|
43 | 43 | from synapse.util.clock import Clock |
44 | 44 |
|
45 | 45 | from tests import unittest |
| 46 | +from tests.server import FakeChannel |
46 | 47 | from tests.unittest import override_config |
47 | 48 |
|
48 | 49 | logger = logging.getLogger(__name__) |
@@ -714,6 +715,132 @@ def test_send_join_contributes_to_room_join_rate_limit_and_is_limited(self) -> N |
714 | 715 | # is probably sufficient to reassure that the bucket is updated. |
715 | 716 |
|
716 | 717 |
|
| 718 | +class MSC4311FederationInviteTestCase(unittest.FederatingHomeserverTestCase): |
| 719 | + """MSC4311: Tests for invite_room_state validation and stripping over federation.""" |
| 720 | + |
| 721 | + servlets = [ |
| 722 | + admin.register_servlets, |
| 723 | + room.register_servlets, |
| 724 | + login.register_servlets, |
| 725 | + ] |
| 726 | + |
| 727 | + def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None: |
| 728 | + super().prepare(reactor, clock, hs) |
| 729 | + self.local_user = self.register_user("user", "pass") |
| 730 | + self.remote_room_id = f"!room:{self.OTHER_SERVER_NAME}" |
| 731 | + self.remote_sender = f"@creator:{self.OTHER_SERVER_NAME}" |
| 732 | + |
| 733 | + def _make_invite_request( |
| 734 | + self, |
| 735 | + invite_room_state: list, |
| 736 | + room_version: str = RoomVersions.V10.identifier, |
| 737 | + ) -> FakeChannel: |
| 738 | + rv = KNOWN_ROOM_VERSIONS[room_version] |
| 739 | + room_create_event = make_event_from_dict( |
| 740 | + self.add_hashes_and_signatures_from_other_server( |
| 741 | + { |
| 742 | + "room_id": self.remote_room_id, |
| 743 | + "sender": self.remote_sender, |
| 744 | + "depth": 1, |
| 745 | + "origin_server_ts": 1, |
| 746 | + "type": EventTypes.Create, |
| 747 | + "state_key": "", |
| 748 | + "content": { |
| 749 | + "creator": self.remote_sender, |
| 750 | + "room_version": room_version, |
| 751 | + }, |
| 752 | + "auth_events": [], |
| 753 | + "prev_events": [], |
| 754 | + }, |
| 755 | + rv, |
| 756 | + ), |
| 757 | + rv, |
| 758 | + ) |
| 759 | + invite_event = make_event_from_dict( |
| 760 | + self.add_hashes_and_signatures_from_other_server( |
| 761 | + { |
| 762 | + "room_id": self.remote_room_id, |
| 763 | + "sender": self.remote_sender, |
| 764 | + "depth": 2, |
| 765 | + "origin_server_ts": 2, |
| 766 | + "type": EventTypes.Member, |
| 767 | + "state_key": self.local_user, |
| 768 | + "content": {"membership": Membership.INVITE}, |
| 769 | + "auth_events": [room_create_event.event_id], |
| 770 | + "prev_events": [room_create_event.event_id], |
| 771 | + }, |
| 772 | + rv, |
| 773 | + ), |
| 774 | + rv, |
| 775 | + ) |
| 776 | + return self.make_signed_federation_request( |
| 777 | + "PUT", |
| 778 | + f"/_matrix/federation/v2/invite/{self.remote_room_id}/{invite_event.event_id}", |
| 779 | + content={ |
| 780 | + "event": invite_event.get_dict(), |
| 781 | + "invite_room_state": invite_room_state, |
| 782 | + "room_version": room_version, |
| 783 | + }, |
| 784 | + ) |
| 785 | + |
| 786 | + def test_full_pdus_stripped_for_client(self) -> None: |
| 787 | + """invite_room_state full PDUs are stripped to 4 fields for the C-S API.""" |
| 788 | + rv = KNOWN_ROOM_VERSIONS[RoomVersions.V10.identifier] |
| 789 | + create_pdu = make_event_from_dict( |
| 790 | + self.add_hashes_and_signatures_from_other_server( |
| 791 | + { |
| 792 | + "room_id": self.remote_room_id, |
| 793 | + "sender": self.remote_sender, |
| 794 | + "depth": 1, |
| 795 | + "origin_server_ts": 1, |
| 796 | + "type": EventTypes.Create, |
| 797 | + "state_key": "", |
| 798 | + "content": { |
| 799 | + "creator": self.remote_sender, |
| 800 | + "room_version": RoomVersions.V10.identifier, |
| 801 | + }, |
| 802 | + "auth_events": [], |
| 803 | + "prev_events": [], |
| 804 | + }, |
| 805 | + rv, |
| 806 | + ), |
| 807 | + rv, |
| 808 | + ) |
| 809 | + # A full PDU has signatures, hashes, etc. |
| 810 | + self.assertIn("signatures", create_pdu.get_pdu_json()) |
| 811 | + |
| 812 | + channel = self._make_invite_request( |
| 813 | + invite_room_state=[create_pdu.get_pdu_json()] |
| 814 | + ) |
| 815 | + self.assertEqual(channel.code, 200, channel.json_body) |
| 816 | + |
| 817 | + # Retrieve the stored invite event and verify invite_room_state is stripped. |
| 818 | + store = self.hs.get_datastores().main |
| 819 | + invite_memberships = self.get_success( |
| 820 | + store.get_invited_rooms_for_local_user(self.local_user) |
| 821 | + ) |
| 822 | + self.assertEqual(len(invite_memberships), 1) |
| 823 | + invite_event = self.get_success(store.get_event(invite_memberships[0].event_id)) |
| 824 | + invite_state = invite_event.unsigned.get("invite_room_state", []) |
| 825 | + |
| 826 | + create_events = [e for e in invite_state if e.get("type") == EventTypes.Create] |
| 827 | + self.assertEqual(len(create_events), 1) |
| 828 | + create = create_events[0] |
| 829 | + # Must be stripped state: only these 4 fields |
| 830 | + self.assertIn("type", create) |
| 831 | + self.assertIn("state_key", create) |
| 832 | + self.assertIn("sender", create) |
| 833 | + self.assertIn("content", create) |
| 834 | + self.assertNotIn("signatures", create) |
| 835 | + self.assertNotIn("hashes", create) |
| 836 | + self.assertNotIn("auth_events", create) |
| 837 | + |
| 838 | + def test_missing_create_event_warns_but_accepts(self) -> None: |
| 839 | + """invite_room_state without m.room.create is accepted with a warning.""" |
| 840 | + channel = self._make_invite_request(invite_room_state=[]) |
| 841 | + self.assertEqual(channel.code, 200, channel.json_body) |
| 842 | + |
| 843 | + |
717 | 844 | class StripUnsignedFromEventsTestCase(unittest.TestCase): |
718 | 845 | """ |
719 | 846 | Test to make sure that we handle the raw JSON events from federation carefully and |
|
0 commit comments