matrix-synapse 1.142.0rc3__cp314-abi3-musllinux_1_2_aarch64.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of matrix-synapse might be problematic. Click here for more details.

Files changed (1057) hide show
  1. matrix_synapse-1.142.0rc3.dist-info/AUTHORS.rst +51 -0
  2. matrix_synapse-1.142.0rc3.dist-info/LICENSE-AGPL-3.0 +661 -0
  3. matrix_synapse-1.142.0rc3.dist-info/LICENSE-COMMERCIAL +6 -0
  4. matrix_synapse-1.142.0rc3.dist-info/METADATA +375 -0
  5. matrix_synapse-1.142.0rc3.dist-info/RECORD +1057 -0
  6. matrix_synapse-1.142.0rc3.dist-info/WHEEL +4 -0
  7. matrix_synapse-1.142.0rc3.dist-info/entry_points.txt +14 -0
  8. matrix_synapse.libs/libgcc_s-2d945d6c.so.1 +0 -0
  9. synapse/__init__.py +97 -0
  10. synapse/_scripts/__init__.py +0 -0
  11. synapse/_scripts/export_signing_key.py +109 -0
  12. synapse/_scripts/generate_config.py +83 -0
  13. synapse/_scripts/generate_log_config.py +56 -0
  14. synapse/_scripts/generate_signing_key.py +55 -0
  15. synapse/_scripts/generate_workers_map.py +318 -0
  16. synapse/_scripts/hash_password.py +95 -0
  17. synapse/_scripts/move_remote_media_to_new_store.py +128 -0
  18. synapse/_scripts/register_new_matrix_user.py +374 -0
  19. synapse/_scripts/review_recent_signups.py +212 -0
  20. synapse/_scripts/synapse_port_db.py +1603 -0
  21. synapse/_scripts/synctl.py +365 -0
  22. synapse/_scripts/update_synapse_database.py +130 -0
  23. synapse/api/__init__.py +20 -0
  24. synapse/api/auth/__init__.py +207 -0
  25. synapse/api/auth/base.py +406 -0
  26. synapse/api/auth/internal.py +299 -0
  27. synapse/api/auth/mas.py +457 -0
  28. synapse/api/auth/msc3861_delegated.py +617 -0
  29. synapse/api/auth_blocking.py +144 -0
  30. synapse/api/constants.py +362 -0
  31. synapse/api/errors.py +907 -0
  32. synapse/api/filtering.py +539 -0
  33. synapse/api/presence.py +104 -0
  34. synapse/api/ratelimiting.py +482 -0
  35. synapse/api/room_versions.py +535 -0
  36. synapse/api/urls.py +119 -0
  37. synapse/app/__init__.py +60 -0
  38. synapse/app/_base.py +866 -0
  39. synapse/app/admin_cmd.py +388 -0
  40. synapse/app/appservice.py +30 -0
  41. synapse/app/client_reader.py +30 -0
  42. synapse/app/complement_fork_starter.py +206 -0
  43. synapse/app/event_creator.py +29 -0
  44. synapse/app/federation_reader.py +30 -0
  45. synapse/app/federation_sender.py +30 -0
  46. synapse/app/frontend_proxy.py +30 -0
  47. synapse/app/generic_worker.py +475 -0
  48. synapse/app/homeserver.py +504 -0
  49. synapse/app/media_repository.py +30 -0
  50. synapse/app/phone_stats_home.py +296 -0
  51. synapse/app/pusher.py +30 -0
  52. synapse/app/synchrotron.py +30 -0
  53. synapse/app/user_dir.py +31 -0
  54. synapse/appservice/__init__.py +461 -0
  55. synapse/appservice/api.py +569 -0
  56. synapse/appservice/scheduler.py +567 -0
  57. synapse/config/__init__.py +27 -0
  58. synapse/config/__main__.py +62 -0
  59. synapse/config/_base.py +1108 -0
  60. synapse/config/_base.pyi +217 -0
  61. synapse/config/_util.py +99 -0
  62. synapse/config/account_validity.py +116 -0
  63. synapse/config/api.py +141 -0
  64. synapse/config/appservice.py +210 -0
  65. synapse/config/auth.py +80 -0
  66. synapse/config/auto_accept_invites.py +43 -0
  67. synapse/config/background_updates.py +44 -0
  68. synapse/config/cache.py +231 -0
  69. synapse/config/captcha.py +90 -0
  70. synapse/config/cas.py +116 -0
  71. synapse/config/consent.py +73 -0
  72. synapse/config/database.py +184 -0
  73. synapse/config/emailconfig.py +367 -0
  74. synapse/config/experimental.py +595 -0
  75. synapse/config/federation.py +114 -0
  76. synapse/config/homeserver.py +141 -0
  77. synapse/config/jwt.py +55 -0
  78. synapse/config/key.py +447 -0
  79. synapse/config/logger.py +390 -0
  80. synapse/config/mas.py +191 -0
  81. synapse/config/matrixrtc.py +66 -0
  82. synapse/config/metrics.py +84 -0
  83. synapse/config/modules.py +40 -0
  84. synapse/config/oembed.py +185 -0
  85. synapse/config/oidc.py +509 -0
  86. synapse/config/password_auth_providers.py +82 -0
  87. synapse/config/push.py +64 -0
  88. synapse/config/ratelimiting.py +254 -0
  89. synapse/config/redis.py +74 -0
  90. synapse/config/registration.py +296 -0
  91. synapse/config/repository.py +311 -0
  92. synapse/config/retention.py +162 -0
  93. synapse/config/room.py +88 -0
  94. synapse/config/room_directory.py +165 -0
  95. synapse/config/saml2.py +251 -0
  96. synapse/config/server.py +1170 -0
  97. synapse/config/server_notices.py +84 -0
  98. synapse/config/spam_checker.py +66 -0
  99. synapse/config/sso.py +121 -0
  100. synapse/config/stats.py +54 -0
  101. synapse/config/third_party_event_rules.py +40 -0
  102. synapse/config/tls.py +192 -0
  103. synapse/config/tracer.py +71 -0
  104. synapse/config/user_directory.py +47 -0
  105. synapse/config/user_types.py +44 -0
  106. synapse/config/voip.py +59 -0
  107. synapse/config/workers.py +642 -0
  108. synapse/crypto/__init__.py +20 -0
  109. synapse/crypto/context_factory.py +278 -0
  110. synapse/crypto/event_signing.py +194 -0
  111. synapse/crypto/keyring.py +931 -0
  112. synapse/event_auth.py +1266 -0
  113. synapse/events/__init__.py +668 -0
  114. synapse/events/auto_accept_invites.py +216 -0
  115. synapse/events/builder.py +387 -0
  116. synapse/events/presence_router.py +245 -0
  117. synapse/events/snapshot.py +559 -0
  118. synapse/events/utils.py +928 -0
  119. synapse/events/validator.py +305 -0
  120. synapse/federation/__init__.py +22 -0
  121. synapse/federation/federation_base.py +383 -0
  122. synapse/federation/federation_client.py +2134 -0
  123. synapse/federation/federation_server.py +1544 -0
  124. synapse/federation/persistence.py +71 -0
  125. synapse/federation/send_queue.py +532 -0
  126. synapse/federation/sender/__init__.py +1165 -0
  127. synapse/federation/sender/per_destination_queue.py +884 -0
  128. synapse/federation/sender/transaction_manager.py +210 -0
  129. synapse/federation/transport/__init__.py +28 -0
  130. synapse/federation/transport/client.py +1201 -0
  131. synapse/federation/transport/server/__init__.py +334 -0
  132. synapse/federation/transport/server/_base.py +429 -0
  133. synapse/federation/transport/server/federation.py +912 -0
  134. synapse/federation/units.py +133 -0
  135. synapse/handlers/__init__.py +20 -0
  136. synapse/handlers/account.py +162 -0
  137. synapse/handlers/account_data.py +362 -0
  138. synapse/handlers/account_validity.py +361 -0
  139. synapse/handlers/admin.py +618 -0
  140. synapse/handlers/appservice.py +991 -0
  141. synapse/handlers/auth.py +2494 -0
  142. synapse/handlers/cas.py +413 -0
  143. synapse/handlers/deactivate_account.py +363 -0
  144. synapse/handlers/delayed_events.py +635 -0
  145. synapse/handlers/device.py +1873 -0
  146. synapse/handlers/devicemessage.py +399 -0
  147. synapse/handlers/directory.py +554 -0
  148. synapse/handlers/e2e_keys.py +1834 -0
  149. synapse/handlers/e2e_room_keys.py +455 -0
  150. synapse/handlers/event_auth.py +390 -0
  151. synapse/handlers/events.py +201 -0
  152. synapse/handlers/federation.py +2043 -0
  153. synapse/handlers/federation_event.py +2420 -0
  154. synapse/handlers/identity.py +812 -0
  155. synapse/handlers/initial_sync.py +528 -0
  156. synapse/handlers/jwt.py +120 -0
  157. synapse/handlers/message.py +2347 -0
  158. synapse/handlers/oidc.py +1803 -0
  159. synapse/handlers/pagination.py +768 -0
  160. synapse/handlers/password_policy.py +102 -0
  161. synapse/handlers/presence.py +2638 -0
  162. synapse/handlers/profile.py +655 -0
  163. synapse/handlers/push_rules.py +164 -0
  164. synapse/handlers/read_marker.py +79 -0
  165. synapse/handlers/receipts.py +351 -0
  166. synapse/handlers/register.py +1060 -0
  167. synapse/handlers/relations.py +624 -0
  168. synapse/handlers/reports.py +98 -0
  169. synapse/handlers/room.py +2447 -0
  170. synapse/handlers/room_list.py +632 -0
  171. synapse/handlers/room_member.py +2365 -0
  172. synapse/handlers/room_member_worker.py +146 -0
  173. synapse/handlers/room_policy.py +186 -0
  174. synapse/handlers/room_summary.py +1057 -0
  175. synapse/handlers/saml.py +524 -0
  176. synapse/handlers/search.py +723 -0
  177. synapse/handlers/send_email.py +209 -0
  178. synapse/handlers/set_password.py +71 -0
  179. synapse/handlers/sliding_sync/__init__.py +1701 -0
  180. synapse/handlers/sliding_sync/extensions.py +970 -0
  181. synapse/handlers/sliding_sync/room_lists.py +2266 -0
  182. synapse/handlers/sliding_sync/store.py +128 -0
  183. synapse/handlers/sso.py +1292 -0
  184. synapse/handlers/state_deltas.py +82 -0
  185. synapse/handlers/stats.py +322 -0
  186. synapse/handlers/sync.py +3109 -0
  187. synapse/handlers/thread_subscriptions.py +190 -0
  188. synapse/handlers/typing.py +606 -0
  189. synapse/handlers/ui_auth/__init__.py +48 -0
  190. synapse/handlers/ui_auth/checkers.py +332 -0
  191. synapse/handlers/user_directory.py +783 -0
  192. synapse/handlers/worker_lock.py +365 -0
  193. synapse/http/__init__.py +106 -0
  194. synapse/http/additional_resource.py +62 -0
  195. synapse/http/client.py +1360 -0
  196. synapse/http/connectproxyclient.py +309 -0
  197. synapse/http/federation/__init__.py +19 -0
  198. synapse/http/federation/matrix_federation_agent.py +490 -0
  199. synapse/http/federation/srv_resolver.py +196 -0
  200. synapse/http/federation/well_known_resolver.py +367 -0
  201. synapse/http/matrixfederationclient.py +1875 -0
  202. synapse/http/proxy.py +290 -0
  203. synapse/http/proxyagent.py +497 -0
  204. synapse/http/replicationagent.py +203 -0
  205. synapse/http/request_metrics.py +309 -0
  206. synapse/http/server.py +1114 -0
  207. synapse/http/servlet.py +1019 -0
  208. synapse/http/site.py +825 -0
  209. synapse/http/types.py +27 -0
  210. synapse/logging/__init__.py +31 -0
  211. synapse/logging/_remote.py +261 -0
  212. synapse/logging/_terse_json.py +95 -0
  213. synapse/logging/context.py +1211 -0
  214. synapse/logging/formatter.py +63 -0
  215. synapse/logging/handlers.py +99 -0
  216. synapse/logging/loggers.py +25 -0
  217. synapse/logging/opentracing.py +1132 -0
  218. synapse/logging/scopecontextmanager.py +161 -0
  219. synapse/media/_base.py +827 -0
  220. synapse/media/filepath.py +417 -0
  221. synapse/media/media_repository.py +1580 -0
  222. synapse/media/media_storage.py +704 -0
  223. synapse/media/oembed.py +277 -0
  224. synapse/media/preview_html.py +559 -0
  225. synapse/media/storage_provider.py +195 -0
  226. synapse/media/thumbnailer.py +833 -0
  227. synapse/media/url_previewer.py +875 -0
  228. synapse/metrics/__init__.py +754 -0
  229. synapse/metrics/_gc.py +219 -0
  230. synapse/metrics/_reactor_metrics.py +171 -0
  231. synapse/metrics/_types.py +38 -0
  232. synapse/metrics/background_process_metrics.py +556 -0
  233. synapse/metrics/common_usage_metrics.py +94 -0
  234. synapse/metrics/jemalloc.py +248 -0
  235. synapse/module_api/__init__.py +2154 -0
  236. synapse/module_api/callbacks/__init__.py +50 -0
  237. synapse/module_api/callbacks/account_validity_callbacks.py +106 -0
  238. synapse/module_api/callbacks/media_repository_callbacks.py +160 -0
  239. synapse/module_api/callbacks/ratelimit_callbacks.py +79 -0
  240. synapse/module_api/callbacks/spamchecker_callbacks.py +1113 -0
  241. synapse/module_api/callbacks/third_party_event_rules_callbacks.py +599 -0
  242. synapse/module_api/errors.py +42 -0
  243. synapse/notifier.py +972 -0
  244. synapse/push/__init__.py +212 -0
  245. synapse/push/bulk_push_rule_evaluator.py +637 -0
  246. synapse/push/clientformat.py +126 -0
  247. synapse/push/emailpusher.py +333 -0
  248. synapse/push/httppusher.py +564 -0
  249. synapse/push/mailer.py +1012 -0
  250. synapse/push/presentable_names.py +216 -0
  251. synapse/push/push_tools.py +114 -0
  252. synapse/push/push_types.py +141 -0
  253. synapse/push/pusher.py +87 -0
  254. synapse/push/pusherpool.py +501 -0
  255. synapse/push/rulekinds.py +33 -0
  256. synapse/py.typed +0 -0
  257. synapse/replication/__init__.py +20 -0
  258. synapse/replication/http/__init__.py +68 -0
  259. synapse/replication/http/_base.py +468 -0
  260. synapse/replication/http/account_data.py +297 -0
  261. synapse/replication/http/deactivate_account.py +81 -0
  262. synapse/replication/http/delayed_events.py +62 -0
  263. synapse/replication/http/devices.py +254 -0
  264. synapse/replication/http/federation.py +334 -0
  265. synapse/replication/http/login.py +106 -0
  266. synapse/replication/http/membership.py +364 -0
  267. synapse/replication/http/presence.py +133 -0
  268. synapse/replication/http/push.py +156 -0
  269. synapse/replication/http/register.py +172 -0
  270. synapse/replication/http/send_events.py +182 -0
  271. synapse/replication/http/state.py +82 -0
  272. synapse/replication/http/streams.py +101 -0
  273. synapse/replication/tcp/__init__.py +56 -0
  274. synapse/replication/tcp/client.py +552 -0
  275. synapse/replication/tcp/commands.py +569 -0
  276. synapse/replication/tcp/context.py +41 -0
  277. synapse/replication/tcp/external_cache.py +156 -0
  278. synapse/replication/tcp/handler.py +942 -0
  279. synapse/replication/tcp/protocol.py +608 -0
  280. synapse/replication/tcp/redis.py +509 -0
  281. synapse/replication/tcp/resource.py +348 -0
  282. synapse/replication/tcp/streams/__init__.py +96 -0
  283. synapse/replication/tcp/streams/_base.py +766 -0
  284. synapse/replication/tcp/streams/events.py +287 -0
  285. synapse/replication/tcp/streams/federation.py +92 -0
  286. synapse/replication/tcp/streams/partial_state.py +80 -0
  287. synapse/res/providers.json +29 -0
  288. synapse/res/templates/_base.html +29 -0
  289. synapse/res/templates/account_previously_renewed.html +6 -0
  290. synapse/res/templates/account_renewed.html +6 -0
  291. synapse/res/templates/add_threepid.html +8 -0
  292. synapse/res/templates/add_threepid.txt +6 -0
  293. synapse/res/templates/add_threepid_failure.html +7 -0
  294. synapse/res/templates/add_threepid_success.html +6 -0
  295. synapse/res/templates/already_in_use.html +12 -0
  296. synapse/res/templates/already_in_use.txt +10 -0
  297. synapse/res/templates/auth_success.html +21 -0
  298. synapse/res/templates/invalid_token.html +6 -0
  299. synapse/res/templates/mail-Element.css +7 -0
  300. synapse/res/templates/mail-Vector.css +7 -0
  301. synapse/res/templates/mail-expiry.css +4 -0
  302. synapse/res/templates/mail.css +156 -0
  303. synapse/res/templates/notice_expiry.html +46 -0
  304. synapse/res/templates/notice_expiry.txt +7 -0
  305. synapse/res/templates/notif.html +51 -0
  306. synapse/res/templates/notif.txt +22 -0
  307. synapse/res/templates/notif_mail.html +59 -0
  308. synapse/res/templates/notif_mail.txt +10 -0
  309. synapse/res/templates/password_reset.html +10 -0
  310. synapse/res/templates/password_reset.txt +7 -0
  311. synapse/res/templates/password_reset_confirmation.html +15 -0
  312. synapse/res/templates/password_reset_failure.html +7 -0
  313. synapse/res/templates/password_reset_success.html +6 -0
  314. synapse/res/templates/recaptcha.html +42 -0
  315. synapse/res/templates/registration.html +12 -0
  316. synapse/res/templates/registration.txt +10 -0
  317. synapse/res/templates/registration_failure.html +6 -0
  318. synapse/res/templates/registration_success.html +6 -0
  319. synapse/res/templates/registration_token.html +18 -0
  320. synapse/res/templates/room.html +33 -0
  321. synapse/res/templates/room.txt +9 -0
  322. synapse/res/templates/sso.css +129 -0
  323. synapse/res/templates/sso_account_deactivated.html +25 -0
  324. synapse/res/templates/sso_auth_account_details.html +186 -0
  325. synapse/res/templates/sso_auth_account_details.js +116 -0
  326. synapse/res/templates/sso_auth_bad_user.html +26 -0
  327. synapse/res/templates/sso_auth_confirm.html +27 -0
  328. synapse/res/templates/sso_auth_success.html +26 -0
  329. synapse/res/templates/sso_error.html +71 -0
  330. synapse/res/templates/sso_footer.html +19 -0
  331. synapse/res/templates/sso_login_idp_picker.html +60 -0
  332. synapse/res/templates/sso_new_user_consent.html +30 -0
  333. synapse/res/templates/sso_partial_profile.html +19 -0
  334. synapse/res/templates/sso_redirect_confirm.html +39 -0
  335. synapse/res/templates/style.css +33 -0
  336. synapse/res/templates/terms.html +27 -0
  337. synapse/rest/__init__.py +197 -0
  338. synapse/rest/admin/__init__.py +390 -0
  339. synapse/rest/admin/_base.py +72 -0
  340. synapse/rest/admin/background_updates.py +171 -0
  341. synapse/rest/admin/devices.py +221 -0
  342. synapse/rest/admin/event_reports.py +173 -0
  343. synapse/rest/admin/events.py +69 -0
  344. synapse/rest/admin/experimental_features.py +137 -0
  345. synapse/rest/admin/federation.py +243 -0
  346. synapse/rest/admin/media.py +540 -0
  347. synapse/rest/admin/registration_tokens.py +358 -0
  348. synapse/rest/admin/rooms.py +1061 -0
  349. synapse/rest/admin/scheduled_tasks.py +70 -0
  350. synapse/rest/admin/server_notice_servlet.py +132 -0
  351. synapse/rest/admin/statistics.py +132 -0
  352. synapse/rest/admin/username_available.py +58 -0
  353. synapse/rest/admin/users.py +1608 -0
  354. synapse/rest/client/__init__.py +20 -0
  355. synapse/rest/client/_base.py +113 -0
  356. synapse/rest/client/account.py +930 -0
  357. synapse/rest/client/account_data.py +319 -0
  358. synapse/rest/client/account_validity.py +103 -0
  359. synapse/rest/client/appservice_ping.py +125 -0
  360. synapse/rest/client/auth.py +218 -0
  361. synapse/rest/client/auth_metadata.py +122 -0
  362. synapse/rest/client/capabilities.py +121 -0
  363. synapse/rest/client/delayed_events.py +111 -0
  364. synapse/rest/client/devices.py +587 -0
  365. synapse/rest/client/directory.py +211 -0
  366. synapse/rest/client/events.py +116 -0
  367. synapse/rest/client/filter.py +112 -0
  368. synapse/rest/client/initial_sync.py +65 -0
  369. synapse/rest/client/keys.py +678 -0
  370. synapse/rest/client/knock.py +104 -0
  371. synapse/rest/client/login.py +754 -0
  372. synapse/rest/client/login_token_request.py +127 -0
  373. synapse/rest/client/logout.py +93 -0
  374. synapse/rest/client/matrixrtc.py +52 -0
  375. synapse/rest/client/media.py +286 -0
  376. synapse/rest/client/mutual_rooms.py +93 -0
  377. synapse/rest/client/notifications.py +137 -0
  378. synapse/rest/client/openid.py +109 -0
  379. synapse/rest/client/password_policy.py +69 -0
  380. synapse/rest/client/presence.py +131 -0
  381. synapse/rest/client/profile.py +291 -0
  382. synapse/rest/client/push_rule.py +331 -0
  383. synapse/rest/client/pusher.py +181 -0
  384. synapse/rest/client/read_marker.py +104 -0
  385. synapse/rest/client/receipts.py +165 -0
  386. synapse/rest/client/register.py +1067 -0
  387. synapse/rest/client/relations.py +138 -0
  388. synapse/rest/client/rendezvous.py +76 -0
  389. synapse/rest/client/reporting.py +207 -0
  390. synapse/rest/client/room.py +1669 -0
  391. synapse/rest/client/room_keys.py +426 -0
  392. synapse/rest/client/room_upgrade_rest_servlet.py +112 -0
  393. synapse/rest/client/sendtodevice.py +85 -0
  394. synapse/rest/client/sync.py +1131 -0
  395. synapse/rest/client/tags.py +129 -0
  396. synapse/rest/client/thirdparty.py +130 -0
  397. synapse/rest/client/thread_subscriptions.py +247 -0
  398. synapse/rest/client/tokenrefresh.py +52 -0
  399. synapse/rest/client/transactions.py +149 -0
  400. synapse/rest/client/user_directory.py +90 -0
  401. synapse/rest/client/versions.py +191 -0
  402. synapse/rest/client/voip.py +88 -0
  403. synapse/rest/consent/__init__.py +0 -0
  404. synapse/rest/consent/consent_resource.py +210 -0
  405. synapse/rest/health.py +38 -0
  406. synapse/rest/key/__init__.py +20 -0
  407. synapse/rest/key/v2/__init__.py +40 -0
  408. synapse/rest/key/v2/local_key_resource.py +125 -0
  409. synapse/rest/key/v2/remote_key_resource.py +302 -0
  410. synapse/rest/media/__init__.py +0 -0
  411. synapse/rest/media/config_resource.py +53 -0
  412. synapse/rest/media/create_resource.py +90 -0
  413. synapse/rest/media/download_resource.py +110 -0
  414. synapse/rest/media/media_repository_resource.py +113 -0
  415. synapse/rest/media/preview_url_resource.py +77 -0
  416. synapse/rest/media/thumbnail_resource.py +142 -0
  417. synapse/rest/media/upload_resource.py +187 -0
  418. synapse/rest/media/v1/__init__.py +39 -0
  419. synapse/rest/media/v1/_base.py +23 -0
  420. synapse/rest/media/v1/media_storage.py +23 -0
  421. synapse/rest/media/v1/storage_provider.py +23 -0
  422. synapse/rest/synapse/__init__.py +20 -0
  423. synapse/rest/synapse/client/__init__.py +93 -0
  424. synapse/rest/synapse/client/federation_whitelist.py +66 -0
  425. synapse/rest/synapse/client/jwks.py +77 -0
  426. synapse/rest/synapse/client/new_user_consent.py +115 -0
  427. synapse/rest/synapse/client/oidc/__init__.py +45 -0
  428. synapse/rest/synapse/client/oidc/backchannel_logout_resource.py +42 -0
  429. synapse/rest/synapse/client/oidc/callback_resource.py +48 -0
  430. synapse/rest/synapse/client/password_reset.py +129 -0
  431. synapse/rest/synapse/client/pick_idp.py +107 -0
  432. synapse/rest/synapse/client/pick_username.py +153 -0
  433. synapse/rest/synapse/client/rendezvous.py +58 -0
  434. synapse/rest/synapse/client/saml2/__init__.py +42 -0
  435. synapse/rest/synapse/client/saml2/metadata_resource.py +46 -0
  436. synapse/rest/synapse/client/saml2/response_resource.py +52 -0
  437. synapse/rest/synapse/client/sso_register.py +56 -0
  438. synapse/rest/synapse/client/unsubscribe.py +88 -0
  439. synapse/rest/synapse/mas/__init__.py +71 -0
  440. synapse/rest/synapse/mas/_base.py +55 -0
  441. synapse/rest/synapse/mas/devices.py +239 -0
  442. synapse/rest/synapse/mas/users.py +469 -0
  443. synapse/rest/well_known.py +148 -0
  444. synapse/server.py +1258 -0
  445. synapse/server_notices/__init__.py +0 -0
  446. synapse/server_notices/consent_server_notices.py +136 -0
  447. synapse/server_notices/resource_limits_server_notices.py +215 -0
  448. synapse/server_notices/server_notices_manager.py +388 -0
  449. synapse/server_notices/server_notices_sender.py +67 -0
  450. synapse/server_notices/worker_server_notices_sender.py +46 -0
  451. synapse/spam_checker_api/__init__.py +31 -0
  452. synapse/state/__init__.py +1022 -0
  453. synapse/state/v1.py +370 -0
  454. synapse/state/v2.py +985 -0
  455. synapse/static/client/login/index.html +47 -0
  456. synapse/static/client/login/js/jquery-3.4.1.min.js +2 -0
  457. synapse/static/client/login/js/login.js +291 -0
  458. synapse/static/client/login/spinner.gif +0 -0
  459. synapse/static/client/login/style.css +79 -0
  460. synapse/static/index.html +63 -0
  461. synapse/storage/__init__.py +43 -0
  462. synapse/storage/_base.py +245 -0
  463. synapse/storage/admin_client_config.py +26 -0
  464. synapse/storage/background_updates.py +1189 -0
  465. synapse/storage/controllers/__init__.py +57 -0
  466. synapse/storage/controllers/persist_events.py +1239 -0
  467. synapse/storage/controllers/purge_events.py +456 -0
  468. synapse/storage/controllers/state.py +954 -0
  469. synapse/storage/controllers/stats.py +119 -0
  470. synapse/storage/database.py +2720 -0
  471. synapse/storage/databases/__init__.py +175 -0
  472. synapse/storage/databases/main/__init__.py +424 -0
  473. synapse/storage/databases/main/account_data.py +1060 -0
  474. synapse/storage/databases/main/appservice.py +473 -0
  475. synapse/storage/databases/main/cache.py +911 -0
  476. synapse/storage/databases/main/censor_events.py +225 -0
  477. synapse/storage/databases/main/client_ips.py +817 -0
  478. synapse/storage/databases/main/delayed_events.py +560 -0
  479. synapse/storage/databases/main/deviceinbox.py +1272 -0
  480. synapse/storage/databases/main/devices.py +2581 -0
  481. synapse/storage/databases/main/directory.py +212 -0
  482. synapse/storage/databases/main/e2e_room_keys.py +690 -0
  483. synapse/storage/databases/main/end_to_end_keys.py +1896 -0
  484. synapse/storage/databases/main/event_federation.py +2509 -0
  485. synapse/storage/databases/main/event_push_actions.py +1937 -0
  486. synapse/storage/databases/main/events.py +3746 -0
  487. synapse/storage/databases/main/events_bg_updates.py +2910 -0
  488. synapse/storage/databases/main/events_forward_extremities.py +126 -0
  489. synapse/storage/databases/main/events_worker.py +2784 -0
  490. synapse/storage/databases/main/experimental_features.py +130 -0
  491. synapse/storage/databases/main/filtering.py +231 -0
  492. synapse/storage/databases/main/keys.py +291 -0
  493. synapse/storage/databases/main/lock.py +553 -0
  494. synapse/storage/databases/main/media_repository.py +1070 -0
  495. synapse/storage/databases/main/metrics.py +460 -0
  496. synapse/storage/databases/main/monthly_active_users.py +443 -0
  497. synapse/storage/databases/main/openid.py +61 -0
  498. synapse/storage/databases/main/presence.py +511 -0
  499. synapse/storage/databases/main/profile.py +541 -0
  500. synapse/storage/databases/main/purge_events.py +511 -0
  501. synapse/storage/databases/main/push_rule.py +972 -0
  502. synapse/storage/databases/main/pusher.py +794 -0
  503. synapse/storage/databases/main/receipts.py +1342 -0
  504. synapse/storage/databases/main/registration.py +3076 -0
  505. synapse/storage/databases/main/rejections.py +38 -0
  506. synapse/storage/databases/main/relations.py +1118 -0
  507. synapse/storage/databases/main/room.py +2781 -0
  508. synapse/storage/databases/main/roommember.py +2112 -0
  509. synapse/storage/databases/main/search.py +941 -0
  510. synapse/storage/databases/main/session.py +151 -0
  511. synapse/storage/databases/main/signatures.py +94 -0
  512. synapse/storage/databases/main/sliding_sync.py +603 -0
  513. synapse/storage/databases/main/state.py +1006 -0
  514. synapse/storage/databases/main/state_deltas.py +329 -0
  515. synapse/storage/databases/main/stats.py +791 -0
  516. synapse/storage/databases/main/stream.py +2580 -0
  517. synapse/storage/databases/main/tags.py +360 -0
  518. synapse/storage/databases/main/task_scheduler.py +225 -0
  519. synapse/storage/databases/main/thread_subscriptions.py +591 -0
  520. synapse/storage/databases/main/transactions.py +681 -0
  521. synapse/storage/databases/main/ui_auth.py +420 -0
  522. synapse/storage/databases/main/user_directory.py +1331 -0
  523. synapse/storage/databases/main/user_erasure_store.py +117 -0
  524. synapse/storage/databases/state/__init__.py +22 -0
  525. synapse/storage/databases/state/bg_updates.py +499 -0
  526. synapse/storage/databases/state/deletion.py +558 -0
  527. synapse/storage/databases/state/store.py +949 -0
  528. synapse/storage/engines/__init__.py +70 -0
  529. synapse/storage/engines/_base.py +154 -0
  530. synapse/storage/engines/postgres.py +261 -0
  531. synapse/storage/engines/sqlite.py +199 -0
  532. synapse/storage/invite_rule.py +112 -0
  533. synapse/storage/keys.py +40 -0
  534. synapse/storage/prepare_database.py +731 -0
  535. synapse/storage/push_rule.py +28 -0
  536. synapse/storage/roommember.py +89 -0
  537. synapse/storage/schema/README.md +4 -0
  538. synapse/storage/schema/__init__.py +182 -0
  539. synapse/storage/schema/common/delta/25/00background_updates.sql +40 -0
  540. synapse/storage/schema/common/delta/35/00background_updates_add_col.sql +36 -0
  541. synapse/storage/schema/common/delta/58/00background_update_ordering.sql +38 -0
  542. synapse/storage/schema/common/full_schemas/72/full.sql.postgres +8 -0
  543. synapse/storage/schema/common/full_schemas/72/full.sql.sqlite +6 -0
  544. synapse/storage/schema/common/schema_version.sql +60 -0
  545. synapse/storage/schema/main/delta/12/v12.sql +82 -0
  546. synapse/storage/schema/main/delta/13/v13.sql +38 -0
  547. synapse/storage/schema/main/delta/14/v14.sql +42 -0
  548. synapse/storage/schema/main/delta/15/appservice_txns.sql +50 -0
  549. synapse/storage/schema/main/delta/15/presence_indices.sql +2 -0
  550. synapse/storage/schema/main/delta/15/v15.sql +24 -0
  551. synapse/storage/schema/main/delta/16/events_order_index.sql +4 -0
  552. synapse/storage/schema/main/delta/16/remote_media_cache_index.sql +2 -0
  553. synapse/storage/schema/main/delta/16/remove_duplicates.sql +9 -0
  554. synapse/storage/schema/main/delta/16/room_alias_index.sql +3 -0
  555. synapse/storage/schema/main/delta/16/unique_constraints.sql +72 -0
  556. synapse/storage/schema/main/delta/16/users.sql +56 -0
  557. synapse/storage/schema/main/delta/17/drop_indexes.sql +37 -0
  558. synapse/storage/schema/main/delta/17/server_keys.sql +43 -0
  559. synapse/storage/schema/main/delta/17/user_threepids.sql +9 -0
  560. synapse/storage/schema/main/delta/18/server_keys_bigger_ints.sql +51 -0
  561. synapse/storage/schema/main/delta/19/event_index.sql +38 -0
  562. synapse/storage/schema/main/delta/20/dummy.sql +1 -0
  563. synapse/storage/schema/main/delta/20/pushers.py +93 -0
  564. synapse/storage/schema/main/delta/21/end_to_end_keys.sql +53 -0
  565. synapse/storage/schema/main/delta/21/receipts.sql +57 -0
  566. synapse/storage/schema/main/delta/22/receipts_index.sql +41 -0
  567. synapse/storage/schema/main/delta/22/user_threepids_unique.sql +19 -0
  568. synapse/storage/schema/main/delta/24/stats_reporting.sql +37 -0
  569. synapse/storage/schema/main/delta/25/fts.py +81 -0
  570. synapse/storage/schema/main/delta/25/guest_access.sql +44 -0
  571. synapse/storage/schema/main/delta/25/history_visibility.sql +44 -0
  572. synapse/storage/schema/main/delta/25/tags.sql +57 -0
  573. synapse/storage/schema/main/delta/26/account_data.sql +36 -0
  574. synapse/storage/schema/main/delta/27/account_data.sql +55 -0
  575. synapse/storage/schema/main/delta/27/forgotten_memberships.sql +45 -0
  576. synapse/storage/schema/main/delta/27/ts.py +61 -0
  577. synapse/storage/schema/main/delta/28/event_push_actions.sql +46 -0
  578. synapse/storage/schema/main/delta/28/events_room_stream.sql +39 -0
  579. synapse/storage/schema/main/delta/28/public_roms_index.sql +39 -0
  580. synapse/storage/schema/main/delta/28/receipts_user_id_index.sql +41 -0
  581. synapse/storage/schema/main/delta/28/upgrade_times.sql +40 -0
  582. synapse/storage/schema/main/delta/28/users_is_guest.sql +41 -0
  583. synapse/storage/schema/main/delta/29/push_actions.sql +54 -0
  584. synapse/storage/schema/main/delta/30/alias_creator.sql +35 -0
  585. synapse/storage/schema/main/delta/30/as_users.py +82 -0
  586. synapse/storage/schema/main/delta/30/deleted_pushers.sql +44 -0
  587. synapse/storage/schema/main/delta/30/presence_stream.sql +49 -0
  588. synapse/storage/schema/main/delta/30/public_rooms.sql +42 -0
  589. synapse/storage/schema/main/delta/30/push_rule_stream.sql +57 -0
  590. synapse/storage/schema/main/delta/30/threepid_guest_access_tokens.sql +43 -0
  591. synapse/storage/schema/main/delta/31/invites.sql +61 -0
  592. synapse/storage/schema/main/delta/31/local_media_repository_url_cache.sql +46 -0
  593. synapse/storage/schema/main/delta/31/pushers_0.py +92 -0
  594. synapse/storage/schema/main/delta/31/pushers_index.sql +41 -0
  595. synapse/storage/schema/main/delta/31/search_update.py +65 -0
  596. synapse/storage/schema/main/delta/32/events.sql +35 -0
  597. synapse/storage/schema/main/delta/32/openid.sql +9 -0
  598. synapse/storage/schema/main/delta/32/pusher_throttle.sql +42 -0
  599. synapse/storage/schema/main/delta/32/remove_indices.sql +52 -0
  600. synapse/storage/schema/main/delta/32/reports.sql +44 -0
  601. synapse/storage/schema/main/delta/33/access_tokens_device_index.sql +36 -0
  602. synapse/storage/schema/main/delta/33/devices.sql +40 -0
  603. synapse/storage/schema/main/delta/33/devices_for_e2e_keys.sql +38 -0
  604. synapse/storage/schema/main/delta/33/devices_for_e2e_keys_clear_unknown_device.sql +39 -0
  605. synapse/storage/schema/main/delta/33/event_fields.py +61 -0
  606. synapse/storage/schema/main/delta/33/remote_media_ts.py +43 -0
  607. synapse/storage/schema/main/delta/33/user_ips_index.sql +36 -0
  608. synapse/storage/schema/main/delta/34/appservice_stream.sql +42 -0
  609. synapse/storage/schema/main/delta/34/cache_stream.py +50 -0
  610. synapse/storage/schema/main/delta/34/device_inbox.sql +43 -0
  611. synapse/storage/schema/main/delta/34/push_display_name_rename.sql +39 -0
  612. synapse/storage/schema/main/delta/34/received_txn_purge.py +36 -0
  613. synapse/storage/schema/main/delta/35/contains_url.sql +36 -0
  614. synapse/storage/schema/main/delta/35/device_outbox.sql +58 -0
  615. synapse/storage/schema/main/delta/35/device_stream_id.sql +40 -0
  616. synapse/storage/schema/main/delta/35/event_push_actions_index.sql +36 -0
  617. synapse/storage/schema/main/delta/35/public_room_list_change_stream.sql +52 -0
  618. synapse/storage/schema/main/delta/35/stream_order_to_extrem.sql +56 -0
  619. synapse/storage/schema/main/delta/36/readd_public_rooms.sql +45 -0
  620. synapse/storage/schema/main/delta/37/remove_auth_idx.py +89 -0
  621. synapse/storage/schema/main/delta/37/user_threepids.sql +71 -0
  622. synapse/storage/schema/main/delta/38/postgres_fts_gist.sql +38 -0
  623. synapse/storage/schema/main/delta/39/appservice_room_list.sql +48 -0
  624. synapse/storage/schema/main/delta/39/device_federation_stream_idx.sql +35 -0
  625. synapse/storage/schema/main/delta/39/event_push_index.sql +36 -0
  626. synapse/storage/schema/main/delta/39/federation_out_position.sql +41 -0
  627. synapse/storage/schema/main/delta/39/membership_profile.sql +39 -0
  628. synapse/storage/schema/main/delta/40/current_state_idx.sql +36 -0
  629. synapse/storage/schema/main/delta/40/device_inbox.sql +40 -0
  630. synapse/storage/schema/main/delta/40/device_list_streams.sql +79 -0
  631. synapse/storage/schema/main/delta/40/event_push_summary.sql +57 -0
  632. synapse/storage/schema/main/delta/40/pushers.sql +58 -0
  633. synapse/storage/schema/main/delta/41/device_list_stream_idx.sql +36 -0
  634. synapse/storage/schema/main/delta/41/device_outbound_index.sql +35 -0
  635. synapse/storage/schema/main/delta/41/event_search_event_id_idx.sql +36 -0
  636. synapse/storage/schema/main/delta/41/ratelimit.sql +41 -0
  637. synapse/storage/schema/main/delta/42/current_state_delta.sql +48 -0
  638. synapse/storage/schema/main/delta/42/device_list_last_id.sql +52 -0
  639. synapse/storage/schema/main/delta/42/event_auth_state_only.sql +36 -0
  640. synapse/storage/schema/main/delta/42/user_dir.py +88 -0
  641. synapse/storage/schema/main/delta/43/blocked_rooms.sql +40 -0
  642. synapse/storage/schema/main/delta/43/quarantine_media.sql +36 -0
  643. synapse/storage/schema/main/delta/43/url_cache.sql +35 -0
  644. synapse/storage/schema/main/delta/43/user_share.sql +52 -0
  645. synapse/storage/schema/main/delta/44/expire_url_cache.sql +60 -0
  646. synapse/storage/schema/main/delta/45/group_server.sql +186 -0
  647. synapse/storage/schema/main/delta/45/profile_cache.sql +47 -0
  648. synapse/storage/schema/main/delta/46/drop_refresh_tokens.sql +36 -0
  649. synapse/storage/schema/main/delta/46/drop_unique_deleted_pushers.sql +54 -0
  650. synapse/storage/schema/main/delta/46/group_server.sql +51 -0
  651. synapse/storage/schema/main/delta/46/local_media_repository_url_idx.sql +43 -0
  652. synapse/storage/schema/main/delta/46/user_dir_null_room_ids.sql +54 -0
  653. synapse/storage/schema/main/delta/46/user_dir_typos.sql +43 -0
  654. synapse/storage/schema/main/delta/47/last_access_media.sql +35 -0
  655. synapse/storage/schema/main/delta/47/postgres_fts_gin.sql +36 -0
  656. synapse/storage/schema/main/delta/47/push_actions_staging.sql +47 -0
  657. synapse/storage/schema/main/delta/48/add_user_consent.sql +37 -0
  658. synapse/storage/schema/main/delta/48/add_user_ips_last_seen_index.sql +36 -0
  659. synapse/storage/schema/main/delta/48/deactivated_users.sql +44 -0
  660. synapse/storage/schema/main/delta/48/group_unique_indexes.py +67 -0
  661. synapse/storage/schema/main/delta/48/groups_joinable.sql +41 -0
  662. synapse/storage/schema/main/delta/49/add_user_consent_server_notice_sent.sql +39 -0
  663. synapse/storage/schema/main/delta/49/add_user_daily_visits.sql +40 -0
  664. synapse/storage/schema/main/delta/49/add_user_ips_last_seen_only_index.sql +36 -0
  665. synapse/storage/schema/main/delta/50/add_creation_ts_users_index.sql +38 -0
  666. synapse/storage/schema/main/delta/50/erasure_store.sql +40 -0
  667. synapse/storage/schema/main/delta/50/make_event_content_nullable.py +102 -0
  668. synapse/storage/schema/main/delta/51/e2e_room_keys.sql +58 -0
  669. synapse/storage/schema/main/delta/51/monthly_active_users.sql +46 -0
  670. synapse/storage/schema/main/delta/52/add_event_to_state_group_index.sql +38 -0
  671. synapse/storage/schema/main/delta/52/device_list_streams_unique_idx.sql +55 -0
  672. synapse/storage/schema/main/delta/52/e2e_room_keys.sql +72 -0
  673. synapse/storage/schema/main/delta/53/add_user_type_to_users.sql +38 -0
  674. synapse/storage/schema/main/delta/53/drop_sent_transactions.sql +35 -0
  675. synapse/storage/schema/main/delta/53/event_format_version.sql +35 -0
  676. synapse/storage/schema/main/delta/53/user_dir_populate.sql +49 -0
  677. synapse/storage/schema/main/delta/53/user_ips_index.sql +49 -0
  678. synapse/storage/schema/main/delta/53/user_share.sql +63 -0
  679. synapse/storage/schema/main/delta/53/user_threepid_id.sql +48 -0
  680. synapse/storage/schema/main/delta/53/users_in_public_rooms.sql +47 -0
  681. synapse/storage/schema/main/delta/54/account_validity_with_renewal.sql +49 -0
  682. synapse/storage/schema/main/delta/54/add_validity_to_server_keys.sql +42 -0
  683. synapse/storage/schema/main/delta/54/delete_forward_extremities.sql +42 -0
  684. synapse/storage/schema/main/delta/54/drop_legacy_tables.sql +49 -0
  685. synapse/storage/schema/main/delta/54/drop_presence_list.sql +35 -0
  686. synapse/storage/schema/main/delta/54/relations.sql +46 -0
  687. synapse/storage/schema/main/delta/54/stats.sql +99 -0
  688. synapse/storage/schema/main/delta/54/stats2.sql +47 -0
  689. synapse/storage/schema/main/delta/55/access_token_expiry.sql +37 -0
  690. synapse/storage/schema/main/delta/55/track_threepid_validations.sql +50 -0
  691. synapse/storage/schema/main/delta/55/users_alter_deactivated.sql +38 -0
  692. synapse/storage/schema/main/delta/56/add_spans_to_device_lists.sql +39 -0
  693. synapse/storage/schema/main/delta/56/current_state_events_membership.sql +41 -0
  694. synapse/storage/schema/main/delta/56/current_state_events_membership_mk2.sql +43 -0
  695. synapse/storage/schema/main/delta/56/delete_keys_from_deleted_backups.sql +44 -0
  696. synapse/storage/schema/main/delta/56/destinations_failure_ts.sql +44 -0
  697. synapse/storage/schema/main/delta/56/destinations_retry_interval_type.sql.postgres +18 -0
  698. synapse/storage/schema/main/delta/56/device_stream_id_insert.sql +39 -0
  699. synapse/storage/schema/main/delta/56/devices_last_seen.sql +43 -0
  700. synapse/storage/schema/main/delta/56/drop_unused_event_tables.sql +39 -0
  701. synapse/storage/schema/main/delta/56/event_expiry.sql +40 -0
  702. synapse/storage/schema/main/delta/56/event_labels.sql +49 -0
  703. synapse/storage/schema/main/delta/56/event_labels_background_update.sql +36 -0
  704. synapse/storage/schema/main/delta/56/fix_room_keys_index.sql +37 -0
  705. synapse/storage/schema/main/delta/56/hidden_devices.sql +37 -0
  706. synapse/storage/schema/main/delta/56/hidden_devices_fix.sql.sqlite +42 -0
  707. synapse/storage/schema/main/delta/56/nuke_empty_communities_from_db.sql +48 -0
  708. synapse/storage/schema/main/delta/56/public_room_list_idx.sql +35 -0
  709. synapse/storage/schema/main/delta/56/redaction_censor.sql +35 -0
  710. synapse/storage/schema/main/delta/56/redaction_censor2.sql +41 -0
  711. synapse/storage/schema/main/delta/56/redaction_censor3_fix_update.sql.postgres +25 -0
  712. synapse/storage/schema/main/delta/56/redaction_censor4.sql +35 -0
  713. synapse/storage/schema/main/delta/56/remove_tombstoned_rooms_from_directory.sql +38 -0
  714. synapse/storage/schema/main/delta/56/room_key_etag.sql +36 -0
  715. synapse/storage/schema/main/delta/56/room_membership_idx.sql +37 -0
  716. synapse/storage/schema/main/delta/56/room_retention.sql +52 -0
  717. synapse/storage/schema/main/delta/56/signing_keys.sql +75 -0
  718. synapse/storage/schema/main/delta/56/signing_keys_nonunique_signatures.sql +41 -0
  719. synapse/storage/schema/main/delta/56/stats_separated.sql +175 -0
  720. synapse/storage/schema/main/delta/56/unique_user_filter_index.py +46 -0
  721. synapse/storage/schema/main/delta/56/user_external_ids.sql +43 -0
  722. synapse/storage/schema/main/delta/56/users_in_public_rooms_idx.sql +36 -0
  723. synapse/storage/schema/main/delta/57/delete_old_current_state_events.sql +41 -0
  724. synapse/storage/schema/main/delta/57/device_list_remote_cache_stale.sql +44 -0
  725. synapse/storage/schema/main/delta/57/local_current_membership.py +111 -0
  726. synapse/storage/schema/main/delta/57/remove_sent_outbound_pokes.sql +40 -0
  727. synapse/storage/schema/main/delta/57/rooms_version_column.sql +43 -0
  728. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.postgres +35 -0
  729. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.sqlite +22 -0
  730. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.postgres +39 -0
  731. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.sqlite +23 -0
  732. synapse/storage/schema/main/delta/58/02remove_dup_outbound_pokes.sql +41 -0
  733. synapse/storage/schema/main/delta/58/03persist_ui_auth.sql +55 -0
  734. synapse/storage/schema/main/delta/58/05cache_instance.sql.postgres +30 -0
  735. synapse/storage/schema/main/delta/58/06dlols_unique_idx.py +83 -0
  736. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.postgres +33 -0
  737. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.sqlite +44 -0
  738. synapse/storage/schema/main/delta/58/07persist_ui_auth_ips.sql +44 -0
  739. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.postgres +18 -0
  740. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.sqlite +18 -0
  741. synapse/storage/schema/main/delta/58/09shadow_ban.sql +37 -0
  742. synapse/storage/schema/main/delta/58/10_pushrules_enabled_delete_obsolete.sql +47 -0
  743. synapse/storage/schema/main/delta/58/10drop_local_rejections_stream.sql +41 -0
  744. synapse/storage/schema/main/delta/58/10federation_pos_instance_name.sql +41 -0
  745. synapse/storage/schema/main/delta/58/11dehydration.sql +39 -0
  746. synapse/storage/schema/main/delta/58/11fallback.sql +43 -0
  747. synapse/storage/schema/main/delta/58/11user_id_seq.py +38 -0
  748. synapse/storage/schema/main/delta/58/12room_stats.sql +51 -0
  749. synapse/storage/schema/main/delta/58/13remove_presence_allow_inbound.sql +36 -0
  750. synapse/storage/schema/main/delta/58/14events_instance_name.sql +35 -0
  751. synapse/storage/schema/main/delta/58/14events_instance_name.sql.postgres +28 -0
  752. synapse/storage/schema/main/delta/58/15_catchup_destination_rooms.sql +61 -0
  753. synapse/storage/schema/main/delta/58/15unread_count.sql +45 -0
  754. synapse/storage/schema/main/delta/58/16populate_stats_process_rooms_fix.sql +41 -0
  755. synapse/storage/schema/main/delta/58/17_catchup_last_successful.sql +40 -0
  756. synapse/storage/schema/main/delta/58/18stream_positions.sql +41 -0
  757. synapse/storage/schema/main/delta/58/19instance_map.sql.postgres +25 -0
  758. synapse/storage/schema/main/delta/58/19txn_id.sql +59 -0
  759. synapse/storage/schema/main/delta/58/20instance_name_event_tables.sql +36 -0
  760. synapse/storage/schema/main/delta/58/20user_daily_visits.sql +37 -0
  761. synapse/storage/schema/main/delta/58/21as_device_stream.sql +36 -0
  762. synapse/storage/schema/main/delta/58/21drop_device_max_stream_id.sql +1 -0
  763. synapse/storage/schema/main/delta/58/22puppet_token.sql +36 -0
  764. synapse/storage/schema/main/delta/58/22users_have_local_media.sql +2 -0
  765. synapse/storage/schema/main/delta/58/23e2e_cross_signing_keys_idx.sql +36 -0
  766. synapse/storage/schema/main/delta/58/24drop_event_json_index.sql +38 -0
  767. synapse/storage/schema/main/delta/58/25user_external_ids_user_id_idx.sql +36 -0
  768. synapse/storage/schema/main/delta/58/26access_token_last_validated.sql +37 -0
  769. synapse/storage/schema/main/delta/58/27local_invites.sql +37 -0
  770. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.postgres +16 -0
  771. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.sqlite +62 -0
  772. synapse/storage/schema/main/delta/59/01ignored_user.py +85 -0
  773. synapse/storage/schema/main/delta/59/02shard_send_to_device.sql +37 -0
  774. synapse/storage/schema/main/delta/59/03shard_send_to_device_sequence.sql.postgres +25 -0
  775. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql +71 -0
  776. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql.postgres +16 -0
  777. synapse/storage/schema/main/delta/59/04drop_account_data.sql +36 -0
  778. synapse/storage/schema/main/delta/59/05cache_invalidation.sql +36 -0
  779. synapse/storage/schema/main/delta/59/06chain_cover_index.sql +36 -0
  780. synapse/storage/schema/main/delta/59/06shard_account_data.sql +39 -0
  781. synapse/storage/schema/main/delta/59/06shard_account_data.sql.postgres +32 -0
  782. synapse/storage/schema/main/delta/59/07shard_account_data_fix.sql +37 -0
  783. synapse/storage/schema/main/delta/59/08delete_pushers_for_deactivated_accounts.sql +39 -0
  784. synapse/storage/schema/main/delta/59/08delete_stale_pushers.sql +39 -0
  785. synapse/storage/schema/main/delta/59/09rejected_events_metadata.sql +45 -0
  786. synapse/storage/schema/main/delta/59/10delete_purged_chain_cover.sql +36 -0
  787. synapse/storage/schema/main/delta/59/11add_knock_members_to_stats.sql +39 -0
  788. synapse/storage/schema/main/delta/59/11drop_thumbnail_constraint.sql.postgres +22 -0
  789. synapse/storage/schema/main/delta/59/12account_validity_token_used_ts_ms.sql +37 -0
  790. synapse/storage/schema/main/delta/59/12presence_stream_instance.sql +37 -0
  791. synapse/storage/schema/main/delta/59/12presence_stream_instance_seq.sql.postgres +20 -0
  792. synapse/storage/schema/main/delta/59/13users_to_send_full_presence_to.sql +53 -0
  793. synapse/storage/schema/main/delta/59/14refresh_tokens.sql +53 -0
  794. synapse/storage/schema/main/delta/59/15locks.sql +56 -0
  795. synapse/storage/schema/main/delta/59/16federation_inbound_staging.sql +51 -0
  796. synapse/storage/schema/main/delta/60/01recreate_stream_ordering.sql.postgres +45 -0
  797. synapse/storage/schema/main/delta/60/02change_stream_ordering_columns.sql.postgres +30 -0
  798. synapse/storage/schema/main/delta/61/01change_appservices_txns.sql.postgres +23 -0
  799. synapse/storage/schema/main/delta/61/01insertion_event_lookups.sql +68 -0
  800. synapse/storage/schema/main/delta/61/02drop_redundant_room_depth_index.sql +37 -0
  801. synapse/storage/schema/main/delta/61/03recreate_min_depth.py +74 -0
  802. synapse/storage/schema/main/delta/62/01insertion_event_extremities.sql +43 -0
  803. synapse/storage/schema/main/delta/63/01create_registration_tokens.sql +42 -0
  804. synapse/storage/schema/main/delta/63/02delete_unlinked_email_pushers.sql +39 -0
  805. synapse/storage/schema/main/delta/63/02populate-rooms-creator.sql +36 -0
  806. synapse/storage/schema/main/delta/63/03session_store.sql +42 -0
  807. synapse/storage/schema/main/delta/63/04add_presence_stream_not_offline_index.sql +37 -0
  808. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.postgres +23 -0
  809. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.sqlite +37 -0
  810. synapse/storage/schema/main/delta/65/01msc2716_insertion_event_edges.sql +38 -0
  811. synapse/storage/schema/main/delta/65/03remove_hidden_devices_from_device_inbox.sql +41 -0
  812. synapse/storage/schema/main/delta/65/04_local_group_updates.sql +37 -0
  813. synapse/storage/schema/main/delta/65/05_remove_room_stats_historical_and_user_stats_historical.sql +38 -0
  814. synapse/storage/schema/main/delta/65/06remove_deleted_devices_from_device_inbox.sql +53 -0
  815. synapse/storage/schema/main/delta/65/07_arbitrary_relations.sql +37 -0
  816. synapse/storage/schema/main/delta/65/08_device_inbox_background_updates.sql +37 -0
  817. synapse/storage/schema/main/delta/65/10_expirable_refresh_tokens.sql +47 -0
  818. synapse/storage/schema/main/delta/65/11_devices_auth_provider_session.sql +46 -0
  819. synapse/storage/schema/main/delta/67/01drop_public_room_list_stream.sql +37 -0
  820. synapse/storage/schema/main/delta/68/01event_columns.sql +45 -0
  821. synapse/storage/schema/main/delta/68/02_msc2409_add_device_id_appservice_stream_type.sql +40 -0
  822. synapse/storage/schema/main/delta/68/03_delete_account_data_for_deactivated_accounts.sql +39 -0
  823. synapse/storage/schema/main/delta/68/04_refresh_tokens_index_next_token_id.sql +47 -0
  824. synapse/storage/schema/main/delta/68/04partial_state_rooms.sql +60 -0
  825. synapse/storage/schema/main/delta/68/05_delete_non_strings_from_event_search.sql.sqlite +22 -0
  826. synapse/storage/schema/main/delta/68/05partial_state_rooms_triggers.py +80 -0
  827. synapse/storage/schema/main/delta/68/06_msc3202_add_device_list_appservice_stream_type.sql +42 -0
  828. synapse/storage/schema/main/delta/69/01as_txn_seq.py +54 -0
  829. synapse/storage/schema/main/delta/69/01device_list_oubound_by_room.sql +57 -0
  830. synapse/storage/schema/main/delta/69/02cache_invalidation_index.sql +37 -0
  831. synapse/storage/schema/main/delta/70/01clean_table_purged_rooms.sql +39 -0
  832. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.postgres +43 -0
  833. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.sqlite +47 -0
  834. synapse/storage/schema/main/delta/71/01remove_noop_background_updates.sql +80 -0
  835. synapse/storage/schema/main/delta/71/02event_push_summary_unique.sql +37 -0
  836. synapse/storage/schema/main/delta/72/01add_room_type_to_state_stats.sql +38 -0
  837. synapse/storage/schema/main/delta/72/01event_push_summary_receipt.sql +54 -0
  838. synapse/storage/schema/main/delta/72/02event_push_actions_index.sql +38 -0
  839. synapse/storage/schema/main/delta/72/03bg_populate_events_columns.py +57 -0
  840. synapse/storage/schema/main/delta/72/03drop_event_reference_hashes.sql +36 -0
  841. synapse/storage/schema/main/delta/72/03remove_groups.sql +50 -0
  842. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.postgres +17 -0
  843. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.sqlite +40 -0
  844. synapse/storage/schema/main/delta/72/05receipts_event_stream_ordering.sql +38 -0
  845. synapse/storage/schema/main/delta/72/05remove_unstable_private_read_receipts.sql +38 -0
  846. synapse/storage/schema/main/delta/72/06add_consent_ts_to_users.sql +35 -0
  847. synapse/storage/schema/main/delta/72/06thread_notifications.sql +49 -0
  848. synapse/storage/schema/main/delta/72/07force_update_current_state_events_membership.py +67 -0
  849. synapse/storage/schema/main/delta/72/07thread_receipts.sql.postgres +30 -0
  850. synapse/storage/schema/main/delta/72/07thread_receipts.sql.sqlite +70 -0
  851. synapse/storage/schema/main/delta/72/08begin_cache_invalidation_seq_at_2.sql.postgres +23 -0
  852. synapse/storage/schema/main/delta/72/08thread_receipts.sql +39 -0
  853. synapse/storage/schema/main/delta/72/09partial_indices.sql.sqlite +56 -0
  854. synapse/storage/schema/main/delta/73/01event_failed_pull_attempts.sql +48 -0
  855. synapse/storage/schema/main/delta/73/02add_pusher_enabled.sql +35 -0
  856. synapse/storage/schema/main/delta/73/02room_id_indexes_for_purging.sql +41 -0
  857. synapse/storage/schema/main/delta/73/03pusher_device_id.sql +39 -0
  858. synapse/storage/schema/main/delta/73/03users_approved_column.sql +39 -0
  859. synapse/storage/schema/main/delta/73/04partial_join_details.sql +42 -0
  860. synapse/storage/schema/main/delta/73/04pending_device_list_updates.sql +47 -0
  861. synapse/storage/schema/main/delta/73/05old_push_actions.sql.postgres +22 -0
  862. synapse/storage/schema/main/delta/73/05old_push_actions.sql.sqlite +24 -0
  863. synapse/storage/schema/main/delta/73/06thread_notifications_thread_id_idx.sql +42 -0
  864. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.postgres +23 -0
  865. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.sqlite +76 -0
  866. synapse/storage/schema/main/delta/73/09partial_joined_via_destination.sql +37 -0
  867. synapse/storage/schema/main/delta/73/09threads_table.sql +49 -0
  868. synapse/storage/schema/main/delta/73/10_update_sqlite_fts4_tokenizer.py +71 -0
  869. synapse/storage/schema/main/delta/73/10login_tokens.sql +54 -0
  870. synapse/storage/schema/main/delta/73/11event_search_room_id_n_distinct.sql.postgres +33 -0
  871. synapse/storage/schema/main/delta/73/12refactor_device_list_outbound_pokes.sql +72 -0
  872. synapse/storage/schema/main/delta/73/13add_device_lists_index.sql +39 -0
  873. synapse/storage/schema/main/delta/73/20_un_partial_stated_room_stream.sql +51 -0
  874. synapse/storage/schema/main/delta/73/21_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  875. synapse/storage/schema/main/delta/73/22_rebuild_user_dir_stats.sql +48 -0
  876. synapse/storage/schema/main/delta/73/22_un_partial_stated_event_stream.sql +53 -0
  877. synapse/storage/schema/main/delta/73/23_fix_thread_index.sql +52 -0
  878. synapse/storage/schema/main/delta/73/23_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  879. synapse/storage/schema/main/delta/73/24_events_jump_to_date_index.sql +36 -0
  880. synapse/storage/schema/main/delta/73/25drop_presence.sql +36 -0
  881. synapse/storage/schema/main/delta/74/01_user_directory_stale_remote_users.sql +58 -0
  882. synapse/storage/schema/main/delta/74/02_set_device_id_for_pushers_bg_update.sql +38 -0
  883. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.postgres +29 -0
  884. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.sqlite +23 -0
  885. synapse/storage/schema/main/delta/74/03_room_membership_index.sql +38 -0
  886. synapse/storage/schema/main/delta/74/04_delete_e2e_backup_keys_for_deactivated_users.sql +36 -0
  887. synapse/storage/schema/main/delta/74/04_membership_tables_event_stream_ordering_triggers.py +87 -0
  888. synapse/storage/schema/main/delta/74/05_events_txn_id_device_id.sql +72 -0
  889. synapse/storage/schema/main/delta/74/90COMMENTS_destinations.sql.postgres +52 -0
  890. synapse/storage/schema/main/delta/76/01_add_profiles_full_user_id_column.sql +39 -0
  891. synapse/storage/schema/main/delta/76/02_add_user_filters_full_user_id_column.sql +39 -0
  892. synapse/storage/schema/main/delta/76/03_per_user_experimental_features.sql +46 -0
  893. synapse/storage/schema/main/delta/76/04_add_room_forgetter.sql +43 -0
  894. synapse/storage/schema/main/delta/77/01_add_profiles_not_valid_check.sql.postgres +16 -0
  895. synapse/storage/schema/main/delta/77/02_add_user_filters_not_valid_check.sql.postgres +16 -0
  896. synapse/storage/schema/main/delta/77/03bg_populate_full_user_id_profiles.sql +35 -0
  897. synapse/storage/schema/main/delta/77/04bg_populate_full_user_id_user_filters.sql +35 -0
  898. synapse/storage/schema/main/delta/77/05thread_notifications_backfill.sql +67 -0
  899. synapse/storage/schema/main/delta/77/06thread_notifications_not_null.sql.sqlite +102 -0
  900. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions.sql.postgres +27 -0
  901. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions_staging.sql.postgres +27 -0
  902. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_summary.sql.postgres +29 -0
  903. synapse/storage/schema/main/delta/77/14bg_indices_event_stream_ordering.sql +39 -0
  904. synapse/storage/schema/main/delta/78/01_validate_and_update_profiles.py +99 -0
  905. synapse/storage/schema/main/delta/78/02_validate_and_update_user_filters.py +100 -0
  906. synapse/storage/schema/main/delta/78/03_remove_unused_indexes_user_filters.py +72 -0
  907. synapse/storage/schema/main/delta/78/03event_extremities_constraints.py +65 -0
  908. synapse/storage/schema/main/delta/78/04_add_full_user_id_index_user_filters.py +32 -0
  909. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.postgres +102 -0
  910. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.sqlite +72 -0
  911. synapse/storage/schema/main/delta/79/04_mitigate_stream_ordering_update_race.py +70 -0
  912. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.postgres +69 -0
  913. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.sqlite +65 -0
  914. synapse/storage/schema/main/delta/80/01_users_alter_locked.sql +35 -0
  915. synapse/storage/schema/main/delta/80/02_read_write_locks_unlogged.sql.postgres +30 -0
  916. synapse/storage/schema/main/delta/80/02_scheduled_tasks.sql +47 -0
  917. synapse/storage/schema/main/delta/80/03_read_write_locks_triggers.sql.postgres +37 -0
  918. synapse/storage/schema/main/delta/80/04_read_write_locks_deadlock.sql.postgres +71 -0
  919. synapse/storage/schema/main/delta/82/02_scheduled_tasks_index.sql +35 -0
  920. synapse/storage/schema/main/delta/82/04_add_indices_for_purging_rooms.sql +39 -0
  921. synapse/storage/schema/main/delta/82/05gaps.sql +44 -0
  922. synapse/storage/schema/main/delta/83/01_drop_old_tables.sql +43 -0
  923. synapse/storage/schema/main/delta/83/03_instance_name_receipts.sql.sqlite +17 -0
  924. synapse/storage/schema/main/delta/83/05_cross_signing_key_update_grant.sql +34 -0
  925. synapse/storage/schema/main/delta/83/06_event_push_summary_room.sql +36 -0
  926. synapse/storage/schema/main/delta/84/01_auth_links_stats.sql.postgres +20 -0
  927. synapse/storage/schema/main/delta/84/02_auth_links_index.sql +16 -0
  928. synapse/storage/schema/main/delta/84/03_auth_links_analyze.sql.postgres +16 -0
  929. synapse/storage/schema/main/delta/84/04_access_token_index.sql +15 -0
  930. synapse/storage/schema/main/delta/85/01_add_suspended.sql +14 -0
  931. synapse/storage/schema/main/delta/85/02_add_instance_names.sql +27 -0
  932. synapse/storage/schema/main/delta/85/03_new_sequences.sql.postgres +54 -0
  933. synapse/storage/schema/main/delta/85/04_cleanup_device_federation_outbox.sql +15 -0
  934. synapse/storage/schema/main/delta/85/05_add_instance_names_converted_pos.sql +16 -0
  935. synapse/storage/schema/main/delta/85/06_add_room_reports.sql +20 -0
  936. synapse/storage/schema/main/delta/86/01_authenticate_media.sql +15 -0
  937. synapse/storage/schema/main/delta/86/02_receipts_event_id_index.sql +15 -0
  938. synapse/storage/schema/main/delta/87/01_sliding_sync_memberships.sql +169 -0
  939. synapse/storage/schema/main/delta/87/02_per_connection_state.sql +81 -0
  940. synapse/storage/schema/main/delta/87/03_current_state_index.sql +19 -0
  941. synapse/storage/schema/main/delta/88/01_add_delayed_events.sql +43 -0
  942. synapse/storage/schema/main/delta/88/01_custom_profile_fields.sql +15 -0
  943. synapse/storage/schema/main/delta/88/02_fix_sliding_sync_membership_snapshots_forgotten_column.sql +21 -0
  944. synapse/storage/schema/main/delta/88/03_add_otk_ts_added_index.sql +18 -0
  945. synapse/storage/schema/main/delta/88/04_current_state_delta_index.sql +18 -0
  946. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.postgres +19 -0
  947. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.sqlite +19 -0
  948. synapse/storage/schema/main/delta/88/05_sliding_sync_room_config_index.sql +20 -0
  949. synapse/storage/schema/main/delta/88/06_events_received_ts_index.sql +17 -0
  950. synapse/storage/schema/main/delta/89/01_sliding_sync_membership_snapshot_index.sql +15 -0
  951. synapse/storage/schema/main/delta/90/01_add_column_participant_room_memberships_table.sql +16 -0
  952. synapse/storage/schema/main/delta/91/01_media_hash.sql +28 -0
  953. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.postgres +16 -0
  954. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.sqlite +16 -0
  955. synapse/storage/schema/main/delta/92/02_remove_populate_participant_bg_update.sql +17 -0
  956. synapse/storage/schema/main/delta/92/04_ss_membership_snapshot_idx.sql +16 -0
  957. synapse/storage/schema/main/delta/92/04_thread_subscriptions.sql +59 -0
  958. synapse/storage/schema/main/delta/92/04_thread_subscriptions_seq.sql.postgres +19 -0
  959. synapse/storage/schema/main/delta/92/05_fixup_max_depth_cap.sql +17 -0
  960. synapse/storage/schema/main/delta/92/05_thread_subscriptions_comments.sql.postgres +18 -0
  961. synapse/storage/schema/main/delta/92/06_device_federation_inbox_index.sql +16 -0
  962. synapse/storage/schema/main/delta/92/06_threads_last_sent_stream_ordering_comments.sql.postgres +24 -0
  963. synapse/storage/schema/main/delta/92/07_add_user_reports.sql +22 -0
  964. synapse/storage/schema/main/delta/92/07_event_txn_id_device_id_txn_id2.sql +15 -0
  965. synapse/storage/schema/main/delta/92/08_room_ban_redactions.sql +21 -0
  966. synapse/storage/schema/main/delta/92/08_thread_subscriptions_seq_fixup.sql.postgres +19 -0
  967. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql +20 -0
  968. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql.postgres +18 -0
  969. synapse/storage/schema/main/full_schemas/72/full.sql.postgres +1344 -0
  970. synapse/storage/schema/main/full_schemas/72/full.sql.sqlite +646 -0
  971. synapse/storage/schema/state/delta/23/drop_state_index.sql +35 -0
  972. synapse/storage/schema/state/delta/32/remove_state_indices.sql +38 -0
  973. synapse/storage/schema/state/delta/35/add_state_index.sql +36 -0
  974. synapse/storage/schema/state/delta/35/state.sql +41 -0
  975. synapse/storage/schema/state/delta/35/state_dedupe.sql +36 -0
  976. synapse/storage/schema/state/delta/47/state_group_seq.py +38 -0
  977. synapse/storage/schema/state/delta/56/state_group_room_idx.sql +36 -0
  978. synapse/storage/schema/state/delta/61/02state_groups_state_n_distinct.sql.postgres +34 -0
  979. synapse/storage/schema/state/delta/70/08_state_group_edges_unique.sql +36 -0
  980. synapse/storage/schema/state/delta/89/01_state_groups_deletion.sql +39 -0
  981. synapse/storage/schema/state/delta/90/02_delete_unreferenced_state_groups.sql +16 -0
  982. synapse/storage/schema/state/delta/90/03_remove_old_deletion_bg_update.sql +15 -0
  983. synapse/storage/schema/state/full_schemas/72/full.sql.postgres +30 -0
  984. synapse/storage/schema/state/full_schemas/72/full.sql.sqlite +20 -0
  985. synapse/storage/types.py +185 -0
  986. synapse/storage/util/__init__.py +20 -0
  987. synapse/storage/util/id_generators.py +909 -0
  988. synapse/storage/util/partial_state_events_tracker.py +194 -0
  989. synapse/storage/util/sequence.py +315 -0
  990. synapse/streams/__init__.py +43 -0
  991. synapse/streams/config.py +92 -0
  992. synapse/streams/events.py +203 -0
  993. synapse/synapse_rust/__init__.pyi +3 -0
  994. synapse/synapse_rust/acl.pyi +20 -0
  995. synapse/synapse_rust/events.pyi +136 -0
  996. synapse/synapse_rust/http_client.pyi +32 -0
  997. synapse/synapse_rust/push.pyi +86 -0
  998. synapse/synapse_rust/rendezvous.pyi +30 -0
  999. synapse/synapse_rust/segmenter.pyi +1 -0
  1000. synapse/synapse_rust.abi3.so +0 -0
  1001. synapse/types/__init__.py +1600 -0
  1002. synapse/types/handlers/__init__.py +93 -0
  1003. synapse/types/handlers/policy_server.py +16 -0
  1004. synapse/types/handlers/sliding_sync.py +909 -0
  1005. synapse/types/rest/__init__.py +25 -0
  1006. synapse/types/rest/client/__init__.py +415 -0
  1007. synapse/types/state.py +635 -0
  1008. synapse/types/storage/__init__.py +66 -0
  1009. synapse/util/__init__.py +170 -0
  1010. synapse/util/async_helpers.py +1067 -0
  1011. synapse/util/batching_queue.py +202 -0
  1012. synapse/util/caches/__init__.py +300 -0
  1013. synapse/util/caches/cached_call.py +143 -0
  1014. synapse/util/caches/deferred_cache.py +530 -0
  1015. synapse/util/caches/descriptors.py +694 -0
  1016. synapse/util/caches/dictionary_cache.py +350 -0
  1017. synapse/util/caches/expiringcache.py +251 -0
  1018. synapse/util/caches/lrucache.py +977 -0
  1019. synapse/util/caches/response_cache.py +323 -0
  1020. synapse/util/caches/stream_change_cache.py +370 -0
  1021. synapse/util/caches/treecache.py +189 -0
  1022. synapse/util/caches/ttlcache.py +197 -0
  1023. synapse/util/cancellation.py +63 -0
  1024. synapse/util/check_dependencies.py +335 -0
  1025. synapse/util/clock.py +500 -0
  1026. synapse/util/constants.py +22 -0
  1027. synapse/util/daemonize.py +165 -0
  1028. synapse/util/distributor.py +159 -0
  1029. synapse/util/events.py +134 -0
  1030. synapse/util/file_consumer.py +164 -0
  1031. synapse/util/frozenutils.py +57 -0
  1032. synapse/util/gai_resolver.py +180 -0
  1033. synapse/util/hash.py +38 -0
  1034. synapse/util/httpresourcetree.py +108 -0
  1035. synapse/util/iterutils.py +189 -0
  1036. synapse/util/json.py +56 -0
  1037. synapse/util/linked_list.py +156 -0
  1038. synapse/util/logcontext.py +46 -0
  1039. synapse/util/logformatter.py +28 -0
  1040. synapse/util/macaroons.py +325 -0
  1041. synapse/util/manhole.py +191 -0
  1042. synapse/util/metrics.py +340 -0
  1043. synapse/util/module_loader.py +116 -0
  1044. synapse/util/msisdn.py +51 -0
  1045. synapse/util/patch_inline_callbacks.py +250 -0
  1046. synapse/util/pydantic_models.py +56 -0
  1047. synapse/util/ratelimitutils.py +420 -0
  1048. synapse/util/retryutils.py +339 -0
  1049. synapse/util/rlimit.py +42 -0
  1050. synapse/util/rust.py +134 -0
  1051. synapse/util/sentinel.py +21 -0
  1052. synapse/util/stringutils.py +293 -0
  1053. synapse/util/task_scheduler.py +493 -0
  1054. synapse/util/templates.py +126 -0
  1055. synapse/util/threepids.py +123 -0
  1056. synapse/util/wheel_timer.py +112 -0
  1057. synapse/visibility.py +836 -0
@@ -0,0 +1,2447 @@
1
+ #
2
+ # This file is licensed under the Affero General Public License (AGPL) version 3.
3
+ #
4
+ # Copyright 2016-2021 The Matrix.org Foundation C.I.C.
5
+ # Copyright (C) 2023 New Vector, Ltd
6
+ #
7
+ # This program is free software: you can redistribute it and/or modify
8
+ # it under the terms of the GNU Affero General Public License as
9
+ # published by the Free Software Foundation, either version 3 of the
10
+ # License, or (at your option) any later version.
11
+ #
12
+ # See the GNU Affero General Public License for more details:
13
+ # <https://www.gnu.org/licenses/agpl-3.0.html>.
14
+ #
15
+ # Originally licensed under the Apache License, Version 2.0:
16
+ # <http://www.apache.org/licenses/LICENSE-2.0>.
17
+ #
18
+ # [This file includes modifications made by New Vector Limited]
19
+ #
20
+ #
21
+
22
+ """Contains functions for performing actions on rooms."""
23
+
24
+ import itertools
25
+ import logging
26
+ import math
27
+ import random
28
+ import string
29
+ from collections import OrderedDict
30
+ from http import HTTPStatus
31
+ from typing import (
32
+ TYPE_CHECKING,
33
+ Any,
34
+ Awaitable,
35
+ Callable,
36
+ Optional,
37
+ cast,
38
+ )
39
+
40
+ import attr
41
+
42
+ import synapse.events.snapshot
43
+ from synapse.api.constants import (
44
+ Direction,
45
+ EventContentFields,
46
+ EventTypes,
47
+ GuestAccess,
48
+ HistoryVisibility,
49
+ JoinRules,
50
+ Membership,
51
+ MTextFields,
52
+ RoomCreationPreset,
53
+ RoomEncryptionAlgorithms,
54
+ RoomTypes,
55
+ )
56
+ from synapse.api.errors import (
57
+ AuthError,
58
+ Codes,
59
+ LimitExceededError,
60
+ NotFoundError,
61
+ PartialStateConflictError,
62
+ StoreError,
63
+ SynapseError,
64
+ )
65
+ from synapse.api.filtering import Filter
66
+ from synapse.api.ratelimiting import Ratelimiter
67
+ from synapse.api.room_versions import KNOWN_ROOM_VERSIONS, RoomVersion
68
+ from synapse.event_auth import validate_event_for_room_version
69
+ from synapse.events import EventBase
70
+ from synapse.events.snapshot import UnpersistedEventContext
71
+ from synapse.events.utils import copy_and_fixup_power_levels_contents
72
+ from synapse.handlers.relations import BundledAggregations
73
+ from synapse.rest.admin._base import assert_user_is_admin
74
+ from synapse.streams import EventSource
75
+ from synapse.types import (
76
+ JsonDict,
77
+ JsonMapping,
78
+ MutableStateMap,
79
+ Requester,
80
+ RoomAlias,
81
+ RoomID,
82
+ RoomIdWithDomain,
83
+ RoomStreamToken,
84
+ StateMap,
85
+ StrCollection,
86
+ StreamKeyType,
87
+ StreamToken,
88
+ UserID,
89
+ create_requester,
90
+ )
91
+ from synapse.types.handlers import ShutdownRoomParams, ShutdownRoomResponse
92
+ from synapse.types.state import StateFilter
93
+ from synapse.util import stringutils
94
+ from synapse.util.async_helpers import concurrently_execute
95
+ from synapse.util.caches.response_cache import ResponseCache
96
+ from synapse.util.iterutils import batch_iter
97
+ from synapse.util.stringutils import parse_and_validate_server_name
98
+ from synapse.visibility import filter_events_for_client
99
+
100
+ if TYPE_CHECKING:
101
+ from synapse.server import HomeServer
102
+
103
+ logger = logging.getLogger(__name__)
104
+
105
+ id_server_scheme = "https://"
106
+
107
+ FIVE_MINUTES_IN_MS = 5 * 60 * 1000
108
+
109
+
110
+ @attr.s(slots=True, frozen=True, auto_attribs=True)
111
+ class EventContext:
112
+ events_before: list[EventBase]
113
+ event: EventBase
114
+ events_after: list[EventBase]
115
+ state: list[EventBase]
116
+ aggregations: dict[str, BundledAggregations]
117
+ start: str
118
+ end: str
119
+
120
+
121
+ class RoomCreationHandler:
122
+ def __init__(self, hs: "HomeServer"):
123
+ self.server_name = hs.hostname
124
+ self.store = hs.get_datastores().main
125
+ self._storage_controllers = hs.get_storage_controllers()
126
+ self.auth = hs.get_auth()
127
+ self.auth_blocking = hs.get_auth_blocking()
128
+ self.clock = hs.get_clock()
129
+ self.hs = hs
130
+ self._spam_checker_module_callbacks = hs.get_module_api_callbacks().spam_checker
131
+ self.event_creation_handler = hs.get_event_creation_handler()
132
+ self.room_member_handler = hs.get_room_member_handler()
133
+ self._event_auth_handler = hs.get_event_auth_handler()
134
+ self.config = hs.config
135
+ self.common_request_ratelimiter = hs.get_request_ratelimiter()
136
+ self.creation_ratelimiter = Ratelimiter(
137
+ store=self.store,
138
+ clock=self.clock,
139
+ cfg=self.config.ratelimiting.rc_room_creation,
140
+ )
141
+
142
+ # Room state based off defined presets
143
+ self._presets_dict: dict[str, dict[str, Any]] = {
144
+ RoomCreationPreset.PRIVATE_CHAT: {
145
+ "join_rules": JoinRules.INVITE,
146
+ "history_visibility": HistoryVisibility.SHARED,
147
+ "original_invitees_have_ops": False,
148
+ "guest_can_join": True,
149
+ "power_level_content_override": {"invite": 0},
150
+ },
151
+ RoomCreationPreset.TRUSTED_PRIVATE_CHAT: {
152
+ "join_rules": JoinRules.INVITE,
153
+ "history_visibility": HistoryVisibility.SHARED,
154
+ "original_invitees_have_ops": True,
155
+ "guest_can_join": True,
156
+ "power_level_content_override": {"invite": 0},
157
+ },
158
+ RoomCreationPreset.PUBLIC_CHAT: {
159
+ "join_rules": JoinRules.PUBLIC,
160
+ "history_visibility": HistoryVisibility.SHARED,
161
+ "original_invitees_have_ops": False,
162
+ "guest_can_join": False,
163
+ "power_level_content_override": {EventTypes.CallInvite: 50},
164
+ },
165
+ }
166
+
167
+ # Modify presets to selectively enable encryption by default per homeserver config
168
+ for preset_name, preset_config in self._presets_dict.items():
169
+ encrypted = (
170
+ preset_name
171
+ in self.config.room.encryption_enabled_by_default_for_room_presets
172
+ )
173
+ preset_config["encrypted"] = encrypted
174
+
175
+ self._default_power_level_content_override = (
176
+ self.config.room.default_power_level_content_override
177
+ )
178
+
179
+ self._replication = hs.get_replication_data_handler()
180
+
181
+ # If a user tries to update the same room multiple times in quick
182
+ # succession, only process the first attempt and return its result to
183
+ # subsequent requests
184
+ self._upgrade_response_cache: ResponseCache[tuple[str, str]] = ResponseCache(
185
+ clock=hs.get_clock(),
186
+ name="room_upgrade",
187
+ server_name=self.server_name,
188
+ timeout_ms=FIVE_MINUTES_IN_MS,
189
+ )
190
+ self._server_notices_mxid = hs.config.servernotices.server_notices_mxid
191
+
192
+ self._third_party_event_rules = (
193
+ hs.get_module_api_callbacks().third_party_event_rules
194
+ )
195
+
196
+ async def upgrade_room(
197
+ self,
198
+ requester: Requester,
199
+ old_room_id: str,
200
+ new_version: RoomVersion,
201
+ additional_creators: Optional[list[str]],
202
+ auto_member: bool = False,
203
+ ratelimit: bool = True,
204
+ ) -> str:
205
+ """Replace a room with a new room with a different version
206
+
207
+ Args:
208
+ requester: the user requesting the upgrade
209
+ old_room_id: the id of the room to be replaced
210
+ new_version: the new room version to use
211
+ additional_creators: additional room creators, for MSC4289.
212
+ auto_member: Whether to automatically join local users to the new
213
+ room and send out invites to remote users.
214
+
215
+ Returns:
216
+ the new room id
217
+
218
+ Raises:
219
+ ShadowBanError if the requester is shadow-banned.
220
+ """
221
+ if ratelimit:
222
+ await self.creation_ratelimiter.ratelimit(requester, update=False)
223
+
224
+ # then apply the ratelimits
225
+ await self.common_request_ratelimiter.ratelimit(requester)
226
+ await self.creation_ratelimiter.ratelimit(requester)
227
+
228
+ user_id = requester.user.to_string()
229
+
230
+ # Check if this room is already being upgraded by another person
231
+ for key in self._upgrade_response_cache.keys():
232
+ if key[0] == old_room_id and key[1] != user_id:
233
+ # Two different people are trying to upgrade the same room.
234
+ # Send the second an error.
235
+ #
236
+ # Note that this of course only gets caught if both users are
237
+ # on the same homeserver.
238
+ raise SynapseError(
239
+ 400, "An upgrade for this room is currently in progress"
240
+ )
241
+
242
+ # Check whether the room exists and 404 if it doesn't.
243
+ # We could go straight for the auth check, but that will raise a 403 instead.
244
+ old_room = await self.store.get_room(old_room_id)
245
+ if old_room is None:
246
+ raise NotFoundError("Unknown room id %s" % (old_room_id,))
247
+ old_room_is_public, _ = old_room
248
+
249
+ creation_event_with_context = None
250
+ if new_version.msc4291_room_ids_as_hashes:
251
+ old_room_create_event = await self.store.get_create_event_for_room(
252
+ old_room_id
253
+ )
254
+ creation_content = self._calculate_upgraded_room_creation_content(
255
+ old_room_create_event,
256
+ tombstone_event_id=None,
257
+ new_room_version=new_version,
258
+ additional_creators=additional_creators,
259
+ )
260
+ creation_event_with_context = await self._generate_create_event_for_room_id(
261
+ requester,
262
+ creation_content,
263
+ old_room_is_public,
264
+ new_version,
265
+ )
266
+ (create_event, _) = creation_event_with_context
267
+ new_room_id = create_event.room_id
268
+ else:
269
+ new_room_id = self._generate_room_id()
270
+
271
+ # Try several times, it could fail with PartialStateConflictError
272
+ # in _upgrade_room, cf comment in except block.
273
+ max_retries = 5
274
+ for i in range(max_retries):
275
+ try:
276
+ # Check whether the user has the power level to carry out the upgrade.
277
+ # `check_auth_rules_from_context` will check that they are in the room and have
278
+ # the required power level to send the tombstone event.
279
+ (
280
+ tombstone_event,
281
+ tombstone_unpersisted_context,
282
+ ) = await self.event_creation_handler.create_event(
283
+ requester,
284
+ {
285
+ "type": EventTypes.Tombstone,
286
+ "state_key": "",
287
+ "room_id": old_room_id,
288
+ "sender": user_id,
289
+ "content": {
290
+ "body": "This room has been replaced",
291
+ "replacement_room": new_room_id,
292
+ },
293
+ },
294
+ )
295
+ tombstone_context = await tombstone_unpersisted_context.persist(
296
+ tombstone_event
297
+ )
298
+ validate_event_for_room_version(tombstone_event)
299
+ await self._event_auth_handler.check_auth_rules_from_context(
300
+ tombstone_event
301
+ )
302
+
303
+ # Upgrade the room
304
+ #
305
+ # If this user has sent multiple upgrade requests for the same room
306
+ # and one of them is not complete yet, cache the response and
307
+ # return it to all subsequent requests
308
+ ret = await self._upgrade_response_cache.wrap(
309
+ (old_room_id, user_id),
310
+ self._upgrade_room,
311
+ requester,
312
+ old_room_id,
313
+ old_room, # args for _upgrade_room
314
+ new_room_id,
315
+ new_version,
316
+ tombstone_event,
317
+ tombstone_context,
318
+ additional_creators,
319
+ creation_event_with_context,
320
+ auto_member=auto_member,
321
+ )
322
+
323
+ return ret
324
+ except PartialStateConflictError as e:
325
+ # Clean up the cache so we can retry properly
326
+ self._upgrade_response_cache.unset((old_room_id, user_id))
327
+ # Persisting couldn't happen because the room got un-partial stated
328
+ # in the meantime and context needs to be recomputed, so let's do so.
329
+ if i == max_retries - 1:
330
+ raise e
331
+
332
+ # This is to satisfy mypy and should never happen
333
+ raise PartialStateConflictError()
334
+
335
+ async def _upgrade_room(
336
+ self,
337
+ requester: Requester,
338
+ old_room_id: str,
339
+ old_room: tuple[bool, str, bool],
340
+ new_room_id: str,
341
+ new_version: RoomVersion,
342
+ tombstone_event: EventBase,
343
+ tombstone_context: synapse.events.snapshot.EventContext,
344
+ additional_creators: Optional[list[str]],
345
+ creation_event_with_context: Optional[
346
+ tuple[EventBase, synapse.events.snapshot.EventContext]
347
+ ] = None,
348
+ auto_member: bool = False,
349
+ ) -> str:
350
+ """
351
+ Args:
352
+ requester: the user requesting the upgrade
353
+ old_room_id: the id of the room to be replaced
354
+ old_room: a tuple containing room information for the room to be replaced,
355
+ as returned by `RoomWorkerStore.get_room`.
356
+ new_room_id: the id of the replacement room
357
+ new_version: the version to upgrade the room to
358
+ tombstone_event: the tombstone event to send to the old room
359
+ tombstone_context: the context for the tombstone event
360
+ additional_creators: additional room creators, for MSC4289.
361
+ creation_event_with_context: The new room's create event, for room IDs as create event IDs.
362
+ auto_member: Whether to automatically join local users to the new
363
+ room and send out invites to remote users.
364
+
365
+ Raises:
366
+ ShadowBanError if the requester is shadow-banned.
367
+ """
368
+ user_id = requester.user.to_string()
369
+ assert self.hs.is_mine_id(user_id), "User must be our own: %s" % (user_id,)
370
+
371
+ logger.info("Creating new room %s to replace %s", new_room_id, old_room_id)
372
+
373
+ # We've already stored the room if we have the create event
374
+ if not creation_event_with_context:
375
+ # create the new room. may raise a `StoreError` in the exceedingly unlikely
376
+ # event of a room ID collision.
377
+ await self.store.store_room(
378
+ room_id=new_room_id,
379
+ room_creator_user_id=user_id,
380
+ is_public=old_room[0],
381
+ room_version=new_version,
382
+ )
383
+
384
+ await self.clone_existing_room(
385
+ requester,
386
+ old_room_id=old_room_id,
387
+ new_room_id=new_room_id,
388
+ new_room_version=new_version,
389
+ tombstone_event_id=tombstone_event.event_id,
390
+ additional_creators=additional_creators,
391
+ creation_event_with_context=creation_event_with_context,
392
+ auto_member=auto_member,
393
+ )
394
+
395
+ # now send the tombstone
396
+ await self.event_creation_handler.handle_new_client_event(
397
+ requester=requester,
398
+ events_and_context=[(tombstone_event, tombstone_context)],
399
+ )
400
+
401
+ state_filter = StateFilter.from_types(
402
+ [(EventTypes.CanonicalAlias, ""), (EventTypes.PowerLevels, "")]
403
+ )
404
+ old_room_state = await tombstone_context.get_current_state_ids(state_filter)
405
+
406
+ # We know the tombstone event isn't an outlier so it has current state.
407
+ assert old_room_state is not None
408
+
409
+ # update any aliases
410
+ await self._move_aliases_to_new_room(
411
+ requester, old_room_id, new_room_id, old_room_state
412
+ )
413
+
414
+ # Copy over user push rules, tags and migrate room directory state
415
+ await self.room_member_handler.transfer_room_state_on_room_upgrade(
416
+ old_room_id, new_room_id
417
+ )
418
+
419
+ # finally, shut down the PLs in the old room, and update them in the new
420
+ # room.
421
+ await self._update_upgraded_room_pls(
422
+ requester,
423
+ old_room_id,
424
+ new_room_id,
425
+ old_room_state,
426
+ additional_creators,
427
+ )
428
+
429
+ return new_room_id
430
+
431
+ async def _update_upgraded_room_pls(
432
+ self,
433
+ requester: Requester,
434
+ old_room_id: str,
435
+ new_room_id: str,
436
+ old_room_state: StateMap[str],
437
+ additional_creators: Optional[list[str]],
438
+ ) -> None:
439
+ """Send updated power levels in both rooms after an upgrade
440
+
441
+ Args:
442
+ requester: the user requesting the upgrade
443
+ old_room_id: the id of the room to be replaced
444
+ new_room_id: the id of the replacement room
445
+ old_room_state: the state map for the old room
446
+ additional_creators: Additional creators in the new room.
447
+ Raises:
448
+ ShadowBanError if the requester is shadow-banned.
449
+ """
450
+ old_room_pl_event_id = old_room_state.get((EventTypes.PowerLevels, ""))
451
+
452
+ if old_room_pl_event_id is None:
453
+ logger.warning(
454
+ "Not supported: upgrading a room with no PL event. Not setting PLs "
455
+ "in old room."
456
+ )
457
+ return
458
+
459
+ old_room_pl_state = await self.store.get_event(old_room_pl_event_id)
460
+
461
+ # we try to stop regular users from speaking by setting the PL required
462
+ # to send regular events and invites to 'Moderator' level. That's normally
463
+ # 50, but if the default PL in a room is 50 or more, then we set the
464
+ # required PL above that.
465
+
466
+ pl_content = copy_and_fixup_power_levels_contents(old_room_pl_state.content)
467
+ users_default: int = pl_content.get("users_default", 0) # type: ignore[assignment]
468
+ restricted_level = max(users_default + 1, 50)
469
+
470
+ updated = False
471
+ for v in ("invite", "events_default"):
472
+ current: int = pl_content.get(v, 0) # type: ignore[assignment]
473
+ if current < restricted_level:
474
+ logger.debug(
475
+ "Setting level for %s in %s to %i (was %i)",
476
+ v,
477
+ old_room_id,
478
+ restricted_level,
479
+ current,
480
+ )
481
+ pl_content[v] = restricted_level
482
+ updated = True
483
+ else:
484
+ logger.debug("Not setting level for %s (already %i)", v, current)
485
+
486
+ if updated:
487
+ try:
488
+ await self.event_creation_handler.create_and_send_nonmember_event(
489
+ requester,
490
+ {
491
+ "type": EventTypes.PowerLevels,
492
+ "state_key": "",
493
+ "room_id": old_room_id,
494
+ "sender": requester.user.to_string(),
495
+ "content": pl_content,
496
+ },
497
+ ratelimit=False,
498
+ )
499
+ except AuthError as e:
500
+ logger.warning("Unable to update PLs in old room: %s", e)
501
+
502
+ new_room_version = await self.store.get_room_version(new_room_id)
503
+ if new_room_version.msc4289_creator_power_enabled:
504
+ self._remove_creators_from_pl_users_map(
505
+ old_room_pl_state.content.get("users", {}),
506
+ requester.user.to_string(),
507
+ additional_creators,
508
+ )
509
+
510
+ await self.event_creation_handler.create_and_send_nonmember_event(
511
+ requester,
512
+ {
513
+ "type": EventTypes.PowerLevels,
514
+ "state_key": "",
515
+ "room_id": new_room_id,
516
+ "sender": requester.user.to_string(),
517
+ "content": copy_and_fixup_power_levels_contents(
518
+ old_room_pl_state.content
519
+ ),
520
+ },
521
+ ratelimit=False,
522
+ )
523
+
524
+ def _calculate_upgraded_room_creation_content(
525
+ self,
526
+ old_room_create_event: EventBase,
527
+ tombstone_event_id: Optional[str],
528
+ new_room_version: RoomVersion,
529
+ additional_creators: Optional[list[str]],
530
+ ) -> JsonDict:
531
+ creation_content: JsonDict = {
532
+ "room_version": new_room_version.identifier,
533
+ "predecessor": {
534
+ "room_id": old_room_create_event.room_id,
535
+ },
536
+ }
537
+ if tombstone_event_id is not None:
538
+ creation_content["predecessor"]["event_id"] = tombstone_event_id
539
+ if (
540
+ additional_creators is not None
541
+ and new_room_version.msc4289_creator_power_enabled
542
+ ):
543
+ creation_content["additional_creators"] = additional_creators
544
+ # Check if old room was non-federatable
545
+ if not old_room_create_event.content.get(EventContentFields.FEDERATE, True):
546
+ # If so, mark the new room as non-federatable as well
547
+ creation_content[EventContentFields.FEDERATE] = False
548
+ # Copy the room type as per MSC3818.
549
+ room_type = old_room_create_event.content.get(EventContentFields.ROOM_TYPE)
550
+ if room_type is not None:
551
+ creation_content[EventContentFields.ROOM_TYPE] = room_type
552
+ return creation_content
553
+
554
+ async def clone_existing_room(
555
+ self,
556
+ requester: Requester,
557
+ old_room_id: str,
558
+ new_room_id: str,
559
+ new_room_version: RoomVersion,
560
+ tombstone_event_id: str,
561
+ additional_creators: Optional[list[str]],
562
+ creation_event_with_context: Optional[
563
+ tuple[EventBase, synapse.events.snapshot.EventContext]
564
+ ] = None,
565
+ auto_member: bool = False,
566
+ ) -> None:
567
+ """Populate a new room based on an old room
568
+
569
+ Args:
570
+ requester: the user requesting the upgrade
571
+ old_room_id : the id of the room to be replaced
572
+ new_room_id: the id to give the new room (should already have been
573
+ created with _generate_room_id())
574
+ new_room_version: the new room version to use
575
+ tombstone_event_id: the ID of the tombstone event in the old room.
576
+ additional_creators: additional room creators, for MSC4289.
577
+ creation_event_with_context: The create event of the new room, if the new room supports
578
+ room ID as create event ID hash.
579
+ auto_member: Whether to automatically join local users to the new
580
+ room and send out invites to remote users.
581
+ """
582
+ user_id = requester.user.to_string()
583
+
584
+ # Get old room's create event
585
+ old_room_create_event = await self.store.get_create_event_for_room(old_room_id)
586
+
587
+ if creation_event_with_context:
588
+ create_event, _ = creation_event_with_context
589
+ creation_content = create_event.content
590
+ else:
591
+ creation_content = self._calculate_upgraded_room_creation_content(
592
+ old_room_create_event,
593
+ tombstone_event_id,
594
+ new_room_version,
595
+ additional_creators=additional_creators,
596
+ )
597
+ initial_state: MutableStateMap = {}
598
+
599
+ # Replicate relevant room events
600
+ types_to_copy: list[tuple[str, Optional[str]]] = [
601
+ (EventTypes.JoinRules, ""),
602
+ (EventTypes.Name, ""),
603
+ (EventTypes.Topic, ""),
604
+ (EventTypes.RoomHistoryVisibility, ""),
605
+ (EventTypes.GuestAccess, ""),
606
+ (EventTypes.RoomAvatar, ""),
607
+ (EventTypes.RoomEncryption, ""),
608
+ (EventTypes.ServerACL, ""),
609
+ (EventTypes.PowerLevels, ""),
610
+ ]
611
+
612
+ room_type = old_room_create_event.content.get(EventContentFields.ROOM_TYPE)
613
+ if room_type is not None:
614
+ # If the old room was a space, copy over the rooms in the space.
615
+ if room_type == RoomTypes.SPACE:
616
+ types_to_copy.append((EventTypes.SpaceChild, None))
617
+
618
+ old_room_state_ids = (
619
+ await self._storage_controllers.state.get_current_state_ids(
620
+ old_room_id, StateFilter.from_types(types_to_copy)
621
+ )
622
+ )
623
+ # map from event_id to BaseEvent
624
+ old_room_state_events = await self.store.get_events(old_room_state_ids.values())
625
+
626
+ for k, old_event_id in old_room_state_ids.items():
627
+ old_event = old_room_state_events.get(old_event_id)
628
+ if old_event:
629
+ # If the event is an space child event with empty content, it was
630
+ # removed from the space and should be ignored.
631
+ if k[0] == EventTypes.SpaceChild and not old_event.content:
632
+ continue
633
+
634
+ initial_state[k] = old_event.content
635
+
636
+ # deep-copy the power-levels event before we start modifying it
637
+ # note that if frozen_dicts are enabled, `power_levels` will be a frozen
638
+ # dict so we can't just copy.deepcopy it.
639
+ initial_state[(EventTypes.PowerLevels, "")] = power_levels = (
640
+ copy_and_fixup_power_levels_contents(
641
+ initial_state[(EventTypes.PowerLevels, "")]
642
+ )
643
+ )
644
+
645
+ # Resolve the minimum power level required to send any state event
646
+ # We will give the upgrading user this power level temporarily (if necessary) such that
647
+ # they are able to copy all of the state events over, then revert them back to their
648
+ # original power level afterwards in _update_upgraded_room_pls
649
+
650
+ # Copy over user power levels now as this will not be possible with >100PL users once
651
+ # the room has been created
652
+ # Calculate the minimum power level needed to clone the room
653
+ event_power_levels = power_levels.get("events", {})
654
+ if not isinstance(event_power_levels, dict):
655
+ event_power_levels = {}
656
+ state_default = power_levels.get("state_default", 50)
657
+ try:
658
+ state_default_int = int(state_default) # type: ignore[arg-type]
659
+ except (TypeError, ValueError):
660
+ state_default_int = 50
661
+ ban = power_levels.get("ban", 50)
662
+ try:
663
+ ban = int(ban) # type: ignore[arg-type]
664
+ except (TypeError, ValueError):
665
+ ban = 50
666
+ needed_power_level = max(
667
+ state_default_int, ban, max(event_power_levels.values(), default=0)
668
+ )
669
+
670
+ # Get the user's current power level, this matches the logic in get_user_power_level,
671
+ # but without the entire state map.
672
+ user_power_levels = power_levels.setdefault("users", {})
673
+ if not isinstance(user_power_levels, dict):
674
+ user_power_levels = {}
675
+ users_default = power_levels.get("users_default", 0)
676
+ current_power_level = user_power_levels.get(user_id, users_default)
677
+ try:
678
+ current_power_level_int = int(current_power_level) # type: ignore[arg-type]
679
+ except (TypeError, ValueError):
680
+ current_power_level_int = 0
681
+ # Raise the requester's power level in the new room if necessary
682
+ if current_power_level_int < needed_power_level:
683
+ user_power_levels[user_id] = needed_power_level
684
+
685
+ if new_room_version.msc4289_creator_power_enabled:
686
+ # the creator(s) cannot be in the users map
687
+ self._remove_creators_from_pl_users_map(
688
+ user_power_levels,
689
+ user_id,
690
+ additional_creators,
691
+ )
692
+
693
+ # We construct a subset of what the body of a call to /createRoom would look like
694
+ # for passing to the spam checker. We don't include a preset here, as we expect the
695
+ # initial state to contain everything we need.
696
+ # TODO: given we are upgrading, it would make sense to pass the room_version
697
+ # TODO: the preset might be useful too
698
+ spam_check = await self._spam_checker_module_callbacks.user_may_create_room(
699
+ user_id,
700
+ {
701
+ "creation_content": creation_content,
702
+ "initial_state": [
703
+ {
704
+ "type": state_key[0],
705
+ "state_key": state_key[1],
706
+ "content": event_content,
707
+ }
708
+ for state_key, event_content in initial_state.items()
709
+ ],
710
+ },
711
+ )
712
+ if spam_check != self._spam_checker_module_callbacks.NOT_SPAM:
713
+ raise SynapseError(
714
+ 403,
715
+ "You are not permitted to create rooms",
716
+ errcode=spam_check[0],
717
+ additional_fields=spam_check[1],
718
+ )
719
+
720
+ _, last_event_id, _ = await self._send_events_for_new_room(
721
+ requester,
722
+ new_room_id,
723
+ new_room_version,
724
+ # we expect to override all the presets with initial_state, so this is
725
+ # somewhat arbitrary.
726
+ room_config={"preset": RoomCreationPreset.PRIVATE_CHAT},
727
+ invite_list=[],
728
+ initial_state=initial_state,
729
+ creation_content=creation_content,
730
+ creation_event_with_context=creation_event_with_context,
731
+ )
732
+
733
+ # Transfer membership events
734
+ ban_event_ids = await self.store.get_ban_event_ids_in_room(old_room_id)
735
+ if ban_event_ids:
736
+ ban_events = await self.store.get_events_as_list(ban_event_ids)
737
+
738
+ # Add any banned users to the new room.
739
+ #
740
+ # Note generally we should send membership events via
741
+ # `update_membership`, however in this case its fine to bypass as
742
+ # these bans don't need any special treatment, i.e. the sender is in
743
+ # the room and they don't need any extra signatures, etc.
744
+ for batched_ban_events in batch_iter(ban_events, 1000):
745
+ await self.event_creation_handler.create_and_send_new_client_events(
746
+ requester=requester,
747
+ room_id=new_room_id,
748
+ prev_event_id=last_event_id,
749
+ event_dicts=[
750
+ {
751
+ "type": EventTypes.Member,
752
+ "state_key": ban_event.state_key,
753
+ "room_id": new_room_id,
754
+ "sender": requester.user.to_string(),
755
+ "content": ban_event.content,
756
+ }
757
+ for ban_event in batched_ban_events
758
+ ],
759
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
760
+ )
761
+
762
+ if auto_member:
763
+ logger.info("Joining local users to %s", new_room_id)
764
+
765
+ # 1. Copy over all joins for local
766
+ joined_profiles = await self.store.get_users_in_room_with_profiles(
767
+ old_room_id
768
+ )
769
+
770
+ local_user_ids = [
771
+ user_id for user_id in joined_profiles if self.hs.is_mine_id(user_id)
772
+ ]
773
+
774
+ logger.info("Local user IDs %s", local_user_ids)
775
+
776
+ for batched_local_user_ids in batch_iter(local_user_ids, 1000):
777
+ invites_to_send = []
778
+
779
+ # For each local user we create an invite event (from the
780
+ # upgrading user) plus a join event.
781
+ for local_user_id in batched_local_user_ids:
782
+ if local_user_id == user_id:
783
+ # Ignore the upgrading user, as they are already in the
784
+ # new room.
785
+ continue
786
+
787
+ invites_to_send.append(
788
+ {
789
+ "type": EventTypes.Member,
790
+ "state_key": local_user_id,
791
+ "room_id": new_room_id,
792
+ "sender": requester.user.to_string(),
793
+ "content": {
794
+ "membership": Membership.INVITE,
795
+ },
796
+ }
797
+ )
798
+
799
+ # If the user has profile information in the previous join,
800
+ # add it to the content.
801
+ #
802
+ # We could instead copy over the contents from the old join
803
+ # event, however a) that would require us to fetch all the
804
+ # old join events (which is slow), and b) generally the join
805
+ # events have no extra information in them. (We also believe
806
+ # that most clients don't copy this information over either,
807
+ # but we could be wrong.)
808
+ content_profile = {}
809
+ user_profile = joined_profiles[local_user_id]
810
+ if user_profile.display_name:
811
+ content_profile["displayname"] = user_profile.display_name
812
+ if user_profile.avatar_url:
813
+ content_profile["avatar_url"] = user_profile.avatar_url
814
+
815
+ invites_to_send.append(
816
+ {
817
+ "type": EventTypes.Member,
818
+ "state_key": local_user_id,
819
+ "room_id": new_room_id,
820
+ "sender": local_user_id,
821
+ "content": {
822
+ "membership": Membership.JOIN,
823
+ **content_profile,
824
+ },
825
+ }
826
+ )
827
+
828
+ await self.event_creation_handler.create_and_send_new_client_events(
829
+ requester=requester,
830
+ room_id=new_room_id,
831
+ prev_event_id=None,
832
+ event_dicts=invites_to_send,
833
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
834
+ )
835
+
836
+ # Invite other users if the room is not public. If the room *is*
837
+ # public then users can simply directly join, and inviting them as
838
+ # well may lead to confusion.
839
+
840
+ join_rule_content = initial_state.get((EventTypes.JoinRules, ""), None)
841
+ is_public = False
842
+ if join_rule_content:
843
+ is_public = join_rule_content["join_rule"] == JoinRules.PUBLIC
844
+
845
+ if not is_public:
846
+ # Copy invites
847
+ # TODO: Copy over 3pid invites as well.
848
+ invited_users = await self.store.get_invited_users_in_room(
849
+ room_id=old_room_id
850
+ )
851
+
852
+ # For local users we can just batch send the invites.
853
+ local_invited_users = [
854
+ user_id for user_id in invited_users if self.hs.is_mine_id(user_id)
855
+ ]
856
+
857
+ logger.info(
858
+ "Joining local user IDs %s to new room %s",
859
+ local_invited_users,
860
+ new_room_id,
861
+ )
862
+
863
+ for batched_local_invited_users in batch_iter(
864
+ local_invited_users, 1000
865
+ ):
866
+ invites_to_send = []
867
+ leaves_to_send = []
868
+
869
+ # For each local user we create an invite event (from the
870
+ # upgrading user), and reject the invite event in the old
871
+ # room.
872
+ #
873
+ # This ensures that the user ends up with a single invite to
874
+ # the new room (rather than multiple invites which may be
875
+ # noisy and confusing).
876
+ for local_user_id in batched_local_invited_users:
877
+ leaves_to_send.append(
878
+ {
879
+ "type": EventTypes.Member,
880
+ "state_key": local_user_id,
881
+ "room_id": old_room_id,
882
+ "sender": local_user_id,
883
+ "content": {
884
+ "membership": Membership.LEAVE,
885
+ },
886
+ }
887
+ )
888
+ invites_to_send.append(
889
+ {
890
+ "type": EventTypes.Member,
891
+ "state_key": local_user_id,
892
+ "room_id": new_room_id,
893
+ "sender": requester.user.to_string(),
894
+ "content": {
895
+ "membership": Membership.INVITE,
896
+ },
897
+ }
898
+ )
899
+
900
+ await self.event_creation_handler.create_and_send_new_client_events(
901
+ requester=requester,
902
+ room_id=old_room_id,
903
+ prev_event_id=None,
904
+ event_dicts=leaves_to_send,
905
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
906
+ )
907
+ await self.event_creation_handler.create_and_send_new_client_events(
908
+ requester=requester,
909
+ room_id=new_room_id,
910
+ prev_event_id=None,
911
+ event_dicts=invites_to_send,
912
+ ratelimit=False,
913
+ )
914
+
915
+ # For remote users we send invites one by one, as we need to
916
+ # send each one to the remote server.
917
+ #
918
+ # We also invite joined remote users who were in the old room.
919
+ remote_user_ids = [
920
+ user_id
921
+ for user_id in itertools.chain(invited_users, joined_profiles)
922
+ if not self.hs.is_mine_id(user_id)
923
+ ]
924
+
925
+ logger.debug("Inviting remote user IDs %s", remote_user_ids)
926
+
927
+ async def remote_invite(remote_user: str) -> None:
928
+ try:
929
+ await self.room_member_handler.update_membership(
930
+ requester,
931
+ UserID.from_string(remote_user),
932
+ new_room_id,
933
+ Membership.INVITE,
934
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
935
+ )
936
+ except SynapseError as e:
937
+ # If we fail to invite a remote user, we log it but continue
938
+ # on with the upgrade.
939
+ logger.warning(
940
+ "Failed to invite remote user %s to new room %s: %s",
941
+ remote_user,
942
+ new_room_id,
943
+ e,
944
+ )
945
+
946
+ # We do this concurrently, as it can take a while to invite
947
+ await concurrently_execute(
948
+ remote_invite,
949
+ remote_user_ids,
950
+ 10,
951
+ )
952
+
953
+ async def _move_aliases_to_new_room(
954
+ self,
955
+ requester: Requester,
956
+ old_room_id: str,
957
+ new_room_id: str,
958
+ old_room_state: StateMap[str],
959
+ ) -> None:
960
+ # check to see if we have a canonical alias.
961
+ canonical_alias_event = None
962
+ canonical_alias_event_id = old_room_state.get((EventTypes.CanonicalAlias, ""))
963
+ if canonical_alias_event_id:
964
+ canonical_alias_event = await self.store.get_event(canonical_alias_event_id)
965
+
966
+ await self.store.update_aliases_for_room(old_room_id, new_room_id)
967
+
968
+ if not canonical_alias_event:
969
+ return
970
+
971
+ # If there is a canonical alias we need to update the one in the old
972
+ # room and set one in the new one.
973
+ old_canonical_alias_content = dict(canonical_alias_event.content)
974
+ new_canonical_alias_content = {}
975
+
976
+ canonical = canonical_alias_event.content.get("alias")
977
+ if canonical and self.hs.is_mine_id(canonical):
978
+ new_canonical_alias_content["alias"] = canonical
979
+ old_canonical_alias_content.pop("alias", None)
980
+
981
+ # We convert to a list as it will be a Tuple.
982
+ old_alt_aliases = list(old_canonical_alias_content.get("alt_aliases", []))
983
+ if old_alt_aliases:
984
+ old_canonical_alias_content["alt_aliases"] = old_alt_aliases
985
+ new_alt_aliases = new_canonical_alias_content.setdefault("alt_aliases", [])
986
+ for alias in canonical_alias_event.content.get("alt_aliases", []):
987
+ try:
988
+ if self.hs.is_mine_id(alias):
989
+ new_alt_aliases.append(alias)
990
+ old_alt_aliases.remove(alias)
991
+ except Exception:
992
+ logger.info(
993
+ "Invalid alias %s in canonical alias event %s",
994
+ alias,
995
+ canonical_alias_event_id,
996
+ )
997
+
998
+ if not old_alt_aliases:
999
+ old_canonical_alias_content.pop("alt_aliases")
1000
+
1001
+ # If a canonical alias event existed for the old room, fire a canonical
1002
+ # alias event for the new room with a copy of the information.
1003
+ try:
1004
+ await self.event_creation_handler.create_and_send_nonmember_event(
1005
+ requester,
1006
+ {
1007
+ "type": EventTypes.CanonicalAlias,
1008
+ "state_key": "",
1009
+ "room_id": old_room_id,
1010
+ "sender": requester.user.to_string(),
1011
+ "content": old_canonical_alias_content,
1012
+ },
1013
+ ratelimit=False,
1014
+ )
1015
+ except SynapseError as e:
1016
+ # again I'm not really expecting this to fail, but if it does, I'd rather
1017
+ # we returned the new room to the client at this point.
1018
+ logger.exception("Unable to send updated alias events in old room: %s", e)
1019
+
1020
+ try:
1021
+ await self.event_creation_handler.create_and_send_nonmember_event(
1022
+ requester,
1023
+ {
1024
+ "type": EventTypes.CanonicalAlias,
1025
+ "state_key": "",
1026
+ "room_id": new_room_id,
1027
+ "sender": requester.user.to_string(),
1028
+ "content": new_canonical_alias_content,
1029
+ },
1030
+ ratelimit=False,
1031
+ )
1032
+ except SynapseError as e:
1033
+ # again I'm not really expecting this to fail, but if it does, I'd rather
1034
+ # we returned the new room to the client at this point.
1035
+ logger.exception("Unable to send updated alias events in new room: %s", e)
1036
+
1037
+ async def create_room(
1038
+ self,
1039
+ requester: Requester,
1040
+ config: JsonDict,
1041
+ ratelimit: bool = True,
1042
+ creator_join_profile: Optional[JsonDict] = None,
1043
+ ignore_forced_encryption: bool = False,
1044
+ ) -> tuple[str, Optional[RoomAlias], int]:
1045
+ """Creates a new room.
1046
+
1047
+ Args:
1048
+ requester: The user who requested the room creation.
1049
+ config: A dict of configuration options. This will be the body of
1050
+ a /createRoom request; see
1051
+ https://spec.matrix.org/latest/client-server-api/#post_matrixclientv3createroom
1052
+ ratelimit: set to False to disable the rate limiter
1053
+
1054
+ creator_join_profile:
1055
+ Set to override the displayname and avatar for the creating
1056
+ user in this room. If unset, displayname and avatar will be
1057
+ derived from the user's profile. If set, should contain the
1058
+ values to go in the body of the 'join' event (typically
1059
+ `avatar_url` and/or `displayname`.
1060
+ ignore_forced_encryption:
1061
+ Ignore encryption forced by `encryption_enabled_by_default_for_room_type` setting.
1062
+
1063
+ Returns:
1064
+ A 3-tuple containing:
1065
+ - the room ID;
1066
+ - if requested, the room alias, otherwise None; and
1067
+ - the `stream_id` of the last persisted event.
1068
+ Raises:
1069
+ SynapseError:
1070
+ if the room ID couldn't be stored, 3pid invitation config
1071
+ validation failed, or something went horribly wrong.
1072
+ ResourceLimitError:
1073
+ if server is blocked to some resource being
1074
+ exceeded
1075
+ """
1076
+ user_id = requester.user.to_string()
1077
+
1078
+ await self.auth_blocking.check_auth_blocking(requester=requester)
1079
+
1080
+ if ratelimit:
1081
+ # Limit the rate of room creations,
1082
+ # using both the limiter specific to room creations as well
1083
+ # as the general request ratelimiter.
1084
+ #
1085
+ # Note that we don't rate limit the individual
1086
+ # events in the room — room creation isn't atomic and
1087
+ # historically it was very janky if half the events in the
1088
+ # initial state don't make it because of rate limiting.
1089
+
1090
+ # First check the room creation ratelimiter without updating it
1091
+ # (this is so we don't consume a token if the other ratelimiter doesn't
1092
+ # allow us to proceed)
1093
+ await self.creation_ratelimiter.ratelimit(requester, update=False)
1094
+
1095
+ # then apply the ratelimits
1096
+ await self.common_request_ratelimiter.ratelimit(requester)
1097
+ await self.creation_ratelimiter.ratelimit(requester)
1098
+
1099
+ if (
1100
+ self._server_notices_mxid is not None
1101
+ and user_id == self._server_notices_mxid
1102
+ ):
1103
+ # allow the server notices mxid to create rooms
1104
+ is_requester_admin = True
1105
+ else:
1106
+ is_requester_admin = await self.auth.is_server_admin(requester)
1107
+
1108
+ # Let the third party rules modify the room creation config if needed, or abort
1109
+ # the room creation entirely with an exception.
1110
+ await self._third_party_event_rules.on_create_room(
1111
+ requester, config, is_requester_admin=is_requester_admin
1112
+ )
1113
+
1114
+ invite_3pid_list = config.get("invite_3pid", [])
1115
+ invite_list = config.get("invite", [])
1116
+
1117
+ # validate each entry for correctness
1118
+ for invite_3pid in invite_3pid_list:
1119
+ if not all(
1120
+ key in invite_3pid
1121
+ for key in ("medium", "address", "id_server", "id_access_token")
1122
+ ):
1123
+ raise SynapseError(
1124
+ HTTPStatus.BAD_REQUEST,
1125
+ "all of `medium`, `address`, `id_server` and `id_access_token` "
1126
+ "are required when making a 3pid invite",
1127
+ Codes.MISSING_PARAM,
1128
+ )
1129
+
1130
+ room_version_id = config.get(
1131
+ "room_version", self.config.server.default_room_version.identifier
1132
+ )
1133
+
1134
+ if not isinstance(room_version_id, str):
1135
+ raise SynapseError(400, "room_version must be a string", Codes.BAD_JSON)
1136
+
1137
+ room_version = KNOWN_ROOM_VERSIONS.get(room_version_id)
1138
+ if room_version is None:
1139
+ raise SynapseError(
1140
+ 400,
1141
+ "Your homeserver does not support this room version",
1142
+ Codes.UNSUPPORTED_ROOM_VERSION,
1143
+ )
1144
+
1145
+ room_alias = None
1146
+ if "room_alias_name" in config:
1147
+ for wchar in string.whitespace:
1148
+ if wchar in config["room_alias_name"]:
1149
+ raise SynapseError(400, "Invalid characters in room alias")
1150
+
1151
+ if ":" in config["room_alias_name"]:
1152
+ # Prevent someone from trying to pass in a full alias here.
1153
+ # Note that it's permissible for a room alias to have multiple
1154
+ # hash symbols at the start (notably bridged over from IRC, too),
1155
+ # but the first colon in the alias is defined to separate the local
1156
+ # part from the server name.
1157
+ # (remember server names can contain port numbers, also separated
1158
+ # by a colon. But under no circumstances should the local part be
1159
+ # allowed to contain a colon!)
1160
+ raise SynapseError(
1161
+ 400,
1162
+ "':' is not permitted in the room alias name. "
1163
+ "Please note this expects a local part — 'wombat', not '#wombat:example.com'.",
1164
+ )
1165
+
1166
+ room_alias = RoomAlias(config["room_alias_name"], self.hs.hostname)
1167
+ mapping = await self.store.get_association_from_room_alias(room_alias)
1168
+
1169
+ if mapping:
1170
+ raise SynapseError(400, "Room alias already taken", Codes.ROOM_IN_USE)
1171
+
1172
+ for i in invite_list:
1173
+ try:
1174
+ uid = UserID.from_string(i)
1175
+ parse_and_validate_server_name(uid.domain)
1176
+ except Exception:
1177
+ raise SynapseError(400, "Invalid user_id: %s" % (i,))
1178
+
1179
+ if (invite_list or invite_3pid_list) and requester.shadow_banned:
1180
+ # We randomly sleep a bit just to annoy the requester.
1181
+ await self.clock.sleep(random.randint(1, 10))
1182
+
1183
+ # Allow the request to go through, but remove any associated invites.
1184
+ invite_3pid_list = []
1185
+ invite_list = []
1186
+
1187
+ if invite_list or invite_3pid_list:
1188
+ try:
1189
+ # If there are invites in the request, see if the ratelimiting settings
1190
+ # allow that number of invites to be sent from the current user.
1191
+ await self.room_member_handler.ratelimit_multiple_invites(
1192
+ requester,
1193
+ room_id=None,
1194
+ n_invites=len(invite_list) + len(invite_3pid_list),
1195
+ update=False,
1196
+ )
1197
+ except LimitExceededError:
1198
+ raise SynapseError(400, "Cannot invite so many users at once")
1199
+
1200
+ await self.event_creation_handler.assert_accepted_privacy_policy(requester)
1201
+
1202
+ power_level_content_override = config.get("power_level_content_override")
1203
+ if (
1204
+ power_level_content_override
1205
+ and not room_version.msc4289_creator_power_enabled # this validation doesn't apply in MSC4289 rooms
1206
+ and "users" in power_level_content_override
1207
+ and user_id not in power_level_content_override["users"]
1208
+ ):
1209
+ raise SynapseError(
1210
+ 400,
1211
+ "Not a valid power_level_content_override: 'users' did not contain %s"
1212
+ % (user_id,),
1213
+ )
1214
+
1215
+ # The spec says rooms should default to private visibility if
1216
+ # `visibility` is not specified.
1217
+ visibility = config.get("visibility", "private")
1218
+ is_public = visibility == "public"
1219
+
1220
+ self._validate_room_config(config, visibility)
1221
+
1222
+ # Run the spam checker after other validation
1223
+ if not is_requester_admin:
1224
+ spam_check = await self._spam_checker_module_callbacks.user_may_create_room(
1225
+ user_id, config
1226
+ )
1227
+ if spam_check != self._spam_checker_module_callbacks.NOT_SPAM:
1228
+ raise SynapseError(
1229
+ 403,
1230
+ "You are not permitted to create rooms",
1231
+ errcode=spam_check[0],
1232
+ additional_fields=spam_check[1],
1233
+ )
1234
+
1235
+ creation_content = config.get("creation_content", {})
1236
+ # override any attempt to set room versions via the creation_content
1237
+ creation_content["room_version"] = room_version.identifier
1238
+
1239
+ # trusted private chats have the invited users marked as additional creators
1240
+ if (
1241
+ room_version.msc4289_creator_power_enabled
1242
+ and config.get("preset", None) == RoomCreationPreset.TRUSTED_PRIVATE_CHAT
1243
+ and len(config.get("invite", [])) > 0
1244
+ ):
1245
+ # the other user(s) are additional creators
1246
+ invitees = config.get("invite", [])
1247
+ # we don't want to replace any additional_creators additionally specified, and we want
1248
+ # to remove duplicates.
1249
+ creation_content[EventContentFields.ADDITIONAL_CREATORS] = list(
1250
+ set(creation_content.get(EventContentFields.ADDITIONAL_CREATORS, []))
1251
+ | set(invitees)
1252
+ )
1253
+
1254
+ creation_event_with_context = None
1255
+ if room_version.msc4291_room_ids_as_hashes:
1256
+ creation_event_with_context = await self._generate_create_event_for_room_id(
1257
+ requester,
1258
+ creation_content,
1259
+ is_public,
1260
+ room_version,
1261
+ )
1262
+ (create_event, _) = creation_event_with_context
1263
+ room_id = create_event.room_id
1264
+ else:
1265
+ room_id = await self._generate_and_create_room_id(
1266
+ creator_id=user_id,
1267
+ is_public=is_public,
1268
+ room_version=room_version,
1269
+ )
1270
+
1271
+ # Check whether this visibility value is blocked by a third party module
1272
+ allowed_by_third_party_rules = await (
1273
+ self._third_party_event_rules.check_visibility_can_be_modified(
1274
+ room_id, visibility
1275
+ )
1276
+ )
1277
+ if not allowed_by_third_party_rules:
1278
+ raise SynapseError(403, "Room visibility value not allowed.")
1279
+
1280
+ if is_public:
1281
+ room_aliases = []
1282
+ if room_alias:
1283
+ room_aliases.append(room_alias.to_string())
1284
+ if not self.config.roomdirectory.is_publishing_room_allowed(
1285
+ user_id, room_id, room_aliases
1286
+ ):
1287
+ # allow room creation to continue but do not publish room
1288
+ await self.store.set_room_is_public(room_id, False)
1289
+
1290
+ directory_handler = self.hs.get_directory_handler()
1291
+ if room_alias:
1292
+ await directory_handler.create_association(
1293
+ requester=requester,
1294
+ room_id=room_id,
1295
+ room_alias=room_alias,
1296
+ servers=[self.hs.hostname],
1297
+ check_membership=False,
1298
+ )
1299
+
1300
+ raw_initial_state = config.get("initial_state", [])
1301
+
1302
+ initial_state = OrderedDict()
1303
+ for val in raw_initial_state:
1304
+ initial_state[(val["type"], val.get("state_key", ""))] = val["content"]
1305
+
1306
+ (
1307
+ last_stream_id,
1308
+ last_sent_event_id,
1309
+ depth,
1310
+ ) = await self._send_events_for_new_room(
1311
+ requester,
1312
+ room_id,
1313
+ room_version,
1314
+ room_config=config,
1315
+ invite_list=invite_list,
1316
+ initial_state=initial_state,
1317
+ creation_content=creation_content,
1318
+ room_alias=room_alias,
1319
+ power_level_content_override=power_level_content_override,
1320
+ creator_join_profile=creator_join_profile,
1321
+ ignore_forced_encryption=ignore_forced_encryption,
1322
+ creation_event_with_context=creation_event_with_context,
1323
+ )
1324
+
1325
+ # we avoid dropping the lock between invites, as otherwise joins can
1326
+ # start coming in and making the createRoom slow.
1327
+ #
1328
+ # we also don't need to check the requester's shadow-ban here, as we
1329
+ # have already done so above (and potentially emptied invite_list).
1330
+ async with self.room_member_handler.member_linearizer.queue((room_id,)):
1331
+ content = {}
1332
+ is_direct = config.get("is_direct", None)
1333
+ if is_direct:
1334
+ content["is_direct"] = is_direct
1335
+
1336
+ for invitee in invite_list:
1337
+ (
1338
+ member_event_id,
1339
+ last_stream_id,
1340
+ ) = await self.room_member_handler.update_membership_locked(
1341
+ requester,
1342
+ UserID.from_string(invitee),
1343
+ room_id,
1344
+ "invite",
1345
+ ratelimit=False,
1346
+ content=content,
1347
+ new_room=True,
1348
+ prev_event_ids=[last_sent_event_id],
1349
+ depth=depth,
1350
+ )
1351
+ last_sent_event_id = member_event_id
1352
+ depth += 1
1353
+
1354
+ for invite_3pid in invite_3pid_list:
1355
+ id_server = invite_3pid["id_server"]
1356
+ id_access_token = invite_3pid["id_access_token"]
1357
+ address = invite_3pid["address"]
1358
+ medium = invite_3pid["medium"]
1359
+ # Note that do_3pid_invite can raise a ShadowBanError, but this was
1360
+ # handled above by emptying invite_3pid_list.
1361
+ (
1362
+ member_event_id,
1363
+ last_stream_id,
1364
+ ) = await self.hs.get_room_member_handler().do_3pid_invite(
1365
+ room_id,
1366
+ requester.user,
1367
+ medium,
1368
+ address,
1369
+ id_server,
1370
+ requester,
1371
+ txn_id=None,
1372
+ id_access_token=id_access_token,
1373
+ prev_event_ids=[last_sent_event_id],
1374
+ depth=depth,
1375
+ )
1376
+ last_sent_event_id = member_event_id
1377
+ depth += 1
1378
+
1379
+ # Always wait for room creation to propagate before returning
1380
+ await self._replication.wait_for_stream_position(
1381
+ self.hs.config.worker.events_shard_config.get_instance(room_id),
1382
+ "events",
1383
+ last_stream_id,
1384
+ )
1385
+
1386
+ return room_id, room_alias, last_stream_id
1387
+
1388
+ async def _generate_create_event_for_room_id(
1389
+ self,
1390
+ creator: Requester,
1391
+ creation_content: JsonDict,
1392
+ is_public: bool,
1393
+ room_version: RoomVersion,
1394
+ ) -> tuple[EventBase, synapse.events.snapshot.EventContext]:
1395
+ (
1396
+ creation_event,
1397
+ new_unpersisted_context,
1398
+ ) = await self.event_creation_handler.create_event(
1399
+ creator,
1400
+ {
1401
+ "content": creation_content,
1402
+ "sender": creator.user.to_string(),
1403
+ "type": EventTypes.Create,
1404
+ "state_key": "",
1405
+ },
1406
+ prev_event_ids=[],
1407
+ depth=1,
1408
+ state_map={},
1409
+ for_batch=False,
1410
+ )
1411
+ await self.store.store_room(
1412
+ room_id=creation_event.room_id,
1413
+ room_creator_user_id=creator.user.to_string(),
1414
+ is_public=is_public,
1415
+ room_version=room_version,
1416
+ )
1417
+ creation_context = await new_unpersisted_context.persist(creation_event)
1418
+ return (creation_event, creation_context)
1419
+
1420
+ async def _send_events_for_new_room(
1421
+ self,
1422
+ creator: Requester,
1423
+ room_id: str,
1424
+ room_version: RoomVersion,
1425
+ room_config: JsonDict,
1426
+ invite_list: list[str],
1427
+ initial_state: MutableStateMap,
1428
+ creation_content: JsonDict,
1429
+ room_alias: Optional[RoomAlias] = None,
1430
+ power_level_content_override: Optional[JsonDict] = None,
1431
+ creator_join_profile: Optional[JsonDict] = None,
1432
+ ignore_forced_encryption: bool = False,
1433
+ creation_event_with_context: Optional[
1434
+ tuple[EventBase, synapse.events.snapshot.EventContext]
1435
+ ] = None,
1436
+ ) -> tuple[int, str, int]:
1437
+ """Sends the initial events into a new room. Sends the room creation, membership,
1438
+ and power level events into the room sequentially, then creates and batches up the
1439
+ rest of the events to persist as a batch to the DB.
1440
+
1441
+ `power_level_content_override` doesn't apply when initial state has
1442
+ power level state event content.
1443
+
1444
+ Rate limiting should already have been applied by this point.
1445
+
1446
+ Args:
1447
+ creator:
1448
+ the user requesting the room creation
1449
+ room_id:
1450
+ room id for the room being created
1451
+ room_version:
1452
+ The room version of the new room.
1453
+ room_config:
1454
+ A dict of configuration options. This will be the body of
1455
+ a /createRoom request; see
1456
+ https://spec.matrix.org/latest/client-server-api/#post_matrixclientv3createroom
1457
+ invite_list:
1458
+ a list of user ids to invite to the room
1459
+ initial_state:
1460
+ A list of state events to set in the new room.
1461
+ creation_content:
1462
+ Extra keys, such as m.federate, to be added to the content of the m.room.create event.
1463
+ room_alias:
1464
+ alias for the room
1465
+ power_level_content_override:
1466
+ The power level content to override in the default power level event.
1467
+ creator_join_profile:
1468
+ Set to override the displayname and avatar for the creating
1469
+ user in this room.
1470
+ ignore_forced_encryption:
1471
+ Ignore encryption forced by `encryption_enabled_by_default_for_room_type` setting.
1472
+ creation_event_with_context:
1473
+ Set in MSC4291 rooms where the create event determines the room ID. If provided,
1474
+ does not create an additional create event but instead appends the remaining new
1475
+ events onto the provided create event.
1476
+ Returns:
1477
+ A tuple containing the stream ID, event ID and depth of the last
1478
+ event sent to the room.
1479
+ """
1480
+ creator_id = creator.user.to_string()
1481
+ event_keys = {"room_id": room_id, "sender": creator_id, "state_key": ""}
1482
+ depth = 1
1483
+
1484
+ # the most recently created event
1485
+ prev_event: list[str] = []
1486
+ # a map of event types, state keys -> event_ids. We collect these mappings this as events are
1487
+ # created (but not persisted to the db) to determine state for future created events
1488
+ # (as this info can't be pulled from the db)
1489
+ state_map: MutableStateMap[str] = {}
1490
+
1491
+ async def create_event(
1492
+ etype: str,
1493
+ content: JsonDict,
1494
+ for_batch: bool,
1495
+ **kwargs: Any,
1496
+ ) -> tuple[EventBase, synapse.events.snapshot.UnpersistedEventContextBase]:
1497
+ """
1498
+ Creates an event and associated event context.
1499
+ Args:
1500
+ etype: the type of event to be created
1501
+ content: content of the event
1502
+ for_batch: whether the event is being created for batch persisting. If
1503
+ bool for_batch is true, this will create an event using the prev_event_ids,
1504
+ and will create an event context for the event using the parameters state_map
1505
+ and current_state_group, thus these parameters must be provided in this
1506
+ case if for_batch is True. The subsequently created event and context
1507
+ are suitable for being batched up and bulk persisted to the database
1508
+ with other similarly created events.
1509
+ """
1510
+ nonlocal depth
1511
+ nonlocal prev_event
1512
+
1513
+ # Create the event dictionary.
1514
+ event_dict = {"type": etype, "content": content}
1515
+ event_dict.update(event_keys)
1516
+ event_dict.update(kwargs)
1517
+
1518
+ (
1519
+ new_event,
1520
+ new_unpersisted_context,
1521
+ ) = await self.event_creation_handler.create_event(
1522
+ creator,
1523
+ event_dict,
1524
+ prev_event_ids=prev_event,
1525
+ depth=depth,
1526
+ # Take a copy to ensure each event gets a unique copy of
1527
+ # state_map since it is modified below.
1528
+ state_map=dict(state_map),
1529
+ for_batch=for_batch,
1530
+ )
1531
+
1532
+ depth += 1
1533
+ prev_event = [new_event.event_id]
1534
+ state_map[(new_event.type, new_event.state_key)] = new_event.event_id
1535
+
1536
+ return new_event, new_unpersisted_context
1537
+
1538
+ preset_config, config = self._room_preset_config(room_config)
1539
+
1540
+ if creation_event_with_context is None:
1541
+ # MSC2175 removes the creator field from the create event.
1542
+ if not room_version.implicit_room_creator:
1543
+ creation_content["creator"] = creator_id
1544
+ creation_event, unpersisted_creation_context = await create_event(
1545
+ EventTypes.Create, creation_content, False
1546
+ )
1547
+ creation_context = await unpersisted_creation_context.persist(
1548
+ creation_event
1549
+ )
1550
+ else:
1551
+ (creation_event, creation_context) = creation_event_with_context
1552
+ # we had to do the above already in order to have a room ID, so just updates local vars
1553
+ # and continue.
1554
+ depth = 2
1555
+ prev_event = [creation_event.event_id]
1556
+ state_map[(creation_event.type, creation_event.state_key)] = (
1557
+ creation_event.event_id
1558
+ )
1559
+
1560
+ logger.debug("Sending %s in new room", EventTypes.Member)
1561
+ ev = await self.event_creation_handler.handle_new_client_event(
1562
+ requester=creator,
1563
+ events_and_context=[(creation_event, creation_context)],
1564
+ ratelimit=False,
1565
+ ignore_shadow_ban=True,
1566
+ )
1567
+ last_sent_event_id = ev.event_id
1568
+
1569
+ member_event_id, _ = await self.room_member_handler.update_membership(
1570
+ creator,
1571
+ creator.user,
1572
+ room_id,
1573
+ "join",
1574
+ ratelimit=False,
1575
+ content=creator_join_profile,
1576
+ new_room=True,
1577
+ prev_event_ids=[last_sent_event_id],
1578
+ depth=depth,
1579
+ )
1580
+ prev_event = [member_event_id]
1581
+
1582
+ # update the depth and state map here as the membership event has been created
1583
+ # through a different code path
1584
+ depth += 1
1585
+ state_map[(EventTypes.Member, creator.user.to_string())] = member_event_id
1586
+
1587
+ # we need the state group of the membership event as it is the current state group
1588
+ event_to_state = (
1589
+ await self._storage_controllers.state.get_state_group_for_events(
1590
+ [member_event_id]
1591
+ )
1592
+ )
1593
+ current_state_group = event_to_state[member_event_id]
1594
+
1595
+ events_to_send = []
1596
+ # We treat the power levels override specially as this needs to be one
1597
+ # of the first events that get sent into a room.
1598
+ pl_content = initial_state.pop((EventTypes.PowerLevels, ""), None)
1599
+ if pl_content is not None:
1600
+ power_event, power_context = await create_event(
1601
+ EventTypes.PowerLevels, pl_content, True
1602
+ )
1603
+ events_to_send.append((power_event, power_context))
1604
+ else:
1605
+ # Please update the docs for `default_power_level_content_override` when
1606
+ # updating the `events` dict below
1607
+ power_level_content: JsonDict = {
1608
+ "users": {creator_id: 100}
1609
+ if not room_version.msc4289_creator_power_enabled
1610
+ else {},
1611
+ "users_default": 0,
1612
+ "events": {
1613
+ EventTypes.Name: 50,
1614
+ EventTypes.PowerLevels: 100,
1615
+ EventTypes.RoomHistoryVisibility: 100,
1616
+ EventTypes.CanonicalAlias: 50,
1617
+ EventTypes.RoomAvatar: 50,
1618
+ EventTypes.Tombstone: 150
1619
+ if room_version.msc4289_creator_power_enabled
1620
+ else 100,
1621
+ EventTypes.ServerACL: 100,
1622
+ EventTypes.RoomEncryption: 100,
1623
+ },
1624
+ "events_default": 0,
1625
+ "state_default": 50,
1626
+ "ban": 50,
1627
+ "kick": 50,
1628
+ "redact": 50,
1629
+ "invite": 50,
1630
+ "historical": 100,
1631
+ }
1632
+
1633
+ # original_invitees_have_ops is set on preset:trusted_private_chat which will already
1634
+ # have set these users as additional_creators, hence don't set the PL for creators as
1635
+ # that is invalid.
1636
+ if (
1637
+ config["original_invitees_have_ops"]
1638
+ and not room_version.msc4289_creator_power_enabled
1639
+ ):
1640
+ for invitee in invite_list:
1641
+ power_level_content["users"][invitee] = 100
1642
+
1643
+ # If the user supplied a preset name e.g. "private_chat",
1644
+ # we apply that preset
1645
+ power_level_content.update(config["power_level_content_override"])
1646
+
1647
+ # If the server config contains default_power_level_content_override,
1648
+ # and that contains information for this room preset, apply it.
1649
+ if self._default_power_level_content_override:
1650
+ override = self._default_power_level_content_override.get(preset_config)
1651
+ if override is not None:
1652
+ power_level_content.update(override)
1653
+
1654
+ # Finally, if the user supplied specific permissions for this room,
1655
+ # apply those.
1656
+ if power_level_content_override:
1657
+ power_level_content.update(power_level_content_override)
1658
+ pl_event, pl_context = await create_event(
1659
+ EventTypes.PowerLevels,
1660
+ power_level_content,
1661
+ True,
1662
+ )
1663
+ events_to_send.append((pl_event, pl_context))
1664
+
1665
+ if room_alias and (EventTypes.CanonicalAlias, "") not in initial_state:
1666
+ room_alias_event, room_alias_context = await create_event(
1667
+ EventTypes.CanonicalAlias, {"alias": room_alias.to_string()}, True
1668
+ )
1669
+ events_to_send.append((room_alias_event, room_alias_context))
1670
+
1671
+ if (EventTypes.JoinRules, "") not in initial_state:
1672
+ join_rules_event, join_rules_context = await create_event(
1673
+ EventTypes.JoinRules,
1674
+ {"join_rule": config["join_rules"]},
1675
+ True,
1676
+ )
1677
+ events_to_send.append((join_rules_event, join_rules_context))
1678
+
1679
+ if (EventTypes.RoomHistoryVisibility, "") not in initial_state:
1680
+ visibility_event, visibility_context = await create_event(
1681
+ EventTypes.RoomHistoryVisibility,
1682
+ {"history_visibility": config["history_visibility"]},
1683
+ True,
1684
+ )
1685
+ events_to_send.append((visibility_event, visibility_context))
1686
+
1687
+ if config["guest_can_join"]:
1688
+ if (EventTypes.GuestAccess, "") not in initial_state:
1689
+ guest_access_event, guest_access_context = await create_event(
1690
+ EventTypes.GuestAccess,
1691
+ {EventContentFields.GUEST_ACCESS: GuestAccess.CAN_JOIN},
1692
+ True,
1693
+ )
1694
+ events_to_send.append((guest_access_event, guest_access_context))
1695
+
1696
+ for (etype, state_key), content in initial_state.items():
1697
+ event, context = await create_event(
1698
+ etype, content, True, state_key=state_key
1699
+ )
1700
+ events_to_send.append((event, context))
1701
+
1702
+ if config["encrypted"] and not ignore_forced_encryption:
1703
+ encryption_event, encryption_context = await create_event(
1704
+ EventTypes.RoomEncryption,
1705
+ {"algorithm": RoomEncryptionAlgorithms.DEFAULT},
1706
+ True,
1707
+ state_key="",
1708
+ )
1709
+ events_to_send.append((encryption_event, encryption_context))
1710
+
1711
+ if "name" in room_config:
1712
+ name = room_config["name"]
1713
+ name_event, name_context = await create_event(
1714
+ EventTypes.Name,
1715
+ {"name": name},
1716
+ True,
1717
+ )
1718
+ events_to_send.append((name_event, name_context))
1719
+
1720
+ if "topic" in room_config:
1721
+ topic = room_config["topic"]
1722
+ topic_event, topic_context = await create_event(
1723
+ EventTypes.Topic,
1724
+ {
1725
+ EventContentFields.TOPIC: topic,
1726
+ EventContentFields.M_TOPIC: {
1727
+ # The mimetype property defaults to `text/plain` if omitted.
1728
+ EventContentFields.M_TEXT: [{MTextFields.BODY: topic}]
1729
+ },
1730
+ },
1731
+ True,
1732
+ )
1733
+ events_to_send.append((topic_event, topic_context))
1734
+
1735
+ datastore = self.hs.get_datastores().state
1736
+ events_and_context = (
1737
+ await UnpersistedEventContext.batch_persist_unpersisted_contexts(
1738
+ events_to_send, room_id, current_state_group, datastore
1739
+ )
1740
+ )
1741
+
1742
+ last_event = await self.event_creation_handler.handle_new_client_event(
1743
+ creator,
1744
+ events_and_context,
1745
+ ignore_shadow_ban=True,
1746
+ ratelimit=False,
1747
+ )
1748
+ assert last_event.internal_metadata.stream_ordering is not None
1749
+ return last_event.internal_metadata.stream_ordering, last_event.event_id, depth
1750
+
1751
+ def _validate_room_config(
1752
+ self,
1753
+ config: JsonDict,
1754
+ visibility: str,
1755
+ ) -> None:
1756
+ """Checks configuration parameters for a /createRoom request.
1757
+
1758
+ If validation detects invalid parameters an exception may be raised to
1759
+ cause room creation to be aborted and an error response to be returned
1760
+ to the client.
1761
+
1762
+ Args:
1763
+ config: A dict of configuration options. Originally from the body of
1764
+ the /createRoom request
1765
+ visibility: One of "public" or "private"
1766
+ """
1767
+
1768
+ # Validate the requested preset, raise a 400 error if not valid
1769
+ preset_name, preset_config = self._room_preset_config(config)
1770
+
1771
+ # If the user is trying to create an encrypted room and this is forbidden
1772
+ # by the configured default_power_level_content_override, then reject the
1773
+ # request before the room is created.
1774
+ raw_initial_state = config.get("initial_state", [])
1775
+ room_encryption_event = any(
1776
+ s.get("type", "") == EventTypes.RoomEncryption for s in raw_initial_state
1777
+ )
1778
+
1779
+ if preset_config["encrypted"] or room_encryption_event:
1780
+ if self._default_power_level_content_override:
1781
+ override = self._default_power_level_content_override.get(preset_name)
1782
+ if override is not None:
1783
+ event_levels = override.get("events", {})
1784
+ room_admin_level = event_levels.get(EventTypes.PowerLevels, 100)
1785
+ encryption_level = event_levels.get(EventTypes.RoomEncryption, 100)
1786
+ if encryption_level > room_admin_level:
1787
+ raise SynapseError(
1788
+ 403,
1789
+ f"You cannot create an encrypted room. user_level ({room_admin_level}) < send_level ({encryption_level})",
1790
+ )
1791
+
1792
+ def _room_preset_config(self, room_config: JsonDict) -> tuple[str, dict]:
1793
+ # The spec says rooms should default to private visibility if
1794
+ # `visibility` is not specified.
1795
+ visibility = room_config.get("visibility", "private")
1796
+ preset_name = room_config.get(
1797
+ "preset",
1798
+ (
1799
+ RoomCreationPreset.PRIVATE_CHAT
1800
+ if visibility == "private"
1801
+ else RoomCreationPreset.PUBLIC_CHAT
1802
+ ),
1803
+ )
1804
+ try:
1805
+ preset_config = self._presets_dict[preset_name]
1806
+ except KeyError:
1807
+ raise SynapseError(
1808
+ 400, f"'{preset_name}' is not a valid preset", errcode=Codes.BAD_JSON
1809
+ )
1810
+ return preset_name, preset_config
1811
+
1812
+ def _remove_creators_from_pl_users_map(
1813
+ self,
1814
+ users_map: dict[str, int],
1815
+ creator: str,
1816
+ additional_creators: Optional[list[str]],
1817
+ ) -> None:
1818
+ creators = [creator]
1819
+ if additional_creators:
1820
+ creators.extend(additional_creators)
1821
+ for creator in creators:
1822
+ # the creator(s) cannot be in the users map
1823
+ users_map.pop(creator, None)
1824
+
1825
+ def _generate_room_id(self) -> str:
1826
+ """Generates a random room ID.
1827
+
1828
+ Room IDs look like "!opaque_id:domain" and are case-sensitive as per the spec
1829
+ at https://spec.matrix.org/v1.2/appendices/#room-ids-and-event-ids.
1830
+
1831
+ Does not check for collisions with existing rooms or prevent future calls from
1832
+ returning the same room ID. To ensure the uniqueness of a new room ID, use
1833
+ `_generate_and_create_room_id` instead.
1834
+
1835
+ Synapse's room IDs are 18 [a-zA-Z] characters long, which comes out to around
1836
+ 102 bits.
1837
+
1838
+ Returns:
1839
+ A random room ID of the form "!opaque_id:domain".
1840
+ """
1841
+ random_string = stringutils.random_string(18)
1842
+ return RoomIdWithDomain(random_string, self.hs.hostname).to_string()
1843
+
1844
+ async def _generate_and_create_room_id(
1845
+ self,
1846
+ creator_id: str,
1847
+ is_public: bool,
1848
+ room_version: RoomVersion,
1849
+ ) -> str:
1850
+ # autogen room IDs and try to create it. We may clash, so just
1851
+ # try a few times till one goes through, giving up eventually.
1852
+ attempts = 0
1853
+ while attempts < 5:
1854
+ try:
1855
+ gen_room_id = self._generate_room_id()
1856
+ await self.store.store_room(
1857
+ room_id=gen_room_id,
1858
+ room_creator_user_id=creator_id,
1859
+ is_public=is_public,
1860
+ room_version=room_version,
1861
+ )
1862
+ return gen_room_id
1863
+ except StoreError:
1864
+ attempts += 1
1865
+ raise StoreError(500, "Couldn't generate a room ID.")
1866
+
1867
+
1868
+ class RoomContextHandler:
1869
+ def __init__(self, hs: "HomeServer"):
1870
+ self.hs = hs
1871
+ self.auth = hs.get_auth()
1872
+ self.store = hs.get_datastores().main
1873
+ self._storage_controllers = hs.get_storage_controllers()
1874
+ self._state_storage_controller = self._storage_controllers.state
1875
+ self._relations_handler = hs.get_relations_handler()
1876
+
1877
+ async def get_event_context(
1878
+ self,
1879
+ requester: Requester,
1880
+ room_id: str,
1881
+ event_id: str,
1882
+ limit: int,
1883
+ event_filter: Optional[Filter],
1884
+ use_admin_priviledge: bool = False,
1885
+ ) -> Optional[EventContext]:
1886
+ """Retrieves events, pagination tokens and state around a given event
1887
+ in a room.
1888
+
1889
+ Args:
1890
+ requester
1891
+ room_id
1892
+ event_id
1893
+ limit: The maximum number of events to return in total
1894
+ (excluding state).
1895
+ event_filter: the filter to apply to the events returned
1896
+ (excluding the target event_id)
1897
+ use_admin_priviledge: if `True`, return all events, regardless
1898
+ of whether `user` has access to them. To be used **ONLY**
1899
+ from the admin API.
1900
+ Returns:
1901
+ dict, or None if the event isn't found
1902
+ """
1903
+ user = requester.user
1904
+ if use_admin_priviledge:
1905
+ await assert_user_is_admin(self.auth, requester)
1906
+
1907
+ before_limit = math.floor(limit / 2.0)
1908
+ after_limit = limit - before_limit
1909
+
1910
+ is_user_in_room = await self.store.check_local_user_in_room(
1911
+ user_id=user.to_string(), room_id=room_id
1912
+ )
1913
+ # The user is peeking if they aren't in the room already
1914
+ is_peeking = not is_user_in_room
1915
+
1916
+ async def filter_evts(events: list[EventBase]) -> list[EventBase]:
1917
+ if use_admin_priviledge:
1918
+ return events
1919
+ return await filter_events_for_client(
1920
+ self._storage_controllers,
1921
+ user.to_string(),
1922
+ events,
1923
+ is_peeking=is_peeking,
1924
+ )
1925
+
1926
+ event = await self.store.get_event(
1927
+ event_id, get_prev_content=True, allow_none=True
1928
+ )
1929
+ if not event:
1930
+ return None
1931
+
1932
+ filtered = await filter_evts([event])
1933
+ if not filtered:
1934
+ raise AuthError(403, "You don't have permission to access that event.")
1935
+
1936
+ results = await self.store.get_events_around(
1937
+ room_id, event_id, before_limit, after_limit, event_filter
1938
+ )
1939
+ events_before = results.events_before
1940
+ events_after = results.events_after
1941
+
1942
+ if event_filter:
1943
+ events_before = await event_filter.filter(events_before)
1944
+ events_after = await event_filter.filter(events_after)
1945
+
1946
+ events_before = await filter_evts(events_before)
1947
+ events_after = await filter_evts(events_after)
1948
+ # filter_evts can return a pruned event in case the user is allowed to see that
1949
+ # there's something there but not see the content, so use the event that's in
1950
+ # `filtered` rather than the event we retrieved from the datastore.
1951
+ event = filtered[0]
1952
+
1953
+ # Fetch the aggregations.
1954
+ aggregations = await self._relations_handler.get_bundled_aggregations(
1955
+ itertools.chain(events_before, (event,), events_after),
1956
+ user.to_string(),
1957
+ )
1958
+
1959
+ if events_after:
1960
+ last_event_id = events_after[-1].event_id
1961
+ else:
1962
+ last_event_id = event_id
1963
+
1964
+ if event_filter and event_filter.lazy_load_members:
1965
+ state_filter = StateFilter.from_lazy_load_member_list(
1966
+ ev.sender
1967
+ for ev in itertools.chain(
1968
+ events_before,
1969
+ (event,),
1970
+ events_after,
1971
+ )
1972
+ )
1973
+ else:
1974
+ state_filter = StateFilter.all()
1975
+
1976
+ # XXX: why do we return the state as of the last event rather than the
1977
+ # first? Shouldn't we be consistent with /sync?
1978
+ # https://github.com/matrix-org/matrix-doc/issues/687
1979
+
1980
+ state = await self._state_storage_controller.get_state_for_events(
1981
+ [last_event_id], state_filter=state_filter
1982
+ )
1983
+
1984
+ state_events = list(state[last_event_id].values())
1985
+ if event_filter:
1986
+ state_events = await event_filter.filter(state_events)
1987
+
1988
+ # We use a dummy token here as we only care about the room portion of
1989
+ # the token, which we replace.
1990
+ token = StreamToken.START
1991
+
1992
+ return EventContext(
1993
+ events_before=events_before,
1994
+ event=event,
1995
+ events_after=events_after,
1996
+ state=state_events,
1997
+ aggregations=aggregations,
1998
+ start=await token.copy_and_replace(
1999
+ StreamKeyType.ROOM, results.start
2000
+ ).to_string(self.store),
2001
+ end=await token.copy_and_replace(StreamKeyType.ROOM, results.end).to_string(
2002
+ self.store
2003
+ ),
2004
+ )
2005
+
2006
+
2007
+ class TimestampLookupHandler:
2008
+ def __init__(self, hs: "HomeServer"):
2009
+ self.store = hs.get_datastores().main
2010
+ self.state_handler = hs.get_state_handler()
2011
+ self.federation_client = hs.get_federation_client()
2012
+ self.federation_event_handler = hs.get_federation_event_handler()
2013
+ self._storage_controllers = hs.get_storage_controllers()
2014
+
2015
+ async def get_event_for_timestamp(
2016
+ self,
2017
+ requester: Requester,
2018
+ room_id: str,
2019
+ timestamp: int,
2020
+ direction: Direction,
2021
+ ) -> tuple[str, int]:
2022
+ """Find the closest event to the given timestamp in the given direction.
2023
+ If we can't find an event locally or the event we have locally is next to a gap,
2024
+ it will ask other federated homeservers for an event.
2025
+
2026
+ Args:
2027
+ requester: The user making the request according to the access token
2028
+ room_id: Room to fetch the event from
2029
+ timestamp: The point in time (inclusive) we should navigate from in
2030
+ the given direction to find the closest event.
2031
+ direction: indicates whether we should navigate forward
2032
+ or backward from the given timestamp to find the closest event.
2033
+
2034
+ Returns:
2035
+ A tuple containing the `event_id` closest to the given timestamp in
2036
+ the given direction and the `origin_server_ts`.
2037
+
2038
+ Raises:
2039
+ SynapseError if unable to find any event locally in the given direction
2040
+ """
2041
+ logger.debug(
2042
+ "get_event_for_timestamp(room_id=%s, timestamp=%s, direction=%s) Finding closest event...",
2043
+ room_id,
2044
+ timestamp,
2045
+ direction,
2046
+ )
2047
+ local_event_id = await self.store.get_event_id_for_timestamp(
2048
+ room_id, timestamp, direction
2049
+ )
2050
+ logger.debug(
2051
+ "get_event_for_timestamp: locally, we found event_id=%s closest to timestamp=%s",
2052
+ local_event_id,
2053
+ timestamp,
2054
+ )
2055
+
2056
+ # Check for gaps in the history where events could be hiding in between
2057
+ # the timestamp given and the event we were able to find locally
2058
+ is_event_next_to_backward_gap = False
2059
+ is_event_next_to_forward_gap = False
2060
+ local_event = None
2061
+ if local_event_id:
2062
+ local_event = await self.store.get_event(
2063
+ local_event_id, allow_none=False, allow_rejected=False
2064
+ )
2065
+
2066
+ if direction == Direction.FORWARDS:
2067
+ # We only need to check for a backward gap if we're looking forwards
2068
+ # to ensure there is nothing in between.
2069
+ is_event_next_to_backward_gap = (
2070
+ await self.store.is_event_next_to_backward_gap(local_event)
2071
+ )
2072
+ elif direction == Direction.BACKWARDS:
2073
+ # We only need to check for a forward gap if we're looking backwards
2074
+ # to ensure there is nothing in between
2075
+ is_event_next_to_forward_gap = (
2076
+ await self.store.is_event_next_to_forward_gap(local_event)
2077
+ )
2078
+
2079
+ # If we found a gap, we should probably ask another homeserver first
2080
+ # about more history in between
2081
+ if (
2082
+ not local_event_id
2083
+ or is_event_next_to_backward_gap
2084
+ or is_event_next_to_forward_gap
2085
+ ):
2086
+ logger.debug(
2087
+ "get_event_for_timestamp: locally, we found event_id=%s closest to timestamp=%s which is next to a gap in event history so we're asking other homeservers first",
2088
+ local_event_id,
2089
+ timestamp,
2090
+ )
2091
+
2092
+ likely_domains = (
2093
+ await self._storage_controllers.state.get_current_hosts_in_room_ordered(
2094
+ room_id
2095
+ )
2096
+ )
2097
+
2098
+ remote_response = await self.federation_client.timestamp_to_event(
2099
+ destinations=likely_domains,
2100
+ room_id=room_id,
2101
+ timestamp=timestamp,
2102
+ direction=direction,
2103
+ )
2104
+ if remote_response is not None:
2105
+ logger.debug(
2106
+ "get_event_for_timestamp: remote_response=%s",
2107
+ remote_response,
2108
+ )
2109
+
2110
+ remote_event_id = remote_response.event_id
2111
+ remote_origin_server_ts = remote_response.origin_server_ts
2112
+
2113
+ # Backfill this event so we can get a pagination token for
2114
+ # it with `/context` and paginate `/messages` from this
2115
+ # point.
2116
+ pulled_pdu_info = await self.federation_event_handler.backfill_event_id(
2117
+ likely_domains, room_id, remote_event_id
2118
+ )
2119
+ remote_event = pulled_pdu_info.pdu
2120
+
2121
+ # XXX: When we see that the remote server is not trustworthy,
2122
+ # maybe we should not ask them first in the future.
2123
+ if remote_origin_server_ts != remote_event.origin_server_ts:
2124
+ logger.info(
2125
+ "get_event_for_timestamp: Remote server (%s) claimed that remote_event_id=%s occured at remote_origin_server_ts=%s but that isn't true (actually occured at %s). Their claims are dubious and we should consider not trusting them.",
2126
+ pulled_pdu_info.pull_origin,
2127
+ remote_event_id,
2128
+ remote_origin_server_ts,
2129
+ remote_event.origin_server_ts,
2130
+ )
2131
+
2132
+ # Only return the remote event if it's closer than the local event
2133
+ if not local_event or (
2134
+ abs(remote_event.origin_server_ts - timestamp)
2135
+ < abs(local_event.origin_server_ts - timestamp)
2136
+ ):
2137
+ logger.info(
2138
+ "get_event_for_timestamp: returning remote_event_id=%s (%s) since it's closer to timestamp=%s than local_event=%s (%s)",
2139
+ remote_event_id,
2140
+ remote_event.origin_server_ts,
2141
+ timestamp,
2142
+ local_event.event_id if local_event else None,
2143
+ local_event.origin_server_ts if local_event else None,
2144
+ )
2145
+ return remote_event_id, remote_origin_server_ts
2146
+
2147
+ # To appease mypy, we have to add both of these conditions to check for
2148
+ # `None`. We only expect `local_event` to be `None` when
2149
+ # `local_event_id` is `None` but mypy isn't as smart and assuming as us.
2150
+ if not local_event_id or not local_event:
2151
+ raise SynapseError(
2152
+ 404,
2153
+ "Unable to find event from %s in direction %s" % (timestamp, direction),
2154
+ errcode=Codes.NOT_FOUND,
2155
+ )
2156
+
2157
+ return local_event_id, local_event.origin_server_ts
2158
+
2159
+
2160
+ class RoomEventSource(EventSource[RoomStreamToken, EventBase]):
2161
+ def __init__(self, hs: "HomeServer"):
2162
+ self.store = hs.get_datastores().main
2163
+
2164
+ async def get_new_events(
2165
+ self,
2166
+ user: UserID,
2167
+ from_key: RoomStreamToken,
2168
+ limit: int,
2169
+ room_ids: StrCollection,
2170
+ is_guest: bool,
2171
+ explicit_room_id: Optional[str] = None,
2172
+ ) -> tuple[list[EventBase], RoomStreamToken]:
2173
+ # We just ignore the key for now.
2174
+
2175
+ to_key = self.get_current_key()
2176
+
2177
+ if from_key.topological:
2178
+ logger.warning("Stream has topological part!!!! %r", from_key)
2179
+ from_key = RoomStreamToken(stream=from_key.stream)
2180
+
2181
+ app_service = self.store.get_app_service_by_user_id(user.to_string())
2182
+ if app_service:
2183
+ # We no longer support AS users using /sync directly.
2184
+ # See https://github.com/matrix-org/matrix-doc/issues/1144
2185
+ raise NotImplementedError()
2186
+ else:
2187
+ room_events = await self.store.get_membership_changes_for_user(
2188
+ user.to_string(), from_key, to_key
2189
+ )
2190
+
2191
+ room_to_events = await self.store.get_room_events_stream_for_rooms(
2192
+ room_ids=room_ids,
2193
+ from_key=from_key,
2194
+ to_key=to_key,
2195
+ limit=limit or 10,
2196
+ direction=Direction.FORWARDS,
2197
+ )
2198
+
2199
+ events = list(room_events)
2200
+ events.extend(e for evs, _, _ in room_to_events.values() for e in evs)
2201
+
2202
+ # We know stream_ordering must be not None here, as its been
2203
+ # persisted, but mypy doesn't know that
2204
+ events.sort(key=lambda e: cast(int, e.internal_metadata.stream_ordering))
2205
+
2206
+ if limit:
2207
+ events[:] = events[:limit]
2208
+
2209
+ if events:
2210
+ last_event = events[-1]
2211
+ assert last_event.internal_metadata.stream_ordering
2212
+ end_key = RoomStreamToken(
2213
+ stream=last_event.internal_metadata.stream_ordering,
2214
+ )
2215
+ else:
2216
+ end_key = to_key
2217
+
2218
+ return events, end_key
2219
+
2220
+ def get_current_key(self) -> RoomStreamToken:
2221
+ return self.store.get_room_max_token()
2222
+
2223
+ def get_current_key_for_room(self, room_id: str) -> Awaitable[RoomStreamToken]:
2224
+ return self.store.get_current_room_stream_token_for_room_id(room_id)
2225
+
2226
+
2227
+ class RoomShutdownHandler:
2228
+ DEFAULT_MESSAGE = (
2229
+ "Sharing illegal content on this server is not permitted and rooms in"
2230
+ " violation will be blocked."
2231
+ )
2232
+ DEFAULT_ROOM_NAME = "Content Violation Notification"
2233
+
2234
+ def __init__(self, hs: "HomeServer"):
2235
+ self.hs = hs
2236
+ self.room_member_handler = hs.get_room_member_handler()
2237
+ self._room_creation_handler = hs.get_room_creation_handler()
2238
+ self._replication = hs.get_replication_data_handler()
2239
+ self._third_party_rules = hs.get_module_api_callbacks().third_party_event_rules
2240
+ self.event_creation_handler = hs.get_event_creation_handler()
2241
+ self.store = hs.get_datastores().main
2242
+
2243
+ async def shutdown_room(
2244
+ self,
2245
+ room_id: str,
2246
+ params: ShutdownRoomParams,
2247
+ result: Optional[ShutdownRoomResponse] = None,
2248
+ update_result_fct: Optional[
2249
+ Callable[[Optional[JsonMapping]], Awaitable[None]]
2250
+ ] = None,
2251
+ ) -> Optional[ShutdownRoomResponse]:
2252
+ """
2253
+ Shuts down a room. Moves all joined local users and room aliases automatically
2254
+ to a new room if `new_room_user_id` is set. Otherwise local users only
2255
+ leave the room without any information.
2256
+
2257
+ The new room will be created with the user specified by the
2258
+ `new_room_user_id` parameter as room administrator and will contain a
2259
+ message explaining what happened. Users invited to the new room will
2260
+ have power level `-10` by default, and thus be unable to speak.
2261
+
2262
+ The local server will only have the power to move local user and room
2263
+ aliases to the new room. Users on other servers will be unaffected.
2264
+
2265
+ Args:
2266
+ room_id: The ID of the room to shut down.
2267
+ delete_id: The delete ID identifying this delete request
2268
+ params: parameters for the shutdown, cf `ShutdownRoomParams`
2269
+ result: current status of the shutdown, if it was interrupted
2270
+ update_result_fct: function called when `result` is updated locally
2271
+
2272
+ Returns: a dict matching `ShutdownRoomResponse`.
2273
+ """
2274
+ requester_user_id = params["requester_user_id"]
2275
+ new_room_user_id = params["new_room_user_id"]
2276
+ block = params["block"]
2277
+
2278
+ new_room_name = (
2279
+ params["new_room_name"]
2280
+ if params["new_room_name"]
2281
+ else self.DEFAULT_ROOM_NAME
2282
+ )
2283
+ message = params["message"] if params["message"] else self.DEFAULT_MESSAGE
2284
+
2285
+ if not RoomID.is_valid(room_id):
2286
+ raise SynapseError(400, "%s is not a legal room ID" % (room_id,))
2287
+
2288
+ if not await self._third_party_rules.check_can_shutdown_room(
2289
+ requester_user_id, room_id
2290
+ ):
2291
+ raise SynapseError(
2292
+ 403, "Shutdown of this room is forbidden", Codes.FORBIDDEN
2293
+ )
2294
+
2295
+ result = (
2296
+ result
2297
+ if result
2298
+ else {
2299
+ "kicked_users": [],
2300
+ "failed_to_kick_users": [],
2301
+ "local_aliases": [],
2302
+ "new_room_id": None,
2303
+ }
2304
+ )
2305
+
2306
+ # Action the block first (even if the room doesn't exist yet)
2307
+ if block:
2308
+ if requester_user_id is None:
2309
+ raise ValueError(
2310
+ "shutdown_room: block=True not allowed when requester_user_id is None."
2311
+ )
2312
+ # This will work even if the room is already blocked, but that is
2313
+ # desirable in case the first attempt at blocking the room failed below.
2314
+ await self.store.block_room(room_id, requester_user_id)
2315
+
2316
+ if not await self.store.get_room(room_id):
2317
+ # if we don't know about the room, there is nothing left to do.
2318
+ return result
2319
+
2320
+ new_room_id = result.get("new_room_id")
2321
+ if new_room_user_id is not None and new_room_id is None:
2322
+ if not self.hs.is_mine_id(new_room_user_id):
2323
+ raise SynapseError(
2324
+ 400, "User must be our own: %s" % (new_room_user_id,)
2325
+ )
2326
+
2327
+ room_creator_requester = create_requester(
2328
+ new_room_user_id, authenticated_entity=requester_user_id
2329
+ )
2330
+
2331
+ new_room_id, _, stream_id = await self._room_creation_handler.create_room(
2332
+ room_creator_requester,
2333
+ config={
2334
+ "preset": RoomCreationPreset.PUBLIC_CHAT,
2335
+ "name": new_room_name,
2336
+ "power_level_content_override": {"users_default": -10},
2337
+ },
2338
+ ratelimit=False,
2339
+ )
2340
+
2341
+ result["new_room_id"] = new_room_id
2342
+ if update_result_fct:
2343
+ await update_result_fct(result)
2344
+
2345
+ logger.info(
2346
+ "Shutting down room %r, joining to new room: %r", room_id, new_room_id
2347
+ )
2348
+
2349
+ # We now wait for the create room to come back in via replication so
2350
+ # that we can assume that all the joins/invites have propagated before
2351
+ # we try and auto join below.
2352
+ await self._replication.wait_for_stream_position(
2353
+ self.hs.config.worker.events_shard_config.get_instance(new_room_id),
2354
+ "events",
2355
+ stream_id,
2356
+ )
2357
+ else:
2358
+ logger.info("Shutting down room %r", room_id)
2359
+
2360
+ users = await self.store.get_local_users_related_to_room(room_id)
2361
+ for user_id, membership in users:
2362
+ # If the user is not in the room (or is banned), nothing to do.
2363
+ if membership not in (Membership.JOIN, Membership.INVITE, Membership.KNOCK):
2364
+ continue
2365
+
2366
+ logger.info("Kicking %r from %r...", user_id, room_id)
2367
+
2368
+ try:
2369
+ # Kick users from room
2370
+ target_requester = create_requester(
2371
+ user_id, authenticated_entity=requester_user_id
2372
+ )
2373
+ _, stream_id = await self.room_member_handler.update_membership(
2374
+ requester=target_requester,
2375
+ target=target_requester.user,
2376
+ room_id=room_id,
2377
+ action=Membership.LEAVE,
2378
+ content={},
2379
+ ratelimit=False,
2380
+ require_consent=False,
2381
+ )
2382
+
2383
+ # Wait for leave to come in over replication before trying to forget.
2384
+ await self._replication.wait_for_stream_position(
2385
+ self.hs.config.worker.events_shard_config.get_instance(room_id),
2386
+ "events",
2387
+ stream_id,
2388
+ )
2389
+
2390
+ await self.room_member_handler.forget(
2391
+ target_requester.user, room_id, do_not_schedule_purge=True
2392
+ )
2393
+
2394
+ # Join users to new room
2395
+ if new_room_user_id:
2396
+ if membership == Membership.JOIN:
2397
+ assert new_room_id is not None
2398
+ await self.room_member_handler.update_membership(
2399
+ requester=target_requester,
2400
+ target=target_requester.user,
2401
+ room_id=new_room_id,
2402
+ action=Membership.JOIN,
2403
+ content={},
2404
+ ratelimit=False,
2405
+ require_consent=False,
2406
+ )
2407
+
2408
+ result["kicked_users"].append(user_id)
2409
+ if update_result_fct:
2410
+ await update_result_fct(result)
2411
+ except Exception:
2412
+ logger.exception(
2413
+ "Failed to leave old room and join new room for %r", user_id
2414
+ )
2415
+ result["failed_to_kick_users"].append(user_id)
2416
+ if update_result_fct:
2417
+ await update_result_fct(result)
2418
+
2419
+ # Send message in new room and move aliases
2420
+ if new_room_user_id:
2421
+ room_creator_requester = create_requester(
2422
+ new_room_user_id, authenticated_entity=requester_user_id
2423
+ )
2424
+
2425
+ await self.event_creation_handler.create_and_send_nonmember_event(
2426
+ room_creator_requester,
2427
+ {
2428
+ "type": "m.room.message",
2429
+ "content": {"body": message, "msgtype": "m.text"},
2430
+ "room_id": new_room_id,
2431
+ "sender": new_room_user_id,
2432
+ },
2433
+ ratelimit=False,
2434
+ )
2435
+
2436
+ result["local_aliases"] = list(
2437
+ await self.store.get_aliases_for_room(room_id)
2438
+ )
2439
+
2440
+ assert new_room_id is not None
2441
+ await self.store.update_aliases_for_room(
2442
+ room_id, new_room_id, requester_user_id
2443
+ )
2444
+ else:
2445
+ result["local_aliases"] = []
2446
+
2447
+ return result