matrix-synapse 1.143.0__cp310-abi3-manylinux_2_28_aarch64.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of matrix-synapse might be problematic. Click here for more details.

Files changed (1058) hide show
  1. matrix_synapse-1.143.0.dist-info/AUTHORS.rst +51 -0
  2. matrix_synapse-1.143.0.dist-info/LICENSE-AGPL-3.0 +661 -0
  3. matrix_synapse-1.143.0.dist-info/LICENSE-COMMERCIAL +6 -0
  4. matrix_synapse-1.143.0.dist-info/METADATA +385 -0
  5. matrix_synapse-1.143.0.dist-info/RECORD +1058 -0
  6. matrix_synapse-1.143.0.dist-info/WHEEL +4 -0
  7. matrix_synapse-1.143.0.dist-info/entry_points.txt +14 -0
  8. synapse/__init__.py +97 -0
  9. synapse/_scripts/__init__.py +0 -0
  10. synapse/_scripts/export_signing_key.py +109 -0
  11. synapse/_scripts/generate_config.py +83 -0
  12. synapse/_scripts/generate_log_config.py +56 -0
  13. synapse/_scripts/generate_signing_key.py +55 -0
  14. synapse/_scripts/generate_workers_map.py +318 -0
  15. synapse/_scripts/hash_password.py +95 -0
  16. synapse/_scripts/move_remote_media_to_new_store.py +128 -0
  17. synapse/_scripts/register_new_matrix_user.py +402 -0
  18. synapse/_scripts/review_recent_signups.py +212 -0
  19. synapse/_scripts/synapse_port_db.py +1604 -0
  20. synapse/_scripts/synctl.py +365 -0
  21. synapse/_scripts/update_synapse_database.py +130 -0
  22. synapse/api/__init__.py +20 -0
  23. synapse/api/auth/__init__.py +207 -0
  24. synapse/api/auth/base.py +406 -0
  25. synapse/api/auth/internal.py +299 -0
  26. synapse/api/auth/mas.py +436 -0
  27. synapse/api/auth/msc3861_delegated.py +617 -0
  28. synapse/api/auth_blocking.py +144 -0
  29. synapse/api/constants.py +362 -0
  30. synapse/api/errors.py +907 -0
  31. synapse/api/filtering.py +537 -0
  32. synapse/api/presence.py +102 -0
  33. synapse/api/ratelimiting.py +480 -0
  34. synapse/api/room_versions.py +535 -0
  35. synapse/api/urls.py +118 -0
  36. synapse/app/__init__.py +60 -0
  37. synapse/app/_base.py +862 -0
  38. synapse/app/admin_cmd.py +388 -0
  39. synapse/app/appservice.py +30 -0
  40. synapse/app/client_reader.py +30 -0
  41. synapse/app/complement_fork_starter.py +206 -0
  42. synapse/app/event_creator.py +29 -0
  43. synapse/app/federation_reader.py +30 -0
  44. synapse/app/federation_sender.py +30 -0
  45. synapse/app/frontend_proxy.py +30 -0
  46. synapse/app/generic_worker.py +474 -0
  47. synapse/app/homeserver.py +505 -0
  48. synapse/app/media_repository.py +30 -0
  49. synapse/app/phone_stats_home.py +296 -0
  50. synapse/app/pusher.py +30 -0
  51. synapse/app/synchrotron.py +30 -0
  52. synapse/app/user_dir.py +31 -0
  53. synapse/appservice/__init__.py +458 -0
  54. synapse/appservice/api.py +567 -0
  55. synapse/appservice/scheduler.py +564 -0
  56. synapse/config/__init__.py +27 -0
  57. synapse/config/__main__.py +62 -0
  58. synapse/config/_base.py +1106 -0
  59. synapse/config/_base.pyi +215 -0
  60. synapse/config/_util.py +99 -0
  61. synapse/config/account_validity.py +116 -0
  62. synapse/config/api.py +141 -0
  63. synapse/config/appservice.py +210 -0
  64. synapse/config/auth.py +80 -0
  65. synapse/config/auto_accept_invites.py +43 -0
  66. synapse/config/background_updates.py +44 -0
  67. synapse/config/cache.py +231 -0
  68. synapse/config/captcha.py +90 -0
  69. synapse/config/cas.py +116 -0
  70. synapse/config/consent.py +73 -0
  71. synapse/config/database.py +184 -0
  72. synapse/config/emailconfig.py +367 -0
  73. synapse/config/experimental.py +595 -0
  74. synapse/config/federation.py +114 -0
  75. synapse/config/homeserver.py +141 -0
  76. synapse/config/jwt.py +55 -0
  77. synapse/config/key.py +447 -0
  78. synapse/config/logger.py +390 -0
  79. synapse/config/mas.py +192 -0
  80. synapse/config/matrixrtc.py +66 -0
  81. synapse/config/metrics.py +84 -0
  82. synapse/config/modules.py +40 -0
  83. synapse/config/oembed.py +185 -0
  84. synapse/config/oidc.py +509 -0
  85. synapse/config/password_auth_providers.py +82 -0
  86. synapse/config/push.py +64 -0
  87. synapse/config/ratelimiting.py +254 -0
  88. synapse/config/redis.py +74 -0
  89. synapse/config/registration.py +296 -0
  90. synapse/config/repository.py +311 -0
  91. synapse/config/retention.py +162 -0
  92. synapse/config/room.py +88 -0
  93. synapse/config/room_directory.py +165 -0
  94. synapse/config/saml2.py +251 -0
  95. synapse/config/server.py +1170 -0
  96. synapse/config/server_notices.py +84 -0
  97. synapse/config/spam_checker.py +66 -0
  98. synapse/config/sso.py +121 -0
  99. synapse/config/stats.py +54 -0
  100. synapse/config/third_party_event_rules.py +40 -0
  101. synapse/config/tls.py +192 -0
  102. synapse/config/tracer.py +71 -0
  103. synapse/config/user_directory.py +47 -0
  104. synapse/config/user_types.py +42 -0
  105. synapse/config/voip.py +59 -0
  106. synapse/config/workers.py +642 -0
  107. synapse/crypto/__init__.py +20 -0
  108. synapse/crypto/context_factory.py +278 -0
  109. synapse/crypto/event_signing.py +194 -0
  110. synapse/crypto/keyring.py +931 -0
  111. synapse/event_auth.py +1266 -0
  112. synapse/events/__init__.py +667 -0
  113. synapse/events/auto_accept_invites.py +216 -0
  114. synapse/events/builder.py +387 -0
  115. synapse/events/presence_router.py +243 -0
  116. synapse/events/snapshot.py +559 -0
  117. synapse/events/utils.py +924 -0
  118. synapse/events/validator.py +305 -0
  119. synapse/federation/__init__.py +22 -0
  120. synapse/federation/federation_base.py +382 -0
  121. synapse/federation/federation_client.py +2132 -0
  122. synapse/federation/federation_server.py +1540 -0
  123. synapse/federation/persistence.py +70 -0
  124. synapse/federation/send_queue.py +531 -0
  125. synapse/federation/sender/__init__.py +1164 -0
  126. synapse/federation/sender/per_destination_queue.py +886 -0
  127. synapse/federation/sender/transaction_manager.py +210 -0
  128. synapse/federation/transport/__init__.py +28 -0
  129. synapse/federation/transport/client.py +1199 -0
  130. synapse/federation/transport/server/__init__.py +334 -0
  131. synapse/federation/transport/server/_base.py +429 -0
  132. synapse/federation/transport/server/federation.py +910 -0
  133. synapse/federation/units.py +133 -0
  134. synapse/handlers/__init__.py +20 -0
  135. synapse/handlers/account.py +162 -0
  136. synapse/handlers/account_data.py +360 -0
  137. synapse/handlers/account_validity.py +361 -0
  138. synapse/handlers/admin.py +615 -0
  139. synapse/handlers/appservice.py +989 -0
  140. synapse/handlers/auth.py +2481 -0
  141. synapse/handlers/cas.py +413 -0
  142. synapse/handlers/deactivate_account.py +363 -0
  143. synapse/handlers/delayed_events.py +599 -0
  144. synapse/handlers/device.py +1870 -0
  145. synapse/handlers/devicemessage.py +399 -0
  146. synapse/handlers/directory.py +545 -0
  147. synapse/handlers/e2e_keys.py +1834 -0
  148. synapse/handlers/e2e_room_keys.py +455 -0
  149. synapse/handlers/event_auth.py +390 -0
  150. synapse/handlers/events.py +201 -0
  151. synapse/handlers/federation.py +2039 -0
  152. synapse/handlers/federation_event.py +2419 -0
  153. synapse/handlers/identity.py +812 -0
  154. synapse/handlers/initial_sync.py +528 -0
  155. synapse/handlers/jwt.py +120 -0
  156. synapse/handlers/message.py +2347 -0
  157. synapse/handlers/oidc.py +1801 -0
  158. synapse/handlers/pagination.py +768 -0
  159. synapse/handlers/password_policy.py +102 -0
  160. synapse/handlers/presence.py +2633 -0
  161. synapse/handlers/profile.py +655 -0
  162. synapse/handlers/push_rules.py +164 -0
  163. synapse/handlers/read_marker.py +79 -0
  164. synapse/handlers/receipts.py +351 -0
  165. synapse/handlers/register.py +1059 -0
  166. synapse/handlers/relations.py +623 -0
  167. synapse/handlers/reports.py +98 -0
  168. synapse/handlers/room.py +2448 -0
  169. synapse/handlers/room_list.py +632 -0
  170. synapse/handlers/room_member.py +2365 -0
  171. synapse/handlers/room_member_worker.py +146 -0
  172. synapse/handlers/room_policy.py +186 -0
  173. synapse/handlers/room_summary.py +1057 -0
  174. synapse/handlers/saml.py +524 -0
  175. synapse/handlers/search.py +723 -0
  176. synapse/handlers/send_email.py +209 -0
  177. synapse/handlers/set_password.py +71 -0
  178. synapse/handlers/sliding_sync/__init__.py +1701 -0
  179. synapse/handlers/sliding_sync/extensions.py +969 -0
  180. synapse/handlers/sliding_sync/room_lists.py +2262 -0
  181. synapse/handlers/sliding_sync/store.py +128 -0
  182. synapse/handlers/sso.py +1291 -0
  183. synapse/handlers/state_deltas.py +82 -0
  184. synapse/handlers/stats.py +321 -0
  185. synapse/handlers/sync.py +3106 -0
  186. synapse/handlers/thread_subscriptions.py +190 -0
  187. synapse/handlers/typing.py +606 -0
  188. synapse/handlers/ui_auth/__init__.py +48 -0
  189. synapse/handlers/ui_auth/checkers.py +332 -0
  190. synapse/handlers/user_directory.py +783 -0
  191. synapse/handlers/worker_lock.py +371 -0
  192. synapse/http/__init__.py +105 -0
  193. synapse/http/additional_resource.py +62 -0
  194. synapse/http/client.py +1373 -0
  195. synapse/http/connectproxyclient.py +316 -0
  196. synapse/http/federation/__init__.py +19 -0
  197. synapse/http/federation/matrix_federation_agent.py +490 -0
  198. synapse/http/federation/srv_resolver.py +196 -0
  199. synapse/http/federation/well_known_resolver.py +367 -0
  200. synapse/http/matrixfederationclient.py +1873 -0
  201. synapse/http/proxy.py +290 -0
  202. synapse/http/proxyagent.py +497 -0
  203. synapse/http/replicationagent.py +202 -0
  204. synapse/http/request_metrics.py +309 -0
  205. synapse/http/server.py +1110 -0
  206. synapse/http/servlet.py +1018 -0
  207. synapse/http/site.py +825 -0
  208. synapse/http/types.py +27 -0
  209. synapse/logging/__init__.py +31 -0
  210. synapse/logging/_remote.py +261 -0
  211. synapse/logging/_terse_json.py +95 -0
  212. synapse/logging/context.py +1209 -0
  213. synapse/logging/formatter.py +62 -0
  214. synapse/logging/handlers.py +99 -0
  215. synapse/logging/loggers.py +25 -0
  216. synapse/logging/opentracing.py +1132 -0
  217. synapse/logging/scopecontextmanager.py +160 -0
  218. synapse/media/_base.py +830 -0
  219. synapse/media/filepath.py +417 -0
  220. synapse/media/media_repository.py +1580 -0
  221. synapse/media/media_storage.py +702 -0
  222. synapse/media/oembed.py +277 -0
  223. synapse/media/preview_html.py +556 -0
  224. synapse/media/storage_provider.py +195 -0
  225. synapse/media/thumbnailer.py +833 -0
  226. synapse/media/url_previewer.py +875 -0
  227. synapse/metrics/__init__.py +748 -0
  228. synapse/metrics/_gc.py +219 -0
  229. synapse/metrics/_reactor_metrics.py +171 -0
  230. synapse/metrics/_types.py +38 -0
  231. synapse/metrics/background_process_metrics.py +555 -0
  232. synapse/metrics/common_usage_metrics.py +94 -0
  233. synapse/metrics/jemalloc.py +248 -0
  234. synapse/module_api/__init__.py +2131 -0
  235. synapse/module_api/callbacks/__init__.py +50 -0
  236. synapse/module_api/callbacks/account_validity_callbacks.py +106 -0
  237. synapse/module_api/callbacks/media_repository_callbacks.py +157 -0
  238. synapse/module_api/callbacks/ratelimit_callbacks.py +78 -0
  239. synapse/module_api/callbacks/spamchecker_callbacks.py +991 -0
  240. synapse/module_api/callbacks/third_party_event_rules_callbacks.py +592 -0
  241. synapse/module_api/errors.py +42 -0
  242. synapse/notifier.py +970 -0
  243. synapse/push/__init__.py +212 -0
  244. synapse/push/bulk_push_rule_evaluator.py +635 -0
  245. synapse/push/clientformat.py +126 -0
  246. synapse/push/emailpusher.py +333 -0
  247. synapse/push/httppusher.py +564 -0
  248. synapse/push/mailer.py +1010 -0
  249. synapse/push/presentable_names.py +216 -0
  250. synapse/push/push_tools.py +114 -0
  251. synapse/push/push_types.py +141 -0
  252. synapse/push/pusher.py +87 -0
  253. synapse/push/pusherpool.py +501 -0
  254. synapse/push/rulekinds.py +33 -0
  255. synapse/py.typed +0 -0
  256. synapse/replication/__init__.py +20 -0
  257. synapse/replication/http/__init__.py +68 -0
  258. synapse/replication/http/_base.py +468 -0
  259. synapse/replication/http/account_data.py +297 -0
  260. synapse/replication/http/deactivate_account.py +81 -0
  261. synapse/replication/http/delayed_events.py +62 -0
  262. synapse/replication/http/devices.py +254 -0
  263. synapse/replication/http/federation.py +334 -0
  264. synapse/replication/http/login.py +106 -0
  265. synapse/replication/http/membership.py +364 -0
  266. synapse/replication/http/presence.py +133 -0
  267. synapse/replication/http/push.py +156 -0
  268. synapse/replication/http/register.py +172 -0
  269. synapse/replication/http/send_events.py +182 -0
  270. synapse/replication/http/state.py +82 -0
  271. synapse/replication/http/streams.py +101 -0
  272. synapse/replication/tcp/__init__.py +56 -0
  273. synapse/replication/tcp/client.py +552 -0
  274. synapse/replication/tcp/commands.py +569 -0
  275. synapse/replication/tcp/context.py +41 -0
  276. synapse/replication/tcp/external_cache.py +156 -0
  277. synapse/replication/tcp/handler.py +922 -0
  278. synapse/replication/tcp/protocol.py +608 -0
  279. synapse/replication/tcp/redis.py +509 -0
  280. synapse/replication/tcp/resource.py +348 -0
  281. synapse/replication/tcp/streams/__init__.py +96 -0
  282. synapse/replication/tcp/streams/_base.py +765 -0
  283. synapse/replication/tcp/streams/events.py +287 -0
  284. synapse/replication/tcp/streams/federation.py +92 -0
  285. synapse/replication/tcp/streams/partial_state.py +80 -0
  286. synapse/res/providers.json +29 -0
  287. synapse/res/templates/_base.html +29 -0
  288. synapse/res/templates/account_previously_renewed.html +6 -0
  289. synapse/res/templates/account_renewed.html +6 -0
  290. synapse/res/templates/add_threepid.html +8 -0
  291. synapse/res/templates/add_threepid.txt +6 -0
  292. synapse/res/templates/add_threepid_failure.html +7 -0
  293. synapse/res/templates/add_threepid_success.html +6 -0
  294. synapse/res/templates/already_in_use.html +12 -0
  295. synapse/res/templates/already_in_use.txt +10 -0
  296. synapse/res/templates/auth_success.html +21 -0
  297. synapse/res/templates/invalid_token.html +6 -0
  298. synapse/res/templates/mail-Element.css +7 -0
  299. synapse/res/templates/mail-Vector.css +7 -0
  300. synapse/res/templates/mail-expiry.css +4 -0
  301. synapse/res/templates/mail.css +156 -0
  302. synapse/res/templates/notice_expiry.html +46 -0
  303. synapse/res/templates/notice_expiry.txt +7 -0
  304. synapse/res/templates/notif.html +51 -0
  305. synapse/res/templates/notif.txt +22 -0
  306. synapse/res/templates/notif_mail.html +59 -0
  307. synapse/res/templates/notif_mail.txt +10 -0
  308. synapse/res/templates/password_reset.html +10 -0
  309. synapse/res/templates/password_reset.txt +7 -0
  310. synapse/res/templates/password_reset_confirmation.html +15 -0
  311. synapse/res/templates/password_reset_failure.html +7 -0
  312. synapse/res/templates/password_reset_success.html +6 -0
  313. synapse/res/templates/recaptcha.html +42 -0
  314. synapse/res/templates/registration.html +12 -0
  315. synapse/res/templates/registration.txt +10 -0
  316. synapse/res/templates/registration_failure.html +6 -0
  317. synapse/res/templates/registration_success.html +6 -0
  318. synapse/res/templates/registration_token.html +18 -0
  319. synapse/res/templates/room.html +33 -0
  320. synapse/res/templates/room.txt +9 -0
  321. synapse/res/templates/sso.css +129 -0
  322. synapse/res/templates/sso_account_deactivated.html +25 -0
  323. synapse/res/templates/sso_auth_account_details.html +186 -0
  324. synapse/res/templates/sso_auth_account_details.js +116 -0
  325. synapse/res/templates/sso_auth_bad_user.html +26 -0
  326. synapse/res/templates/sso_auth_confirm.html +27 -0
  327. synapse/res/templates/sso_auth_success.html +26 -0
  328. synapse/res/templates/sso_error.html +71 -0
  329. synapse/res/templates/sso_footer.html +19 -0
  330. synapse/res/templates/sso_login_idp_picker.html +60 -0
  331. synapse/res/templates/sso_new_user_consent.html +30 -0
  332. synapse/res/templates/sso_partial_profile.html +19 -0
  333. synapse/res/templates/sso_redirect_confirm.html +39 -0
  334. synapse/res/templates/style.css +33 -0
  335. synapse/res/templates/terms.html +27 -0
  336. synapse/rest/__init__.py +197 -0
  337. synapse/rest/admin/__init__.py +390 -0
  338. synapse/rest/admin/_base.py +72 -0
  339. synapse/rest/admin/background_updates.py +171 -0
  340. synapse/rest/admin/devices.py +221 -0
  341. synapse/rest/admin/event_reports.py +173 -0
  342. synapse/rest/admin/events.py +69 -0
  343. synapse/rest/admin/experimental_features.py +137 -0
  344. synapse/rest/admin/federation.py +243 -0
  345. synapse/rest/admin/media.py +540 -0
  346. synapse/rest/admin/registration_tokens.py +358 -0
  347. synapse/rest/admin/rooms.py +1061 -0
  348. synapse/rest/admin/scheduled_tasks.py +70 -0
  349. synapse/rest/admin/server_notice_servlet.py +132 -0
  350. synapse/rest/admin/statistics.py +132 -0
  351. synapse/rest/admin/username_available.py +58 -0
  352. synapse/rest/admin/users.py +1606 -0
  353. synapse/rest/client/__init__.py +20 -0
  354. synapse/rest/client/_base.py +113 -0
  355. synapse/rest/client/account.py +930 -0
  356. synapse/rest/client/account_data.py +319 -0
  357. synapse/rest/client/account_validity.py +103 -0
  358. synapse/rest/client/appservice_ping.py +125 -0
  359. synapse/rest/client/auth.py +218 -0
  360. synapse/rest/client/auth_metadata.py +122 -0
  361. synapse/rest/client/capabilities.py +121 -0
  362. synapse/rest/client/delayed_events.py +165 -0
  363. synapse/rest/client/devices.py +587 -0
  364. synapse/rest/client/directory.py +211 -0
  365. synapse/rest/client/events.py +116 -0
  366. synapse/rest/client/filter.py +112 -0
  367. synapse/rest/client/initial_sync.py +65 -0
  368. synapse/rest/client/keys.py +678 -0
  369. synapse/rest/client/knock.py +104 -0
  370. synapse/rest/client/login.py +750 -0
  371. synapse/rest/client/login_token_request.py +127 -0
  372. synapse/rest/client/logout.py +93 -0
  373. synapse/rest/client/matrixrtc.py +52 -0
  374. synapse/rest/client/media.py +285 -0
  375. synapse/rest/client/mutual_rooms.py +93 -0
  376. synapse/rest/client/notifications.py +137 -0
  377. synapse/rest/client/openid.py +109 -0
  378. synapse/rest/client/password_policy.py +69 -0
  379. synapse/rest/client/presence.py +131 -0
  380. synapse/rest/client/profile.py +291 -0
  381. synapse/rest/client/push_rule.py +331 -0
  382. synapse/rest/client/pusher.py +181 -0
  383. synapse/rest/client/read_marker.py +104 -0
  384. synapse/rest/client/receipts.py +165 -0
  385. synapse/rest/client/register.py +1067 -0
  386. synapse/rest/client/relations.py +138 -0
  387. synapse/rest/client/rendezvous.py +76 -0
  388. synapse/rest/client/reporting.py +207 -0
  389. synapse/rest/client/room.py +1669 -0
  390. synapse/rest/client/room_keys.py +426 -0
  391. synapse/rest/client/room_upgrade_rest_servlet.py +112 -0
  392. synapse/rest/client/sendtodevice.py +85 -0
  393. synapse/rest/client/sync.py +1131 -0
  394. synapse/rest/client/tags.py +129 -0
  395. synapse/rest/client/thirdparty.py +130 -0
  396. synapse/rest/client/thread_subscriptions.py +247 -0
  397. synapse/rest/client/tokenrefresh.py +52 -0
  398. synapse/rest/client/transactions.py +149 -0
  399. synapse/rest/client/user_directory.py +90 -0
  400. synapse/rest/client/versions.py +191 -0
  401. synapse/rest/client/voip.py +88 -0
  402. synapse/rest/consent/__init__.py +0 -0
  403. synapse/rest/consent/consent_resource.py +210 -0
  404. synapse/rest/health.py +38 -0
  405. synapse/rest/key/__init__.py +20 -0
  406. synapse/rest/key/v2/__init__.py +40 -0
  407. synapse/rest/key/v2/local_key_resource.py +125 -0
  408. synapse/rest/key/v2/remote_key_resource.py +302 -0
  409. synapse/rest/media/__init__.py +0 -0
  410. synapse/rest/media/config_resource.py +53 -0
  411. synapse/rest/media/create_resource.py +90 -0
  412. synapse/rest/media/download_resource.py +110 -0
  413. synapse/rest/media/media_repository_resource.py +113 -0
  414. synapse/rest/media/preview_url_resource.py +77 -0
  415. synapse/rest/media/thumbnail_resource.py +142 -0
  416. synapse/rest/media/upload_resource.py +187 -0
  417. synapse/rest/media/v1/__init__.py +39 -0
  418. synapse/rest/media/v1/_base.py +23 -0
  419. synapse/rest/media/v1/media_storage.py +23 -0
  420. synapse/rest/media/v1/storage_provider.py +23 -0
  421. synapse/rest/synapse/__init__.py +20 -0
  422. synapse/rest/synapse/client/__init__.py +93 -0
  423. synapse/rest/synapse/client/federation_whitelist.py +66 -0
  424. synapse/rest/synapse/client/jwks.py +77 -0
  425. synapse/rest/synapse/client/new_user_consent.py +115 -0
  426. synapse/rest/synapse/client/oidc/__init__.py +45 -0
  427. synapse/rest/synapse/client/oidc/backchannel_logout_resource.py +42 -0
  428. synapse/rest/synapse/client/oidc/callback_resource.py +48 -0
  429. synapse/rest/synapse/client/password_reset.py +129 -0
  430. synapse/rest/synapse/client/pick_idp.py +107 -0
  431. synapse/rest/synapse/client/pick_username.py +153 -0
  432. synapse/rest/synapse/client/rendezvous.py +58 -0
  433. synapse/rest/synapse/client/saml2/__init__.py +42 -0
  434. synapse/rest/synapse/client/saml2/metadata_resource.py +46 -0
  435. synapse/rest/synapse/client/saml2/response_resource.py +52 -0
  436. synapse/rest/synapse/client/sso_register.py +56 -0
  437. synapse/rest/synapse/client/unsubscribe.py +88 -0
  438. synapse/rest/synapse/mas/__init__.py +71 -0
  439. synapse/rest/synapse/mas/_base.py +55 -0
  440. synapse/rest/synapse/mas/devices.py +239 -0
  441. synapse/rest/synapse/mas/users.py +469 -0
  442. synapse/rest/well_known.py +148 -0
  443. synapse/server.py +1257 -0
  444. synapse/server_notices/__init__.py +0 -0
  445. synapse/server_notices/consent_server_notices.py +136 -0
  446. synapse/server_notices/resource_limits_server_notices.py +215 -0
  447. synapse/server_notices/server_notices_manager.py +388 -0
  448. synapse/server_notices/server_notices_sender.py +67 -0
  449. synapse/server_notices/worker_server_notices_sender.py +46 -0
  450. synapse/spam_checker_api/__init__.py +31 -0
  451. synapse/state/__init__.py +1022 -0
  452. synapse/state/v1.py +369 -0
  453. synapse/state/v2.py +984 -0
  454. synapse/static/client/login/index.html +47 -0
  455. synapse/static/client/login/js/jquery-3.4.1.min.js +2 -0
  456. synapse/static/client/login/js/login.js +291 -0
  457. synapse/static/client/login/spinner.gif +0 -0
  458. synapse/static/client/login/style.css +79 -0
  459. synapse/static/index.html +63 -0
  460. synapse/storage/__init__.py +43 -0
  461. synapse/storage/_base.py +245 -0
  462. synapse/storage/admin_client_config.py +25 -0
  463. synapse/storage/background_updates.py +1188 -0
  464. synapse/storage/controllers/__init__.py +57 -0
  465. synapse/storage/controllers/persist_events.py +1237 -0
  466. synapse/storage/controllers/purge_events.py +455 -0
  467. synapse/storage/controllers/state.py +950 -0
  468. synapse/storage/controllers/stats.py +119 -0
  469. synapse/storage/database.py +2719 -0
  470. synapse/storage/databases/__init__.py +175 -0
  471. synapse/storage/databases/main/__init__.py +420 -0
  472. synapse/storage/databases/main/account_data.py +1059 -0
  473. synapse/storage/databases/main/appservice.py +473 -0
  474. synapse/storage/databases/main/cache.py +911 -0
  475. synapse/storage/databases/main/censor_events.py +225 -0
  476. synapse/storage/databases/main/client_ips.py +815 -0
  477. synapse/storage/databases/main/delayed_events.py +562 -0
  478. synapse/storage/databases/main/deviceinbox.py +1271 -0
  479. synapse/storage/databases/main/devices.py +2578 -0
  480. synapse/storage/databases/main/directory.py +212 -0
  481. synapse/storage/databases/main/e2e_room_keys.py +689 -0
  482. synapse/storage/databases/main/end_to_end_keys.py +1894 -0
  483. synapse/storage/databases/main/event_federation.py +2508 -0
  484. synapse/storage/databases/main/event_push_actions.py +1933 -0
  485. synapse/storage/databases/main/events.py +3765 -0
  486. synapse/storage/databases/main/events_bg_updates.py +2910 -0
  487. synapse/storage/databases/main/events_forward_extremities.py +126 -0
  488. synapse/storage/databases/main/events_worker.py +2786 -0
  489. synapse/storage/databases/main/experimental_features.py +130 -0
  490. synapse/storage/databases/main/filtering.py +231 -0
  491. synapse/storage/databases/main/keys.py +291 -0
  492. synapse/storage/databases/main/lock.py +553 -0
  493. synapse/storage/databases/main/media_repository.py +1068 -0
  494. synapse/storage/databases/main/metrics.py +460 -0
  495. synapse/storage/databases/main/monthly_active_users.py +443 -0
  496. synapse/storage/databases/main/openid.py +60 -0
  497. synapse/storage/databases/main/presence.py +509 -0
  498. synapse/storage/databases/main/profile.py +539 -0
  499. synapse/storage/databases/main/purge_events.py +521 -0
  500. synapse/storage/databases/main/push_rule.py +970 -0
  501. synapse/storage/databases/main/pusher.py +793 -0
  502. synapse/storage/databases/main/receipts.py +1341 -0
  503. synapse/storage/databases/main/registration.py +3072 -0
  504. synapse/storage/databases/main/rejections.py +37 -0
  505. synapse/storage/databases/main/relations.py +1116 -0
  506. synapse/storage/databases/main/room.py +2779 -0
  507. synapse/storage/databases/main/roommember.py +2110 -0
  508. synapse/storage/databases/main/search.py +939 -0
  509. synapse/storage/databases/main/session.py +151 -0
  510. synapse/storage/databases/main/signatures.py +94 -0
  511. synapse/storage/databases/main/sliding_sync.py +603 -0
  512. synapse/storage/databases/main/state.py +1002 -0
  513. synapse/storage/databases/main/state_deltas.py +329 -0
  514. synapse/storage/databases/main/stats.py +789 -0
  515. synapse/storage/databases/main/stream.py +2577 -0
  516. synapse/storage/databases/main/tags.py +360 -0
  517. synapse/storage/databases/main/task_scheduler.py +225 -0
  518. synapse/storage/databases/main/thread_subscriptions.py +589 -0
  519. synapse/storage/databases/main/transactions.py +675 -0
  520. synapse/storage/databases/main/ui_auth.py +420 -0
  521. synapse/storage/databases/main/user_directory.py +1330 -0
  522. synapse/storage/databases/main/user_erasure_store.py +117 -0
  523. synapse/storage/databases/state/__init__.py +22 -0
  524. synapse/storage/databases/state/bg_updates.py +497 -0
  525. synapse/storage/databases/state/deletion.py +557 -0
  526. synapse/storage/databases/state/store.py +948 -0
  527. synapse/storage/engines/__init__.py +70 -0
  528. synapse/storage/engines/_base.py +154 -0
  529. synapse/storage/engines/postgres.py +261 -0
  530. synapse/storage/engines/sqlite.py +199 -0
  531. synapse/storage/invite_rule.py +112 -0
  532. synapse/storage/keys.py +40 -0
  533. synapse/storage/prepare_database.py +730 -0
  534. synapse/storage/push_rule.py +28 -0
  535. synapse/storage/roommember.py +88 -0
  536. synapse/storage/schema/README.md +4 -0
  537. synapse/storage/schema/__init__.py +186 -0
  538. synapse/storage/schema/common/delta/25/00background_updates.sql +40 -0
  539. synapse/storage/schema/common/delta/35/00background_updates_add_col.sql +36 -0
  540. synapse/storage/schema/common/delta/58/00background_update_ordering.sql +38 -0
  541. synapse/storage/schema/common/full_schemas/72/full.sql.postgres +8 -0
  542. synapse/storage/schema/common/full_schemas/72/full.sql.sqlite +6 -0
  543. synapse/storage/schema/common/schema_version.sql +60 -0
  544. synapse/storage/schema/main/delta/12/v12.sql +82 -0
  545. synapse/storage/schema/main/delta/13/v13.sql +38 -0
  546. synapse/storage/schema/main/delta/14/v14.sql +42 -0
  547. synapse/storage/schema/main/delta/15/appservice_txns.sql +50 -0
  548. synapse/storage/schema/main/delta/15/presence_indices.sql +2 -0
  549. synapse/storage/schema/main/delta/15/v15.sql +24 -0
  550. synapse/storage/schema/main/delta/16/events_order_index.sql +4 -0
  551. synapse/storage/schema/main/delta/16/remote_media_cache_index.sql +2 -0
  552. synapse/storage/schema/main/delta/16/remove_duplicates.sql +9 -0
  553. synapse/storage/schema/main/delta/16/room_alias_index.sql +3 -0
  554. synapse/storage/schema/main/delta/16/unique_constraints.sql +72 -0
  555. synapse/storage/schema/main/delta/16/users.sql +56 -0
  556. synapse/storage/schema/main/delta/17/drop_indexes.sql +37 -0
  557. synapse/storage/schema/main/delta/17/server_keys.sql +43 -0
  558. synapse/storage/schema/main/delta/17/user_threepids.sql +9 -0
  559. synapse/storage/schema/main/delta/18/server_keys_bigger_ints.sql +51 -0
  560. synapse/storage/schema/main/delta/19/event_index.sql +38 -0
  561. synapse/storage/schema/main/delta/20/dummy.sql +1 -0
  562. synapse/storage/schema/main/delta/20/pushers.py +93 -0
  563. synapse/storage/schema/main/delta/21/end_to_end_keys.sql +53 -0
  564. synapse/storage/schema/main/delta/21/receipts.sql +57 -0
  565. synapse/storage/schema/main/delta/22/receipts_index.sql +41 -0
  566. synapse/storage/schema/main/delta/22/user_threepids_unique.sql +19 -0
  567. synapse/storage/schema/main/delta/24/stats_reporting.sql +37 -0
  568. synapse/storage/schema/main/delta/25/fts.py +81 -0
  569. synapse/storage/schema/main/delta/25/guest_access.sql +44 -0
  570. synapse/storage/schema/main/delta/25/history_visibility.sql +44 -0
  571. synapse/storage/schema/main/delta/25/tags.sql +57 -0
  572. synapse/storage/schema/main/delta/26/account_data.sql +36 -0
  573. synapse/storage/schema/main/delta/27/account_data.sql +55 -0
  574. synapse/storage/schema/main/delta/27/forgotten_memberships.sql +45 -0
  575. synapse/storage/schema/main/delta/27/ts.py +61 -0
  576. synapse/storage/schema/main/delta/28/event_push_actions.sql +46 -0
  577. synapse/storage/schema/main/delta/28/events_room_stream.sql +39 -0
  578. synapse/storage/schema/main/delta/28/public_roms_index.sql +39 -0
  579. synapse/storage/schema/main/delta/28/receipts_user_id_index.sql +41 -0
  580. synapse/storage/schema/main/delta/28/upgrade_times.sql +40 -0
  581. synapse/storage/schema/main/delta/28/users_is_guest.sql +41 -0
  582. synapse/storage/schema/main/delta/29/push_actions.sql +54 -0
  583. synapse/storage/schema/main/delta/30/alias_creator.sql +35 -0
  584. synapse/storage/schema/main/delta/30/as_users.py +82 -0
  585. synapse/storage/schema/main/delta/30/deleted_pushers.sql +44 -0
  586. synapse/storage/schema/main/delta/30/presence_stream.sql +49 -0
  587. synapse/storage/schema/main/delta/30/public_rooms.sql +42 -0
  588. synapse/storage/schema/main/delta/30/push_rule_stream.sql +57 -0
  589. synapse/storage/schema/main/delta/30/threepid_guest_access_tokens.sql +43 -0
  590. synapse/storage/schema/main/delta/31/invites.sql +61 -0
  591. synapse/storage/schema/main/delta/31/local_media_repository_url_cache.sql +46 -0
  592. synapse/storage/schema/main/delta/31/pushers_0.py +92 -0
  593. synapse/storage/schema/main/delta/31/pushers_index.sql +41 -0
  594. synapse/storage/schema/main/delta/31/search_update.py +65 -0
  595. synapse/storage/schema/main/delta/32/events.sql +35 -0
  596. synapse/storage/schema/main/delta/32/openid.sql +9 -0
  597. synapse/storage/schema/main/delta/32/pusher_throttle.sql +42 -0
  598. synapse/storage/schema/main/delta/32/remove_indices.sql +52 -0
  599. synapse/storage/schema/main/delta/32/reports.sql +44 -0
  600. synapse/storage/schema/main/delta/33/access_tokens_device_index.sql +36 -0
  601. synapse/storage/schema/main/delta/33/devices.sql +40 -0
  602. synapse/storage/schema/main/delta/33/devices_for_e2e_keys.sql +38 -0
  603. synapse/storage/schema/main/delta/33/devices_for_e2e_keys_clear_unknown_device.sql +39 -0
  604. synapse/storage/schema/main/delta/33/event_fields.py +61 -0
  605. synapse/storage/schema/main/delta/33/remote_media_ts.py +43 -0
  606. synapse/storage/schema/main/delta/33/user_ips_index.sql +36 -0
  607. synapse/storage/schema/main/delta/34/appservice_stream.sql +42 -0
  608. synapse/storage/schema/main/delta/34/cache_stream.py +50 -0
  609. synapse/storage/schema/main/delta/34/device_inbox.sql +43 -0
  610. synapse/storage/schema/main/delta/34/push_display_name_rename.sql +39 -0
  611. synapse/storage/schema/main/delta/34/received_txn_purge.py +36 -0
  612. synapse/storage/schema/main/delta/35/contains_url.sql +36 -0
  613. synapse/storage/schema/main/delta/35/device_outbox.sql +58 -0
  614. synapse/storage/schema/main/delta/35/device_stream_id.sql +40 -0
  615. synapse/storage/schema/main/delta/35/event_push_actions_index.sql +36 -0
  616. synapse/storage/schema/main/delta/35/public_room_list_change_stream.sql +52 -0
  617. synapse/storage/schema/main/delta/35/stream_order_to_extrem.sql +56 -0
  618. synapse/storage/schema/main/delta/36/readd_public_rooms.sql +45 -0
  619. synapse/storage/schema/main/delta/37/remove_auth_idx.py +89 -0
  620. synapse/storage/schema/main/delta/37/user_threepids.sql +71 -0
  621. synapse/storage/schema/main/delta/38/postgres_fts_gist.sql +38 -0
  622. synapse/storage/schema/main/delta/39/appservice_room_list.sql +48 -0
  623. synapse/storage/schema/main/delta/39/device_federation_stream_idx.sql +35 -0
  624. synapse/storage/schema/main/delta/39/event_push_index.sql +36 -0
  625. synapse/storage/schema/main/delta/39/federation_out_position.sql +41 -0
  626. synapse/storage/schema/main/delta/39/membership_profile.sql +39 -0
  627. synapse/storage/schema/main/delta/40/current_state_idx.sql +36 -0
  628. synapse/storage/schema/main/delta/40/device_inbox.sql +40 -0
  629. synapse/storage/schema/main/delta/40/device_list_streams.sql +79 -0
  630. synapse/storage/schema/main/delta/40/event_push_summary.sql +57 -0
  631. synapse/storage/schema/main/delta/40/pushers.sql +58 -0
  632. synapse/storage/schema/main/delta/41/device_list_stream_idx.sql +36 -0
  633. synapse/storage/schema/main/delta/41/device_outbound_index.sql +35 -0
  634. synapse/storage/schema/main/delta/41/event_search_event_id_idx.sql +36 -0
  635. synapse/storage/schema/main/delta/41/ratelimit.sql +41 -0
  636. synapse/storage/schema/main/delta/42/current_state_delta.sql +48 -0
  637. synapse/storage/schema/main/delta/42/device_list_last_id.sql +52 -0
  638. synapse/storage/schema/main/delta/42/event_auth_state_only.sql +36 -0
  639. synapse/storage/schema/main/delta/42/user_dir.py +88 -0
  640. synapse/storage/schema/main/delta/43/blocked_rooms.sql +40 -0
  641. synapse/storage/schema/main/delta/43/quarantine_media.sql +36 -0
  642. synapse/storage/schema/main/delta/43/url_cache.sql +35 -0
  643. synapse/storage/schema/main/delta/43/user_share.sql +52 -0
  644. synapse/storage/schema/main/delta/44/expire_url_cache.sql +60 -0
  645. synapse/storage/schema/main/delta/45/group_server.sql +186 -0
  646. synapse/storage/schema/main/delta/45/profile_cache.sql +47 -0
  647. synapse/storage/schema/main/delta/46/drop_refresh_tokens.sql +36 -0
  648. synapse/storage/schema/main/delta/46/drop_unique_deleted_pushers.sql +54 -0
  649. synapse/storage/schema/main/delta/46/group_server.sql +51 -0
  650. synapse/storage/schema/main/delta/46/local_media_repository_url_idx.sql +43 -0
  651. synapse/storage/schema/main/delta/46/user_dir_null_room_ids.sql +54 -0
  652. synapse/storage/schema/main/delta/46/user_dir_typos.sql +43 -0
  653. synapse/storage/schema/main/delta/47/last_access_media.sql +35 -0
  654. synapse/storage/schema/main/delta/47/postgres_fts_gin.sql +36 -0
  655. synapse/storage/schema/main/delta/47/push_actions_staging.sql +47 -0
  656. synapse/storage/schema/main/delta/48/add_user_consent.sql +37 -0
  657. synapse/storage/schema/main/delta/48/add_user_ips_last_seen_index.sql +36 -0
  658. synapse/storage/schema/main/delta/48/deactivated_users.sql +44 -0
  659. synapse/storage/schema/main/delta/48/group_unique_indexes.py +67 -0
  660. synapse/storage/schema/main/delta/48/groups_joinable.sql +41 -0
  661. synapse/storage/schema/main/delta/49/add_user_consent_server_notice_sent.sql +39 -0
  662. synapse/storage/schema/main/delta/49/add_user_daily_visits.sql +40 -0
  663. synapse/storage/schema/main/delta/49/add_user_ips_last_seen_only_index.sql +36 -0
  664. synapse/storage/schema/main/delta/50/add_creation_ts_users_index.sql +38 -0
  665. synapse/storage/schema/main/delta/50/erasure_store.sql +40 -0
  666. synapse/storage/schema/main/delta/50/make_event_content_nullable.py +102 -0
  667. synapse/storage/schema/main/delta/51/e2e_room_keys.sql +58 -0
  668. synapse/storage/schema/main/delta/51/monthly_active_users.sql +46 -0
  669. synapse/storage/schema/main/delta/52/add_event_to_state_group_index.sql +38 -0
  670. synapse/storage/schema/main/delta/52/device_list_streams_unique_idx.sql +55 -0
  671. synapse/storage/schema/main/delta/52/e2e_room_keys.sql +72 -0
  672. synapse/storage/schema/main/delta/53/add_user_type_to_users.sql +38 -0
  673. synapse/storage/schema/main/delta/53/drop_sent_transactions.sql +35 -0
  674. synapse/storage/schema/main/delta/53/event_format_version.sql +35 -0
  675. synapse/storage/schema/main/delta/53/user_dir_populate.sql +49 -0
  676. synapse/storage/schema/main/delta/53/user_ips_index.sql +49 -0
  677. synapse/storage/schema/main/delta/53/user_share.sql +63 -0
  678. synapse/storage/schema/main/delta/53/user_threepid_id.sql +48 -0
  679. synapse/storage/schema/main/delta/53/users_in_public_rooms.sql +47 -0
  680. synapse/storage/schema/main/delta/54/account_validity_with_renewal.sql +49 -0
  681. synapse/storage/schema/main/delta/54/add_validity_to_server_keys.sql +42 -0
  682. synapse/storage/schema/main/delta/54/delete_forward_extremities.sql +42 -0
  683. synapse/storage/schema/main/delta/54/drop_legacy_tables.sql +49 -0
  684. synapse/storage/schema/main/delta/54/drop_presence_list.sql +35 -0
  685. synapse/storage/schema/main/delta/54/relations.sql +46 -0
  686. synapse/storage/schema/main/delta/54/stats.sql +99 -0
  687. synapse/storage/schema/main/delta/54/stats2.sql +47 -0
  688. synapse/storage/schema/main/delta/55/access_token_expiry.sql +37 -0
  689. synapse/storage/schema/main/delta/55/track_threepid_validations.sql +50 -0
  690. synapse/storage/schema/main/delta/55/users_alter_deactivated.sql +38 -0
  691. synapse/storage/schema/main/delta/56/add_spans_to_device_lists.sql +39 -0
  692. synapse/storage/schema/main/delta/56/current_state_events_membership.sql +41 -0
  693. synapse/storage/schema/main/delta/56/current_state_events_membership_mk2.sql +43 -0
  694. synapse/storage/schema/main/delta/56/delete_keys_from_deleted_backups.sql +44 -0
  695. synapse/storage/schema/main/delta/56/destinations_failure_ts.sql +44 -0
  696. synapse/storage/schema/main/delta/56/destinations_retry_interval_type.sql.postgres +18 -0
  697. synapse/storage/schema/main/delta/56/device_stream_id_insert.sql +39 -0
  698. synapse/storage/schema/main/delta/56/devices_last_seen.sql +43 -0
  699. synapse/storage/schema/main/delta/56/drop_unused_event_tables.sql +39 -0
  700. synapse/storage/schema/main/delta/56/event_expiry.sql +40 -0
  701. synapse/storage/schema/main/delta/56/event_labels.sql +49 -0
  702. synapse/storage/schema/main/delta/56/event_labels_background_update.sql +36 -0
  703. synapse/storage/schema/main/delta/56/fix_room_keys_index.sql +37 -0
  704. synapse/storage/schema/main/delta/56/hidden_devices.sql +37 -0
  705. synapse/storage/schema/main/delta/56/hidden_devices_fix.sql.sqlite +42 -0
  706. synapse/storage/schema/main/delta/56/nuke_empty_communities_from_db.sql +48 -0
  707. synapse/storage/schema/main/delta/56/public_room_list_idx.sql +35 -0
  708. synapse/storage/schema/main/delta/56/redaction_censor.sql +35 -0
  709. synapse/storage/schema/main/delta/56/redaction_censor2.sql +41 -0
  710. synapse/storage/schema/main/delta/56/redaction_censor3_fix_update.sql.postgres +25 -0
  711. synapse/storage/schema/main/delta/56/redaction_censor4.sql +35 -0
  712. synapse/storage/schema/main/delta/56/remove_tombstoned_rooms_from_directory.sql +38 -0
  713. synapse/storage/schema/main/delta/56/room_key_etag.sql +36 -0
  714. synapse/storage/schema/main/delta/56/room_membership_idx.sql +37 -0
  715. synapse/storage/schema/main/delta/56/room_retention.sql +52 -0
  716. synapse/storage/schema/main/delta/56/signing_keys.sql +75 -0
  717. synapse/storage/schema/main/delta/56/signing_keys_nonunique_signatures.sql +41 -0
  718. synapse/storage/schema/main/delta/56/stats_separated.sql +175 -0
  719. synapse/storage/schema/main/delta/56/unique_user_filter_index.py +46 -0
  720. synapse/storage/schema/main/delta/56/user_external_ids.sql +43 -0
  721. synapse/storage/schema/main/delta/56/users_in_public_rooms_idx.sql +36 -0
  722. synapse/storage/schema/main/delta/57/delete_old_current_state_events.sql +41 -0
  723. synapse/storage/schema/main/delta/57/device_list_remote_cache_stale.sql +44 -0
  724. synapse/storage/schema/main/delta/57/local_current_membership.py +111 -0
  725. synapse/storage/schema/main/delta/57/remove_sent_outbound_pokes.sql +40 -0
  726. synapse/storage/schema/main/delta/57/rooms_version_column.sql +43 -0
  727. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.postgres +35 -0
  728. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.sqlite +22 -0
  729. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.postgres +39 -0
  730. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.sqlite +23 -0
  731. synapse/storage/schema/main/delta/58/02remove_dup_outbound_pokes.sql +41 -0
  732. synapse/storage/schema/main/delta/58/03persist_ui_auth.sql +55 -0
  733. synapse/storage/schema/main/delta/58/05cache_instance.sql.postgres +30 -0
  734. synapse/storage/schema/main/delta/58/06dlols_unique_idx.py +83 -0
  735. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.postgres +33 -0
  736. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.sqlite +44 -0
  737. synapse/storage/schema/main/delta/58/07persist_ui_auth_ips.sql +44 -0
  738. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.postgres +18 -0
  739. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.sqlite +18 -0
  740. synapse/storage/schema/main/delta/58/09shadow_ban.sql +37 -0
  741. synapse/storage/schema/main/delta/58/10_pushrules_enabled_delete_obsolete.sql +47 -0
  742. synapse/storage/schema/main/delta/58/10drop_local_rejections_stream.sql +41 -0
  743. synapse/storage/schema/main/delta/58/10federation_pos_instance_name.sql +41 -0
  744. synapse/storage/schema/main/delta/58/11dehydration.sql +39 -0
  745. synapse/storage/schema/main/delta/58/11fallback.sql +43 -0
  746. synapse/storage/schema/main/delta/58/11user_id_seq.py +38 -0
  747. synapse/storage/schema/main/delta/58/12room_stats.sql +51 -0
  748. synapse/storage/schema/main/delta/58/13remove_presence_allow_inbound.sql +36 -0
  749. synapse/storage/schema/main/delta/58/14events_instance_name.sql +35 -0
  750. synapse/storage/schema/main/delta/58/14events_instance_name.sql.postgres +28 -0
  751. synapse/storage/schema/main/delta/58/15_catchup_destination_rooms.sql +61 -0
  752. synapse/storage/schema/main/delta/58/15unread_count.sql +45 -0
  753. synapse/storage/schema/main/delta/58/16populate_stats_process_rooms_fix.sql +41 -0
  754. synapse/storage/schema/main/delta/58/17_catchup_last_successful.sql +40 -0
  755. synapse/storage/schema/main/delta/58/18stream_positions.sql +41 -0
  756. synapse/storage/schema/main/delta/58/19instance_map.sql.postgres +25 -0
  757. synapse/storage/schema/main/delta/58/19txn_id.sql +59 -0
  758. synapse/storage/schema/main/delta/58/20instance_name_event_tables.sql +36 -0
  759. synapse/storage/schema/main/delta/58/20user_daily_visits.sql +37 -0
  760. synapse/storage/schema/main/delta/58/21as_device_stream.sql +36 -0
  761. synapse/storage/schema/main/delta/58/21drop_device_max_stream_id.sql +1 -0
  762. synapse/storage/schema/main/delta/58/22puppet_token.sql +36 -0
  763. synapse/storage/schema/main/delta/58/22users_have_local_media.sql +2 -0
  764. synapse/storage/schema/main/delta/58/23e2e_cross_signing_keys_idx.sql +36 -0
  765. synapse/storage/schema/main/delta/58/24drop_event_json_index.sql +38 -0
  766. synapse/storage/schema/main/delta/58/25user_external_ids_user_id_idx.sql +36 -0
  767. synapse/storage/schema/main/delta/58/26access_token_last_validated.sql +37 -0
  768. synapse/storage/schema/main/delta/58/27local_invites.sql +37 -0
  769. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.postgres +16 -0
  770. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.sqlite +62 -0
  771. synapse/storage/schema/main/delta/59/01ignored_user.py +85 -0
  772. synapse/storage/schema/main/delta/59/02shard_send_to_device.sql +37 -0
  773. synapse/storage/schema/main/delta/59/03shard_send_to_device_sequence.sql.postgres +25 -0
  774. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql +71 -0
  775. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql.postgres +16 -0
  776. synapse/storage/schema/main/delta/59/04drop_account_data.sql +36 -0
  777. synapse/storage/schema/main/delta/59/05cache_invalidation.sql +36 -0
  778. synapse/storage/schema/main/delta/59/06chain_cover_index.sql +36 -0
  779. synapse/storage/schema/main/delta/59/06shard_account_data.sql +39 -0
  780. synapse/storage/schema/main/delta/59/06shard_account_data.sql.postgres +32 -0
  781. synapse/storage/schema/main/delta/59/07shard_account_data_fix.sql +37 -0
  782. synapse/storage/schema/main/delta/59/08delete_pushers_for_deactivated_accounts.sql +39 -0
  783. synapse/storage/schema/main/delta/59/08delete_stale_pushers.sql +39 -0
  784. synapse/storage/schema/main/delta/59/09rejected_events_metadata.sql +45 -0
  785. synapse/storage/schema/main/delta/59/10delete_purged_chain_cover.sql +36 -0
  786. synapse/storage/schema/main/delta/59/11add_knock_members_to_stats.sql +39 -0
  787. synapse/storage/schema/main/delta/59/11drop_thumbnail_constraint.sql.postgres +22 -0
  788. synapse/storage/schema/main/delta/59/12account_validity_token_used_ts_ms.sql +37 -0
  789. synapse/storage/schema/main/delta/59/12presence_stream_instance.sql +37 -0
  790. synapse/storage/schema/main/delta/59/12presence_stream_instance_seq.sql.postgres +20 -0
  791. synapse/storage/schema/main/delta/59/13users_to_send_full_presence_to.sql +53 -0
  792. synapse/storage/schema/main/delta/59/14refresh_tokens.sql +53 -0
  793. synapse/storage/schema/main/delta/59/15locks.sql +56 -0
  794. synapse/storage/schema/main/delta/59/16federation_inbound_staging.sql +51 -0
  795. synapse/storage/schema/main/delta/60/01recreate_stream_ordering.sql.postgres +45 -0
  796. synapse/storage/schema/main/delta/60/02change_stream_ordering_columns.sql.postgres +30 -0
  797. synapse/storage/schema/main/delta/61/01change_appservices_txns.sql.postgres +23 -0
  798. synapse/storage/schema/main/delta/61/01insertion_event_lookups.sql +68 -0
  799. synapse/storage/schema/main/delta/61/02drop_redundant_room_depth_index.sql +37 -0
  800. synapse/storage/schema/main/delta/61/03recreate_min_depth.py +74 -0
  801. synapse/storage/schema/main/delta/62/01insertion_event_extremities.sql +43 -0
  802. synapse/storage/schema/main/delta/63/01create_registration_tokens.sql +42 -0
  803. synapse/storage/schema/main/delta/63/02delete_unlinked_email_pushers.sql +39 -0
  804. synapse/storage/schema/main/delta/63/02populate-rooms-creator.sql +36 -0
  805. synapse/storage/schema/main/delta/63/03session_store.sql +42 -0
  806. synapse/storage/schema/main/delta/63/04add_presence_stream_not_offline_index.sql +37 -0
  807. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.postgres +23 -0
  808. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.sqlite +37 -0
  809. synapse/storage/schema/main/delta/65/01msc2716_insertion_event_edges.sql +38 -0
  810. synapse/storage/schema/main/delta/65/03remove_hidden_devices_from_device_inbox.sql +41 -0
  811. synapse/storage/schema/main/delta/65/04_local_group_updates.sql +37 -0
  812. synapse/storage/schema/main/delta/65/05_remove_room_stats_historical_and_user_stats_historical.sql +38 -0
  813. synapse/storage/schema/main/delta/65/06remove_deleted_devices_from_device_inbox.sql +53 -0
  814. synapse/storage/schema/main/delta/65/07_arbitrary_relations.sql +37 -0
  815. synapse/storage/schema/main/delta/65/08_device_inbox_background_updates.sql +37 -0
  816. synapse/storage/schema/main/delta/65/10_expirable_refresh_tokens.sql +47 -0
  817. synapse/storage/schema/main/delta/65/11_devices_auth_provider_session.sql +46 -0
  818. synapse/storage/schema/main/delta/67/01drop_public_room_list_stream.sql +37 -0
  819. synapse/storage/schema/main/delta/68/01event_columns.sql +45 -0
  820. synapse/storage/schema/main/delta/68/02_msc2409_add_device_id_appservice_stream_type.sql +40 -0
  821. synapse/storage/schema/main/delta/68/03_delete_account_data_for_deactivated_accounts.sql +39 -0
  822. synapse/storage/schema/main/delta/68/04_refresh_tokens_index_next_token_id.sql +47 -0
  823. synapse/storage/schema/main/delta/68/04partial_state_rooms.sql +60 -0
  824. synapse/storage/schema/main/delta/68/05_delete_non_strings_from_event_search.sql.sqlite +22 -0
  825. synapse/storage/schema/main/delta/68/05partial_state_rooms_triggers.py +80 -0
  826. synapse/storage/schema/main/delta/68/06_msc3202_add_device_list_appservice_stream_type.sql +42 -0
  827. synapse/storage/schema/main/delta/69/01as_txn_seq.py +54 -0
  828. synapse/storage/schema/main/delta/69/01device_list_oubound_by_room.sql +57 -0
  829. synapse/storage/schema/main/delta/69/02cache_invalidation_index.sql +37 -0
  830. synapse/storage/schema/main/delta/70/01clean_table_purged_rooms.sql +39 -0
  831. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.postgres +43 -0
  832. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.sqlite +47 -0
  833. synapse/storage/schema/main/delta/71/01remove_noop_background_updates.sql +80 -0
  834. synapse/storage/schema/main/delta/71/02event_push_summary_unique.sql +37 -0
  835. synapse/storage/schema/main/delta/72/01add_room_type_to_state_stats.sql +38 -0
  836. synapse/storage/schema/main/delta/72/01event_push_summary_receipt.sql +54 -0
  837. synapse/storage/schema/main/delta/72/02event_push_actions_index.sql +38 -0
  838. synapse/storage/schema/main/delta/72/03bg_populate_events_columns.py +57 -0
  839. synapse/storage/schema/main/delta/72/03drop_event_reference_hashes.sql +36 -0
  840. synapse/storage/schema/main/delta/72/03remove_groups.sql +50 -0
  841. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.postgres +17 -0
  842. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.sqlite +40 -0
  843. synapse/storage/schema/main/delta/72/05receipts_event_stream_ordering.sql +38 -0
  844. synapse/storage/schema/main/delta/72/05remove_unstable_private_read_receipts.sql +38 -0
  845. synapse/storage/schema/main/delta/72/06add_consent_ts_to_users.sql +35 -0
  846. synapse/storage/schema/main/delta/72/06thread_notifications.sql +49 -0
  847. synapse/storage/schema/main/delta/72/07force_update_current_state_events_membership.py +67 -0
  848. synapse/storage/schema/main/delta/72/07thread_receipts.sql.postgres +30 -0
  849. synapse/storage/schema/main/delta/72/07thread_receipts.sql.sqlite +70 -0
  850. synapse/storage/schema/main/delta/72/08begin_cache_invalidation_seq_at_2.sql.postgres +23 -0
  851. synapse/storage/schema/main/delta/72/08thread_receipts.sql +39 -0
  852. synapse/storage/schema/main/delta/72/09partial_indices.sql.sqlite +56 -0
  853. synapse/storage/schema/main/delta/73/01event_failed_pull_attempts.sql +48 -0
  854. synapse/storage/schema/main/delta/73/02add_pusher_enabled.sql +35 -0
  855. synapse/storage/schema/main/delta/73/02room_id_indexes_for_purging.sql +41 -0
  856. synapse/storage/schema/main/delta/73/03pusher_device_id.sql +39 -0
  857. synapse/storage/schema/main/delta/73/03users_approved_column.sql +39 -0
  858. synapse/storage/schema/main/delta/73/04partial_join_details.sql +42 -0
  859. synapse/storage/schema/main/delta/73/04pending_device_list_updates.sql +47 -0
  860. synapse/storage/schema/main/delta/73/05old_push_actions.sql.postgres +22 -0
  861. synapse/storage/schema/main/delta/73/05old_push_actions.sql.sqlite +24 -0
  862. synapse/storage/schema/main/delta/73/06thread_notifications_thread_id_idx.sql +42 -0
  863. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.postgres +23 -0
  864. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.sqlite +76 -0
  865. synapse/storage/schema/main/delta/73/09partial_joined_via_destination.sql +37 -0
  866. synapse/storage/schema/main/delta/73/09threads_table.sql +49 -0
  867. synapse/storage/schema/main/delta/73/10_update_sqlite_fts4_tokenizer.py +71 -0
  868. synapse/storage/schema/main/delta/73/10login_tokens.sql +54 -0
  869. synapse/storage/schema/main/delta/73/11event_search_room_id_n_distinct.sql.postgres +33 -0
  870. synapse/storage/schema/main/delta/73/12refactor_device_list_outbound_pokes.sql +72 -0
  871. synapse/storage/schema/main/delta/73/13add_device_lists_index.sql +39 -0
  872. synapse/storage/schema/main/delta/73/20_un_partial_stated_room_stream.sql +51 -0
  873. synapse/storage/schema/main/delta/73/21_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  874. synapse/storage/schema/main/delta/73/22_rebuild_user_dir_stats.sql +48 -0
  875. synapse/storage/schema/main/delta/73/22_un_partial_stated_event_stream.sql +53 -0
  876. synapse/storage/schema/main/delta/73/23_fix_thread_index.sql +52 -0
  877. synapse/storage/schema/main/delta/73/23_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  878. synapse/storage/schema/main/delta/73/24_events_jump_to_date_index.sql +36 -0
  879. synapse/storage/schema/main/delta/73/25drop_presence.sql +36 -0
  880. synapse/storage/schema/main/delta/74/01_user_directory_stale_remote_users.sql +58 -0
  881. synapse/storage/schema/main/delta/74/02_set_device_id_for_pushers_bg_update.sql +38 -0
  882. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.postgres +29 -0
  883. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.sqlite +23 -0
  884. synapse/storage/schema/main/delta/74/03_room_membership_index.sql +38 -0
  885. synapse/storage/schema/main/delta/74/04_delete_e2e_backup_keys_for_deactivated_users.sql +36 -0
  886. synapse/storage/schema/main/delta/74/04_membership_tables_event_stream_ordering_triggers.py +87 -0
  887. synapse/storage/schema/main/delta/74/05_events_txn_id_device_id.sql +72 -0
  888. synapse/storage/schema/main/delta/74/90COMMENTS_destinations.sql.postgres +52 -0
  889. synapse/storage/schema/main/delta/76/01_add_profiles_full_user_id_column.sql +39 -0
  890. synapse/storage/schema/main/delta/76/02_add_user_filters_full_user_id_column.sql +39 -0
  891. synapse/storage/schema/main/delta/76/03_per_user_experimental_features.sql +46 -0
  892. synapse/storage/schema/main/delta/76/04_add_room_forgetter.sql +43 -0
  893. synapse/storage/schema/main/delta/77/01_add_profiles_not_valid_check.sql.postgres +16 -0
  894. synapse/storage/schema/main/delta/77/02_add_user_filters_not_valid_check.sql.postgres +16 -0
  895. synapse/storage/schema/main/delta/77/03bg_populate_full_user_id_profiles.sql +35 -0
  896. synapse/storage/schema/main/delta/77/04bg_populate_full_user_id_user_filters.sql +35 -0
  897. synapse/storage/schema/main/delta/77/05thread_notifications_backfill.sql +67 -0
  898. synapse/storage/schema/main/delta/77/06thread_notifications_not_null.sql.sqlite +102 -0
  899. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions.sql.postgres +27 -0
  900. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions_staging.sql.postgres +27 -0
  901. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_summary.sql.postgres +29 -0
  902. synapse/storage/schema/main/delta/77/14bg_indices_event_stream_ordering.sql +39 -0
  903. synapse/storage/schema/main/delta/78/01_validate_and_update_profiles.py +99 -0
  904. synapse/storage/schema/main/delta/78/02_validate_and_update_user_filters.py +100 -0
  905. synapse/storage/schema/main/delta/78/03_remove_unused_indexes_user_filters.py +72 -0
  906. synapse/storage/schema/main/delta/78/03event_extremities_constraints.py +65 -0
  907. synapse/storage/schema/main/delta/78/04_add_full_user_id_index_user_filters.py +32 -0
  908. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.postgres +102 -0
  909. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.sqlite +72 -0
  910. synapse/storage/schema/main/delta/79/04_mitigate_stream_ordering_update_race.py +70 -0
  911. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.postgres +69 -0
  912. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.sqlite +65 -0
  913. synapse/storage/schema/main/delta/80/01_users_alter_locked.sql +35 -0
  914. synapse/storage/schema/main/delta/80/02_read_write_locks_unlogged.sql.postgres +30 -0
  915. synapse/storage/schema/main/delta/80/02_scheduled_tasks.sql +47 -0
  916. synapse/storage/schema/main/delta/80/03_read_write_locks_triggers.sql.postgres +37 -0
  917. synapse/storage/schema/main/delta/80/04_read_write_locks_deadlock.sql.postgres +71 -0
  918. synapse/storage/schema/main/delta/82/02_scheduled_tasks_index.sql +35 -0
  919. synapse/storage/schema/main/delta/82/04_add_indices_for_purging_rooms.sql +39 -0
  920. synapse/storage/schema/main/delta/82/05gaps.sql +44 -0
  921. synapse/storage/schema/main/delta/83/01_drop_old_tables.sql +43 -0
  922. synapse/storage/schema/main/delta/83/03_instance_name_receipts.sql.sqlite +17 -0
  923. synapse/storage/schema/main/delta/83/05_cross_signing_key_update_grant.sql +34 -0
  924. synapse/storage/schema/main/delta/83/06_event_push_summary_room.sql +36 -0
  925. synapse/storage/schema/main/delta/84/01_auth_links_stats.sql.postgres +20 -0
  926. synapse/storage/schema/main/delta/84/02_auth_links_index.sql +16 -0
  927. synapse/storage/schema/main/delta/84/03_auth_links_analyze.sql.postgres +16 -0
  928. synapse/storage/schema/main/delta/84/04_access_token_index.sql +15 -0
  929. synapse/storage/schema/main/delta/85/01_add_suspended.sql +14 -0
  930. synapse/storage/schema/main/delta/85/02_add_instance_names.sql +27 -0
  931. synapse/storage/schema/main/delta/85/03_new_sequences.sql.postgres +54 -0
  932. synapse/storage/schema/main/delta/85/04_cleanup_device_federation_outbox.sql +15 -0
  933. synapse/storage/schema/main/delta/85/05_add_instance_names_converted_pos.sql +16 -0
  934. synapse/storage/schema/main/delta/85/06_add_room_reports.sql +20 -0
  935. synapse/storage/schema/main/delta/86/01_authenticate_media.sql +15 -0
  936. synapse/storage/schema/main/delta/86/02_receipts_event_id_index.sql +15 -0
  937. synapse/storage/schema/main/delta/87/01_sliding_sync_memberships.sql +169 -0
  938. synapse/storage/schema/main/delta/87/02_per_connection_state.sql +81 -0
  939. synapse/storage/schema/main/delta/87/03_current_state_index.sql +19 -0
  940. synapse/storage/schema/main/delta/88/01_add_delayed_events.sql +43 -0
  941. synapse/storage/schema/main/delta/88/01_custom_profile_fields.sql +15 -0
  942. synapse/storage/schema/main/delta/88/02_fix_sliding_sync_membership_snapshots_forgotten_column.sql +21 -0
  943. synapse/storage/schema/main/delta/88/03_add_otk_ts_added_index.sql +18 -0
  944. synapse/storage/schema/main/delta/88/04_current_state_delta_index.sql +18 -0
  945. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.postgres +19 -0
  946. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.sqlite +19 -0
  947. synapse/storage/schema/main/delta/88/05_sliding_sync_room_config_index.sql +20 -0
  948. synapse/storage/schema/main/delta/88/06_events_received_ts_index.sql +17 -0
  949. synapse/storage/schema/main/delta/89/01_sliding_sync_membership_snapshot_index.sql +15 -0
  950. synapse/storage/schema/main/delta/90/01_add_column_participant_room_memberships_table.sql +16 -0
  951. synapse/storage/schema/main/delta/91/01_media_hash.sql +28 -0
  952. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.postgres +16 -0
  953. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.sqlite +16 -0
  954. synapse/storage/schema/main/delta/92/02_remove_populate_participant_bg_update.sql +17 -0
  955. synapse/storage/schema/main/delta/92/04_ss_membership_snapshot_idx.sql +16 -0
  956. synapse/storage/schema/main/delta/92/04_thread_subscriptions.sql +59 -0
  957. synapse/storage/schema/main/delta/92/04_thread_subscriptions_seq.sql.postgres +19 -0
  958. synapse/storage/schema/main/delta/92/05_fixup_max_depth_cap.sql +17 -0
  959. synapse/storage/schema/main/delta/92/05_thread_subscriptions_comments.sql.postgres +18 -0
  960. synapse/storage/schema/main/delta/92/06_device_federation_inbox_index.sql +16 -0
  961. synapse/storage/schema/main/delta/92/06_threads_last_sent_stream_ordering_comments.sql.postgres +24 -0
  962. synapse/storage/schema/main/delta/92/07_add_user_reports.sql +22 -0
  963. synapse/storage/schema/main/delta/92/07_event_txn_id_device_id_txn_id2.sql +15 -0
  964. synapse/storage/schema/main/delta/92/08_room_ban_redactions.sql +21 -0
  965. synapse/storage/schema/main/delta/92/08_thread_subscriptions_seq_fixup.sql.postgres +19 -0
  966. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql +20 -0
  967. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql.postgres +18 -0
  968. synapse/storage/schema/main/delta/93/01_add_delayed_events.sql +15 -0
  969. synapse/storage/schema/main/full_schemas/72/full.sql.postgres +1344 -0
  970. synapse/storage/schema/main/full_schemas/72/full.sql.sqlite +646 -0
  971. synapse/storage/schema/state/delta/23/drop_state_index.sql +35 -0
  972. synapse/storage/schema/state/delta/32/remove_state_indices.sql +38 -0
  973. synapse/storage/schema/state/delta/35/add_state_index.sql +36 -0
  974. synapse/storage/schema/state/delta/35/state.sql +41 -0
  975. synapse/storage/schema/state/delta/35/state_dedupe.sql +36 -0
  976. synapse/storage/schema/state/delta/47/state_group_seq.py +38 -0
  977. synapse/storage/schema/state/delta/56/state_group_room_idx.sql +36 -0
  978. synapse/storage/schema/state/delta/61/02state_groups_state_n_distinct.sql.postgres +34 -0
  979. synapse/storage/schema/state/delta/70/08_state_group_edges_unique.sql +36 -0
  980. synapse/storage/schema/state/delta/89/01_state_groups_deletion.sql +39 -0
  981. synapse/storage/schema/state/delta/90/02_delete_unreferenced_state_groups.sql +16 -0
  982. synapse/storage/schema/state/delta/90/03_remove_old_deletion_bg_update.sql +15 -0
  983. synapse/storage/schema/state/full_schemas/72/full.sql.postgres +30 -0
  984. synapse/storage/schema/state/full_schemas/72/full.sql.sqlite +20 -0
  985. synapse/storage/types.py +183 -0
  986. synapse/storage/util/__init__.py +20 -0
  987. synapse/storage/util/id_generators.py +928 -0
  988. synapse/storage/util/partial_state_events_tracker.py +194 -0
  989. synapse/storage/util/sequence.py +315 -0
  990. synapse/streams/__init__.py +43 -0
  991. synapse/streams/config.py +91 -0
  992. synapse/streams/events.py +203 -0
  993. synapse/synapse_rust/__init__.pyi +3 -0
  994. synapse/synapse_rust/acl.pyi +20 -0
  995. synapse/synapse_rust/events.pyi +136 -0
  996. synapse/synapse_rust/http_client.pyi +32 -0
  997. synapse/synapse_rust/push.pyi +86 -0
  998. synapse/synapse_rust/rendezvous.pyi +30 -0
  999. synapse/synapse_rust/segmenter.pyi +1 -0
  1000. synapse/synapse_rust.abi3.so +0 -0
  1001. synapse/types/__init__.py +1600 -0
  1002. synapse/types/handlers/__init__.py +93 -0
  1003. synapse/types/handlers/policy_server.py +16 -0
  1004. synapse/types/handlers/sliding_sync.py +908 -0
  1005. synapse/types/rest/__init__.py +25 -0
  1006. synapse/types/rest/client/__init__.py +413 -0
  1007. synapse/types/state.py +634 -0
  1008. synapse/types/storage/__init__.py +66 -0
  1009. synapse/util/__init__.py +169 -0
  1010. synapse/util/async_helpers.py +1045 -0
  1011. synapse/util/background_queue.py +142 -0
  1012. synapse/util/batching_queue.py +202 -0
  1013. synapse/util/caches/__init__.py +300 -0
  1014. synapse/util/caches/cached_call.py +143 -0
  1015. synapse/util/caches/deferred_cache.py +530 -0
  1016. synapse/util/caches/descriptors.py +692 -0
  1017. synapse/util/caches/dictionary_cache.py +346 -0
  1018. synapse/util/caches/expiringcache.py +249 -0
  1019. synapse/util/caches/lrucache.py +975 -0
  1020. synapse/util/caches/response_cache.py +322 -0
  1021. synapse/util/caches/stream_change_cache.py +370 -0
  1022. synapse/util/caches/treecache.py +189 -0
  1023. synapse/util/caches/ttlcache.py +197 -0
  1024. synapse/util/cancellation.py +63 -0
  1025. synapse/util/check_dependencies.py +335 -0
  1026. synapse/util/clock.py +567 -0
  1027. synapse/util/constants.py +22 -0
  1028. synapse/util/daemonize.py +165 -0
  1029. synapse/util/distributor.py +157 -0
  1030. synapse/util/events.py +134 -0
  1031. synapse/util/file_consumer.py +164 -0
  1032. synapse/util/frozenutils.py +57 -0
  1033. synapse/util/gai_resolver.py +178 -0
  1034. synapse/util/hash.py +38 -0
  1035. synapse/util/httpresourcetree.py +108 -0
  1036. synapse/util/iterutils.py +189 -0
  1037. synapse/util/json.py +56 -0
  1038. synapse/util/linked_list.py +156 -0
  1039. synapse/util/logcontext.py +46 -0
  1040. synapse/util/logformatter.py +28 -0
  1041. synapse/util/macaroons.py +325 -0
  1042. synapse/util/manhole.py +191 -0
  1043. synapse/util/metrics.py +339 -0
  1044. synapse/util/module_loader.py +116 -0
  1045. synapse/util/msisdn.py +51 -0
  1046. synapse/util/patch_inline_callbacks.py +250 -0
  1047. synapse/util/pydantic_models.py +63 -0
  1048. synapse/util/ratelimitutils.py +419 -0
  1049. synapse/util/retryutils.py +339 -0
  1050. synapse/util/rlimit.py +42 -0
  1051. synapse/util/rust.py +133 -0
  1052. synapse/util/sentinel.py +21 -0
  1053. synapse/util/stringutils.py +293 -0
  1054. synapse/util/task_scheduler.py +493 -0
  1055. synapse/util/templates.py +126 -0
  1056. synapse/util/threepids.py +123 -0
  1057. synapse/util/wheel_timer.py +112 -0
  1058. synapse/visibility.py +835 -0
@@ -0,0 +1,2448 @@
1
+ #
2
+ # This file is licensed under the Affero General Public License (AGPL) version 3.
3
+ #
4
+ # Copyright 2016-2021 The Matrix.org Foundation C.I.C.
5
+ # Copyright (C) 2023 New Vector, Ltd
6
+ #
7
+ # This program is free software: you can redistribute it and/or modify
8
+ # it under the terms of the GNU Affero General Public License as
9
+ # published by the Free Software Foundation, either version 3 of the
10
+ # License, or (at your option) any later version.
11
+ #
12
+ # See the GNU Affero General Public License for more details:
13
+ # <https://www.gnu.org/licenses/agpl-3.0.html>.
14
+ #
15
+ # Originally licensed under the Apache License, Version 2.0:
16
+ # <http://www.apache.org/licenses/LICENSE-2.0>.
17
+ #
18
+ # [This file includes modifications made by New Vector Limited]
19
+ #
20
+ #
21
+
22
+ """Contains functions for performing actions on rooms."""
23
+
24
+ import itertools
25
+ import logging
26
+ import math
27
+ import random
28
+ import string
29
+ from collections import OrderedDict
30
+ from http import HTTPStatus
31
+ from typing import (
32
+ TYPE_CHECKING,
33
+ Any,
34
+ Awaitable,
35
+ Callable,
36
+ cast,
37
+ )
38
+
39
+ import attr
40
+
41
+ import synapse.events.snapshot
42
+ from synapse.api.constants import (
43
+ Direction,
44
+ EventContentFields,
45
+ EventTypes,
46
+ GuestAccess,
47
+ HistoryVisibility,
48
+ JoinRules,
49
+ Membership,
50
+ MTextFields,
51
+ RoomCreationPreset,
52
+ RoomEncryptionAlgorithms,
53
+ RoomTypes,
54
+ )
55
+ from synapse.api.errors import (
56
+ AuthError,
57
+ Codes,
58
+ LimitExceededError,
59
+ NotFoundError,
60
+ PartialStateConflictError,
61
+ StoreError,
62
+ SynapseError,
63
+ )
64
+ from synapse.api.filtering import Filter
65
+ from synapse.api.ratelimiting import Ratelimiter
66
+ from synapse.api.room_versions import KNOWN_ROOM_VERSIONS, RoomVersion
67
+ from synapse.event_auth import validate_event_for_room_version
68
+ from synapse.events import EventBase
69
+ from synapse.events.snapshot import UnpersistedEventContext
70
+ from synapse.events.utils import copy_and_fixup_power_levels_contents
71
+ from synapse.handlers.relations import BundledAggregations
72
+ from synapse.rest.admin._base import assert_user_is_admin
73
+ from synapse.streams import EventSource
74
+ from synapse.types import (
75
+ JsonDict,
76
+ JsonMapping,
77
+ MutableStateMap,
78
+ Requester,
79
+ RoomAlias,
80
+ RoomID,
81
+ RoomIdWithDomain,
82
+ RoomStreamToken,
83
+ StateMap,
84
+ StrCollection,
85
+ StreamKeyType,
86
+ StreamToken,
87
+ UserID,
88
+ create_requester,
89
+ )
90
+ from synapse.types.handlers import ShutdownRoomParams, ShutdownRoomResponse
91
+ from synapse.types.state import StateFilter
92
+ from synapse.util import stringutils
93
+ from synapse.util.async_helpers import concurrently_execute
94
+ from synapse.util.caches.response_cache import ResponseCache
95
+ from synapse.util.iterutils import batch_iter
96
+ from synapse.util.stringutils import parse_and_validate_server_name
97
+ from synapse.visibility import filter_events_for_client
98
+
99
+ if TYPE_CHECKING:
100
+ from synapse.server import HomeServer
101
+
102
+ logger = logging.getLogger(__name__)
103
+
104
+ id_server_scheme = "https://"
105
+
106
+ FIVE_MINUTES_IN_MS = 5 * 60 * 1000
107
+
108
+
109
+ @attr.s(slots=True, frozen=True, auto_attribs=True)
110
+ class EventContext:
111
+ events_before: list[EventBase]
112
+ event: EventBase
113
+ events_after: list[EventBase]
114
+ state: list[EventBase]
115
+ aggregations: dict[str, BundledAggregations]
116
+ start: str
117
+ end: str
118
+
119
+
120
+ class RoomCreationHandler:
121
+ def __init__(self, hs: "HomeServer"):
122
+ self.server_name = hs.hostname
123
+ self.store = hs.get_datastores().main
124
+ self._storage_controllers = hs.get_storage_controllers()
125
+ self.auth = hs.get_auth()
126
+ self.auth_blocking = hs.get_auth_blocking()
127
+ self.clock = hs.get_clock()
128
+ self.hs = hs
129
+ self._spam_checker_module_callbacks = hs.get_module_api_callbacks().spam_checker
130
+ self.event_creation_handler = hs.get_event_creation_handler()
131
+ self.room_member_handler = hs.get_room_member_handler()
132
+ self._event_auth_handler = hs.get_event_auth_handler()
133
+ self.config = hs.config
134
+ self.common_request_ratelimiter = hs.get_request_ratelimiter()
135
+ self.creation_ratelimiter = Ratelimiter(
136
+ store=self.store,
137
+ clock=self.clock,
138
+ cfg=self.config.ratelimiting.rc_room_creation,
139
+ )
140
+
141
+ # Room state based off defined presets
142
+ self._presets_dict: dict[str, dict[str, Any]] = {
143
+ RoomCreationPreset.PRIVATE_CHAT: {
144
+ "join_rules": JoinRules.INVITE,
145
+ "history_visibility": HistoryVisibility.SHARED,
146
+ "original_invitees_have_ops": False,
147
+ "guest_can_join": True,
148
+ "power_level_content_override": {"invite": 0},
149
+ },
150
+ RoomCreationPreset.TRUSTED_PRIVATE_CHAT: {
151
+ "join_rules": JoinRules.INVITE,
152
+ "history_visibility": HistoryVisibility.SHARED,
153
+ "original_invitees_have_ops": True,
154
+ "guest_can_join": True,
155
+ "power_level_content_override": {"invite": 0},
156
+ },
157
+ RoomCreationPreset.PUBLIC_CHAT: {
158
+ "join_rules": JoinRules.PUBLIC,
159
+ "history_visibility": HistoryVisibility.SHARED,
160
+ "original_invitees_have_ops": False,
161
+ "guest_can_join": False,
162
+ "power_level_content_override": {EventTypes.CallInvite: 50},
163
+ },
164
+ }
165
+
166
+ # Modify presets to selectively enable encryption by default per homeserver config
167
+ for preset_name, preset_config in self._presets_dict.items():
168
+ encrypted = (
169
+ preset_name
170
+ in self.config.room.encryption_enabled_by_default_for_room_presets
171
+ )
172
+ preset_config["encrypted"] = encrypted
173
+
174
+ self._default_power_level_content_override = (
175
+ self.config.room.default_power_level_content_override
176
+ )
177
+
178
+ self._replication = hs.get_replication_data_handler()
179
+
180
+ # If a user tries to update the same room multiple times in quick
181
+ # succession, only process the first attempt and return its result to
182
+ # subsequent requests
183
+ self._upgrade_response_cache: ResponseCache[tuple[str, str]] = ResponseCache(
184
+ clock=hs.get_clock(),
185
+ name="room_upgrade",
186
+ server_name=self.server_name,
187
+ timeout_ms=FIVE_MINUTES_IN_MS,
188
+ )
189
+ self._server_notices_mxid = hs.config.servernotices.server_notices_mxid
190
+
191
+ self._third_party_event_rules = (
192
+ hs.get_module_api_callbacks().third_party_event_rules
193
+ )
194
+
195
+ async def upgrade_room(
196
+ self,
197
+ requester: Requester,
198
+ old_room_id: str,
199
+ new_version: RoomVersion,
200
+ additional_creators: list[str] | None,
201
+ auto_member: bool = False,
202
+ ratelimit: bool = True,
203
+ ) -> str:
204
+ """Replace a room with a new room with a different version
205
+
206
+ Args:
207
+ requester: the user requesting the upgrade
208
+ old_room_id: the id of the room to be replaced
209
+ new_version: the new room version to use
210
+ additional_creators: additional room creators, for MSC4289.
211
+ auto_member: Whether to automatically join local users to the new
212
+ room and send out invites to remote users.
213
+
214
+ Returns:
215
+ the new room id
216
+
217
+ Raises:
218
+ ShadowBanError if the requester is shadow-banned.
219
+ """
220
+ if ratelimit:
221
+ await self.creation_ratelimiter.ratelimit(requester, update=False)
222
+
223
+ # then apply the ratelimits
224
+ await self.common_request_ratelimiter.ratelimit(requester)
225
+ await self.creation_ratelimiter.ratelimit(requester)
226
+
227
+ user_id = requester.user.to_string()
228
+
229
+ # Check if this room is already being upgraded by another person
230
+ for key in self._upgrade_response_cache.keys():
231
+ if key[0] == old_room_id and key[1] != user_id:
232
+ # Two different people are trying to upgrade the same room.
233
+ # Send the second an error.
234
+ #
235
+ # Note that this of course only gets caught if both users are
236
+ # on the same homeserver.
237
+ raise SynapseError(
238
+ 400, "An upgrade for this room is currently in progress"
239
+ )
240
+
241
+ # Check whether the room exists and 404 if it doesn't.
242
+ # We could go straight for the auth check, but that will raise a 403 instead.
243
+ old_room = await self.store.get_room(old_room_id)
244
+ if old_room is None:
245
+ raise NotFoundError("Unknown room id %s" % (old_room_id,))
246
+ old_room_is_public, _ = old_room
247
+
248
+ creation_event_with_context = None
249
+ if new_version.msc4291_room_ids_as_hashes:
250
+ old_room_create_event = await self.store.get_create_event_for_room(
251
+ old_room_id
252
+ )
253
+ creation_content = self._calculate_upgraded_room_creation_content(
254
+ old_room_create_event,
255
+ tombstone_event_id=None,
256
+ new_room_version=new_version,
257
+ additional_creators=additional_creators,
258
+ )
259
+ creation_event_with_context = await self._generate_create_event_for_room_id(
260
+ requester,
261
+ creation_content,
262
+ old_room_is_public,
263
+ new_version,
264
+ )
265
+ (create_event, _) = creation_event_with_context
266
+ new_room_id = create_event.room_id
267
+ else:
268
+ new_room_id = self._generate_room_id()
269
+
270
+ # Try several times, it could fail with PartialStateConflictError
271
+ # in _upgrade_room, cf comment in except block.
272
+ max_retries = 5
273
+ for i in range(max_retries):
274
+ try:
275
+ # Check whether the user has the power level to carry out the upgrade.
276
+ # `check_auth_rules_from_context` will check that they are in the room and have
277
+ # the required power level to send the tombstone event.
278
+ (
279
+ tombstone_event,
280
+ tombstone_unpersisted_context,
281
+ ) = await self.event_creation_handler.create_event(
282
+ requester,
283
+ {
284
+ "type": EventTypes.Tombstone,
285
+ "state_key": "",
286
+ "room_id": old_room_id,
287
+ "sender": user_id,
288
+ "content": {
289
+ "body": "This room has been replaced",
290
+ "replacement_room": new_room_id,
291
+ },
292
+ },
293
+ )
294
+ tombstone_context = await tombstone_unpersisted_context.persist(
295
+ tombstone_event
296
+ )
297
+ validate_event_for_room_version(tombstone_event)
298
+ await self._event_auth_handler.check_auth_rules_from_context(
299
+ tombstone_event
300
+ )
301
+
302
+ # Upgrade the room
303
+ #
304
+ # If this user has sent multiple upgrade requests for the same room
305
+ # and one of them is not complete yet, cache the response and
306
+ # return it to all subsequent requests
307
+ ret = await self._upgrade_response_cache.wrap(
308
+ (old_room_id, user_id),
309
+ self._upgrade_room,
310
+ requester,
311
+ old_room_id,
312
+ old_room, # args for _upgrade_room
313
+ new_room_id,
314
+ new_version,
315
+ tombstone_event,
316
+ tombstone_context,
317
+ additional_creators,
318
+ creation_event_with_context,
319
+ auto_member=auto_member,
320
+ )
321
+
322
+ return ret
323
+ except PartialStateConflictError as e:
324
+ # Clean up the cache so we can retry properly
325
+ self._upgrade_response_cache.unset((old_room_id, user_id))
326
+ # Persisting couldn't happen because the room got un-partial stated
327
+ # in the meantime and context needs to be recomputed, so let's do so.
328
+ if i == max_retries - 1:
329
+ raise e
330
+
331
+ # This is to satisfy mypy and should never happen
332
+ raise PartialStateConflictError()
333
+
334
+ async def _upgrade_room(
335
+ self,
336
+ requester: Requester,
337
+ old_room_id: str,
338
+ old_room: tuple[bool, str, bool],
339
+ new_room_id: str,
340
+ new_version: RoomVersion,
341
+ tombstone_event: EventBase,
342
+ tombstone_context: synapse.events.snapshot.EventContext,
343
+ additional_creators: list[str] | None,
344
+ creation_event_with_context: tuple[
345
+ EventBase, synapse.events.snapshot.EventContext
346
+ ]
347
+ | None = None,
348
+ auto_member: bool = False,
349
+ ) -> str:
350
+ """
351
+ Args:
352
+ requester: the user requesting the upgrade
353
+ old_room_id: the id of the room to be replaced
354
+ old_room: a tuple containing room information for the room to be replaced,
355
+ as returned by `RoomWorkerStore.get_room`.
356
+ new_room_id: the id of the replacement room
357
+ new_version: the version to upgrade the room to
358
+ tombstone_event: the tombstone event to send to the old room
359
+ tombstone_context: the context for the tombstone event
360
+ additional_creators: additional room creators, for MSC4289.
361
+ creation_event_with_context: The new room's create event, for room IDs as create event IDs.
362
+ auto_member: Whether to automatically join local users to the new
363
+ room and send out invites to remote users.
364
+
365
+ Raises:
366
+ ShadowBanError if the requester is shadow-banned.
367
+ """
368
+ user_id = requester.user.to_string()
369
+ assert self.hs.is_mine_id(user_id), "User must be our own: %s" % (user_id,)
370
+
371
+ logger.info("Creating new room %s to replace %s", new_room_id, old_room_id)
372
+
373
+ # We've already stored the room if we have the create event
374
+ if not creation_event_with_context:
375
+ # create the new room. may raise a `StoreError` in the exceedingly unlikely
376
+ # event of a room ID collision.
377
+ await self.store.store_room(
378
+ room_id=new_room_id,
379
+ room_creator_user_id=user_id,
380
+ is_public=old_room[0],
381
+ room_version=new_version,
382
+ )
383
+
384
+ await self.clone_existing_room(
385
+ requester,
386
+ old_room_id=old_room_id,
387
+ new_room_id=new_room_id,
388
+ new_room_version=new_version,
389
+ tombstone_event_id=tombstone_event.event_id,
390
+ additional_creators=additional_creators,
391
+ creation_event_with_context=creation_event_with_context,
392
+ auto_member=auto_member,
393
+ )
394
+
395
+ # now send the tombstone
396
+ await self.event_creation_handler.handle_new_client_event(
397
+ requester=requester,
398
+ events_and_context=[(tombstone_event, tombstone_context)],
399
+ )
400
+
401
+ state_filter = StateFilter.from_types(
402
+ [(EventTypes.CanonicalAlias, ""), (EventTypes.PowerLevels, "")]
403
+ )
404
+ old_room_state = await tombstone_context.get_current_state_ids(state_filter)
405
+
406
+ # We know the tombstone event isn't an outlier so it has current state.
407
+ assert old_room_state is not None
408
+
409
+ # update any aliases
410
+ await self._move_aliases_to_new_room(
411
+ requester, old_room_id, new_room_id, old_room_state
412
+ )
413
+
414
+ # Copy over user push rules, tags and migrate room directory state
415
+ await self.room_member_handler.transfer_room_state_on_room_upgrade(
416
+ old_room_id, new_room_id
417
+ )
418
+
419
+ # finally, shut down the PLs in the old room, and update them in the new
420
+ # room.
421
+ await self._update_upgraded_room_pls(
422
+ requester,
423
+ old_room_id,
424
+ new_room_id,
425
+ old_room_state,
426
+ additional_creators,
427
+ )
428
+
429
+ return new_room_id
430
+
431
+ async def _update_upgraded_room_pls(
432
+ self,
433
+ requester: Requester,
434
+ old_room_id: str,
435
+ new_room_id: str,
436
+ old_room_state: StateMap[str],
437
+ additional_creators: list[str] | None,
438
+ ) -> None:
439
+ """Send updated power levels in both rooms after an upgrade
440
+
441
+ Args:
442
+ requester: the user requesting the upgrade
443
+ old_room_id: the id of the room to be replaced
444
+ new_room_id: the id of the replacement room
445
+ old_room_state: the state map for the old room
446
+ additional_creators: Additional creators in the new room.
447
+ Raises:
448
+ ShadowBanError if the requester is shadow-banned.
449
+ """
450
+ old_room_pl_event_id = old_room_state.get((EventTypes.PowerLevels, ""))
451
+
452
+ if old_room_pl_event_id is None:
453
+ logger.warning(
454
+ "Not supported: upgrading a room with no PL event. Not setting PLs "
455
+ "in old room."
456
+ )
457
+ return
458
+
459
+ old_room_pl_state = await self.store.get_event(old_room_pl_event_id)
460
+
461
+ # we try to stop regular users from speaking by setting the PL required
462
+ # to send regular events and invites to 'Moderator' level. That's normally
463
+ # 50, but if the default PL in a room is 50 or more, then we set the
464
+ # required PL above that.
465
+
466
+ pl_content = copy_and_fixup_power_levels_contents(old_room_pl_state.content)
467
+ users_default: int = pl_content.get("users_default", 0) # type: ignore[assignment]
468
+ restricted_level = max(users_default + 1, 50)
469
+
470
+ updated = False
471
+ for v in ("invite", "events_default"):
472
+ current: int = pl_content.get(v, 0) # type: ignore[assignment]
473
+ if current < restricted_level:
474
+ logger.debug(
475
+ "Setting level for %s in %s to %i (was %i)",
476
+ v,
477
+ old_room_id,
478
+ restricted_level,
479
+ current,
480
+ )
481
+ pl_content[v] = restricted_level
482
+ updated = True
483
+ else:
484
+ logger.debug("Not setting level for %s (already %i)", v, current)
485
+
486
+ if updated:
487
+ try:
488
+ await self.event_creation_handler.create_and_send_nonmember_event(
489
+ requester,
490
+ {
491
+ "type": EventTypes.PowerLevels,
492
+ "state_key": "",
493
+ "room_id": old_room_id,
494
+ "sender": requester.user.to_string(),
495
+ "content": pl_content,
496
+ },
497
+ ratelimit=False,
498
+ )
499
+ except AuthError as e:
500
+ logger.warning("Unable to update PLs in old room: %s", e)
501
+
502
+ new_room_version = await self.store.get_room_version(new_room_id)
503
+ if new_room_version.msc4289_creator_power_enabled:
504
+ self._remove_creators_from_pl_users_map(
505
+ old_room_pl_state.content.get("users", {}),
506
+ requester.user.to_string(),
507
+ additional_creators,
508
+ )
509
+
510
+ await self.event_creation_handler.create_and_send_nonmember_event(
511
+ requester,
512
+ {
513
+ "type": EventTypes.PowerLevels,
514
+ "state_key": "",
515
+ "room_id": new_room_id,
516
+ "sender": requester.user.to_string(),
517
+ "content": copy_and_fixup_power_levels_contents(
518
+ old_room_pl_state.content
519
+ ),
520
+ },
521
+ ratelimit=False,
522
+ )
523
+
524
+ def _calculate_upgraded_room_creation_content(
525
+ self,
526
+ old_room_create_event: EventBase,
527
+ tombstone_event_id: str | None,
528
+ new_room_version: RoomVersion,
529
+ additional_creators: list[str] | None,
530
+ ) -> JsonDict:
531
+ creation_content: JsonDict = {
532
+ "room_version": new_room_version.identifier,
533
+ "predecessor": {
534
+ "room_id": old_room_create_event.room_id,
535
+ },
536
+ }
537
+ if tombstone_event_id is not None:
538
+ creation_content["predecessor"]["event_id"] = tombstone_event_id
539
+ if (
540
+ additional_creators is not None
541
+ and new_room_version.msc4289_creator_power_enabled
542
+ ):
543
+ creation_content["additional_creators"] = additional_creators
544
+ # Check if old room was non-federatable
545
+ if not old_room_create_event.content.get(EventContentFields.FEDERATE, True):
546
+ # If so, mark the new room as non-federatable as well
547
+ creation_content[EventContentFields.FEDERATE] = False
548
+ # Copy the room type as per MSC3818.
549
+ room_type = old_room_create_event.content.get(EventContentFields.ROOM_TYPE)
550
+ if room_type is not None:
551
+ creation_content[EventContentFields.ROOM_TYPE] = room_type
552
+ return creation_content
553
+
554
+ async def clone_existing_room(
555
+ self,
556
+ requester: Requester,
557
+ old_room_id: str,
558
+ new_room_id: str,
559
+ new_room_version: RoomVersion,
560
+ tombstone_event_id: str,
561
+ additional_creators: list[str] | None,
562
+ creation_event_with_context: tuple[
563
+ EventBase, synapse.events.snapshot.EventContext
564
+ ]
565
+ | None = None,
566
+ auto_member: bool = False,
567
+ ) -> None:
568
+ """Populate a new room based on an old room
569
+
570
+ Args:
571
+ requester: the user requesting the upgrade
572
+ old_room_id : the id of the room to be replaced
573
+ new_room_id: the id to give the new room (should already have been
574
+ created with _generate_room_id())
575
+ new_room_version: the new room version to use
576
+ tombstone_event_id: the ID of the tombstone event in the old room.
577
+ additional_creators: additional room creators, for MSC4289.
578
+ creation_event_with_context: The create event of the new room, if the new room supports
579
+ room ID as create event ID hash.
580
+ auto_member: Whether to automatically join local users to the new
581
+ room and send out invites to remote users.
582
+ """
583
+ user_id = requester.user.to_string()
584
+
585
+ # Get old room's create event
586
+ old_room_create_event = await self.store.get_create_event_for_room(old_room_id)
587
+
588
+ if creation_event_with_context:
589
+ create_event, _ = creation_event_with_context
590
+ creation_content = create_event.content
591
+ else:
592
+ creation_content = self._calculate_upgraded_room_creation_content(
593
+ old_room_create_event,
594
+ tombstone_event_id,
595
+ new_room_version,
596
+ additional_creators=additional_creators,
597
+ )
598
+ initial_state: MutableStateMap = {}
599
+
600
+ # Replicate relevant room events
601
+ types_to_copy: list[tuple[str, str | None]] = [
602
+ (EventTypes.JoinRules, ""),
603
+ (EventTypes.Name, ""),
604
+ (EventTypes.Topic, ""),
605
+ (EventTypes.RoomHistoryVisibility, ""),
606
+ (EventTypes.GuestAccess, ""),
607
+ (EventTypes.RoomAvatar, ""),
608
+ (EventTypes.RoomEncryption, ""),
609
+ (EventTypes.ServerACL, ""),
610
+ (EventTypes.PowerLevels, ""),
611
+ ]
612
+
613
+ room_type = old_room_create_event.content.get(EventContentFields.ROOM_TYPE)
614
+ if room_type is not None:
615
+ # If the old room was a space, copy over the rooms in the space.
616
+ if room_type == RoomTypes.SPACE:
617
+ types_to_copy.append((EventTypes.SpaceChild, None))
618
+
619
+ old_room_state_ids = (
620
+ await self._storage_controllers.state.get_current_state_ids(
621
+ old_room_id, StateFilter.from_types(types_to_copy)
622
+ )
623
+ )
624
+ # map from event_id to BaseEvent
625
+ old_room_state_events = await self.store.get_events(old_room_state_ids.values())
626
+
627
+ for k, old_event_id in old_room_state_ids.items():
628
+ old_event = old_room_state_events.get(old_event_id)
629
+ if old_event:
630
+ # If the event is an space child event with empty content, it was
631
+ # removed from the space and should be ignored.
632
+ if k[0] == EventTypes.SpaceChild and not old_event.content:
633
+ continue
634
+
635
+ initial_state[k] = old_event.content
636
+
637
+ # deep-copy the power-levels event before we start modifying it
638
+ # note that if frozen_dicts are enabled, `power_levels` will be a frozen
639
+ # dict so we can't just copy.deepcopy it.
640
+ initial_state[(EventTypes.PowerLevels, "")] = power_levels = (
641
+ copy_and_fixup_power_levels_contents(
642
+ initial_state[(EventTypes.PowerLevels, "")]
643
+ )
644
+ )
645
+
646
+ # Resolve the minimum power level required to send any state event
647
+ # We will give the upgrading user this power level temporarily (if necessary) such that
648
+ # they are able to copy all of the state events over, then revert them back to their
649
+ # original power level afterwards in _update_upgraded_room_pls
650
+
651
+ # Copy over user power levels now as this will not be possible with >100PL users once
652
+ # the room has been created
653
+ # Calculate the minimum power level needed to clone the room
654
+ event_power_levels = power_levels.get("events", {})
655
+ if not isinstance(event_power_levels, dict):
656
+ event_power_levels = {}
657
+ state_default = power_levels.get("state_default", 50)
658
+ try:
659
+ state_default_int = int(state_default) # type: ignore[arg-type]
660
+ except (TypeError, ValueError):
661
+ state_default_int = 50
662
+ ban = power_levels.get("ban", 50)
663
+ try:
664
+ ban = int(ban) # type: ignore[arg-type]
665
+ except (TypeError, ValueError):
666
+ ban = 50
667
+ needed_power_level = max(
668
+ state_default_int, ban, max(event_power_levels.values(), default=0)
669
+ )
670
+
671
+ # Get the user's current power level, this matches the logic in get_user_power_level,
672
+ # but without the entire state map.
673
+ user_power_levels = power_levels.setdefault("users", {})
674
+ if not isinstance(user_power_levels, dict):
675
+ user_power_levels = {}
676
+ users_default = power_levels.get("users_default", 0)
677
+ current_power_level = user_power_levels.get(user_id, users_default)
678
+ try:
679
+ current_power_level_int = int(current_power_level) # type: ignore[arg-type]
680
+ except (TypeError, ValueError):
681
+ current_power_level_int = 0
682
+ # Raise the requester's power level in the new room if necessary
683
+ if current_power_level_int < needed_power_level:
684
+ user_power_levels[user_id] = needed_power_level
685
+
686
+ if new_room_version.msc4289_creator_power_enabled:
687
+ # the creator(s) cannot be in the users map
688
+ self._remove_creators_from_pl_users_map(
689
+ user_power_levels,
690
+ user_id,
691
+ additional_creators,
692
+ )
693
+
694
+ # We construct a subset of what the body of a call to /createRoom would look like
695
+ # for passing to the spam checker. We don't include a preset here, as we expect the
696
+ # initial state to contain everything we need.
697
+ # TODO: given we are upgrading, it would make sense to pass the room_version
698
+ # TODO: the preset might be useful too
699
+ spam_check = await self._spam_checker_module_callbacks.user_may_create_room(
700
+ user_id,
701
+ {
702
+ "creation_content": creation_content,
703
+ "initial_state": [
704
+ {
705
+ "type": state_key[0],
706
+ "state_key": state_key[1],
707
+ "content": event_content,
708
+ }
709
+ for state_key, event_content in initial_state.items()
710
+ ],
711
+ },
712
+ )
713
+ if spam_check != self._spam_checker_module_callbacks.NOT_SPAM:
714
+ raise SynapseError(
715
+ 403,
716
+ "You are not permitted to create rooms",
717
+ errcode=spam_check[0],
718
+ additional_fields=spam_check[1],
719
+ )
720
+
721
+ _, last_event_id, _ = await self._send_events_for_new_room(
722
+ requester,
723
+ new_room_id,
724
+ new_room_version,
725
+ # we expect to override all the presets with initial_state, so this is
726
+ # somewhat arbitrary.
727
+ room_config={"preset": RoomCreationPreset.PRIVATE_CHAT},
728
+ invite_list=[],
729
+ initial_state=initial_state,
730
+ creation_content=creation_content,
731
+ creation_event_with_context=creation_event_with_context,
732
+ )
733
+
734
+ # Transfer membership events
735
+ ban_event_ids = await self.store.get_ban_event_ids_in_room(old_room_id)
736
+ if ban_event_ids:
737
+ ban_events = await self.store.get_events_as_list(ban_event_ids)
738
+
739
+ # Add any banned users to the new room.
740
+ #
741
+ # Note generally we should send membership events via
742
+ # `update_membership`, however in this case its fine to bypass as
743
+ # these bans don't need any special treatment, i.e. the sender is in
744
+ # the room and they don't need any extra signatures, etc.
745
+ for batched_ban_events in batch_iter(ban_events, 1000):
746
+ await self.event_creation_handler.create_and_send_new_client_events(
747
+ requester=requester,
748
+ room_id=new_room_id,
749
+ prev_event_id=last_event_id,
750
+ event_dicts=[
751
+ {
752
+ "type": EventTypes.Member,
753
+ "state_key": ban_event.state_key,
754
+ "room_id": new_room_id,
755
+ "sender": requester.user.to_string(),
756
+ "content": ban_event.content,
757
+ }
758
+ for ban_event in batched_ban_events
759
+ ],
760
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
761
+ )
762
+
763
+ if auto_member:
764
+ logger.info("Joining local users to %s", new_room_id)
765
+
766
+ # 1. Copy over all joins for local
767
+ joined_profiles = await self.store.get_users_in_room_with_profiles(
768
+ old_room_id
769
+ )
770
+
771
+ local_user_ids = [
772
+ user_id for user_id in joined_profiles if self.hs.is_mine_id(user_id)
773
+ ]
774
+
775
+ logger.info("Local user IDs %s", local_user_ids)
776
+
777
+ for batched_local_user_ids in batch_iter(local_user_ids, 1000):
778
+ invites_to_send = []
779
+
780
+ # For each local user we create an invite event (from the
781
+ # upgrading user) plus a join event.
782
+ for local_user_id in batched_local_user_ids:
783
+ if local_user_id == user_id:
784
+ # Ignore the upgrading user, as they are already in the
785
+ # new room.
786
+ continue
787
+
788
+ invites_to_send.append(
789
+ {
790
+ "type": EventTypes.Member,
791
+ "state_key": local_user_id,
792
+ "room_id": new_room_id,
793
+ "sender": requester.user.to_string(),
794
+ "content": {
795
+ "membership": Membership.INVITE,
796
+ },
797
+ }
798
+ )
799
+
800
+ # If the user has profile information in the previous join,
801
+ # add it to the content.
802
+ #
803
+ # We could instead copy over the contents from the old join
804
+ # event, however a) that would require us to fetch all the
805
+ # old join events (which is slow), and b) generally the join
806
+ # events have no extra information in them. (We also believe
807
+ # that most clients don't copy this information over either,
808
+ # but we could be wrong.)
809
+ content_profile = {}
810
+ user_profile = joined_profiles[local_user_id]
811
+ if user_profile.display_name:
812
+ content_profile["displayname"] = user_profile.display_name
813
+ if user_profile.avatar_url:
814
+ content_profile["avatar_url"] = user_profile.avatar_url
815
+
816
+ invites_to_send.append(
817
+ {
818
+ "type": EventTypes.Member,
819
+ "state_key": local_user_id,
820
+ "room_id": new_room_id,
821
+ "sender": local_user_id,
822
+ "content": {
823
+ "membership": Membership.JOIN,
824
+ **content_profile,
825
+ },
826
+ }
827
+ )
828
+
829
+ await self.event_creation_handler.create_and_send_new_client_events(
830
+ requester=requester,
831
+ room_id=new_room_id,
832
+ prev_event_id=None,
833
+ event_dicts=invites_to_send,
834
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
835
+ )
836
+
837
+ # Invite other users if the room is not public. If the room *is*
838
+ # public then users can simply directly join, and inviting them as
839
+ # well may lead to confusion.
840
+
841
+ join_rule_content = initial_state.get((EventTypes.JoinRules, ""), None)
842
+ is_public = False
843
+ if join_rule_content:
844
+ is_public = join_rule_content["join_rule"] == JoinRules.PUBLIC
845
+
846
+ if not is_public:
847
+ # Copy invites
848
+ # TODO: Copy over 3pid invites as well.
849
+ invited_users = await self.store.get_invited_users_in_room(
850
+ room_id=old_room_id
851
+ )
852
+
853
+ # For local users we can just batch send the invites.
854
+ local_invited_users = [
855
+ user_id for user_id in invited_users if self.hs.is_mine_id(user_id)
856
+ ]
857
+
858
+ logger.info(
859
+ "Joining local user IDs %s to new room %s",
860
+ local_invited_users,
861
+ new_room_id,
862
+ )
863
+
864
+ for batched_local_invited_users in batch_iter(
865
+ local_invited_users, 1000
866
+ ):
867
+ invites_to_send = []
868
+ leaves_to_send = []
869
+
870
+ # For each local user we create an invite event (from the
871
+ # upgrading user), and reject the invite event in the old
872
+ # room.
873
+ #
874
+ # This ensures that the user ends up with a single invite to
875
+ # the new room (rather than multiple invites which may be
876
+ # noisy and confusing).
877
+ for local_user_id in batched_local_invited_users:
878
+ leaves_to_send.append(
879
+ {
880
+ "type": EventTypes.Member,
881
+ "state_key": local_user_id,
882
+ "room_id": old_room_id,
883
+ "sender": local_user_id,
884
+ "content": {
885
+ "membership": Membership.LEAVE,
886
+ },
887
+ }
888
+ )
889
+ invites_to_send.append(
890
+ {
891
+ "type": EventTypes.Member,
892
+ "state_key": local_user_id,
893
+ "room_id": new_room_id,
894
+ "sender": requester.user.to_string(),
895
+ "content": {
896
+ "membership": Membership.INVITE,
897
+ },
898
+ }
899
+ )
900
+
901
+ await self.event_creation_handler.create_and_send_new_client_events(
902
+ requester=requester,
903
+ room_id=old_room_id,
904
+ prev_event_id=None,
905
+ event_dicts=leaves_to_send,
906
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
907
+ )
908
+ await self.event_creation_handler.create_and_send_new_client_events(
909
+ requester=requester,
910
+ room_id=new_room_id,
911
+ prev_event_id=None,
912
+ event_dicts=invites_to_send,
913
+ ratelimit=False,
914
+ )
915
+
916
+ # For remote users we send invites one by one, as we need to
917
+ # send each one to the remote server.
918
+ #
919
+ # We also invite joined remote users who were in the old room.
920
+ remote_user_ids = [
921
+ user_id
922
+ for user_id in itertools.chain(invited_users, joined_profiles)
923
+ if not self.hs.is_mine_id(user_id)
924
+ ]
925
+
926
+ logger.debug("Inviting remote user IDs %s", remote_user_ids)
927
+
928
+ async def remote_invite(remote_user: str) -> None:
929
+ try:
930
+ await self.room_member_handler.update_membership(
931
+ requester,
932
+ UserID.from_string(remote_user),
933
+ new_room_id,
934
+ Membership.INVITE,
935
+ ratelimit=False, # We ratelimit the entire upgrade, not individual events.
936
+ )
937
+ except SynapseError as e:
938
+ # If we fail to invite a remote user, we log it but continue
939
+ # on with the upgrade.
940
+ logger.warning(
941
+ "Failed to invite remote user %s to new room %s: %s",
942
+ remote_user,
943
+ new_room_id,
944
+ e,
945
+ )
946
+
947
+ # We do this concurrently, as it can take a while to invite
948
+ await concurrently_execute(
949
+ remote_invite,
950
+ remote_user_ids,
951
+ 10,
952
+ )
953
+
954
+ async def _move_aliases_to_new_room(
955
+ self,
956
+ requester: Requester,
957
+ old_room_id: str,
958
+ new_room_id: str,
959
+ old_room_state: StateMap[str],
960
+ ) -> None:
961
+ # check to see if we have a canonical alias.
962
+ canonical_alias_event = None
963
+ canonical_alias_event_id = old_room_state.get((EventTypes.CanonicalAlias, ""))
964
+ if canonical_alias_event_id:
965
+ canonical_alias_event = await self.store.get_event(canonical_alias_event_id)
966
+
967
+ await self.store.update_aliases_for_room(old_room_id, new_room_id)
968
+
969
+ if not canonical_alias_event:
970
+ return
971
+
972
+ # If there is a canonical alias we need to update the one in the old
973
+ # room and set one in the new one.
974
+ old_canonical_alias_content = dict(canonical_alias_event.content)
975
+ new_canonical_alias_content = {}
976
+
977
+ canonical = canonical_alias_event.content.get("alias")
978
+ if canonical and self.hs.is_mine_id(canonical):
979
+ new_canonical_alias_content["alias"] = canonical
980
+ old_canonical_alias_content.pop("alias", None)
981
+
982
+ # We convert to a list as it will be a Tuple.
983
+ old_alt_aliases = list(old_canonical_alias_content.get("alt_aliases", []))
984
+ if old_alt_aliases:
985
+ old_canonical_alias_content["alt_aliases"] = old_alt_aliases
986
+ new_alt_aliases = new_canonical_alias_content.setdefault("alt_aliases", [])
987
+ for alias in canonical_alias_event.content.get("alt_aliases", []):
988
+ try:
989
+ if self.hs.is_mine_id(alias):
990
+ new_alt_aliases.append(alias)
991
+ old_alt_aliases.remove(alias)
992
+ except Exception:
993
+ logger.info(
994
+ "Invalid alias %s in canonical alias event %s",
995
+ alias,
996
+ canonical_alias_event_id,
997
+ )
998
+
999
+ if not old_alt_aliases:
1000
+ old_canonical_alias_content.pop("alt_aliases")
1001
+
1002
+ # If a canonical alias event existed for the old room, fire a canonical
1003
+ # alias event for the new room with a copy of the information.
1004
+ try:
1005
+ await self.event_creation_handler.create_and_send_nonmember_event(
1006
+ requester,
1007
+ {
1008
+ "type": EventTypes.CanonicalAlias,
1009
+ "state_key": "",
1010
+ "room_id": old_room_id,
1011
+ "sender": requester.user.to_string(),
1012
+ "content": old_canonical_alias_content,
1013
+ },
1014
+ ratelimit=False,
1015
+ )
1016
+ except SynapseError as e:
1017
+ # again I'm not really expecting this to fail, but if it does, I'd rather
1018
+ # we returned the new room to the client at this point.
1019
+ logger.exception("Unable to send updated alias events in old room: %s", e)
1020
+
1021
+ try:
1022
+ await self.event_creation_handler.create_and_send_nonmember_event(
1023
+ requester,
1024
+ {
1025
+ "type": EventTypes.CanonicalAlias,
1026
+ "state_key": "",
1027
+ "room_id": new_room_id,
1028
+ "sender": requester.user.to_string(),
1029
+ "content": new_canonical_alias_content,
1030
+ },
1031
+ ratelimit=False,
1032
+ )
1033
+ except SynapseError as e:
1034
+ # again I'm not really expecting this to fail, but if it does, I'd rather
1035
+ # we returned the new room to the client at this point.
1036
+ logger.exception("Unable to send updated alias events in new room: %s", e)
1037
+
1038
+ async def create_room(
1039
+ self,
1040
+ requester: Requester,
1041
+ config: JsonDict,
1042
+ ratelimit: bool = True,
1043
+ creator_join_profile: JsonDict | None = None,
1044
+ ignore_forced_encryption: bool = False,
1045
+ ) -> tuple[str, RoomAlias | None, int]:
1046
+ """Creates a new room.
1047
+
1048
+ Args:
1049
+ requester: The user who requested the room creation.
1050
+ config: A dict of configuration options. This will be the body of
1051
+ a /createRoom request; see
1052
+ https://spec.matrix.org/latest/client-server-api/#post_matrixclientv3createroom
1053
+ ratelimit: set to False to disable the rate limiter
1054
+
1055
+ creator_join_profile:
1056
+ Set to override the displayname and avatar for the creating
1057
+ user in this room. If unset, displayname and avatar will be
1058
+ derived from the user's profile. If set, should contain the
1059
+ values to go in the body of the 'join' event (typically
1060
+ `avatar_url` and/or `displayname`.
1061
+ ignore_forced_encryption:
1062
+ Ignore encryption forced by `encryption_enabled_by_default_for_room_type` setting.
1063
+
1064
+ Returns:
1065
+ A 3-tuple containing:
1066
+ - the room ID;
1067
+ - if requested, the room alias, otherwise None; and
1068
+ - the `stream_id` of the last persisted event.
1069
+ Raises:
1070
+ SynapseError:
1071
+ if the room ID couldn't be stored, 3pid invitation config
1072
+ validation failed, or something went horribly wrong.
1073
+ ResourceLimitError:
1074
+ if server is blocked to some resource being
1075
+ exceeded
1076
+ """
1077
+ user_id = requester.user.to_string()
1078
+
1079
+ await self.auth_blocking.check_auth_blocking(requester=requester)
1080
+
1081
+ if ratelimit:
1082
+ # Limit the rate of room creations,
1083
+ # using both the limiter specific to room creations as well
1084
+ # as the general request ratelimiter.
1085
+ #
1086
+ # Note that we don't rate limit the individual
1087
+ # events in the room — room creation isn't atomic and
1088
+ # historically it was very janky if half the events in the
1089
+ # initial state don't make it because of rate limiting.
1090
+
1091
+ # First check the room creation ratelimiter without updating it
1092
+ # (this is so we don't consume a token if the other ratelimiter doesn't
1093
+ # allow us to proceed)
1094
+ await self.creation_ratelimiter.ratelimit(requester, update=False)
1095
+
1096
+ # then apply the ratelimits
1097
+ await self.common_request_ratelimiter.ratelimit(requester)
1098
+ await self.creation_ratelimiter.ratelimit(requester)
1099
+
1100
+ if (
1101
+ self._server_notices_mxid is not None
1102
+ and user_id == self._server_notices_mxid
1103
+ ):
1104
+ # allow the server notices mxid to create rooms
1105
+ is_requester_admin = True
1106
+ else:
1107
+ is_requester_admin = await self.auth.is_server_admin(requester)
1108
+
1109
+ # Let the third party rules modify the room creation config if needed, or abort
1110
+ # the room creation entirely with an exception.
1111
+ await self._third_party_event_rules.on_create_room(
1112
+ requester, config, is_requester_admin=is_requester_admin
1113
+ )
1114
+
1115
+ invite_3pid_list = config.get("invite_3pid", [])
1116
+ invite_list = config.get("invite", [])
1117
+
1118
+ # validate each entry for correctness
1119
+ for invite_3pid in invite_3pid_list:
1120
+ if not all(
1121
+ key in invite_3pid
1122
+ for key in ("medium", "address", "id_server", "id_access_token")
1123
+ ):
1124
+ raise SynapseError(
1125
+ HTTPStatus.BAD_REQUEST,
1126
+ "all of `medium`, `address`, `id_server` and `id_access_token` "
1127
+ "are required when making a 3pid invite",
1128
+ Codes.MISSING_PARAM,
1129
+ )
1130
+
1131
+ room_version_id = config.get(
1132
+ "room_version", self.config.server.default_room_version.identifier
1133
+ )
1134
+
1135
+ if not isinstance(room_version_id, str):
1136
+ raise SynapseError(400, "room_version must be a string", Codes.BAD_JSON)
1137
+
1138
+ room_version = KNOWN_ROOM_VERSIONS.get(room_version_id)
1139
+ if room_version is None:
1140
+ raise SynapseError(
1141
+ 400,
1142
+ "Your homeserver does not support this room version",
1143
+ Codes.UNSUPPORTED_ROOM_VERSION,
1144
+ )
1145
+
1146
+ room_alias = None
1147
+ if "room_alias_name" in config:
1148
+ for wchar in string.whitespace:
1149
+ if wchar in config["room_alias_name"]:
1150
+ raise SynapseError(400, "Invalid characters in room alias")
1151
+
1152
+ if ":" in config["room_alias_name"]:
1153
+ # Prevent someone from trying to pass in a full alias here.
1154
+ # Note that it's permissible for a room alias to have multiple
1155
+ # hash symbols at the start (notably bridged over from IRC, too),
1156
+ # but the first colon in the alias is defined to separate the local
1157
+ # part from the server name.
1158
+ # (remember server names can contain port numbers, also separated
1159
+ # by a colon. But under no circumstances should the local part be
1160
+ # allowed to contain a colon!)
1161
+ raise SynapseError(
1162
+ 400,
1163
+ "':' is not permitted in the room alias name. "
1164
+ "Please note this expects a local part — 'wombat', not '#wombat:example.com'.",
1165
+ )
1166
+
1167
+ room_alias = RoomAlias(config["room_alias_name"], self.hs.hostname)
1168
+ mapping = await self.store.get_association_from_room_alias(room_alias)
1169
+
1170
+ if mapping:
1171
+ raise SynapseError(400, "Room alias already taken", Codes.ROOM_IN_USE)
1172
+
1173
+ for i in invite_list:
1174
+ try:
1175
+ uid = UserID.from_string(i)
1176
+ parse_and_validate_server_name(uid.domain)
1177
+ except Exception:
1178
+ raise SynapseError(400, "Invalid user_id: %s" % (i,))
1179
+
1180
+ if (invite_list or invite_3pid_list) and requester.shadow_banned:
1181
+ # We randomly sleep a bit just to annoy the requester.
1182
+ await self.clock.sleep(random.randint(1, 10))
1183
+
1184
+ # Allow the request to go through, but remove any associated invites.
1185
+ invite_3pid_list = []
1186
+ invite_list = []
1187
+
1188
+ if invite_list or invite_3pid_list:
1189
+ try:
1190
+ # If there are invites in the request, see if the ratelimiting settings
1191
+ # allow that number of invites to be sent from the current user.
1192
+ await self.room_member_handler.ratelimit_multiple_invites(
1193
+ requester,
1194
+ room_id=None,
1195
+ n_invites=len(invite_list) + len(invite_3pid_list),
1196
+ update=False,
1197
+ )
1198
+ except LimitExceededError:
1199
+ raise SynapseError(400, "Cannot invite so many users at once")
1200
+
1201
+ await self.event_creation_handler.assert_accepted_privacy_policy(requester)
1202
+
1203
+ power_level_content_override = config.get("power_level_content_override")
1204
+ if (
1205
+ power_level_content_override
1206
+ and not room_version.msc4289_creator_power_enabled # this validation doesn't apply in MSC4289 rooms
1207
+ and "users" in power_level_content_override
1208
+ and user_id not in power_level_content_override["users"]
1209
+ ):
1210
+ raise SynapseError(
1211
+ 400,
1212
+ "Not a valid power_level_content_override: 'users' did not contain %s"
1213
+ % (user_id,),
1214
+ )
1215
+
1216
+ # The spec says rooms should default to private visibility if
1217
+ # `visibility` is not specified.
1218
+ visibility = config.get("visibility", "private")
1219
+ is_public = visibility == "public"
1220
+
1221
+ self._validate_room_config(config, visibility)
1222
+
1223
+ # Run the spam checker after other validation
1224
+ if not is_requester_admin:
1225
+ spam_check = await self._spam_checker_module_callbacks.user_may_create_room(
1226
+ user_id, config
1227
+ )
1228
+ if spam_check != self._spam_checker_module_callbacks.NOT_SPAM:
1229
+ raise SynapseError(
1230
+ 403,
1231
+ "You are not permitted to create rooms",
1232
+ errcode=spam_check[0],
1233
+ additional_fields=spam_check[1],
1234
+ )
1235
+
1236
+ creation_content = config.get("creation_content", {})
1237
+ # override any attempt to set room versions via the creation_content
1238
+ creation_content["room_version"] = room_version.identifier
1239
+
1240
+ # trusted private chats have the invited users marked as additional creators
1241
+ if (
1242
+ room_version.msc4289_creator_power_enabled
1243
+ and config.get("preset", None) == RoomCreationPreset.TRUSTED_PRIVATE_CHAT
1244
+ and len(config.get("invite", [])) > 0
1245
+ ):
1246
+ # the other user(s) are additional creators
1247
+ invitees = config.get("invite", [])
1248
+ # we don't want to replace any additional_creators additionally specified, and we want
1249
+ # to remove duplicates.
1250
+ creation_content[EventContentFields.ADDITIONAL_CREATORS] = list(
1251
+ set(creation_content.get(EventContentFields.ADDITIONAL_CREATORS, []))
1252
+ | set(invitees)
1253
+ )
1254
+
1255
+ creation_event_with_context = None
1256
+ if room_version.msc4291_room_ids_as_hashes:
1257
+ creation_event_with_context = await self._generate_create_event_for_room_id(
1258
+ requester,
1259
+ creation_content,
1260
+ is_public,
1261
+ room_version,
1262
+ )
1263
+ (create_event, _) = creation_event_with_context
1264
+ room_id = create_event.room_id
1265
+ else:
1266
+ room_id = await self._generate_and_create_room_id(
1267
+ creator_id=user_id,
1268
+ is_public=is_public,
1269
+ room_version=room_version,
1270
+ )
1271
+
1272
+ # Check whether this visibility value is blocked by a third party module
1273
+ allowed_by_third_party_rules = await (
1274
+ self._third_party_event_rules.check_visibility_can_be_modified(
1275
+ room_id, visibility
1276
+ )
1277
+ )
1278
+ if not allowed_by_third_party_rules:
1279
+ raise SynapseError(403, "Room visibility value not allowed.")
1280
+
1281
+ if is_public:
1282
+ room_aliases = []
1283
+ if room_alias:
1284
+ room_aliases.append(room_alias.to_string())
1285
+ if not self.config.roomdirectory.is_publishing_room_allowed(
1286
+ user_id, room_id, room_aliases
1287
+ ):
1288
+ # allow room creation to continue but do not publish room
1289
+ await self.store.set_room_is_public(room_id, False)
1290
+
1291
+ directory_handler = self.hs.get_directory_handler()
1292
+ if room_alias:
1293
+ await directory_handler.create_association(
1294
+ requester=requester,
1295
+ room_id=room_id,
1296
+ room_alias=room_alias,
1297
+ servers=[self.hs.hostname],
1298
+ check_membership=False,
1299
+ )
1300
+
1301
+ raw_initial_state = config.get("initial_state", [])
1302
+
1303
+ initial_state = OrderedDict()
1304
+ for val in raw_initial_state:
1305
+ initial_state[(val["type"], val.get("state_key", ""))] = val["content"]
1306
+
1307
+ (
1308
+ last_stream_id,
1309
+ last_sent_event_id,
1310
+ depth,
1311
+ ) = await self._send_events_for_new_room(
1312
+ requester,
1313
+ room_id,
1314
+ room_version,
1315
+ room_config=config,
1316
+ invite_list=invite_list,
1317
+ initial_state=initial_state,
1318
+ creation_content=creation_content,
1319
+ room_alias=room_alias,
1320
+ power_level_content_override=power_level_content_override,
1321
+ creator_join_profile=creator_join_profile,
1322
+ ignore_forced_encryption=ignore_forced_encryption,
1323
+ creation_event_with_context=creation_event_with_context,
1324
+ )
1325
+
1326
+ # we avoid dropping the lock between invites, as otherwise joins can
1327
+ # start coming in and making the createRoom slow.
1328
+ #
1329
+ # we also don't need to check the requester's shadow-ban here, as we
1330
+ # have already done so above (and potentially emptied invite_list).
1331
+ async with self.room_member_handler.member_linearizer.queue((room_id,)):
1332
+ content = {}
1333
+ is_direct = config.get("is_direct", None)
1334
+ if is_direct:
1335
+ content["is_direct"] = is_direct
1336
+
1337
+ for invitee in invite_list:
1338
+ (
1339
+ member_event_id,
1340
+ last_stream_id,
1341
+ ) = await self.room_member_handler.update_membership_locked(
1342
+ requester,
1343
+ UserID.from_string(invitee),
1344
+ room_id,
1345
+ "invite",
1346
+ ratelimit=False,
1347
+ content=content,
1348
+ new_room=True,
1349
+ prev_event_ids=[last_sent_event_id],
1350
+ depth=depth,
1351
+ )
1352
+ last_sent_event_id = member_event_id
1353
+ depth += 1
1354
+
1355
+ for invite_3pid in invite_3pid_list:
1356
+ id_server = invite_3pid["id_server"]
1357
+ id_access_token = invite_3pid["id_access_token"]
1358
+ address = invite_3pid["address"]
1359
+ medium = invite_3pid["medium"]
1360
+ # Note that do_3pid_invite can raise a ShadowBanError, but this was
1361
+ # handled above by emptying invite_3pid_list.
1362
+ (
1363
+ member_event_id,
1364
+ last_stream_id,
1365
+ ) = await self.hs.get_room_member_handler().do_3pid_invite(
1366
+ room_id,
1367
+ requester.user,
1368
+ medium,
1369
+ address,
1370
+ id_server,
1371
+ requester,
1372
+ txn_id=None,
1373
+ id_access_token=id_access_token,
1374
+ prev_event_ids=[last_sent_event_id],
1375
+ depth=depth,
1376
+ )
1377
+ last_sent_event_id = member_event_id
1378
+ depth += 1
1379
+
1380
+ # Always wait for room creation to propagate before returning
1381
+ await self._replication.wait_for_stream_position(
1382
+ self.hs.config.worker.events_shard_config.get_instance(room_id),
1383
+ "events",
1384
+ last_stream_id,
1385
+ )
1386
+
1387
+ return room_id, room_alias, last_stream_id
1388
+
1389
+ async def _generate_create_event_for_room_id(
1390
+ self,
1391
+ creator: Requester,
1392
+ creation_content: JsonDict,
1393
+ is_public: bool,
1394
+ room_version: RoomVersion,
1395
+ ) -> tuple[EventBase, synapse.events.snapshot.EventContext]:
1396
+ (
1397
+ creation_event,
1398
+ new_unpersisted_context,
1399
+ ) = await self.event_creation_handler.create_event(
1400
+ creator,
1401
+ {
1402
+ "content": creation_content,
1403
+ "sender": creator.user.to_string(),
1404
+ "type": EventTypes.Create,
1405
+ "state_key": "",
1406
+ },
1407
+ prev_event_ids=[],
1408
+ depth=1,
1409
+ state_map={},
1410
+ for_batch=False,
1411
+ )
1412
+ await self.store.store_room(
1413
+ room_id=creation_event.room_id,
1414
+ room_creator_user_id=creator.user.to_string(),
1415
+ is_public=is_public,
1416
+ room_version=room_version,
1417
+ )
1418
+ creation_context = await new_unpersisted_context.persist(creation_event)
1419
+ return (creation_event, creation_context)
1420
+
1421
+ async def _send_events_for_new_room(
1422
+ self,
1423
+ creator: Requester,
1424
+ room_id: str,
1425
+ room_version: RoomVersion,
1426
+ room_config: JsonDict,
1427
+ invite_list: list[str],
1428
+ initial_state: MutableStateMap,
1429
+ creation_content: JsonDict,
1430
+ room_alias: RoomAlias | None = None,
1431
+ power_level_content_override: JsonDict | None = None,
1432
+ creator_join_profile: JsonDict | None = None,
1433
+ ignore_forced_encryption: bool = False,
1434
+ creation_event_with_context: tuple[
1435
+ EventBase, synapse.events.snapshot.EventContext
1436
+ ]
1437
+ | None = None,
1438
+ ) -> tuple[int, str, int]:
1439
+ """Sends the initial events into a new room. Sends the room creation, membership,
1440
+ and power level events into the room sequentially, then creates and batches up the
1441
+ rest of the events to persist as a batch to the DB.
1442
+
1443
+ `power_level_content_override` doesn't apply when initial state has
1444
+ power level state event content.
1445
+
1446
+ Rate limiting should already have been applied by this point.
1447
+
1448
+ Args:
1449
+ creator:
1450
+ the user requesting the room creation
1451
+ room_id:
1452
+ room id for the room being created
1453
+ room_version:
1454
+ The room version of the new room.
1455
+ room_config:
1456
+ A dict of configuration options. This will be the body of
1457
+ a /createRoom request; see
1458
+ https://spec.matrix.org/latest/client-server-api/#post_matrixclientv3createroom
1459
+ invite_list:
1460
+ a list of user ids to invite to the room
1461
+ initial_state:
1462
+ A list of state events to set in the new room.
1463
+ creation_content:
1464
+ Extra keys, such as m.federate, to be added to the content of the m.room.create event.
1465
+ room_alias:
1466
+ alias for the room
1467
+ power_level_content_override:
1468
+ The power level content to override in the default power level event.
1469
+ creator_join_profile:
1470
+ Set to override the displayname and avatar for the creating
1471
+ user in this room.
1472
+ ignore_forced_encryption:
1473
+ Ignore encryption forced by `encryption_enabled_by_default_for_room_type` setting.
1474
+ creation_event_with_context:
1475
+ Set in MSC4291 rooms where the create event determines the room ID. If provided,
1476
+ does not create an additional create event but instead appends the remaining new
1477
+ events onto the provided create event.
1478
+ Returns:
1479
+ A tuple containing the stream ID, event ID and depth of the last
1480
+ event sent to the room.
1481
+ """
1482
+ creator_id = creator.user.to_string()
1483
+ event_keys = {"room_id": room_id, "sender": creator_id, "state_key": ""}
1484
+ depth = 1
1485
+
1486
+ # the most recently created event
1487
+ prev_event: list[str] = []
1488
+ # a map of event types, state keys -> event_ids. We collect these mappings this as events are
1489
+ # created (but not persisted to the db) to determine state for future created events
1490
+ # (as this info can't be pulled from the db)
1491
+ state_map: MutableStateMap[str] = {}
1492
+
1493
+ async def create_event(
1494
+ etype: str,
1495
+ content: JsonDict,
1496
+ for_batch: bool,
1497
+ **kwargs: Any,
1498
+ ) -> tuple[EventBase, synapse.events.snapshot.UnpersistedEventContextBase]:
1499
+ """
1500
+ Creates an event and associated event context.
1501
+ Args:
1502
+ etype: the type of event to be created
1503
+ content: content of the event
1504
+ for_batch: whether the event is being created for batch persisting. If
1505
+ bool for_batch is true, this will create an event using the prev_event_ids,
1506
+ and will create an event context for the event using the parameters state_map
1507
+ and current_state_group, thus these parameters must be provided in this
1508
+ case if for_batch is True. The subsequently created event and context
1509
+ are suitable for being batched up and bulk persisted to the database
1510
+ with other similarly created events.
1511
+ """
1512
+ nonlocal depth
1513
+ nonlocal prev_event
1514
+
1515
+ # Create the event dictionary.
1516
+ event_dict = {"type": etype, "content": content}
1517
+ event_dict.update(event_keys)
1518
+ event_dict.update(kwargs)
1519
+
1520
+ (
1521
+ new_event,
1522
+ new_unpersisted_context,
1523
+ ) = await self.event_creation_handler.create_event(
1524
+ creator,
1525
+ event_dict,
1526
+ prev_event_ids=prev_event,
1527
+ depth=depth,
1528
+ # Take a copy to ensure each event gets a unique copy of
1529
+ # state_map since it is modified below.
1530
+ state_map=dict(state_map),
1531
+ for_batch=for_batch,
1532
+ )
1533
+
1534
+ depth += 1
1535
+ prev_event = [new_event.event_id]
1536
+ state_map[(new_event.type, new_event.state_key)] = new_event.event_id
1537
+
1538
+ return new_event, new_unpersisted_context
1539
+
1540
+ preset_config, config = self._room_preset_config(room_config)
1541
+
1542
+ if creation_event_with_context is None:
1543
+ # MSC2175 removes the creator field from the create event.
1544
+ if not room_version.implicit_room_creator:
1545
+ creation_content["creator"] = creator_id
1546
+ creation_event, unpersisted_creation_context = await create_event(
1547
+ EventTypes.Create, creation_content, False
1548
+ )
1549
+ creation_context = await unpersisted_creation_context.persist(
1550
+ creation_event
1551
+ )
1552
+ else:
1553
+ (creation_event, creation_context) = creation_event_with_context
1554
+ # we had to do the above already in order to have a room ID, so just updates local vars
1555
+ # and continue.
1556
+ depth = 2
1557
+ prev_event = [creation_event.event_id]
1558
+ state_map[(creation_event.type, creation_event.state_key)] = (
1559
+ creation_event.event_id
1560
+ )
1561
+
1562
+ logger.debug("Sending %s in new room", EventTypes.Member)
1563
+ ev = await self.event_creation_handler.handle_new_client_event(
1564
+ requester=creator,
1565
+ events_and_context=[(creation_event, creation_context)],
1566
+ ratelimit=False,
1567
+ ignore_shadow_ban=True,
1568
+ )
1569
+ last_sent_event_id = ev.event_id
1570
+
1571
+ member_event_id, _ = await self.room_member_handler.update_membership(
1572
+ creator,
1573
+ creator.user,
1574
+ room_id,
1575
+ "join",
1576
+ ratelimit=False,
1577
+ content=creator_join_profile,
1578
+ new_room=True,
1579
+ prev_event_ids=[last_sent_event_id],
1580
+ depth=depth,
1581
+ )
1582
+ prev_event = [member_event_id]
1583
+
1584
+ # update the depth and state map here as the membership event has been created
1585
+ # through a different code path
1586
+ depth += 1
1587
+ state_map[(EventTypes.Member, creator.user.to_string())] = member_event_id
1588
+
1589
+ # we need the state group of the membership event as it is the current state group
1590
+ event_to_state = (
1591
+ await self._storage_controllers.state.get_state_group_for_events(
1592
+ [member_event_id]
1593
+ )
1594
+ )
1595
+ current_state_group = event_to_state[member_event_id]
1596
+
1597
+ events_to_send = []
1598
+ # We treat the power levels override specially as this needs to be one
1599
+ # of the first events that get sent into a room.
1600
+ pl_content = initial_state.pop((EventTypes.PowerLevels, ""), None)
1601
+ if pl_content is not None:
1602
+ power_event, power_context = await create_event(
1603
+ EventTypes.PowerLevels, pl_content, True
1604
+ )
1605
+ events_to_send.append((power_event, power_context))
1606
+ else:
1607
+ # Please update the docs for `default_power_level_content_override` when
1608
+ # updating the `events` dict below
1609
+ power_level_content: JsonDict = {
1610
+ "users": {creator_id: 100}
1611
+ if not room_version.msc4289_creator_power_enabled
1612
+ else {},
1613
+ "users_default": 0,
1614
+ "events": {
1615
+ EventTypes.Name: 50,
1616
+ EventTypes.PowerLevels: 100,
1617
+ EventTypes.RoomHistoryVisibility: 100,
1618
+ EventTypes.CanonicalAlias: 50,
1619
+ EventTypes.RoomAvatar: 50,
1620
+ EventTypes.Tombstone: 150
1621
+ if room_version.msc4289_creator_power_enabled
1622
+ else 100,
1623
+ EventTypes.ServerACL: 100,
1624
+ EventTypes.RoomEncryption: 100,
1625
+ },
1626
+ "events_default": 0,
1627
+ "state_default": 50,
1628
+ "ban": 50,
1629
+ "kick": 50,
1630
+ "redact": 50,
1631
+ "invite": 50,
1632
+ "historical": 100,
1633
+ }
1634
+
1635
+ # original_invitees_have_ops is set on preset:trusted_private_chat which will already
1636
+ # have set these users as additional_creators, hence don't set the PL for creators as
1637
+ # that is invalid.
1638
+ if (
1639
+ config["original_invitees_have_ops"]
1640
+ and not room_version.msc4289_creator_power_enabled
1641
+ ):
1642
+ for invitee in invite_list:
1643
+ power_level_content["users"][invitee] = 100
1644
+
1645
+ # If the user supplied a preset name e.g. "private_chat",
1646
+ # we apply that preset
1647
+ power_level_content.update(config["power_level_content_override"])
1648
+
1649
+ # If the server config contains default_power_level_content_override,
1650
+ # and that contains information for this room preset, apply it.
1651
+ if self._default_power_level_content_override:
1652
+ override = self._default_power_level_content_override.get(preset_config)
1653
+ if override is not None:
1654
+ power_level_content.update(override)
1655
+
1656
+ # Finally, if the user supplied specific permissions for this room,
1657
+ # apply those.
1658
+ if power_level_content_override:
1659
+ power_level_content.update(power_level_content_override)
1660
+ pl_event, pl_context = await create_event(
1661
+ EventTypes.PowerLevels,
1662
+ power_level_content,
1663
+ True,
1664
+ )
1665
+ events_to_send.append((pl_event, pl_context))
1666
+
1667
+ if room_alias and (EventTypes.CanonicalAlias, "") not in initial_state:
1668
+ room_alias_event, room_alias_context = await create_event(
1669
+ EventTypes.CanonicalAlias, {"alias": room_alias.to_string()}, True
1670
+ )
1671
+ events_to_send.append((room_alias_event, room_alias_context))
1672
+
1673
+ if (EventTypes.JoinRules, "") not in initial_state:
1674
+ join_rules_event, join_rules_context = await create_event(
1675
+ EventTypes.JoinRules,
1676
+ {"join_rule": config["join_rules"]},
1677
+ True,
1678
+ )
1679
+ events_to_send.append((join_rules_event, join_rules_context))
1680
+
1681
+ if (EventTypes.RoomHistoryVisibility, "") not in initial_state:
1682
+ visibility_event, visibility_context = await create_event(
1683
+ EventTypes.RoomHistoryVisibility,
1684
+ {"history_visibility": config["history_visibility"]},
1685
+ True,
1686
+ )
1687
+ events_to_send.append((visibility_event, visibility_context))
1688
+
1689
+ if config["guest_can_join"]:
1690
+ if (EventTypes.GuestAccess, "") not in initial_state:
1691
+ guest_access_event, guest_access_context = await create_event(
1692
+ EventTypes.GuestAccess,
1693
+ {EventContentFields.GUEST_ACCESS: GuestAccess.CAN_JOIN},
1694
+ True,
1695
+ )
1696
+ events_to_send.append((guest_access_event, guest_access_context))
1697
+
1698
+ for (etype, state_key), content in initial_state.items():
1699
+ event, context = await create_event(
1700
+ etype, content, True, state_key=state_key
1701
+ )
1702
+ events_to_send.append((event, context))
1703
+
1704
+ if config["encrypted"] and not ignore_forced_encryption:
1705
+ encryption_event, encryption_context = await create_event(
1706
+ EventTypes.RoomEncryption,
1707
+ {"algorithm": RoomEncryptionAlgorithms.DEFAULT},
1708
+ True,
1709
+ state_key="",
1710
+ )
1711
+ events_to_send.append((encryption_event, encryption_context))
1712
+
1713
+ if "name" in room_config:
1714
+ name = room_config["name"]
1715
+ name_event, name_context = await create_event(
1716
+ EventTypes.Name,
1717
+ {"name": name},
1718
+ True,
1719
+ )
1720
+ events_to_send.append((name_event, name_context))
1721
+
1722
+ if "topic" in room_config:
1723
+ topic = room_config["topic"]
1724
+ topic_event, topic_context = await create_event(
1725
+ EventTypes.Topic,
1726
+ {
1727
+ EventContentFields.TOPIC: topic,
1728
+ EventContentFields.M_TOPIC: {
1729
+ # The mimetype property defaults to `text/plain` if omitted.
1730
+ EventContentFields.M_TEXT: [{MTextFields.BODY: topic}]
1731
+ },
1732
+ },
1733
+ True,
1734
+ )
1735
+ events_to_send.append((topic_event, topic_context))
1736
+
1737
+ datastore = self.hs.get_datastores().state
1738
+ events_and_context = (
1739
+ await UnpersistedEventContext.batch_persist_unpersisted_contexts(
1740
+ events_to_send, room_id, current_state_group, datastore
1741
+ )
1742
+ )
1743
+
1744
+ last_event = await self.event_creation_handler.handle_new_client_event(
1745
+ creator,
1746
+ events_and_context,
1747
+ ignore_shadow_ban=True,
1748
+ ratelimit=False,
1749
+ )
1750
+ assert last_event.internal_metadata.stream_ordering is not None
1751
+ return last_event.internal_metadata.stream_ordering, last_event.event_id, depth
1752
+
1753
+ def _validate_room_config(
1754
+ self,
1755
+ config: JsonDict,
1756
+ visibility: str,
1757
+ ) -> None:
1758
+ """Checks configuration parameters for a /createRoom request.
1759
+
1760
+ If validation detects invalid parameters an exception may be raised to
1761
+ cause room creation to be aborted and an error response to be returned
1762
+ to the client.
1763
+
1764
+ Args:
1765
+ config: A dict of configuration options. Originally from the body of
1766
+ the /createRoom request
1767
+ visibility: One of "public" or "private"
1768
+ """
1769
+
1770
+ # Validate the requested preset, raise a 400 error if not valid
1771
+ preset_name, preset_config = self._room_preset_config(config)
1772
+
1773
+ # If the user is trying to create an encrypted room and this is forbidden
1774
+ # by the configured default_power_level_content_override, then reject the
1775
+ # request before the room is created.
1776
+ raw_initial_state = config.get("initial_state", [])
1777
+ room_encryption_event = any(
1778
+ s.get("type", "") == EventTypes.RoomEncryption for s in raw_initial_state
1779
+ )
1780
+
1781
+ if preset_config["encrypted"] or room_encryption_event:
1782
+ if self._default_power_level_content_override:
1783
+ override = self._default_power_level_content_override.get(preset_name)
1784
+ if override is not None:
1785
+ event_levels = override.get("events", {})
1786
+ room_admin_level = event_levels.get(EventTypes.PowerLevels, 100)
1787
+ encryption_level = event_levels.get(EventTypes.RoomEncryption, 100)
1788
+ if encryption_level > room_admin_level:
1789
+ raise SynapseError(
1790
+ 403,
1791
+ f"You cannot create an encrypted room. user_level ({room_admin_level}) < send_level ({encryption_level})",
1792
+ )
1793
+
1794
+ def _room_preset_config(self, room_config: JsonDict) -> tuple[str, dict]:
1795
+ # The spec says rooms should default to private visibility if
1796
+ # `visibility` is not specified.
1797
+ visibility = room_config.get("visibility", "private")
1798
+ preset_name = room_config.get(
1799
+ "preset",
1800
+ (
1801
+ RoomCreationPreset.PRIVATE_CHAT
1802
+ if visibility == "private"
1803
+ else RoomCreationPreset.PUBLIC_CHAT
1804
+ ),
1805
+ )
1806
+ try:
1807
+ preset_config = self._presets_dict[preset_name]
1808
+ except KeyError:
1809
+ raise SynapseError(
1810
+ 400, f"'{preset_name}' is not a valid preset", errcode=Codes.BAD_JSON
1811
+ )
1812
+ return preset_name, preset_config
1813
+
1814
+ def _remove_creators_from_pl_users_map(
1815
+ self,
1816
+ users_map: dict[str, int],
1817
+ creator: str,
1818
+ additional_creators: list[str] | None,
1819
+ ) -> None:
1820
+ creators = [creator]
1821
+ if additional_creators:
1822
+ creators.extend(additional_creators)
1823
+ for creator in creators:
1824
+ # the creator(s) cannot be in the users map
1825
+ users_map.pop(creator, None)
1826
+
1827
+ def _generate_room_id(self) -> str:
1828
+ """Generates a random room ID.
1829
+
1830
+ Room IDs look like "!opaque_id:domain" and are case-sensitive as per the spec
1831
+ at https://spec.matrix.org/v1.2/appendices/#room-ids-and-event-ids.
1832
+
1833
+ Does not check for collisions with existing rooms or prevent future calls from
1834
+ returning the same room ID. To ensure the uniqueness of a new room ID, use
1835
+ `_generate_and_create_room_id` instead.
1836
+
1837
+ Synapse's room IDs are 18 [a-zA-Z] characters long, which comes out to around
1838
+ 102 bits.
1839
+
1840
+ Returns:
1841
+ A random room ID of the form "!opaque_id:domain".
1842
+ """
1843
+ random_string = stringutils.random_string(18)
1844
+ return RoomIdWithDomain(random_string, self.hs.hostname).to_string()
1845
+
1846
+ async def _generate_and_create_room_id(
1847
+ self,
1848
+ creator_id: str,
1849
+ is_public: bool,
1850
+ room_version: RoomVersion,
1851
+ ) -> str:
1852
+ # autogen room IDs and try to create it. We may clash, so just
1853
+ # try a few times till one goes through, giving up eventually.
1854
+ attempts = 0
1855
+ while attempts < 5:
1856
+ try:
1857
+ gen_room_id = self._generate_room_id()
1858
+ await self.store.store_room(
1859
+ room_id=gen_room_id,
1860
+ room_creator_user_id=creator_id,
1861
+ is_public=is_public,
1862
+ room_version=room_version,
1863
+ )
1864
+ return gen_room_id
1865
+ except StoreError:
1866
+ attempts += 1
1867
+ raise StoreError(500, "Couldn't generate a room ID.")
1868
+
1869
+
1870
+ class RoomContextHandler:
1871
+ def __init__(self, hs: "HomeServer"):
1872
+ self.hs = hs
1873
+ self.auth = hs.get_auth()
1874
+ self.store = hs.get_datastores().main
1875
+ self._storage_controllers = hs.get_storage_controllers()
1876
+ self._state_storage_controller = self._storage_controllers.state
1877
+ self._relations_handler = hs.get_relations_handler()
1878
+
1879
+ async def get_event_context(
1880
+ self,
1881
+ requester: Requester,
1882
+ room_id: str,
1883
+ event_id: str,
1884
+ limit: int,
1885
+ event_filter: Filter | None,
1886
+ use_admin_priviledge: bool = False,
1887
+ ) -> EventContext | None:
1888
+ """Retrieves events, pagination tokens and state around a given event
1889
+ in a room.
1890
+
1891
+ Args:
1892
+ requester
1893
+ room_id
1894
+ event_id
1895
+ limit: The maximum number of events to return in total
1896
+ (excluding state).
1897
+ event_filter: the filter to apply to the events returned
1898
+ (excluding the target event_id)
1899
+ use_admin_priviledge: if `True`, return all events, regardless
1900
+ of whether `user` has access to them. To be used **ONLY**
1901
+ from the admin API.
1902
+ Returns:
1903
+ dict, or None if the event isn't found
1904
+ """
1905
+ user = requester.user
1906
+ if use_admin_priviledge:
1907
+ await assert_user_is_admin(self.auth, requester)
1908
+
1909
+ before_limit = math.floor(limit / 2.0)
1910
+ after_limit = limit - before_limit
1911
+
1912
+ is_user_in_room = await self.store.check_local_user_in_room(
1913
+ user_id=user.to_string(), room_id=room_id
1914
+ )
1915
+ # The user is peeking if they aren't in the room already
1916
+ is_peeking = not is_user_in_room
1917
+
1918
+ async def filter_evts(events: list[EventBase]) -> list[EventBase]:
1919
+ if use_admin_priviledge:
1920
+ return events
1921
+ return await filter_events_for_client(
1922
+ self._storage_controllers,
1923
+ user.to_string(),
1924
+ events,
1925
+ is_peeking=is_peeking,
1926
+ )
1927
+
1928
+ event = await self.store.get_event(
1929
+ event_id, get_prev_content=True, allow_none=True
1930
+ )
1931
+ if not event:
1932
+ return None
1933
+
1934
+ filtered = await filter_evts([event])
1935
+ if not filtered:
1936
+ raise AuthError(403, "You don't have permission to access that event.")
1937
+
1938
+ results = await self.store.get_events_around(
1939
+ room_id, event_id, before_limit, after_limit, event_filter
1940
+ )
1941
+ events_before = results.events_before
1942
+ events_after = results.events_after
1943
+
1944
+ if event_filter:
1945
+ events_before = await event_filter.filter(events_before)
1946
+ events_after = await event_filter.filter(events_after)
1947
+
1948
+ events_before = await filter_evts(events_before)
1949
+ events_after = await filter_evts(events_after)
1950
+ # filter_evts can return a pruned event in case the user is allowed to see that
1951
+ # there's something there but not see the content, so use the event that's in
1952
+ # `filtered` rather than the event we retrieved from the datastore.
1953
+ event = filtered[0]
1954
+
1955
+ # Fetch the aggregations.
1956
+ aggregations = await self._relations_handler.get_bundled_aggregations(
1957
+ itertools.chain(events_before, (event,), events_after),
1958
+ user.to_string(),
1959
+ )
1960
+
1961
+ if events_after:
1962
+ last_event_id = events_after[-1].event_id
1963
+ else:
1964
+ last_event_id = event_id
1965
+
1966
+ if event_filter and event_filter.lazy_load_members:
1967
+ state_filter = StateFilter.from_lazy_load_member_list(
1968
+ ev.sender
1969
+ for ev in itertools.chain(
1970
+ events_before,
1971
+ (event,),
1972
+ events_after,
1973
+ )
1974
+ )
1975
+ else:
1976
+ state_filter = StateFilter.all()
1977
+
1978
+ # XXX: why do we return the state as of the last event rather than the
1979
+ # first? Shouldn't we be consistent with /sync?
1980
+ # https://github.com/matrix-org/matrix-doc/issues/687
1981
+
1982
+ state = await self._state_storage_controller.get_state_for_events(
1983
+ [last_event_id], state_filter=state_filter
1984
+ )
1985
+
1986
+ state_events = list(state[last_event_id].values())
1987
+ if event_filter:
1988
+ state_events = await event_filter.filter(state_events)
1989
+
1990
+ # We use a dummy token here as we only care about the room portion of
1991
+ # the token, which we replace.
1992
+ token = StreamToken.START
1993
+
1994
+ return EventContext(
1995
+ events_before=events_before,
1996
+ event=event,
1997
+ events_after=events_after,
1998
+ state=state_events,
1999
+ aggregations=aggregations,
2000
+ start=await token.copy_and_replace(
2001
+ StreamKeyType.ROOM, results.start
2002
+ ).to_string(self.store),
2003
+ end=await token.copy_and_replace(StreamKeyType.ROOM, results.end).to_string(
2004
+ self.store
2005
+ ),
2006
+ )
2007
+
2008
+
2009
+ class TimestampLookupHandler:
2010
+ def __init__(self, hs: "HomeServer"):
2011
+ self.store = hs.get_datastores().main
2012
+ self.state_handler = hs.get_state_handler()
2013
+ self.federation_client = hs.get_federation_client()
2014
+ self.federation_event_handler = hs.get_federation_event_handler()
2015
+ self._storage_controllers = hs.get_storage_controllers()
2016
+
2017
+ async def get_event_for_timestamp(
2018
+ self,
2019
+ requester: Requester,
2020
+ room_id: str,
2021
+ timestamp: int,
2022
+ direction: Direction,
2023
+ ) -> tuple[str, int]:
2024
+ """Find the closest event to the given timestamp in the given direction.
2025
+ If we can't find an event locally or the event we have locally is next to a gap,
2026
+ it will ask other federated homeservers for an event.
2027
+
2028
+ Args:
2029
+ requester: The user making the request according to the access token
2030
+ room_id: Room to fetch the event from
2031
+ timestamp: The point in time (inclusive) we should navigate from in
2032
+ the given direction to find the closest event.
2033
+ direction: indicates whether we should navigate forward
2034
+ or backward from the given timestamp to find the closest event.
2035
+
2036
+ Returns:
2037
+ A tuple containing the `event_id` closest to the given timestamp in
2038
+ the given direction and the `origin_server_ts`.
2039
+
2040
+ Raises:
2041
+ SynapseError if unable to find any event locally in the given direction
2042
+ """
2043
+ logger.debug(
2044
+ "get_event_for_timestamp(room_id=%s, timestamp=%s, direction=%s) Finding closest event...",
2045
+ room_id,
2046
+ timestamp,
2047
+ direction,
2048
+ )
2049
+ local_event_id = await self.store.get_event_id_for_timestamp(
2050
+ room_id, timestamp, direction
2051
+ )
2052
+ logger.debug(
2053
+ "get_event_for_timestamp: locally, we found event_id=%s closest to timestamp=%s",
2054
+ local_event_id,
2055
+ timestamp,
2056
+ )
2057
+
2058
+ # Check for gaps in the history where events could be hiding in between
2059
+ # the timestamp given and the event we were able to find locally
2060
+ is_event_next_to_backward_gap = False
2061
+ is_event_next_to_forward_gap = False
2062
+ local_event = None
2063
+ if local_event_id:
2064
+ local_event = await self.store.get_event(
2065
+ local_event_id, allow_none=False, allow_rejected=False
2066
+ )
2067
+
2068
+ if direction == Direction.FORWARDS:
2069
+ # We only need to check for a backward gap if we're looking forwards
2070
+ # to ensure there is nothing in between.
2071
+ is_event_next_to_backward_gap = (
2072
+ await self.store.is_event_next_to_backward_gap(local_event)
2073
+ )
2074
+ elif direction == Direction.BACKWARDS:
2075
+ # We only need to check for a forward gap if we're looking backwards
2076
+ # to ensure there is nothing in between
2077
+ is_event_next_to_forward_gap = (
2078
+ await self.store.is_event_next_to_forward_gap(local_event)
2079
+ )
2080
+
2081
+ # If we found a gap, we should probably ask another homeserver first
2082
+ # about more history in between
2083
+ if (
2084
+ not local_event_id
2085
+ or is_event_next_to_backward_gap
2086
+ or is_event_next_to_forward_gap
2087
+ ):
2088
+ logger.debug(
2089
+ "get_event_for_timestamp: locally, we found event_id=%s closest to timestamp=%s which is next to a gap in event history so we're asking other homeservers first",
2090
+ local_event_id,
2091
+ timestamp,
2092
+ )
2093
+
2094
+ likely_domains = (
2095
+ await self._storage_controllers.state.get_current_hosts_in_room_ordered(
2096
+ room_id
2097
+ )
2098
+ )
2099
+
2100
+ remote_response = await self.federation_client.timestamp_to_event(
2101
+ destinations=likely_domains,
2102
+ room_id=room_id,
2103
+ timestamp=timestamp,
2104
+ direction=direction,
2105
+ )
2106
+ if remote_response is not None:
2107
+ logger.debug(
2108
+ "get_event_for_timestamp: remote_response=%s",
2109
+ remote_response,
2110
+ )
2111
+
2112
+ remote_event_id = remote_response.event_id
2113
+ remote_origin_server_ts = remote_response.origin_server_ts
2114
+
2115
+ # Backfill this event so we can get a pagination token for
2116
+ # it with `/context` and paginate `/messages` from this
2117
+ # point.
2118
+ pulled_pdu_info = await self.federation_event_handler.backfill_event_id(
2119
+ likely_domains, room_id, remote_event_id
2120
+ )
2121
+ remote_event = pulled_pdu_info.pdu
2122
+
2123
+ # XXX: When we see that the remote server is not trustworthy,
2124
+ # maybe we should not ask them first in the future.
2125
+ if remote_origin_server_ts != remote_event.origin_server_ts:
2126
+ logger.info(
2127
+ "get_event_for_timestamp: Remote server (%s) claimed that remote_event_id=%s occured at remote_origin_server_ts=%s but that isn't true (actually occured at %s). Their claims are dubious and we should consider not trusting them.",
2128
+ pulled_pdu_info.pull_origin,
2129
+ remote_event_id,
2130
+ remote_origin_server_ts,
2131
+ remote_event.origin_server_ts,
2132
+ )
2133
+
2134
+ # Only return the remote event if it's closer than the local event
2135
+ if not local_event or (
2136
+ abs(remote_event.origin_server_ts - timestamp)
2137
+ < abs(local_event.origin_server_ts - timestamp)
2138
+ ):
2139
+ logger.info(
2140
+ "get_event_for_timestamp: returning remote_event_id=%s (%s) since it's closer to timestamp=%s than local_event=%s (%s)",
2141
+ remote_event_id,
2142
+ remote_event.origin_server_ts,
2143
+ timestamp,
2144
+ local_event.event_id if local_event else None,
2145
+ local_event.origin_server_ts if local_event else None,
2146
+ )
2147
+ return remote_event_id, remote_origin_server_ts
2148
+
2149
+ # To appease mypy, we have to add both of these conditions to check for
2150
+ # `None`. We only expect `local_event` to be `None` when
2151
+ # `local_event_id` is `None` but mypy isn't as smart and assuming as us.
2152
+ if not local_event_id or not local_event:
2153
+ raise SynapseError(
2154
+ 404,
2155
+ "Unable to find event from %s in direction %s" % (timestamp, direction),
2156
+ errcode=Codes.NOT_FOUND,
2157
+ )
2158
+
2159
+ return local_event_id, local_event.origin_server_ts
2160
+
2161
+
2162
+ class RoomEventSource(EventSource[RoomStreamToken, EventBase]):
2163
+ def __init__(self, hs: "HomeServer"):
2164
+ self.store = hs.get_datastores().main
2165
+
2166
+ async def get_new_events(
2167
+ self,
2168
+ user: UserID,
2169
+ from_key: RoomStreamToken,
2170
+ limit: int,
2171
+ room_ids: StrCollection,
2172
+ is_guest: bool,
2173
+ explicit_room_id: str | None = None,
2174
+ ) -> tuple[list[EventBase], RoomStreamToken]:
2175
+ # We just ignore the key for now.
2176
+
2177
+ to_key = self.get_current_key()
2178
+
2179
+ if from_key.topological:
2180
+ logger.warning("Stream has topological part!!!! %r", from_key)
2181
+ from_key = RoomStreamToken(stream=from_key.stream)
2182
+
2183
+ app_service = self.store.get_app_service_by_user_id(user.to_string())
2184
+ if app_service:
2185
+ # We no longer support AS users using /sync directly.
2186
+ # See https://github.com/matrix-org/matrix-doc/issues/1144
2187
+ raise NotImplementedError()
2188
+ else:
2189
+ room_events = await self.store.get_membership_changes_for_user(
2190
+ user.to_string(), from_key, to_key
2191
+ )
2192
+
2193
+ room_to_events = await self.store.get_room_events_stream_for_rooms(
2194
+ room_ids=room_ids,
2195
+ from_key=from_key,
2196
+ to_key=to_key,
2197
+ limit=limit or 10,
2198
+ direction=Direction.FORWARDS,
2199
+ )
2200
+
2201
+ events = list(room_events)
2202
+ events.extend(e for evs, _, _ in room_to_events.values() for e in evs)
2203
+
2204
+ # We know stream_ordering must be not None here, as its been
2205
+ # persisted, but mypy doesn't know that
2206
+ events.sort(key=lambda e: cast(int, e.internal_metadata.stream_ordering))
2207
+
2208
+ if limit:
2209
+ events[:] = events[:limit]
2210
+
2211
+ if events:
2212
+ last_event = events[-1]
2213
+ assert last_event.internal_metadata.stream_ordering
2214
+ end_key = RoomStreamToken(
2215
+ stream=last_event.internal_metadata.stream_ordering,
2216
+ )
2217
+ else:
2218
+ end_key = to_key
2219
+
2220
+ return events, end_key
2221
+
2222
+ def get_current_key(self) -> RoomStreamToken:
2223
+ return self.store.get_room_max_token()
2224
+
2225
+ def get_current_key_for_room(self, room_id: str) -> Awaitable[RoomStreamToken]:
2226
+ return self.store.get_current_room_stream_token_for_room_id(room_id)
2227
+
2228
+
2229
+ class RoomShutdownHandler:
2230
+ DEFAULT_MESSAGE = (
2231
+ "Sharing illegal content on this server is not permitted and rooms in"
2232
+ " violation will be blocked."
2233
+ )
2234
+ DEFAULT_ROOM_NAME = "Content Violation Notification"
2235
+
2236
+ def __init__(self, hs: "HomeServer"):
2237
+ self.hs = hs
2238
+ self.room_member_handler = hs.get_room_member_handler()
2239
+ self._room_creation_handler = hs.get_room_creation_handler()
2240
+ self._replication = hs.get_replication_data_handler()
2241
+ self._third_party_rules = hs.get_module_api_callbacks().third_party_event_rules
2242
+ self.event_creation_handler = hs.get_event_creation_handler()
2243
+ self.store = hs.get_datastores().main
2244
+
2245
+ async def shutdown_room(
2246
+ self,
2247
+ room_id: str,
2248
+ params: ShutdownRoomParams,
2249
+ result: ShutdownRoomResponse | None = None,
2250
+ update_result_fct: Callable[[JsonMapping | None], Awaitable[None]]
2251
+ | None = None,
2252
+ ) -> ShutdownRoomResponse | None:
2253
+ """
2254
+ Shuts down a room. Moves all joined local users and room aliases automatically
2255
+ to a new room if `new_room_user_id` is set. Otherwise local users only
2256
+ leave the room without any information.
2257
+
2258
+ The new room will be created with the user specified by the
2259
+ `new_room_user_id` parameter as room administrator and will contain a
2260
+ message explaining what happened. Users invited to the new room will
2261
+ have power level `-10` by default, and thus be unable to speak.
2262
+
2263
+ The local server will only have the power to move local user and room
2264
+ aliases to the new room. Users on other servers will be unaffected.
2265
+
2266
+ Args:
2267
+ room_id: The ID of the room to shut down.
2268
+ delete_id: The delete ID identifying this delete request
2269
+ params: parameters for the shutdown, cf `ShutdownRoomParams`
2270
+ result: current status of the shutdown, if it was interrupted
2271
+ update_result_fct: function called when `result` is updated locally
2272
+
2273
+ Returns: a dict matching `ShutdownRoomResponse`.
2274
+ """
2275
+ requester_user_id = params["requester_user_id"]
2276
+ new_room_user_id = params["new_room_user_id"]
2277
+ block = params["block"]
2278
+
2279
+ new_room_name = (
2280
+ params["new_room_name"]
2281
+ if params["new_room_name"]
2282
+ else self.DEFAULT_ROOM_NAME
2283
+ )
2284
+ message = params["message"] if params["message"] else self.DEFAULT_MESSAGE
2285
+
2286
+ if not RoomID.is_valid(room_id):
2287
+ raise SynapseError(400, "%s is not a legal room ID" % (room_id,))
2288
+
2289
+ if not await self._third_party_rules.check_can_shutdown_room(
2290
+ requester_user_id, room_id
2291
+ ):
2292
+ raise SynapseError(
2293
+ 403, "Shutdown of this room is forbidden", Codes.FORBIDDEN
2294
+ )
2295
+
2296
+ result = (
2297
+ result
2298
+ if result
2299
+ else {
2300
+ "kicked_users": [],
2301
+ "failed_to_kick_users": [],
2302
+ "local_aliases": [],
2303
+ "new_room_id": None,
2304
+ }
2305
+ )
2306
+
2307
+ # Action the block first (even if the room doesn't exist yet)
2308
+ if block:
2309
+ if requester_user_id is None:
2310
+ raise ValueError(
2311
+ "shutdown_room: block=True not allowed when requester_user_id is None."
2312
+ )
2313
+ # This will work even if the room is already blocked, but that is
2314
+ # desirable in case the first attempt at blocking the room failed below.
2315
+ await self.store.block_room(room_id, requester_user_id)
2316
+
2317
+ if not await self.store.get_room(room_id):
2318
+ # if we don't know about the room, there is nothing left to do.
2319
+ return result
2320
+
2321
+ new_room_id = result.get("new_room_id")
2322
+ if new_room_user_id is not None and new_room_id is None:
2323
+ if not self.hs.is_mine_id(new_room_user_id):
2324
+ raise SynapseError(
2325
+ 400, "User must be our own: %s" % (new_room_user_id,)
2326
+ )
2327
+
2328
+ room_creator_requester = create_requester(
2329
+ new_room_user_id, authenticated_entity=requester_user_id
2330
+ )
2331
+
2332
+ new_room_id, _, stream_id = await self._room_creation_handler.create_room(
2333
+ room_creator_requester,
2334
+ config={
2335
+ "preset": RoomCreationPreset.PUBLIC_CHAT,
2336
+ "name": new_room_name,
2337
+ "power_level_content_override": {"users_default": -10},
2338
+ },
2339
+ ratelimit=False,
2340
+ )
2341
+
2342
+ result["new_room_id"] = new_room_id
2343
+ if update_result_fct:
2344
+ await update_result_fct(result)
2345
+
2346
+ logger.info(
2347
+ "Shutting down room %r, joining to new room: %r", room_id, new_room_id
2348
+ )
2349
+
2350
+ # We now wait for the create room to come back in via replication so
2351
+ # that we can assume that all the joins/invites have propagated before
2352
+ # we try and auto join below.
2353
+ await self._replication.wait_for_stream_position(
2354
+ self.hs.config.worker.events_shard_config.get_instance(new_room_id),
2355
+ "events",
2356
+ stream_id,
2357
+ )
2358
+ else:
2359
+ logger.info("Shutting down room %r", room_id)
2360
+
2361
+ users = await self.store.get_local_users_related_to_room(room_id)
2362
+ for user_id, membership in users:
2363
+ # If the user is not in the room (or is banned), nothing to do.
2364
+ if membership not in (Membership.JOIN, Membership.INVITE, Membership.KNOCK):
2365
+ continue
2366
+
2367
+ logger.info("Kicking %r from %r...", user_id, room_id)
2368
+
2369
+ try:
2370
+ # Kick users from room
2371
+ target_requester = create_requester(
2372
+ user_id, authenticated_entity=requester_user_id
2373
+ )
2374
+ _, stream_id = await self.room_member_handler.update_membership(
2375
+ requester=target_requester,
2376
+ target=target_requester.user,
2377
+ room_id=room_id,
2378
+ action=Membership.LEAVE,
2379
+ content={},
2380
+ ratelimit=False,
2381
+ require_consent=False,
2382
+ )
2383
+
2384
+ # Wait for leave to come in over replication before trying to forget.
2385
+ await self._replication.wait_for_stream_position(
2386
+ self.hs.config.worker.events_shard_config.get_instance(room_id),
2387
+ "events",
2388
+ stream_id,
2389
+ )
2390
+
2391
+ await self.room_member_handler.forget(
2392
+ target_requester.user, room_id, do_not_schedule_purge=True
2393
+ )
2394
+
2395
+ # Join users to new room
2396
+ if new_room_user_id:
2397
+ if membership == Membership.JOIN:
2398
+ assert new_room_id is not None
2399
+ await self.room_member_handler.update_membership(
2400
+ requester=target_requester,
2401
+ target=target_requester.user,
2402
+ room_id=new_room_id,
2403
+ action=Membership.JOIN,
2404
+ content={},
2405
+ ratelimit=False,
2406
+ require_consent=False,
2407
+ )
2408
+
2409
+ result["kicked_users"].append(user_id)
2410
+ if update_result_fct:
2411
+ await update_result_fct(result)
2412
+ except Exception:
2413
+ logger.exception(
2414
+ "Failed to leave old room and join new room for %r", user_id
2415
+ )
2416
+ result["failed_to_kick_users"].append(user_id)
2417
+ if update_result_fct:
2418
+ await update_result_fct(result)
2419
+
2420
+ # Send message in new room and move aliases
2421
+ if new_room_user_id:
2422
+ room_creator_requester = create_requester(
2423
+ new_room_user_id, authenticated_entity=requester_user_id
2424
+ )
2425
+
2426
+ await self.event_creation_handler.create_and_send_nonmember_event(
2427
+ room_creator_requester,
2428
+ {
2429
+ "type": "m.room.message",
2430
+ "content": {"body": message, "msgtype": "m.text"},
2431
+ "room_id": new_room_id,
2432
+ "sender": new_room_user_id,
2433
+ },
2434
+ ratelimit=False,
2435
+ )
2436
+
2437
+ result["local_aliases"] = list(
2438
+ await self.store.get_aliases_for_room(room_id)
2439
+ )
2440
+
2441
+ assert new_room_id is not None
2442
+ await self.store.update_aliases_for_room(
2443
+ room_id, new_room_id, requester_user_id
2444
+ )
2445
+ else:
2446
+ result["local_aliases"] = []
2447
+
2448
+ return result