. self.assertEqual(200, channel.code, msg=channel.json_body)
  635. self.assertFalse(channel.json_body)
  636. media_info = self.get_success(self.store.get_local_media(self.media_id))
  637. self.assertFalse(media_info["safe_from_quarantine"])
  638. class PurgeMediaCacheTestCase(unittest.HomeserverTestCase):
  639. servlets = [
  640. synapse.rest.admin.register_servlets,
  641. synapse.rest.admin.register_servlets_for_media_repo,
  642. login.register_servlets,
  643. profile.register_servlets,
  644. room.register_servlets,
  645. ]
  646. def prepare(self, reactor, clock, hs):
  647. self.media_repo = hs.get_media_repository_resource()
  648. self.server_name = hs.hostname
  649. self.admin_user = self.register_user("admin", "pass", admin=True)
  650. self.admin_user_tok = self.login("admin", "pass")
  651. self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
  652. self.url = "/_synapse/admin/v1/purge_media_cache"
  653. def test_no_auth(self):
  654. """
  655. Try to delete media without authentication.
  656. """
  657. channel = self.make_request("POST", self.url, b"{}")
  658. self.assertEqual(401, int(channel.result["code"]), msg=channel.result["body"])
  659. self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
  660. def test_requester_is_not_admin(self):
  661. """
  662. If the user is not a server admin, an error is returned.
  663. """
  664. self.other_user = self.register_user("user", "pass")
  665. self.other_user_token = self.login("user", "pass")
  666. channel = self.make_request(
  667. "POST",
  668. self.url,
  669. access_token=self.other_user_token,
  670. )
  671. self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
  672. self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
  673. def test_invalid_parameter(self):
  674. """
  675. If parameters are invalid, an error is returned.
  676. """
  677. channel = self.make_request(
  678. "POST",
  679. self.url + "?before_ts=-1234",
  680. access_token=self.admin_user_tok,
  681. )
  682. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  683. self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
  684. self.assertEqual(
  685. "Query parameter before_ts must be a positive integer.",
  686. channel.json_body["error"],
  687. )
  688. channel = self.make_request(
  689. "POST",
  690. self.url + f"?before_ts={INVALID_TIMESTAMP_IN_S}",
  691. access_token=self.admin_user_tok,
  692. )
  693. self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
  694. self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
  695. self.assertEqual(
  696. "Query parameter before_ts you provided is from the year 1970. "
  697. + "Double check that you are providing a timestamp in milliseconds.",
  698. channel.json_body["error"],
  699. )