matrix-synapse 1.145.0rc2__cp310-abi3-manylinux_2_28_x86_64.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of matrix-synapse might be problematic. Click here for more details.

Files changed (1636) hide show
  1. AUTHORS.rst +51 -0
  2. CHANGES.md +1732 -0
  3. CONTRIBUTING.md +3 -0
  4. Cargo.lock +1923 -0
  5. Cargo.toml +6 -0
  6. INSTALL.md +7 -0
  7. LICENSE-AGPL-3.0 +661 -0
  8. LICENSE-COMMERCIAL +6 -0
  9. UPGRADE.rst +7 -0
  10. book.toml +47 -0
  11. changelog.d/.gitignore +1 -0
  12. demo/.gitignore +4 -0
  13. demo/clean.sh +22 -0
  14. demo/start.sh +173 -0
  15. demo/stop.sh +14 -0
  16. docs/.sample_config_header.yaml +12 -0
  17. docs/CAPTCHA_SETUP.md +37 -0
  18. docs/README.md +86 -0
  19. docs/SUMMARY.md +126 -0
  20. docs/admin_api/README.rst +13 -0
  21. docs/admin_api/account_validity.md +47 -0
  22. docs/admin_api/client_server_api_extensions.md +67 -0
  23. docs/admin_api/event_reports.md +185 -0
  24. docs/admin_api/experimental_features.md +52 -0
  25. docs/admin_api/fetch_event.md +53 -0
  26. docs/admin_api/media_admin_api.md +372 -0
  27. docs/admin_api/purge_history_api.md +77 -0
  28. docs/admin_api/register_api.md +92 -0
  29. docs/admin_api/room_membership.md +35 -0
  30. docs/admin_api/rooms.md +1190 -0
  31. docs/admin_api/scheduled_tasks.md +54 -0
  32. docs/admin_api/server_notices.md +48 -0
  33. docs/admin_api/statistics.md +132 -0
  34. docs/admin_api/user_admin_api.md +1602 -0
  35. docs/admin_api/version_api.md +23 -0
  36. docs/ancient_architecture_notes.md +81 -0
  37. docs/application_services.md +36 -0
  38. docs/architecture.md +65 -0
  39. docs/auth_chain_diff.dot +32 -0
  40. docs/auth_chain_diff.dot.png +0 -0
  41. docs/auth_chain_difference_algorithm.md +141 -0
  42. docs/changelogs/CHANGES-2019.md +1039 -0
  43. docs/changelogs/CHANGES-2020.md +2145 -0
  44. docs/changelogs/CHANGES-2021.md +2573 -0
  45. docs/changelogs/CHANGES-2022.md +2766 -0
  46. docs/changelogs/CHANGES-2023.md +2202 -0
  47. docs/changelogs/CHANGES-2024.md +1586 -0
  48. docs/changelogs/CHANGES-pre-1.0.md +3641 -0
  49. docs/changelogs/README.md +1 -0
  50. docs/code_style.md +119 -0
  51. docs/consent_tracking.md +197 -0
  52. docs/delegate.md +111 -0
  53. docs/deprecation_policy.md +89 -0
  54. docs/development/cas.md +64 -0
  55. docs/development/contributing_guide.md +554 -0
  56. docs/development/database_schema.md +404 -0
  57. docs/development/demo.md +42 -0
  58. docs/development/dependencies.md +326 -0
  59. docs/development/experimental_features.md +37 -0
  60. docs/development/git.md +148 -0
  61. docs/development/img/git/branches.jpg +0 -0
  62. docs/development/img/git/clean.png +0 -0
  63. docs/development/img/git/squash.png +0 -0
  64. docs/development/internal_documentation/README.md +12 -0
  65. docs/development/internal_documentation/release_notes_review_checklist.md +12 -0
  66. docs/development/releases.md +37 -0
  67. docs/development/reviews.md +41 -0
  68. docs/development/room-dag-concepts.md +115 -0
  69. docs/development/saml.md +40 -0
  70. docs/development/synapse_architecture/cancellation.md +392 -0
  71. docs/development/synapse_architecture/faster_joins.md +375 -0
  72. docs/development/synapse_architecture/streams.md +198 -0
  73. docs/element_logo_white_bg.svg +94 -0
  74. docs/favicon.png +0 -0
  75. docs/favicon.svg +58 -0
  76. docs/federate.md +67 -0
  77. docs/jwt.md +105 -0
  78. docs/log_contexts.md +566 -0
  79. docs/manhole.md +101 -0
  80. docs/media_repository.md +78 -0
  81. docs/message_retention_policies.md +207 -0
  82. docs/metrics-howto.md +315 -0
  83. docs/modules/account_data_callbacks.md +106 -0
  84. docs/modules/account_validity_callbacks.md +57 -0
  85. docs/modules/add_extra_fields_to_client_events_unsigned.md +32 -0
  86. docs/modules/background_update_controller_callbacks.md +71 -0
  87. docs/modules/index.md +53 -0
  88. docs/modules/media_repository_callbacks.md +131 -0
  89. docs/modules/password_auth_provider_callbacks.md +270 -0
  90. docs/modules/porting_legacy_module.md +20 -0
  91. docs/modules/presence_router_callbacks.md +112 -0
  92. docs/modules/ratelimit_callbacks.md +43 -0
  93. docs/modules/spam_checker_callbacks.md +517 -0
  94. docs/modules/third_party_rules_callbacks.md +350 -0
  95. docs/modules/writing_a_module.md +141 -0
  96. docs/openid.md +783 -0
  97. docs/opentracing.md +99 -0
  98. docs/other/running_synapse_on_single_board_computers.md +75 -0
  99. docs/password_auth_providers.md +129 -0
  100. docs/postgres.md +269 -0
  101. docs/presence_router_module.md +247 -0
  102. docs/privacy_policy_templates/en/1.0.html +26 -0
  103. docs/privacy_policy_templates/en/success.html +11 -0
  104. docs/replication.md +36 -0
  105. docs/reverse_proxy.md +327 -0
  106. docs/room_and_user_statistics.md +22 -0
  107. docs/sample_config.yaml +47 -0
  108. docs/sample_log_config.yaml +75 -0
  109. docs/server_notices.md +66 -0
  110. docs/setup/forward_proxy.md +89 -0
  111. docs/setup/installation.md +656 -0
  112. docs/setup/security.md +41 -0
  113. docs/setup/turn/coturn.md +197 -0
  114. docs/setup/turn/eturnal.md +170 -0
  115. docs/spam_checker.md +122 -0
  116. docs/sso_mapping_providers.md +208 -0
  117. docs/structured_logging.md +80 -0
  118. docs/synctl_workers.md +36 -0
  119. docs/systemd-with-workers/README.md +101 -0
  120. docs/systemd-with-workers/system/matrix-synapse-worker@.service +26 -0
  121. docs/systemd-with-workers/system/matrix-synapse.service +23 -0
  122. docs/systemd-with-workers/system/matrix-synapse.target +6 -0
  123. docs/systemd-with-workers/workers/background_worker.yaml +4 -0
  124. docs/systemd-with-workers/workers/event_persister.yaml +20 -0
  125. docs/systemd-with-workers/workers/federation_sender.yaml +4 -0
  126. docs/systemd-with-workers/workers/generic_worker.yaml +11 -0
  127. docs/systemd-with-workers/workers/media_worker.yaml +11 -0
  128. docs/systemd-with-workers/workers/pusher_worker.yaml +4 -0
  129. docs/tcp_replication.md +258 -0
  130. docs/templates.md +254 -0
  131. docs/turn-howto.md +168 -0
  132. docs/upgrade.md +2876 -0
  133. docs/usage/administration/README.md +7 -0
  134. docs/usage/administration/admin_api/README.md +47 -0
  135. docs/usage/administration/admin_api/background_updates.md +109 -0
  136. docs/usage/administration/admin_api/federation.md +212 -0
  137. docs/usage/administration/admin_api/registration_tokens.md +298 -0
  138. docs/usage/administration/admin_faq.md +294 -0
  139. docs/usage/administration/backups.md +125 -0
  140. docs/usage/administration/database_maintenance_tools.md +18 -0
  141. docs/usage/administration/monitoring/reporting_homeserver_usage_statistics.md +77 -0
  142. docs/usage/administration/monthly_active_users.md +84 -0
  143. docs/usage/administration/request_log.md +44 -0
  144. docs/usage/administration/state_groups.md +25 -0
  145. docs/usage/administration/understanding_synapse_through_grafana_graphs.md +83 -0
  146. docs/usage/administration/useful_sql_for_admins.md +216 -0
  147. docs/usage/configuration/README.md +4 -0
  148. docs/usage/configuration/config_documentation.md +4768 -0
  149. docs/usage/configuration/homeserver_sample_config.md +17 -0
  150. docs/usage/configuration/logging_sample_config.md +19 -0
  151. docs/usage/configuration/user_authentication/README.md +15 -0
  152. docs/usage/configuration/user_authentication/refresh_tokens.md +139 -0
  153. docs/usage/configuration/user_authentication/single_sign_on/README.md +5 -0
  154. docs/usage/configuration/user_authentication/single_sign_on/cas.md +8 -0
  155. docs/usage/configuration/user_authentication/single_sign_on/saml.md +8 -0
  156. docs/user_directory.md +130 -0
  157. docs/website_files/README.md +35 -0
  158. docs/website_files/indent-section-headers.css +7 -0
  159. docs/website_files/remove-nav-buttons.css +8 -0
  160. docs/website_files/table-of-contents.css +47 -0
  161. docs/website_files/table-of-contents.js +148 -0
  162. docs/website_files/theme/index.hbs +324 -0
  163. docs/website_files/version-picker.css +78 -0
  164. docs/website_files/version-picker.js +147 -0
  165. docs/website_files/version.js +1 -0
  166. docs/welcome_and_overview.md +67 -0
  167. docs/workers.md +897 -0
  168. matrix_synapse-1.145.0rc2.dist-info/METADATA +260 -0
  169. matrix_synapse-1.145.0rc2.dist-info/RECORD +1636 -0
  170. matrix_synapse-1.145.0rc2.dist-info/WHEEL +5 -0
  171. matrix_synapse-1.145.0rc2.dist-info/entry_points.txt +13 -0
  172. matrix_synapse-1.145.0rc2.dist-info/licenses/AUTHORS.rst +51 -0
  173. matrix_synapse-1.145.0rc2.dist-info/licenses/LICENSE-AGPL-3.0 +661 -0
  174. matrix_synapse-1.145.0rc2.dist-info/licenses/LICENSE-COMMERCIAL +6 -0
  175. mypy.ini +115 -0
  176. rust/Cargo.toml +63 -0
  177. rust/build.rs +45 -0
  178. scripts-dev/build_debian_packages.py +228 -0
  179. scripts-dev/check-newsfragment.sh +62 -0
  180. scripts-dev/check_line_terminators.sh +29 -0
  181. scripts-dev/check_locked_deps_have_sdists.py +64 -0
  182. scripts-dev/check_schema_delta.py +240 -0
  183. scripts-dev/complement.sh +332 -0
  184. scripts-dev/config-lint.sh +15 -0
  185. scripts-dev/database-save.sh +15 -0
  186. scripts-dev/docker_update_debian_changelog.sh +70 -0
  187. scripts-dev/dump_macaroon.py +25 -0
  188. scripts-dev/federation_client.py +428 -0
  189. scripts-dev/gen_config_documentation.py +510 -0
  190. scripts-dev/generate_sample_config.sh +28 -0
  191. scripts-dev/lint.sh +141 -0
  192. scripts-dev/make_full_schema.sh +310 -0
  193. scripts-dev/mypy_synapse_plugin.py +918 -0
  194. scripts-dev/next_github_number.sh +9 -0
  195. scripts-dev/release.py +986 -0
  196. scripts-dev/schema_versions.py +182 -0
  197. scripts-dev/sign_json.py +172 -0
  198. synapse/__init__.py +97 -0
  199. synapse/_scripts/__init__.py +0 -0
  200. synapse/_scripts/export_signing_key.py +109 -0
  201. synapse/_scripts/generate_config.py +83 -0
  202. synapse/_scripts/generate_log_config.py +56 -0
  203. synapse/_scripts/generate_signing_key.py +55 -0
  204. synapse/_scripts/generate_workers_map.py +318 -0
  205. synapse/_scripts/hash_password.py +95 -0
  206. synapse/_scripts/move_remote_media_to_new_store.py +128 -0
  207. synapse/_scripts/register_new_matrix_user.py +402 -0
  208. synapse/_scripts/review_recent_signups.py +212 -0
  209. synapse/_scripts/synapse_port_db.py +1604 -0
  210. synapse/_scripts/synctl.py +365 -0
  211. synapse/_scripts/update_synapse_database.py +130 -0
  212. synapse/api/__init__.py +20 -0
  213. synapse/api/auth/__init__.py +207 -0
  214. synapse/api/auth/base.py +406 -0
  215. synapse/api/auth/internal.py +299 -0
  216. synapse/api/auth/mas.py +436 -0
  217. synapse/api/auth/msc3861_delegated.py +617 -0
  218. synapse/api/auth_blocking.py +144 -0
  219. synapse/api/constants.py +379 -0
  220. synapse/api/errors.py +913 -0
  221. synapse/api/filtering.py +537 -0
  222. synapse/api/presence.py +102 -0
  223. synapse/api/ratelimiting.py +481 -0
  224. synapse/api/room_versions.py +535 -0
  225. synapse/api/urls.py +118 -0
  226. synapse/app/__init__.py +62 -0
  227. synapse/app/_base.py +906 -0
  228. synapse/app/admin_cmd.py +388 -0
  229. synapse/app/appservice.py +30 -0
  230. synapse/app/client_reader.py +30 -0
  231. synapse/app/complement_fork_starter.py +206 -0
  232. synapse/app/event_creator.py +29 -0
  233. synapse/app/federation_reader.py +30 -0
  234. synapse/app/federation_sender.py +30 -0
  235. synapse/app/frontend_proxy.py +30 -0
  236. synapse/app/generic_worker.py +475 -0
  237. synapse/app/homeserver.py +505 -0
  238. synapse/app/media_repository.py +30 -0
  239. synapse/app/phone_stats_home.py +292 -0
  240. synapse/app/pusher.py +30 -0
  241. synapse/app/synchrotron.py +30 -0
  242. synapse/app/user_dir.py +31 -0
  243. synapse/appservice/__init__.py +458 -0
  244. synapse/appservice/api.py +567 -0
  245. synapse/appservice/scheduler.py +565 -0
  246. synapse/config/__init__.py +27 -0
  247. synapse/config/__main__.py +62 -0
  248. synapse/config/_base.py +1154 -0
  249. synapse/config/_base.pyi +216 -0
  250. synapse/config/_util.py +99 -0
  251. synapse/config/account_validity.py +116 -0
  252. synapse/config/api.py +141 -0
  253. synapse/config/appservice.py +210 -0
  254. synapse/config/auth.py +80 -0
  255. synapse/config/auto_accept_invites.py +43 -0
  256. synapse/config/background_updates.py +44 -0
  257. synapse/config/cache.py +231 -0
  258. synapse/config/captcha.py +90 -0
  259. synapse/config/cas.py +116 -0
  260. synapse/config/consent.py +73 -0
  261. synapse/config/database.py +184 -0
  262. synapse/config/emailconfig.py +367 -0
  263. synapse/config/experimental.py +601 -0
  264. synapse/config/federation.py +114 -0
  265. synapse/config/homeserver.py +141 -0
  266. synapse/config/jwt.py +55 -0
  267. synapse/config/key.py +447 -0
  268. synapse/config/logger.py +390 -0
  269. synapse/config/mas.py +192 -0
  270. synapse/config/matrixrtc.py +66 -0
  271. synapse/config/metrics.py +93 -0
  272. synapse/config/modules.py +40 -0
  273. synapse/config/oembed.py +185 -0
  274. synapse/config/oidc.py +509 -0
  275. synapse/config/password_auth_providers.py +82 -0
  276. synapse/config/push.py +64 -0
  277. synapse/config/ratelimiting.py +260 -0
  278. synapse/config/redis.py +74 -0
  279. synapse/config/registration.py +296 -0
  280. synapse/config/repository.py +311 -0
  281. synapse/config/retention.py +162 -0
  282. synapse/config/room.py +88 -0
  283. synapse/config/room_directory.py +165 -0
  284. synapse/config/saml2.py +251 -0
  285. synapse/config/server.py +1139 -0
  286. synapse/config/server_notices.py +84 -0
  287. synapse/config/spam_checker.py +66 -0
  288. synapse/config/sso.py +121 -0
  289. synapse/config/stats.py +54 -0
  290. synapse/config/third_party_event_rules.py +40 -0
  291. synapse/config/tls.py +192 -0
  292. synapse/config/tracer.py +71 -0
  293. synapse/config/user_directory.py +47 -0
  294. synapse/config/user_types.py +42 -0
  295. synapse/config/voip.py +59 -0
  296. synapse/config/workers.py +642 -0
  297. synapse/crypto/__init__.py +20 -0
  298. synapse/crypto/context_factory.py +278 -0
  299. synapse/crypto/event_signing.py +194 -0
  300. synapse/crypto/keyring.py +980 -0
  301. synapse/event_auth.py +1266 -0
  302. synapse/events/__init__.py +667 -0
  303. synapse/events/auto_accept_invites.py +216 -0
  304. synapse/events/builder.py +387 -0
  305. synapse/events/presence_router.py +243 -0
  306. synapse/events/snapshot.py +559 -0
  307. synapse/events/utils.py +924 -0
  308. synapse/events/validator.py +305 -0
  309. synapse/federation/__init__.py +22 -0
  310. synapse/federation/federation_base.py +382 -0
  311. synapse/federation/federation_client.py +2133 -0
  312. synapse/federation/federation_server.py +1543 -0
  313. synapse/federation/persistence.py +70 -0
  314. synapse/federation/send_queue.py +532 -0
  315. synapse/federation/sender/__init__.py +1165 -0
  316. synapse/federation/sender/per_destination_queue.py +886 -0
  317. synapse/federation/sender/transaction_manager.py +210 -0
  318. synapse/federation/transport/__init__.py +28 -0
  319. synapse/federation/transport/client.py +1199 -0
  320. synapse/federation/transport/server/__init__.py +334 -0
  321. synapse/federation/transport/server/_base.py +429 -0
  322. synapse/federation/transport/server/federation.py +910 -0
  323. synapse/federation/units.py +133 -0
  324. synapse/handlers/__init__.py +20 -0
  325. synapse/handlers/account.py +162 -0
  326. synapse/handlers/account_data.py +360 -0
  327. synapse/handlers/account_validity.py +362 -0
  328. synapse/handlers/admin.py +615 -0
  329. synapse/handlers/appservice.py +989 -0
  330. synapse/handlers/auth.py +2482 -0
  331. synapse/handlers/cas.py +413 -0
  332. synapse/handlers/deactivate_account.py +363 -0
  333. synapse/handlers/delayed_events.py +607 -0
  334. synapse/handlers/device.py +1869 -0
  335. synapse/handlers/devicemessage.py +399 -0
  336. synapse/handlers/directory.py +545 -0
  337. synapse/handlers/e2e_keys.py +1835 -0
  338. synapse/handlers/e2e_room_keys.py +455 -0
  339. synapse/handlers/event_auth.py +390 -0
  340. synapse/handlers/events.py +203 -0
  341. synapse/handlers/federation.py +2042 -0
  342. synapse/handlers/federation_event.py +2420 -0
  343. synapse/handlers/identity.py +812 -0
  344. synapse/handlers/initial_sync.py +528 -0
  345. synapse/handlers/jwt.py +120 -0
  346. synapse/handlers/message.py +2357 -0
  347. synapse/handlers/oidc.py +1801 -0
  348. synapse/handlers/pagination.py +811 -0
  349. synapse/handlers/password_policy.py +102 -0
  350. synapse/handlers/presence.py +2634 -0
  351. synapse/handlers/profile.py +656 -0
  352. synapse/handlers/push_rules.py +164 -0
  353. synapse/handlers/read_marker.py +79 -0
  354. synapse/handlers/receipts.py +351 -0
  355. synapse/handlers/register.py +1059 -0
  356. synapse/handlers/relations.py +623 -0
  357. synapse/handlers/reports.py +98 -0
  358. synapse/handlers/room.py +2449 -0
  359. synapse/handlers/room_list.py +632 -0
  360. synapse/handlers/room_member.py +2366 -0
  361. synapse/handlers/room_member_worker.py +146 -0
  362. synapse/handlers/room_policy.py +186 -0
  363. synapse/handlers/room_summary.py +1057 -0
  364. synapse/handlers/saml.py +524 -0
  365. synapse/handlers/search.py +723 -0
  366. synapse/handlers/send_email.py +209 -0
  367. synapse/handlers/set_password.py +71 -0
  368. synapse/handlers/sliding_sync/__init__.py +1961 -0
  369. synapse/handlers/sliding_sync/extensions.py +969 -0
  370. synapse/handlers/sliding_sync/room_lists.py +2317 -0
  371. synapse/handlers/sliding_sync/store.py +126 -0
  372. synapse/handlers/sso.py +1291 -0
  373. synapse/handlers/state_deltas.py +82 -0
  374. synapse/handlers/stats.py +322 -0
  375. synapse/handlers/sync.py +3096 -0
  376. synapse/handlers/thread_subscriptions.py +190 -0
  377. synapse/handlers/typing.py +612 -0
  378. synapse/handlers/ui_auth/__init__.py +48 -0
  379. synapse/handlers/ui_auth/checkers.py +332 -0
  380. synapse/handlers/user_directory.py +786 -0
  381. synapse/handlers/worker_lock.py +371 -0
  382. synapse/http/__init__.py +105 -0
  383. synapse/http/additional_resource.py +62 -0
  384. synapse/http/client.py +1377 -0
  385. synapse/http/connectproxyclient.py +316 -0
  386. synapse/http/federation/__init__.py +19 -0
  387. synapse/http/federation/matrix_federation_agent.py +490 -0
  388. synapse/http/federation/srv_resolver.py +196 -0
  389. synapse/http/federation/well_known_resolver.py +368 -0
  390. synapse/http/matrixfederationclient.py +1874 -0
  391. synapse/http/proxy.py +290 -0
  392. synapse/http/proxyagent.py +497 -0
  393. synapse/http/replicationagent.py +203 -0
  394. synapse/http/request_metrics.py +309 -0
  395. synapse/http/server.py +1111 -0
  396. synapse/http/servlet.py +1018 -0
  397. synapse/http/site.py +952 -0
  398. synapse/http/types.py +27 -0
  399. synapse/logging/__init__.py +31 -0
  400. synapse/logging/_remote.py +261 -0
  401. synapse/logging/_terse_json.py +95 -0
  402. synapse/logging/context.py +1209 -0
  403. synapse/logging/formatter.py +62 -0
  404. synapse/logging/handlers.py +99 -0
  405. synapse/logging/loggers.py +25 -0
  406. synapse/logging/opentracing.py +1132 -0
  407. synapse/logging/scopecontextmanager.py +160 -0
  408. synapse/media/_base.py +831 -0
  409. synapse/media/filepath.py +417 -0
  410. synapse/media/media_repository.py +1595 -0
  411. synapse/media/media_storage.py +703 -0
  412. synapse/media/oembed.py +277 -0
  413. synapse/media/preview_html.py +556 -0
  414. synapse/media/storage_provider.py +195 -0
  415. synapse/media/thumbnailer.py +833 -0
  416. synapse/media/url_previewer.py +884 -0
  417. synapse/metrics/__init__.py +748 -0
  418. synapse/metrics/_gc.py +219 -0
  419. synapse/metrics/_reactor_metrics.py +171 -0
  420. synapse/metrics/_types.py +38 -0
  421. synapse/metrics/background_process_metrics.py +555 -0
  422. synapse/metrics/common_usage_metrics.py +95 -0
  423. synapse/metrics/jemalloc.py +248 -0
  424. synapse/module_api/__init__.py +2131 -0
  425. synapse/module_api/callbacks/__init__.py +50 -0
  426. synapse/module_api/callbacks/account_validity_callbacks.py +106 -0
  427. synapse/module_api/callbacks/media_repository_callbacks.py +157 -0
  428. synapse/module_api/callbacks/ratelimit_callbacks.py +78 -0
  429. synapse/module_api/callbacks/spamchecker_callbacks.py +991 -0
  430. synapse/module_api/callbacks/third_party_event_rules_callbacks.py +592 -0
  431. synapse/module_api/errors.py +42 -0
  432. synapse/notifier.py +969 -0
  433. synapse/push/__init__.py +212 -0
  434. synapse/push/bulk_push_rule_evaluator.py +635 -0
  435. synapse/push/clientformat.py +126 -0
  436. synapse/push/emailpusher.py +334 -0
  437. synapse/push/httppusher.py +565 -0
  438. synapse/push/mailer.py +1009 -0
  439. synapse/push/presentable_names.py +216 -0
  440. synapse/push/push_tools.py +114 -0
  441. synapse/push/push_types.py +141 -0
  442. synapse/push/pusher.py +87 -0
  443. synapse/push/pusherpool.py +501 -0
  444. synapse/push/rulekinds.py +33 -0
  445. synapse/py.typed +0 -0
  446. synapse/replication/__init__.py +20 -0
  447. synapse/replication/http/__init__.py +68 -0
  448. synapse/replication/http/_base.py +469 -0
  449. synapse/replication/http/account_data.py +297 -0
  450. synapse/replication/http/deactivate_account.py +81 -0
  451. synapse/replication/http/delayed_events.py +62 -0
  452. synapse/replication/http/devices.py +254 -0
  453. synapse/replication/http/federation.py +334 -0
  454. synapse/replication/http/login.py +106 -0
  455. synapse/replication/http/membership.py +364 -0
  456. synapse/replication/http/presence.py +133 -0
  457. synapse/replication/http/push.py +156 -0
  458. synapse/replication/http/register.py +172 -0
  459. synapse/replication/http/send_events.py +182 -0
  460. synapse/replication/http/state.py +82 -0
  461. synapse/replication/http/streams.py +101 -0
  462. synapse/replication/tcp/__init__.py +56 -0
  463. synapse/replication/tcp/client.py +553 -0
  464. synapse/replication/tcp/commands.py +569 -0
  465. synapse/replication/tcp/context.py +41 -0
  466. synapse/replication/tcp/external_cache.py +156 -0
  467. synapse/replication/tcp/handler.py +922 -0
  468. synapse/replication/tcp/protocol.py +611 -0
  469. synapse/replication/tcp/redis.py +510 -0
  470. synapse/replication/tcp/resource.py +349 -0
  471. synapse/replication/tcp/streams/__init__.py +96 -0
  472. synapse/replication/tcp/streams/_base.py +765 -0
  473. synapse/replication/tcp/streams/events.py +287 -0
  474. synapse/replication/tcp/streams/federation.py +92 -0
  475. synapse/replication/tcp/streams/partial_state.py +80 -0
  476. synapse/res/providers.json +29 -0
  477. synapse/res/templates/_base.html +29 -0
  478. synapse/res/templates/account_previously_renewed.html +6 -0
  479. synapse/res/templates/account_renewed.html +6 -0
  480. synapse/res/templates/add_threepid.html +8 -0
  481. synapse/res/templates/add_threepid.txt +6 -0
  482. synapse/res/templates/add_threepid_failure.html +7 -0
  483. synapse/res/templates/add_threepid_success.html +6 -0
  484. synapse/res/templates/already_in_use.html +12 -0
  485. synapse/res/templates/already_in_use.txt +10 -0
  486. synapse/res/templates/auth_success.html +21 -0
  487. synapse/res/templates/invalid_token.html +6 -0
  488. synapse/res/templates/mail-Element.css +7 -0
  489. synapse/res/templates/mail-Vector.css +7 -0
  490. synapse/res/templates/mail-expiry.css +4 -0
  491. synapse/res/templates/mail.css +156 -0
  492. synapse/res/templates/notice_expiry.html +46 -0
  493. synapse/res/templates/notice_expiry.txt +7 -0
  494. synapse/res/templates/notif.html +51 -0
  495. synapse/res/templates/notif.txt +22 -0
  496. synapse/res/templates/notif_mail.html +59 -0
  497. synapse/res/templates/notif_mail.txt +10 -0
  498. synapse/res/templates/password_reset.html +10 -0
  499. synapse/res/templates/password_reset.txt +7 -0
  500. synapse/res/templates/password_reset_confirmation.html +15 -0
  501. synapse/res/templates/password_reset_failure.html +7 -0
  502. synapse/res/templates/password_reset_success.html +6 -0
  503. synapse/res/templates/recaptcha.html +42 -0
  504. synapse/res/templates/registration.html +12 -0
  505. synapse/res/templates/registration.txt +10 -0
  506. synapse/res/templates/registration_failure.html +6 -0
  507. synapse/res/templates/registration_success.html +6 -0
  508. synapse/res/templates/registration_token.html +18 -0
  509. synapse/res/templates/room.html +33 -0
  510. synapse/res/templates/room.txt +9 -0
  511. synapse/res/templates/sso.css +129 -0
  512. synapse/res/templates/sso_account_deactivated.html +25 -0
  513. synapse/res/templates/sso_auth_account_details.html +186 -0
  514. synapse/res/templates/sso_auth_account_details.js +116 -0
  515. synapse/res/templates/sso_auth_bad_user.html +26 -0
  516. synapse/res/templates/sso_auth_confirm.html +27 -0
  517. synapse/res/templates/sso_auth_success.html +26 -0
  518. synapse/res/templates/sso_error.html +71 -0
  519. synapse/res/templates/sso_footer.html +19 -0
  520. synapse/res/templates/sso_login_idp_picker.html +60 -0
  521. synapse/res/templates/sso_new_user_consent.html +30 -0
  522. synapse/res/templates/sso_partial_profile.html +19 -0
  523. synapse/res/templates/sso_redirect_confirm.html +39 -0
  524. synapse/res/templates/style.css +33 -0
  525. synapse/res/templates/terms.html +27 -0
  526. synapse/rest/__init__.py +197 -0
  527. synapse/rest/admin/__init__.py +395 -0
  528. synapse/rest/admin/_base.py +72 -0
  529. synapse/rest/admin/background_updates.py +171 -0
  530. synapse/rest/admin/devices.py +221 -0
  531. synapse/rest/admin/event_reports.py +173 -0
  532. synapse/rest/admin/events.py +69 -0
  533. synapse/rest/admin/experimental_features.py +137 -0
  534. synapse/rest/admin/federation.py +243 -0
  535. synapse/rest/admin/media.py +540 -0
  536. synapse/rest/admin/registration_tokens.py +358 -0
  537. synapse/rest/admin/rooms.py +1092 -0
  538. synapse/rest/admin/scheduled_tasks.py +70 -0
  539. synapse/rest/admin/server_notice_servlet.py +132 -0
  540. synapse/rest/admin/statistics.py +132 -0
  541. synapse/rest/admin/username_available.py +58 -0
  542. synapse/rest/admin/users.py +1634 -0
  543. synapse/rest/client/__init__.py +20 -0
  544. synapse/rest/client/_base.py +113 -0
  545. synapse/rest/client/account.py +937 -0
  546. synapse/rest/client/account_data.py +319 -0
  547. synapse/rest/client/account_validity.py +103 -0
  548. synapse/rest/client/appservice_ping.py +125 -0
  549. synapse/rest/client/auth.py +218 -0
  550. synapse/rest/client/auth_metadata.py +122 -0
  551. synapse/rest/client/capabilities.py +121 -0
  552. synapse/rest/client/delayed_events.py +165 -0
  553. synapse/rest/client/devices.py +587 -0
  554. synapse/rest/client/directory.py +211 -0
  555. synapse/rest/client/events.py +116 -0
  556. synapse/rest/client/filter.py +112 -0
  557. synapse/rest/client/initial_sync.py +65 -0
  558. synapse/rest/client/keys.py +678 -0
  559. synapse/rest/client/knock.py +104 -0
  560. synapse/rest/client/login.py +750 -0
  561. synapse/rest/client/login_token_request.py +127 -0
  562. synapse/rest/client/logout.py +93 -0
  563. synapse/rest/client/matrixrtc.py +52 -0
  564. synapse/rest/client/media.py +307 -0
  565. synapse/rest/client/mutual_rooms.py +145 -0
  566. synapse/rest/client/notifications.py +137 -0
  567. synapse/rest/client/openid.py +109 -0
  568. synapse/rest/client/password_policy.py +69 -0
  569. synapse/rest/client/presence.py +131 -0
  570. synapse/rest/client/profile.py +291 -0
  571. synapse/rest/client/push_rule.py +331 -0
  572. synapse/rest/client/pusher.py +181 -0
  573. synapse/rest/client/read_marker.py +104 -0
  574. synapse/rest/client/receipts.py +165 -0
  575. synapse/rest/client/register.py +1072 -0
  576. synapse/rest/client/relations.py +138 -0
  577. synapse/rest/client/rendezvous.py +76 -0
  578. synapse/rest/client/reporting.py +207 -0
  579. synapse/rest/client/room.py +1763 -0
  580. synapse/rest/client/room_keys.py +426 -0
  581. synapse/rest/client/room_upgrade_rest_servlet.py +112 -0
  582. synapse/rest/client/sendtodevice.py +85 -0
  583. synapse/rest/client/sync.py +1131 -0
  584. synapse/rest/client/tags.py +129 -0
  585. synapse/rest/client/thirdparty.py +130 -0
  586. synapse/rest/client/thread_subscriptions.py +247 -0
  587. synapse/rest/client/tokenrefresh.py +52 -0
  588. synapse/rest/client/transactions.py +150 -0
  589. synapse/rest/client/user_directory.py +99 -0
  590. synapse/rest/client/versions.py +193 -0
  591. synapse/rest/client/voip.py +88 -0
  592. synapse/rest/consent/__init__.py +0 -0
  593. synapse/rest/consent/consent_resource.py +210 -0
  594. synapse/rest/health.py +38 -0
  595. synapse/rest/key/__init__.py +20 -0
  596. synapse/rest/key/v2/__init__.py +40 -0
  597. synapse/rest/key/v2/local_key_resource.py +125 -0
  598. synapse/rest/key/v2/remote_key_resource.py +302 -0
  599. synapse/rest/media/__init__.py +0 -0
  600. synapse/rest/media/config_resource.py +53 -0
  601. synapse/rest/media/create_resource.py +90 -0
  602. synapse/rest/media/download_resource.py +110 -0
  603. synapse/rest/media/media_repository_resource.py +113 -0
  604. synapse/rest/media/preview_url_resource.py +77 -0
  605. synapse/rest/media/thumbnail_resource.py +142 -0
  606. synapse/rest/media/upload_resource.py +187 -0
  607. synapse/rest/media/v1/__init__.py +39 -0
  608. synapse/rest/media/v1/_base.py +23 -0
  609. synapse/rest/media/v1/media_storage.py +23 -0
  610. synapse/rest/media/v1/storage_provider.py +23 -0
  611. synapse/rest/synapse/__init__.py +20 -0
  612. synapse/rest/synapse/client/__init__.py +93 -0
  613. synapse/rest/synapse/client/federation_whitelist.py +66 -0
  614. synapse/rest/synapse/client/jwks.py +77 -0
  615. synapse/rest/synapse/client/new_user_consent.py +115 -0
  616. synapse/rest/synapse/client/oidc/__init__.py +45 -0
  617. synapse/rest/synapse/client/oidc/backchannel_logout_resource.py +42 -0
  618. synapse/rest/synapse/client/oidc/callback_resource.py +48 -0
  619. synapse/rest/synapse/client/password_reset.py +129 -0
  620. synapse/rest/synapse/client/pick_idp.py +107 -0
  621. synapse/rest/synapse/client/pick_username.py +153 -0
  622. synapse/rest/synapse/client/rendezvous.py +58 -0
  623. synapse/rest/synapse/client/saml2/__init__.py +42 -0
  624. synapse/rest/synapse/client/saml2/metadata_resource.py +46 -0
  625. synapse/rest/synapse/client/saml2/response_resource.py +52 -0
  626. synapse/rest/synapse/client/sso_register.py +56 -0
  627. synapse/rest/synapse/client/unsubscribe.py +88 -0
  628. synapse/rest/synapse/mas/__init__.py +71 -0
  629. synapse/rest/synapse/mas/_base.py +55 -0
  630. synapse/rest/synapse/mas/devices.py +239 -0
  631. synapse/rest/synapse/mas/users.py +469 -0
  632. synapse/rest/well_known.py +148 -0
  633. synapse/server.py +1279 -0
  634. synapse/server_notices/__init__.py +0 -0
  635. synapse/server_notices/consent_server_notices.py +136 -0
  636. synapse/server_notices/resource_limits_server_notices.py +215 -0
  637. synapse/server_notices/server_notices_manager.py +388 -0
  638. synapse/server_notices/server_notices_sender.py +67 -0
  639. synapse/server_notices/worker_server_notices_sender.py +46 -0
  640. synapse/spam_checker_api/__init__.py +31 -0
  641. synapse/state/__init__.py +1023 -0
  642. synapse/state/v1.py +369 -0
  643. synapse/state/v2.py +985 -0
  644. synapse/static/client/login/index.html +47 -0
  645. synapse/static/client/login/js/jquery-3.4.1.min.js +2 -0
  646. synapse/static/client/login/js/login.js +291 -0
  647. synapse/static/client/login/spinner.gif +0 -0
  648. synapse/static/client/login/style.css +79 -0
  649. synapse/static/index.html +63 -0
  650. synapse/storage/__init__.py +43 -0
  651. synapse/storage/_base.py +245 -0
  652. synapse/storage/admin_client_config.py +25 -0
  653. synapse/storage/background_updates.py +1189 -0
  654. synapse/storage/controllers/__init__.py +57 -0
  655. synapse/storage/controllers/persist_events.py +1237 -0
  656. synapse/storage/controllers/purge_events.py +456 -0
  657. synapse/storage/controllers/state.py +950 -0
  658. synapse/storage/controllers/stats.py +119 -0
  659. synapse/storage/database.py +2720 -0
  660. synapse/storage/databases/__init__.py +175 -0
  661. synapse/storage/databases/main/__init__.py +420 -0
  662. synapse/storage/databases/main/account_data.py +1073 -0
  663. synapse/storage/databases/main/appservice.py +473 -0
  664. synapse/storage/databases/main/cache.py +912 -0
  665. synapse/storage/databases/main/censor_events.py +226 -0
  666. synapse/storage/databases/main/client_ips.py +816 -0
  667. synapse/storage/databases/main/delayed_events.py +577 -0
  668. synapse/storage/databases/main/deviceinbox.py +1272 -0
  669. synapse/storage/databases/main/devices.py +2579 -0
  670. synapse/storage/databases/main/directory.py +212 -0
  671. synapse/storage/databases/main/e2e_room_keys.py +689 -0
  672. synapse/storage/databases/main/end_to_end_keys.py +1894 -0
  673. synapse/storage/databases/main/event_federation.py +2511 -0
  674. synapse/storage/databases/main/event_push_actions.py +1936 -0
  675. synapse/storage/databases/main/events.py +3765 -0
  676. synapse/storage/databases/main/events_bg_updates.py +2910 -0
  677. synapse/storage/databases/main/events_forward_extremities.py +126 -0
  678. synapse/storage/databases/main/events_worker.py +2787 -0
  679. synapse/storage/databases/main/experimental_features.py +130 -0
  680. synapse/storage/databases/main/filtering.py +231 -0
  681. synapse/storage/databases/main/keys.py +291 -0
  682. synapse/storage/databases/main/lock.py +554 -0
  683. synapse/storage/databases/main/media_repository.py +1068 -0
  684. synapse/storage/databases/main/metrics.py +461 -0
  685. synapse/storage/databases/main/monthly_active_users.py +443 -0
  686. synapse/storage/databases/main/openid.py +60 -0
  687. synapse/storage/databases/main/presence.py +509 -0
  688. synapse/storage/databases/main/profile.py +539 -0
  689. synapse/storage/databases/main/purge_events.py +521 -0
  690. synapse/storage/databases/main/push_rule.py +970 -0
  691. synapse/storage/databases/main/pusher.py +793 -0
  692. synapse/storage/databases/main/receipts.py +1341 -0
  693. synapse/storage/databases/main/registration.py +3071 -0
  694. synapse/storage/databases/main/rejections.py +37 -0
  695. synapse/storage/databases/main/relations.py +1116 -0
  696. synapse/storage/databases/main/room.py +2779 -0
  697. synapse/storage/databases/main/roommember.py +2132 -0
  698. synapse/storage/databases/main/search.py +939 -0
  699. synapse/storage/databases/main/session.py +152 -0
  700. synapse/storage/databases/main/signatures.py +94 -0
  701. synapse/storage/databases/main/sliding_sync.py +842 -0
  702. synapse/storage/databases/main/state.py +1002 -0
  703. synapse/storage/databases/main/state_deltas.py +360 -0
  704. synapse/storage/databases/main/stats.py +789 -0
  705. synapse/storage/databases/main/stream.py +2589 -0
  706. synapse/storage/databases/main/tags.py +360 -0
  707. synapse/storage/databases/main/task_scheduler.py +225 -0
  708. synapse/storage/databases/main/thread_subscriptions.py +589 -0
  709. synapse/storage/databases/main/transactions.py +676 -0
  710. synapse/storage/databases/main/ui_auth.py +420 -0
  711. synapse/storage/databases/main/user_directory.py +1330 -0
  712. synapse/storage/databases/main/user_erasure_store.py +117 -0
  713. synapse/storage/databases/state/__init__.py +22 -0
  714. synapse/storage/databases/state/bg_updates.py +497 -0
  715. synapse/storage/databases/state/deletion.py +557 -0
  716. synapse/storage/databases/state/store.py +948 -0
  717. synapse/storage/engines/__init__.py +70 -0
  718. synapse/storage/engines/_base.py +154 -0
  719. synapse/storage/engines/postgres.py +261 -0
  720. synapse/storage/engines/sqlite.py +199 -0
  721. synapse/storage/invite_rule.py +152 -0
  722. synapse/storage/keys.py +40 -0
  723. synapse/storage/prepare_database.py +730 -0
  724. synapse/storage/push_rule.py +28 -0
  725. synapse/storage/roommember.py +88 -0
  726. synapse/storage/schema/README.md +4 -0
  727. synapse/storage/schema/__init__.py +186 -0
  728. synapse/storage/schema/common/delta/25/00background_updates.sql +40 -0
  729. synapse/storage/schema/common/delta/35/00background_updates_add_col.sql +36 -0
  730. synapse/storage/schema/common/delta/58/00background_update_ordering.sql +38 -0
  731. synapse/storage/schema/common/full_schemas/72/full.sql.postgres +8 -0
  732. synapse/storage/schema/common/full_schemas/72/full.sql.sqlite +6 -0
  733. synapse/storage/schema/common/schema_version.sql +60 -0
  734. synapse/storage/schema/main/delta/12/v12.sql +82 -0
  735. synapse/storage/schema/main/delta/13/v13.sql +38 -0
  736. synapse/storage/schema/main/delta/14/v14.sql +42 -0
  737. synapse/storage/schema/main/delta/15/appservice_txns.sql +50 -0
  738. synapse/storage/schema/main/delta/15/presence_indices.sql +2 -0
  739. synapse/storage/schema/main/delta/15/v15.sql +24 -0
  740. synapse/storage/schema/main/delta/16/events_order_index.sql +4 -0
  741. synapse/storage/schema/main/delta/16/remote_media_cache_index.sql +2 -0
  742. synapse/storage/schema/main/delta/16/remove_duplicates.sql +9 -0
  743. synapse/storage/schema/main/delta/16/room_alias_index.sql +3 -0
  744. synapse/storage/schema/main/delta/16/unique_constraints.sql +72 -0
  745. synapse/storage/schema/main/delta/16/users.sql +56 -0
  746. synapse/storage/schema/main/delta/17/drop_indexes.sql +37 -0
  747. synapse/storage/schema/main/delta/17/server_keys.sql +43 -0
  748. synapse/storage/schema/main/delta/17/user_threepids.sql +9 -0
  749. synapse/storage/schema/main/delta/18/server_keys_bigger_ints.sql +51 -0
  750. synapse/storage/schema/main/delta/19/event_index.sql +38 -0
  751. synapse/storage/schema/main/delta/20/dummy.sql +1 -0
  752. synapse/storage/schema/main/delta/20/pushers.py +93 -0
  753. synapse/storage/schema/main/delta/21/end_to_end_keys.sql +53 -0
  754. synapse/storage/schema/main/delta/21/receipts.sql +57 -0
  755. synapse/storage/schema/main/delta/22/receipts_index.sql +41 -0
  756. synapse/storage/schema/main/delta/22/user_threepids_unique.sql +19 -0
  757. synapse/storage/schema/main/delta/24/stats_reporting.sql +37 -0
  758. synapse/storage/schema/main/delta/25/fts.py +81 -0
  759. synapse/storage/schema/main/delta/25/guest_access.sql +44 -0
  760. synapse/storage/schema/main/delta/25/history_visibility.sql +44 -0
  761. synapse/storage/schema/main/delta/25/tags.sql +57 -0
  762. synapse/storage/schema/main/delta/26/account_data.sql +36 -0
  763. synapse/storage/schema/main/delta/27/account_data.sql +55 -0
  764. synapse/storage/schema/main/delta/27/forgotten_memberships.sql +45 -0
  765. synapse/storage/schema/main/delta/27/ts.py +61 -0
  766. synapse/storage/schema/main/delta/28/event_push_actions.sql +46 -0
  767. synapse/storage/schema/main/delta/28/events_room_stream.sql +39 -0
  768. synapse/storage/schema/main/delta/28/public_roms_index.sql +39 -0
  769. synapse/storage/schema/main/delta/28/receipts_user_id_index.sql +41 -0
  770. synapse/storage/schema/main/delta/28/upgrade_times.sql +40 -0
  771. synapse/storage/schema/main/delta/28/users_is_guest.sql +41 -0
  772. synapse/storage/schema/main/delta/29/push_actions.sql +54 -0
  773. synapse/storage/schema/main/delta/30/alias_creator.sql +35 -0
  774. synapse/storage/schema/main/delta/30/as_users.py +82 -0
  775. synapse/storage/schema/main/delta/30/deleted_pushers.sql +44 -0
  776. synapse/storage/schema/main/delta/30/presence_stream.sql +49 -0
  777. synapse/storage/schema/main/delta/30/public_rooms.sql +42 -0
  778. synapse/storage/schema/main/delta/30/push_rule_stream.sql +57 -0
  779. synapse/storage/schema/main/delta/30/threepid_guest_access_tokens.sql +43 -0
  780. synapse/storage/schema/main/delta/31/invites.sql +61 -0
  781. synapse/storage/schema/main/delta/31/local_media_repository_url_cache.sql +46 -0
  782. synapse/storage/schema/main/delta/31/pushers_0.py +92 -0
  783. synapse/storage/schema/main/delta/31/pushers_index.sql +41 -0
  784. synapse/storage/schema/main/delta/31/search_update.py +65 -0
  785. synapse/storage/schema/main/delta/32/events.sql +35 -0
  786. synapse/storage/schema/main/delta/32/openid.sql +9 -0
  787. synapse/storage/schema/main/delta/32/pusher_throttle.sql +42 -0
  788. synapse/storage/schema/main/delta/32/remove_indices.sql +52 -0
  789. synapse/storage/schema/main/delta/32/reports.sql +44 -0
  790. synapse/storage/schema/main/delta/33/access_tokens_device_index.sql +36 -0
  791. synapse/storage/schema/main/delta/33/devices.sql +40 -0
  792. synapse/storage/schema/main/delta/33/devices_for_e2e_keys.sql +38 -0
  793. synapse/storage/schema/main/delta/33/devices_for_e2e_keys_clear_unknown_device.sql +39 -0
  794. synapse/storage/schema/main/delta/33/event_fields.py +61 -0
  795. synapse/storage/schema/main/delta/33/remote_media_ts.py +43 -0
  796. synapse/storage/schema/main/delta/33/user_ips_index.sql +36 -0
  797. synapse/storage/schema/main/delta/34/appservice_stream.sql +42 -0
  798. synapse/storage/schema/main/delta/34/cache_stream.py +50 -0
  799. synapse/storage/schema/main/delta/34/device_inbox.sql +43 -0
  800. synapse/storage/schema/main/delta/34/push_display_name_rename.sql +39 -0
  801. synapse/storage/schema/main/delta/34/received_txn_purge.py +36 -0
  802. synapse/storage/schema/main/delta/35/contains_url.sql +36 -0
  803. synapse/storage/schema/main/delta/35/device_outbox.sql +58 -0
  804. synapse/storage/schema/main/delta/35/device_stream_id.sql +40 -0
  805. synapse/storage/schema/main/delta/35/event_push_actions_index.sql +36 -0
  806. synapse/storage/schema/main/delta/35/public_room_list_change_stream.sql +52 -0
  807. synapse/storage/schema/main/delta/35/stream_order_to_extrem.sql +56 -0
  808. synapse/storage/schema/main/delta/36/readd_public_rooms.sql +45 -0
  809. synapse/storage/schema/main/delta/37/remove_auth_idx.py +89 -0
  810. synapse/storage/schema/main/delta/37/user_threepids.sql +71 -0
  811. synapse/storage/schema/main/delta/38/postgres_fts_gist.sql +38 -0
  812. synapse/storage/schema/main/delta/39/appservice_room_list.sql +48 -0
  813. synapse/storage/schema/main/delta/39/device_federation_stream_idx.sql +35 -0
  814. synapse/storage/schema/main/delta/39/event_push_index.sql +36 -0
  815. synapse/storage/schema/main/delta/39/federation_out_position.sql +41 -0
  816. synapse/storage/schema/main/delta/39/membership_profile.sql +39 -0
  817. synapse/storage/schema/main/delta/40/current_state_idx.sql +36 -0
  818. synapse/storage/schema/main/delta/40/device_inbox.sql +40 -0
  819. synapse/storage/schema/main/delta/40/device_list_streams.sql +79 -0
  820. synapse/storage/schema/main/delta/40/event_push_summary.sql +57 -0
  821. synapse/storage/schema/main/delta/40/pushers.sql +58 -0
  822. synapse/storage/schema/main/delta/41/device_list_stream_idx.sql +36 -0
  823. synapse/storage/schema/main/delta/41/device_outbound_index.sql +35 -0
  824. synapse/storage/schema/main/delta/41/event_search_event_id_idx.sql +36 -0
  825. synapse/storage/schema/main/delta/41/ratelimit.sql +41 -0
  826. synapse/storage/schema/main/delta/42/current_state_delta.sql +48 -0
  827. synapse/storage/schema/main/delta/42/device_list_last_id.sql +52 -0
  828. synapse/storage/schema/main/delta/42/event_auth_state_only.sql +36 -0
  829. synapse/storage/schema/main/delta/42/user_dir.py +88 -0
  830. synapse/storage/schema/main/delta/43/blocked_rooms.sql +40 -0
  831. synapse/storage/schema/main/delta/43/quarantine_media.sql +36 -0
  832. synapse/storage/schema/main/delta/43/url_cache.sql +35 -0
  833. synapse/storage/schema/main/delta/43/user_share.sql +52 -0
  834. synapse/storage/schema/main/delta/44/expire_url_cache.sql +60 -0
  835. synapse/storage/schema/main/delta/45/group_server.sql +186 -0
  836. synapse/storage/schema/main/delta/45/profile_cache.sql +47 -0
  837. synapse/storage/schema/main/delta/46/drop_refresh_tokens.sql +36 -0
  838. synapse/storage/schema/main/delta/46/drop_unique_deleted_pushers.sql +54 -0
  839. synapse/storage/schema/main/delta/46/group_server.sql +51 -0
  840. synapse/storage/schema/main/delta/46/local_media_repository_url_idx.sql +43 -0
  841. synapse/storage/schema/main/delta/46/user_dir_null_room_ids.sql +54 -0
  842. synapse/storage/schema/main/delta/46/user_dir_typos.sql +43 -0
  843. synapse/storage/schema/main/delta/47/last_access_media.sql +35 -0
  844. synapse/storage/schema/main/delta/47/postgres_fts_gin.sql +36 -0
  845. synapse/storage/schema/main/delta/47/push_actions_staging.sql +47 -0
  846. synapse/storage/schema/main/delta/48/add_user_consent.sql +37 -0
  847. synapse/storage/schema/main/delta/48/add_user_ips_last_seen_index.sql +36 -0
  848. synapse/storage/schema/main/delta/48/deactivated_users.sql +44 -0
  849. synapse/storage/schema/main/delta/48/group_unique_indexes.py +67 -0
  850. synapse/storage/schema/main/delta/48/groups_joinable.sql +41 -0
  851. synapse/storage/schema/main/delta/49/add_user_consent_server_notice_sent.sql +39 -0
  852. synapse/storage/schema/main/delta/49/add_user_daily_visits.sql +40 -0
  853. synapse/storage/schema/main/delta/49/add_user_ips_last_seen_only_index.sql +36 -0
  854. synapse/storage/schema/main/delta/50/add_creation_ts_users_index.sql +38 -0
  855. synapse/storage/schema/main/delta/50/erasure_store.sql +40 -0
  856. synapse/storage/schema/main/delta/50/make_event_content_nullable.py +102 -0
  857. synapse/storage/schema/main/delta/51/e2e_room_keys.sql +58 -0
  858. synapse/storage/schema/main/delta/51/monthly_active_users.sql +46 -0
  859. synapse/storage/schema/main/delta/52/add_event_to_state_group_index.sql +38 -0
  860. synapse/storage/schema/main/delta/52/device_list_streams_unique_idx.sql +55 -0
  861. synapse/storage/schema/main/delta/52/e2e_room_keys.sql +72 -0
  862. synapse/storage/schema/main/delta/53/add_user_type_to_users.sql +38 -0
  863. synapse/storage/schema/main/delta/53/drop_sent_transactions.sql +35 -0
  864. synapse/storage/schema/main/delta/53/event_format_version.sql +35 -0
  865. synapse/storage/schema/main/delta/53/user_dir_populate.sql +49 -0
  866. synapse/storage/schema/main/delta/53/user_ips_index.sql +49 -0
  867. synapse/storage/schema/main/delta/53/user_share.sql +63 -0
  868. synapse/storage/schema/main/delta/53/user_threepid_id.sql +48 -0
  869. synapse/storage/schema/main/delta/53/users_in_public_rooms.sql +47 -0
  870. synapse/storage/schema/main/delta/54/account_validity_with_renewal.sql +49 -0
  871. synapse/storage/schema/main/delta/54/add_validity_to_server_keys.sql +42 -0
  872. synapse/storage/schema/main/delta/54/delete_forward_extremities.sql +42 -0
  873. synapse/storage/schema/main/delta/54/drop_legacy_tables.sql +49 -0
  874. synapse/storage/schema/main/delta/54/drop_presence_list.sql +35 -0
  875. synapse/storage/schema/main/delta/54/relations.sql +46 -0
  876. synapse/storage/schema/main/delta/54/stats.sql +99 -0
  877. synapse/storage/schema/main/delta/54/stats2.sql +47 -0
  878. synapse/storage/schema/main/delta/55/access_token_expiry.sql +37 -0
  879. synapse/storage/schema/main/delta/55/track_threepid_validations.sql +50 -0
  880. synapse/storage/schema/main/delta/55/users_alter_deactivated.sql +38 -0
  881. synapse/storage/schema/main/delta/56/add_spans_to_device_lists.sql +39 -0
  882. synapse/storage/schema/main/delta/56/current_state_events_membership.sql +41 -0
  883. synapse/storage/schema/main/delta/56/current_state_events_membership_mk2.sql +43 -0
  884. synapse/storage/schema/main/delta/56/delete_keys_from_deleted_backups.sql +44 -0
  885. synapse/storage/schema/main/delta/56/destinations_failure_ts.sql +44 -0
  886. synapse/storage/schema/main/delta/56/destinations_retry_interval_type.sql.postgres +18 -0
  887. synapse/storage/schema/main/delta/56/device_stream_id_insert.sql +39 -0
  888. synapse/storage/schema/main/delta/56/devices_last_seen.sql +43 -0
  889. synapse/storage/schema/main/delta/56/drop_unused_event_tables.sql +39 -0
  890. synapse/storage/schema/main/delta/56/event_expiry.sql +40 -0
  891. synapse/storage/schema/main/delta/56/event_labels.sql +49 -0
  892. synapse/storage/schema/main/delta/56/event_labels_background_update.sql +36 -0
  893. synapse/storage/schema/main/delta/56/fix_room_keys_index.sql +37 -0
  894. synapse/storage/schema/main/delta/56/hidden_devices.sql +37 -0
  895. synapse/storage/schema/main/delta/56/hidden_devices_fix.sql.sqlite +42 -0
  896. synapse/storage/schema/main/delta/56/nuke_empty_communities_from_db.sql +48 -0
  897. synapse/storage/schema/main/delta/56/public_room_list_idx.sql +35 -0
  898. synapse/storage/schema/main/delta/56/redaction_censor.sql +35 -0
  899. synapse/storage/schema/main/delta/56/redaction_censor2.sql +41 -0
  900. synapse/storage/schema/main/delta/56/redaction_censor3_fix_update.sql.postgres +25 -0
  901. synapse/storage/schema/main/delta/56/redaction_censor4.sql +35 -0
  902. synapse/storage/schema/main/delta/56/remove_tombstoned_rooms_from_directory.sql +38 -0
  903. synapse/storage/schema/main/delta/56/room_key_etag.sql +36 -0
  904. synapse/storage/schema/main/delta/56/room_membership_idx.sql +37 -0
  905. synapse/storage/schema/main/delta/56/room_retention.sql +52 -0
  906. synapse/storage/schema/main/delta/56/signing_keys.sql +75 -0
  907. synapse/storage/schema/main/delta/56/signing_keys_nonunique_signatures.sql +41 -0
  908. synapse/storage/schema/main/delta/56/stats_separated.sql +175 -0
  909. synapse/storage/schema/main/delta/56/unique_user_filter_index.py +46 -0
  910. synapse/storage/schema/main/delta/56/user_external_ids.sql +43 -0
  911. synapse/storage/schema/main/delta/56/users_in_public_rooms_idx.sql +36 -0
  912. synapse/storage/schema/main/delta/57/delete_old_current_state_events.sql +41 -0
  913. synapse/storage/schema/main/delta/57/device_list_remote_cache_stale.sql +44 -0
  914. synapse/storage/schema/main/delta/57/local_current_membership.py +111 -0
  915. synapse/storage/schema/main/delta/57/remove_sent_outbound_pokes.sql +40 -0
  916. synapse/storage/schema/main/delta/57/rooms_version_column.sql +43 -0
  917. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.postgres +35 -0
  918. synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.sqlite +22 -0
  919. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.postgres +39 -0
  920. synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.sqlite +23 -0
  921. synapse/storage/schema/main/delta/58/02remove_dup_outbound_pokes.sql +41 -0
  922. synapse/storage/schema/main/delta/58/03persist_ui_auth.sql +55 -0
  923. synapse/storage/schema/main/delta/58/05cache_instance.sql.postgres +30 -0
  924. synapse/storage/schema/main/delta/58/06dlols_unique_idx.py +83 -0
  925. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.postgres +33 -0
  926. synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.sqlite +44 -0
  927. synapse/storage/schema/main/delta/58/07persist_ui_auth_ips.sql +44 -0
  928. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.postgres +18 -0
  929. synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.sqlite +18 -0
  930. synapse/storage/schema/main/delta/58/09shadow_ban.sql +37 -0
  931. synapse/storage/schema/main/delta/58/10_pushrules_enabled_delete_obsolete.sql +47 -0
  932. synapse/storage/schema/main/delta/58/10drop_local_rejections_stream.sql +41 -0
  933. synapse/storage/schema/main/delta/58/10federation_pos_instance_name.sql +41 -0
  934. synapse/storage/schema/main/delta/58/11dehydration.sql +39 -0
  935. synapse/storage/schema/main/delta/58/11fallback.sql +43 -0
  936. synapse/storage/schema/main/delta/58/11user_id_seq.py +38 -0
  937. synapse/storage/schema/main/delta/58/12room_stats.sql +51 -0
  938. synapse/storage/schema/main/delta/58/13remove_presence_allow_inbound.sql +36 -0
  939. synapse/storage/schema/main/delta/58/14events_instance_name.sql +35 -0
  940. synapse/storage/schema/main/delta/58/14events_instance_name.sql.postgres +28 -0
  941. synapse/storage/schema/main/delta/58/15_catchup_destination_rooms.sql +61 -0
  942. synapse/storage/schema/main/delta/58/15unread_count.sql +45 -0
  943. synapse/storage/schema/main/delta/58/16populate_stats_process_rooms_fix.sql +41 -0
  944. synapse/storage/schema/main/delta/58/17_catchup_last_successful.sql +40 -0
  945. synapse/storage/schema/main/delta/58/18stream_positions.sql +41 -0
  946. synapse/storage/schema/main/delta/58/19instance_map.sql.postgres +25 -0
  947. synapse/storage/schema/main/delta/58/19txn_id.sql +59 -0
  948. synapse/storage/schema/main/delta/58/20instance_name_event_tables.sql +36 -0
  949. synapse/storage/schema/main/delta/58/20user_daily_visits.sql +37 -0
  950. synapse/storage/schema/main/delta/58/21as_device_stream.sql +36 -0
  951. synapse/storage/schema/main/delta/58/21drop_device_max_stream_id.sql +1 -0
  952. synapse/storage/schema/main/delta/58/22puppet_token.sql +36 -0
  953. synapse/storage/schema/main/delta/58/22users_have_local_media.sql +2 -0
  954. synapse/storage/schema/main/delta/58/23e2e_cross_signing_keys_idx.sql +36 -0
  955. synapse/storage/schema/main/delta/58/24drop_event_json_index.sql +38 -0
  956. synapse/storage/schema/main/delta/58/25user_external_ids_user_id_idx.sql +36 -0
  957. synapse/storage/schema/main/delta/58/26access_token_last_validated.sql +37 -0
  958. synapse/storage/schema/main/delta/58/27local_invites.sql +37 -0
  959. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.postgres +16 -0
  960. synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.sqlite +62 -0
  961. synapse/storage/schema/main/delta/59/01ignored_user.py +85 -0
  962. synapse/storage/schema/main/delta/59/02shard_send_to_device.sql +37 -0
  963. synapse/storage/schema/main/delta/59/03shard_send_to_device_sequence.sql.postgres +25 -0
  964. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql +71 -0
  965. synapse/storage/schema/main/delta/59/04_event_auth_chains.sql.postgres +16 -0
  966. synapse/storage/schema/main/delta/59/04drop_account_data.sql +36 -0
  967. synapse/storage/schema/main/delta/59/05cache_invalidation.sql +36 -0
  968. synapse/storage/schema/main/delta/59/06chain_cover_index.sql +36 -0
  969. synapse/storage/schema/main/delta/59/06shard_account_data.sql +39 -0
  970. synapse/storage/schema/main/delta/59/06shard_account_data.sql.postgres +32 -0
  971. synapse/storage/schema/main/delta/59/07shard_account_data_fix.sql +37 -0
  972. synapse/storage/schema/main/delta/59/08delete_pushers_for_deactivated_accounts.sql +39 -0
  973. synapse/storage/schema/main/delta/59/08delete_stale_pushers.sql +39 -0
  974. synapse/storage/schema/main/delta/59/09rejected_events_metadata.sql +45 -0
  975. synapse/storage/schema/main/delta/59/10delete_purged_chain_cover.sql +36 -0
  976. synapse/storage/schema/main/delta/59/11add_knock_members_to_stats.sql +39 -0
  977. synapse/storage/schema/main/delta/59/11drop_thumbnail_constraint.sql.postgres +22 -0
  978. synapse/storage/schema/main/delta/59/12account_validity_token_used_ts_ms.sql +37 -0
  979. synapse/storage/schema/main/delta/59/12presence_stream_instance.sql +37 -0
  980. synapse/storage/schema/main/delta/59/12presence_stream_instance_seq.sql.postgres +20 -0
  981. synapse/storage/schema/main/delta/59/13users_to_send_full_presence_to.sql +53 -0
  982. synapse/storage/schema/main/delta/59/14refresh_tokens.sql +53 -0
  983. synapse/storage/schema/main/delta/59/15locks.sql +56 -0
  984. synapse/storage/schema/main/delta/59/16federation_inbound_staging.sql +51 -0
  985. synapse/storage/schema/main/delta/60/01recreate_stream_ordering.sql.postgres +45 -0
  986. synapse/storage/schema/main/delta/60/02change_stream_ordering_columns.sql.postgres +30 -0
  987. synapse/storage/schema/main/delta/61/01change_appservices_txns.sql.postgres +23 -0
  988. synapse/storage/schema/main/delta/61/01insertion_event_lookups.sql +68 -0
  989. synapse/storage/schema/main/delta/61/02drop_redundant_room_depth_index.sql +37 -0
  990. synapse/storage/schema/main/delta/61/03recreate_min_depth.py +74 -0
  991. synapse/storage/schema/main/delta/62/01insertion_event_extremities.sql +43 -0
  992. synapse/storage/schema/main/delta/63/01create_registration_tokens.sql +42 -0
  993. synapse/storage/schema/main/delta/63/02delete_unlinked_email_pushers.sql +39 -0
  994. synapse/storage/schema/main/delta/63/02populate-rooms-creator.sql +36 -0
  995. synapse/storage/schema/main/delta/63/03session_store.sql +42 -0
  996. synapse/storage/schema/main/delta/63/04add_presence_stream_not_offline_index.sql +37 -0
  997. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.postgres +23 -0
  998. synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.sqlite +37 -0
  999. synapse/storage/schema/main/delta/65/01msc2716_insertion_event_edges.sql +38 -0
  1000. synapse/storage/schema/main/delta/65/03remove_hidden_devices_from_device_inbox.sql +41 -0
  1001. synapse/storage/schema/main/delta/65/04_local_group_updates.sql +37 -0
  1002. synapse/storage/schema/main/delta/65/05_remove_room_stats_historical_and_user_stats_historical.sql +38 -0
  1003. synapse/storage/schema/main/delta/65/06remove_deleted_devices_from_device_inbox.sql +53 -0
  1004. synapse/storage/schema/main/delta/65/07_arbitrary_relations.sql +37 -0
  1005. synapse/storage/schema/main/delta/65/08_device_inbox_background_updates.sql +37 -0
  1006. synapse/storage/schema/main/delta/65/10_expirable_refresh_tokens.sql +47 -0
  1007. synapse/storage/schema/main/delta/65/11_devices_auth_provider_session.sql +46 -0
  1008. synapse/storage/schema/main/delta/67/01drop_public_room_list_stream.sql +37 -0
  1009. synapse/storage/schema/main/delta/68/01event_columns.sql +45 -0
  1010. synapse/storage/schema/main/delta/68/02_msc2409_add_device_id_appservice_stream_type.sql +40 -0
  1011. synapse/storage/schema/main/delta/68/03_delete_account_data_for_deactivated_accounts.sql +39 -0
  1012. synapse/storage/schema/main/delta/68/04_refresh_tokens_index_next_token_id.sql +47 -0
  1013. synapse/storage/schema/main/delta/68/04partial_state_rooms.sql +60 -0
  1014. synapse/storage/schema/main/delta/68/05_delete_non_strings_from_event_search.sql.sqlite +22 -0
  1015. synapse/storage/schema/main/delta/68/05partial_state_rooms_triggers.py +80 -0
  1016. synapse/storage/schema/main/delta/68/06_msc3202_add_device_list_appservice_stream_type.sql +42 -0
  1017. synapse/storage/schema/main/delta/69/01as_txn_seq.py +54 -0
  1018. synapse/storage/schema/main/delta/69/01device_list_oubound_by_room.sql +57 -0
  1019. synapse/storage/schema/main/delta/69/02cache_invalidation_index.sql +37 -0
  1020. synapse/storage/schema/main/delta/70/01clean_table_purged_rooms.sql +39 -0
  1021. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.postgres +43 -0
  1022. synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.sqlite +47 -0
  1023. synapse/storage/schema/main/delta/71/01remove_noop_background_updates.sql +80 -0
  1024. synapse/storage/schema/main/delta/71/02event_push_summary_unique.sql +37 -0
  1025. synapse/storage/schema/main/delta/72/01add_room_type_to_state_stats.sql +38 -0
  1026. synapse/storage/schema/main/delta/72/01event_push_summary_receipt.sql +54 -0
  1027. synapse/storage/schema/main/delta/72/02event_push_actions_index.sql +38 -0
  1028. synapse/storage/schema/main/delta/72/03bg_populate_events_columns.py +57 -0
  1029. synapse/storage/schema/main/delta/72/03drop_event_reference_hashes.sql +36 -0
  1030. synapse/storage/schema/main/delta/72/03remove_groups.sql +50 -0
  1031. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.postgres +17 -0
  1032. synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.sqlite +40 -0
  1033. synapse/storage/schema/main/delta/72/05receipts_event_stream_ordering.sql +38 -0
  1034. synapse/storage/schema/main/delta/72/05remove_unstable_private_read_receipts.sql +38 -0
  1035. synapse/storage/schema/main/delta/72/06add_consent_ts_to_users.sql +35 -0
  1036. synapse/storage/schema/main/delta/72/06thread_notifications.sql +49 -0
  1037. synapse/storage/schema/main/delta/72/07force_update_current_state_events_membership.py +67 -0
  1038. synapse/storage/schema/main/delta/72/07thread_receipts.sql.postgres +30 -0
  1039. synapse/storage/schema/main/delta/72/07thread_receipts.sql.sqlite +70 -0
  1040. synapse/storage/schema/main/delta/72/08begin_cache_invalidation_seq_at_2.sql.postgres +23 -0
  1041. synapse/storage/schema/main/delta/72/08thread_receipts.sql +39 -0
  1042. synapse/storage/schema/main/delta/72/09partial_indices.sql.sqlite +56 -0
  1043. synapse/storage/schema/main/delta/73/01event_failed_pull_attempts.sql +48 -0
  1044. synapse/storage/schema/main/delta/73/02add_pusher_enabled.sql +35 -0
  1045. synapse/storage/schema/main/delta/73/02room_id_indexes_for_purging.sql +41 -0
  1046. synapse/storage/schema/main/delta/73/03pusher_device_id.sql +39 -0
  1047. synapse/storage/schema/main/delta/73/03users_approved_column.sql +39 -0
  1048. synapse/storage/schema/main/delta/73/04partial_join_details.sql +42 -0
  1049. synapse/storage/schema/main/delta/73/04pending_device_list_updates.sql +47 -0
  1050. synapse/storage/schema/main/delta/73/05old_push_actions.sql.postgres +22 -0
  1051. synapse/storage/schema/main/delta/73/05old_push_actions.sql.sqlite +24 -0
  1052. synapse/storage/schema/main/delta/73/06thread_notifications_thread_id_idx.sql +42 -0
  1053. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.postgres +23 -0
  1054. synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.sqlite +76 -0
  1055. synapse/storage/schema/main/delta/73/09partial_joined_via_destination.sql +37 -0
  1056. synapse/storage/schema/main/delta/73/09threads_table.sql +49 -0
  1057. synapse/storage/schema/main/delta/73/10_update_sqlite_fts4_tokenizer.py +71 -0
  1058. synapse/storage/schema/main/delta/73/10login_tokens.sql +54 -0
  1059. synapse/storage/schema/main/delta/73/11event_search_room_id_n_distinct.sql.postgres +33 -0
  1060. synapse/storage/schema/main/delta/73/12refactor_device_list_outbound_pokes.sql +72 -0
  1061. synapse/storage/schema/main/delta/73/13add_device_lists_index.sql +39 -0
  1062. synapse/storage/schema/main/delta/73/20_un_partial_stated_room_stream.sql +51 -0
  1063. synapse/storage/schema/main/delta/73/21_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  1064. synapse/storage/schema/main/delta/73/22_rebuild_user_dir_stats.sql +48 -0
  1065. synapse/storage/schema/main/delta/73/22_un_partial_stated_event_stream.sql +53 -0
  1066. synapse/storage/schema/main/delta/73/23_fix_thread_index.sql +52 -0
  1067. synapse/storage/schema/main/delta/73/23_un_partial_stated_room_stream_seq.sql.postgres +20 -0
  1068. synapse/storage/schema/main/delta/73/24_events_jump_to_date_index.sql +36 -0
  1069. synapse/storage/schema/main/delta/73/25drop_presence.sql +36 -0
  1070. synapse/storage/schema/main/delta/74/01_user_directory_stale_remote_users.sql +58 -0
  1071. synapse/storage/schema/main/delta/74/02_set_device_id_for_pushers_bg_update.sql +38 -0
  1072. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.postgres +29 -0
  1073. synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.sqlite +23 -0
  1074. synapse/storage/schema/main/delta/74/03_room_membership_index.sql +38 -0
  1075. synapse/storage/schema/main/delta/74/04_delete_e2e_backup_keys_for_deactivated_users.sql +36 -0
  1076. synapse/storage/schema/main/delta/74/04_membership_tables_event_stream_ordering_triggers.py +87 -0
  1077. synapse/storage/schema/main/delta/74/05_events_txn_id_device_id.sql +72 -0
  1078. synapse/storage/schema/main/delta/74/90COMMENTS_destinations.sql.postgres +52 -0
  1079. synapse/storage/schema/main/delta/76/01_add_profiles_full_user_id_column.sql +39 -0
  1080. synapse/storage/schema/main/delta/76/02_add_user_filters_full_user_id_column.sql +39 -0
  1081. synapse/storage/schema/main/delta/76/03_per_user_experimental_features.sql +46 -0
  1082. synapse/storage/schema/main/delta/76/04_add_room_forgetter.sql +43 -0
  1083. synapse/storage/schema/main/delta/77/01_add_profiles_not_valid_check.sql.postgres +16 -0
  1084. synapse/storage/schema/main/delta/77/02_add_user_filters_not_valid_check.sql.postgres +16 -0
  1085. synapse/storage/schema/main/delta/77/03bg_populate_full_user_id_profiles.sql +35 -0
  1086. synapse/storage/schema/main/delta/77/04bg_populate_full_user_id_user_filters.sql +35 -0
  1087. synapse/storage/schema/main/delta/77/05thread_notifications_backfill.sql +67 -0
  1088. synapse/storage/schema/main/delta/77/06thread_notifications_not_null.sql.sqlite +102 -0
  1089. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions.sql.postgres +27 -0
  1090. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions_staging.sql.postgres +27 -0
  1091. synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_summary.sql.postgres +29 -0
  1092. synapse/storage/schema/main/delta/77/14bg_indices_event_stream_ordering.sql +39 -0
  1093. synapse/storage/schema/main/delta/78/01_validate_and_update_profiles.py +99 -0
  1094. synapse/storage/schema/main/delta/78/02_validate_and_update_user_filters.py +100 -0
  1095. synapse/storage/schema/main/delta/78/03_remove_unused_indexes_user_filters.py +72 -0
  1096. synapse/storage/schema/main/delta/78/03event_extremities_constraints.py +65 -0
  1097. synapse/storage/schema/main/delta/78/04_add_full_user_id_index_user_filters.py +32 -0
  1098. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.postgres +102 -0
  1099. synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.sqlite +72 -0
  1100. synapse/storage/schema/main/delta/79/04_mitigate_stream_ordering_update_race.py +70 -0
  1101. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.postgres +69 -0
  1102. synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.sqlite +65 -0
  1103. synapse/storage/schema/main/delta/80/01_users_alter_locked.sql +35 -0
  1104. synapse/storage/schema/main/delta/80/02_read_write_locks_unlogged.sql.postgres +30 -0
  1105. synapse/storage/schema/main/delta/80/02_scheduled_tasks.sql +47 -0
  1106. synapse/storage/schema/main/delta/80/03_read_write_locks_triggers.sql.postgres +37 -0
  1107. synapse/storage/schema/main/delta/80/04_read_write_locks_deadlock.sql.postgres +71 -0
  1108. synapse/storage/schema/main/delta/82/02_scheduled_tasks_index.sql +35 -0
  1109. synapse/storage/schema/main/delta/82/04_add_indices_for_purging_rooms.sql +39 -0
  1110. synapse/storage/schema/main/delta/82/05gaps.sql +44 -0
  1111. synapse/storage/schema/main/delta/83/01_drop_old_tables.sql +43 -0
  1112. synapse/storage/schema/main/delta/83/03_instance_name_receipts.sql.sqlite +17 -0
  1113. synapse/storage/schema/main/delta/83/05_cross_signing_key_update_grant.sql +34 -0
  1114. synapse/storage/schema/main/delta/83/06_event_push_summary_room.sql +36 -0
  1115. synapse/storage/schema/main/delta/84/01_auth_links_stats.sql.postgres +20 -0
  1116. synapse/storage/schema/main/delta/84/02_auth_links_index.sql +16 -0
  1117. synapse/storage/schema/main/delta/84/03_auth_links_analyze.sql.postgres +16 -0
  1118. synapse/storage/schema/main/delta/84/04_access_token_index.sql +15 -0
  1119. synapse/storage/schema/main/delta/85/01_add_suspended.sql +14 -0
  1120. synapse/storage/schema/main/delta/85/02_add_instance_names.sql +27 -0
  1121. synapse/storage/schema/main/delta/85/03_new_sequences.sql.postgres +54 -0
  1122. synapse/storage/schema/main/delta/85/04_cleanup_device_federation_outbox.sql +15 -0
  1123. synapse/storage/schema/main/delta/85/05_add_instance_names_converted_pos.sql +16 -0
  1124. synapse/storage/schema/main/delta/85/06_add_room_reports.sql +20 -0
  1125. synapse/storage/schema/main/delta/86/01_authenticate_media.sql +15 -0
  1126. synapse/storage/schema/main/delta/86/02_receipts_event_id_index.sql +15 -0
  1127. synapse/storage/schema/main/delta/87/01_sliding_sync_memberships.sql +169 -0
  1128. synapse/storage/schema/main/delta/87/02_per_connection_state.sql +81 -0
  1129. synapse/storage/schema/main/delta/87/03_current_state_index.sql +19 -0
  1130. synapse/storage/schema/main/delta/88/01_add_delayed_events.sql +43 -0
  1131. synapse/storage/schema/main/delta/88/01_custom_profile_fields.sql +15 -0
  1132. synapse/storage/schema/main/delta/88/02_fix_sliding_sync_membership_snapshots_forgotten_column.sql +21 -0
  1133. synapse/storage/schema/main/delta/88/03_add_otk_ts_added_index.sql +18 -0
  1134. synapse/storage/schema/main/delta/88/04_current_state_delta_index.sql +18 -0
  1135. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.postgres +19 -0
  1136. synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.sqlite +19 -0
  1137. synapse/storage/schema/main/delta/88/05_sliding_sync_room_config_index.sql +20 -0
  1138. synapse/storage/schema/main/delta/88/06_events_received_ts_index.sql +17 -0
  1139. synapse/storage/schema/main/delta/89/01_sliding_sync_membership_snapshot_index.sql +15 -0
  1140. synapse/storage/schema/main/delta/90/01_add_column_participant_room_memberships_table.sql +16 -0
  1141. synapse/storage/schema/main/delta/91/01_media_hash.sql +28 -0
  1142. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.postgres +16 -0
  1143. synapse/storage/schema/main/delta/92/01_remove_trigger.sql.sqlite +16 -0
  1144. synapse/storage/schema/main/delta/92/02_remove_populate_participant_bg_update.sql +17 -0
  1145. synapse/storage/schema/main/delta/92/04_ss_membership_snapshot_idx.sql +16 -0
  1146. synapse/storage/schema/main/delta/92/04_thread_subscriptions.sql +59 -0
  1147. synapse/storage/schema/main/delta/92/04_thread_subscriptions_seq.sql.postgres +19 -0
  1148. synapse/storage/schema/main/delta/92/05_fixup_max_depth_cap.sql +17 -0
  1149. synapse/storage/schema/main/delta/92/05_thread_subscriptions_comments.sql.postgres +18 -0
  1150. synapse/storage/schema/main/delta/92/06_device_federation_inbox_index.sql +16 -0
  1151. synapse/storage/schema/main/delta/92/06_threads_last_sent_stream_ordering_comments.sql.postgres +24 -0
  1152. synapse/storage/schema/main/delta/92/07_add_user_reports.sql +22 -0
  1153. synapse/storage/schema/main/delta/92/07_event_txn_id_device_id_txn_id2.sql +15 -0
  1154. synapse/storage/schema/main/delta/92/08_room_ban_redactions.sql +21 -0
  1155. synapse/storage/schema/main/delta/92/08_thread_subscriptions_seq_fixup.sql.postgres +19 -0
  1156. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql +20 -0
  1157. synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql.postgres +18 -0
  1158. synapse/storage/schema/main/delta/93/01_add_delayed_events.sql +15 -0
  1159. synapse/storage/schema/main/delta/93/02_sliding_sync_members.sql +60 -0
  1160. synapse/storage/schema/main/delta/93/03_sss_pos_last_used.sql +27 -0
  1161. synapse/storage/schema/main/full_schemas/72/full.sql.postgres +1344 -0
  1162. synapse/storage/schema/main/full_schemas/72/full.sql.sqlite +646 -0
  1163. synapse/storage/schema/state/delta/23/drop_state_index.sql +35 -0
  1164. synapse/storage/schema/state/delta/32/remove_state_indices.sql +38 -0
  1165. synapse/storage/schema/state/delta/35/add_state_index.sql +36 -0
  1166. synapse/storage/schema/state/delta/35/state.sql +41 -0
  1167. synapse/storage/schema/state/delta/35/state_dedupe.sql +36 -0
  1168. synapse/storage/schema/state/delta/47/state_group_seq.py +38 -0
  1169. synapse/storage/schema/state/delta/56/state_group_room_idx.sql +36 -0
  1170. synapse/storage/schema/state/delta/61/02state_groups_state_n_distinct.sql.postgres +34 -0
  1171. synapse/storage/schema/state/delta/70/08_state_group_edges_unique.sql +36 -0
  1172. synapse/storage/schema/state/delta/89/01_state_groups_deletion.sql +39 -0
  1173. synapse/storage/schema/state/delta/90/02_delete_unreferenced_state_groups.sql +16 -0
  1174. synapse/storage/schema/state/delta/90/03_remove_old_deletion_bg_update.sql +15 -0
  1175. synapse/storage/schema/state/full_schemas/72/full.sql.postgres +30 -0
  1176. synapse/storage/schema/state/full_schemas/72/full.sql.sqlite +20 -0
  1177. synapse/storage/types.py +183 -0
  1178. synapse/storage/util/__init__.py +20 -0
  1179. synapse/storage/util/id_generators.py +928 -0
  1180. synapse/storage/util/partial_state_events_tracker.py +194 -0
  1181. synapse/storage/util/sequence.py +315 -0
  1182. synapse/streams/__init__.py +43 -0
  1183. synapse/streams/config.py +91 -0
  1184. synapse/streams/events.py +203 -0
  1185. synapse/synapse_rust/__init__.pyi +3 -0
  1186. synapse/synapse_rust/acl.pyi +20 -0
  1187. synapse/synapse_rust/events.pyi +136 -0
  1188. synapse/synapse_rust/http_client.pyi +32 -0
  1189. synapse/synapse_rust/push.pyi +86 -0
  1190. synapse/synapse_rust/rendezvous.pyi +30 -0
  1191. synapse/synapse_rust/segmenter.pyi +1 -0
  1192. synapse/synapse_rust.abi3.so +0 -0
  1193. synapse/types/__init__.py +1600 -0
  1194. synapse/types/handlers/__init__.py +93 -0
  1195. synapse/types/handlers/policy_server.py +16 -0
  1196. synapse/types/handlers/sliding_sync.py +1004 -0
  1197. synapse/types/rest/__init__.py +25 -0
  1198. synapse/types/rest/client/__init__.py +413 -0
  1199. synapse/types/state.py +634 -0
  1200. synapse/types/storage/__init__.py +66 -0
  1201. synapse/util/__init__.py +160 -0
  1202. synapse/util/async_helpers.py +1048 -0
  1203. synapse/util/background_queue.py +142 -0
  1204. synapse/util/batching_queue.py +203 -0
  1205. synapse/util/caches/__init__.py +300 -0
  1206. synapse/util/caches/cached_call.py +143 -0
  1207. synapse/util/caches/deferred_cache.py +530 -0
  1208. synapse/util/caches/descriptors.py +692 -0
  1209. synapse/util/caches/dictionary_cache.py +346 -0
  1210. synapse/util/caches/expiringcache.py +250 -0
  1211. synapse/util/caches/lrucache.py +976 -0
  1212. synapse/util/caches/response_cache.py +323 -0
  1213. synapse/util/caches/stream_change_cache.py +370 -0
  1214. synapse/util/caches/treecache.py +189 -0
  1215. synapse/util/caches/ttlcache.py +197 -0
  1216. synapse/util/cancellation.py +63 -0
  1217. synapse/util/check_dependencies.py +335 -0
  1218. synapse/util/clock.py +592 -0
  1219. synapse/util/daemonize.py +165 -0
  1220. synapse/util/distributor.py +157 -0
  1221. synapse/util/duration.py +117 -0
  1222. synapse/util/events.py +134 -0
  1223. synapse/util/file_consumer.py +164 -0
  1224. synapse/util/frozenutils.py +57 -0
  1225. synapse/util/gai_resolver.py +178 -0
  1226. synapse/util/hash.py +38 -0
  1227. synapse/util/httpresourcetree.py +108 -0
  1228. synapse/util/iterutils.py +190 -0
  1229. synapse/util/json.py +56 -0
  1230. synapse/util/linked_list.py +156 -0
  1231. synapse/util/logcontext.py +46 -0
  1232. synapse/util/logformatter.py +28 -0
  1233. synapse/util/macaroons.py +325 -0
  1234. synapse/util/manhole.py +191 -0
  1235. synapse/util/metrics.py +339 -0
  1236. synapse/util/module_loader.py +116 -0
  1237. synapse/util/msisdn.py +51 -0
  1238. synapse/util/patch_inline_callbacks.py +250 -0
  1239. synapse/util/pydantic_models.py +63 -0
  1240. synapse/util/ratelimitutils.py +422 -0
  1241. synapse/util/retryutils.py +339 -0
  1242. synapse/util/rlimit.py +42 -0
  1243. synapse/util/rust.py +164 -0
  1244. synapse/util/sentinel.py +21 -0
  1245. synapse/util/stringutils.py +293 -0
  1246. synapse/util/task_scheduler.py +494 -0
  1247. synapse/util/templates.py +126 -0
  1248. synapse/util/threepids.py +123 -0
  1249. synapse/util/wheel_timer.py +112 -0
  1250. synapse/visibility.py +869 -0
  1251. synmark/__init__.py +47 -0
  1252. synmark/__main__.py +128 -0
  1253. synmark/suites/__init__.py +9 -0
  1254. synmark/suites/logging.py +154 -0
  1255. synmark/suites/lrucache.py +48 -0
  1256. synmark/suites/lrucache_evict.py +49 -0
  1257. sytest-blacklist +33 -0
  1258. tests/__init__.py +29 -0
  1259. tests/api/__init__.py +0 -0
  1260. tests/api/test_auth.py +548 -0
  1261. tests/api/test_errors.py +46 -0
  1262. tests/api/test_filtering.py +622 -0
  1263. tests/api/test_ratelimiting.py +505 -0
  1264. tests/api/test_urls.py +81 -0
  1265. tests/app/__init__.py +0 -0
  1266. tests/app/test_homeserver_shutdown.py +271 -0
  1267. tests/app/test_homeserver_start.py +49 -0
  1268. tests/app/test_openid_listener.py +139 -0
  1269. tests/app/test_phone_stats_home.py +248 -0
  1270. tests/appservice/__init__.py +20 -0
  1271. tests/appservice/test_api.py +253 -0
  1272. tests/appservice/test_appservice.py +259 -0
  1273. tests/appservice/test_scheduler.py +477 -0
  1274. tests/config/__init__.py +20 -0
  1275. tests/config/test___main__.py +38 -0
  1276. tests/config/test_api.py +146 -0
  1277. tests/config/test_appservice.py +48 -0
  1278. tests/config/test_background_update.py +65 -0
  1279. tests/config/test_base.py +151 -0
  1280. tests/config/test_cache.py +193 -0
  1281. tests/config/test_database.py +42 -0
  1282. tests/config/test_generate.py +72 -0
  1283. tests/config/test_load.py +322 -0
  1284. tests/config/test_oauth_delegation.py +454 -0
  1285. tests/config/test_ratelimiting.py +77 -0
  1286. tests/config/test_registration_config.py +203 -0
  1287. tests/config/test_room_directory.py +203 -0
  1288. tests/config/test_server.py +248 -0
  1289. tests/config/test_tls.py +209 -0
  1290. tests/config/test_util.py +59 -0
  1291. tests/config/test_workers.py +332 -0
  1292. tests/config/utils.py +66 -0
  1293. tests/crypto/__init__.py +20 -0
  1294. tests/crypto/test_event_signing.py +109 -0
  1295. tests/crypto/test_keyring.py +737 -0
  1296. tests/events/__init__.py +0 -0
  1297. tests/events/test_auto_accept_invites.py +827 -0
  1298. tests/events/test_presence_router.py +540 -0
  1299. tests/events/test_snapshot.py +121 -0
  1300. tests/events/test_utils.py +986 -0
  1301. tests/federation/__init__.py +0 -0
  1302. tests/federation/test_complexity.py +257 -0
  1303. tests/federation/test_federation_catch_up.py +585 -0
  1304. tests/federation/test_federation_client.py +316 -0
  1305. tests/federation/test_federation_devices.py +161 -0
  1306. tests/federation/test_federation_media.py +295 -0
  1307. tests/federation/test_federation_out_of_band_membership.py +671 -0
  1308. tests/federation/test_federation_sender.py +956 -0
  1309. tests/federation/test_federation_server.py +631 -0
  1310. tests/federation/transport/__init__.py +0 -0
  1311. tests/federation/transport/server/__init__.py +20 -0
  1312. tests/federation/transport/server/test__base.py +156 -0
  1313. tests/federation/transport/test_client.py +157 -0
  1314. tests/federation/transport/test_knocking.py +323 -0
  1315. tests/federation/transport/test_server.py +74 -0
  1316. tests/handlers/__init__.py +0 -0
  1317. tests/handlers/oidc_test_key.p8 +5 -0
  1318. tests/handlers/oidc_test_key.pub.pem +4 -0
  1319. tests/handlers/test_admin.py +361 -0
  1320. tests/handlers/test_appservice.py +1336 -0
  1321. tests/handlers/test_auth.py +248 -0
  1322. tests/handlers/test_cas.py +239 -0
  1323. tests/handlers/test_deactivate_account.py +485 -0
  1324. tests/handlers/test_device.py +665 -0
  1325. tests/handlers/test_directory.py +613 -0
  1326. tests/handlers/test_e2e_keys.py +2025 -0
  1327. tests/handlers/test_e2e_room_keys.py +569 -0
  1328. tests/handlers/test_federation.py +794 -0
  1329. tests/handlers/test_federation_event.py +1181 -0
  1330. tests/handlers/test_message.py +322 -0
  1331. tests/handlers/test_oauth_delegation.py +1314 -0
  1332. tests/handlers/test_oidc.py +1688 -0
  1333. tests/handlers/test_password_providers.py +987 -0
  1334. tests/handlers/test_presence.py +2144 -0
  1335. tests/handlers/test_profile.py +401 -0
  1336. tests/handlers/test_receipts.py +342 -0
  1337. tests/handlers/test_register.py +880 -0
  1338. tests/handlers/test_room.py +108 -0
  1339. tests/handlers/test_room_list.py +93 -0
  1340. tests/handlers/test_room_member.py +764 -0
  1341. tests/handlers/test_room_policy.py +468 -0
  1342. tests/handlers/test_room_summary.py +1248 -0
  1343. tests/handlers/test_saml.py +427 -0
  1344. tests/handlers/test_send_email.py +230 -0
  1345. tests/handlers/test_sliding_sync.py +5065 -0
  1346. tests/handlers/test_sso.py +152 -0
  1347. tests/handlers/test_stats.py +594 -0
  1348. tests/handlers/test_sync.py +1275 -0
  1349. tests/handlers/test_typing.py +557 -0
  1350. tests/handlers/test_user_directory.py +1435 -0
  1351. tests/handlers/test_worker_lock.py +126 -0
  1352. tests/http/__init__.py +196 -0
  1353. tests/http/ca.crt +19 -0
  1354. tests/http/ca.key +27 -0
  1355. tests/http/federation/__init__.py +19 -0
  1356. tests/http/federation/test_matrix_federation_agent.py +1855 -0
  1357. tests/http/federation/test_srv_resolver.py +220 -0
  1358. tests/http/server/__init__.py +20 -0
  1359. tests/http/server/_base.py +621 -0
  1360. tests/http/server.key +27 -0
  1361. tests/http/test_additional_resource.py +76 -0
  1362. tests/http/test_client.py +422 -0
  1363. tests/http/test_endpoint.py +62 -0
  1364. tests/http/test_matrixfederationclient.py +1092 -0
  1365. tests/http/test_proxy.py +75 -0
  1366. tests/http/test_proxyagent.py +1008 -0
  1367. tests/http/test_servlet.py +145 -0
  1368. tests/http/test_simple_client.py +188 -0
  1369. tests/http/test_site.py +247 -0
  1370. tests/logging/__init__.py +42 -0
  1371. tests/logging/test_loggers.py +127 -0
  1372. tests/logging/test_opentracing.py +524 -0
  1373. tests/logging/test_remote_handler.py +184 -0
  1374. tests/logging/test_terse_json.py +253 -0
  1375. tests/media/__init__.py +20 -0
  1376. tests/media/test_base.py +88 -0
  1377. tests/media/test_filepath.py +602 -0
  1378. tests/media/test_html_preview.py +565 -0
  1379. tests/media/test_media_retention.py +299 -0
  1380. tests/media/test_media_storage.py +1401 -0
  1381. tests/media/test_oembed.py +172 -0
  1382. tests/media/test_url_previewer.py +120 -0
  1383. tests/metrics/__init__.py +0 -0
  1384. tests/metrics/test_background_process_metrics.py +21 -0
  1385. tests/metrics/test_metrics.py +407 -0
  1386. tests/metrics/test_phone_home_stats.py +263 -0
  1387. tests/module_api/__init__.py +0 -0
  1388. tests/module_api/test_account_data_manager.py +171 -0
  1389. tests/module_api/test_api.py +1035 -0
  1390. tests/module_api/test_event_unsigned_addition.py +66 -0
  1391. tests/module_api/test_spamchecker.py +286 -0
  1392. tests/push/__init__.py +0 -0
  1393. tests/push/test_bulk_push_rule_evaluator.py +652 -0
  1394. tests/push/test_email.py +570 -0
  1395. tests/push/test_http.py +1247 -0
  1396. tests/push/test_presentable_names.py +238 -0
  1397. tests/push/test_push_rule_evaluator.py +1069 -0
  1398. tests/replication/__init__.py +20 -0
  1399. tests/replication/_base.py +619 -0
  1400. tests/replication/http/__init__.py +20 -0
  1401. tests/replication/http/test__base.py +113 -0
  1402. tests/replication/storage/__init__.py +20 -0
  1403. tests/replication/storage/_base.py +85 -0
  1404. tests/replication/storage/test_events.py +299 -0
  1405. tests/replication/tcp/__init__.py +19 -0
  1406. tests/replication/tcp/streams/__init__.py +19 -0
  1407. tests/replication/tcp/streams/test_account_data.py +133 -0
  1408. tests/replication/tcp/streams/test_events.py +565 -0
  1409. tests/replication/tcp/streams/test_federation.py +117 -0
  1410. tests/replication/tcp/streams/test_partial_state.py +72 -0
  1411. tests/replication/tcp/streams/test_receipts.py +110 -0
  1412. tests/replication/tcp/streams/test_thread_subscriptions.py +157 -0
  1413. tests/replication/tcp/streams/test_to_device.py +112 -0
  1414. tests/replication/tcp/streams/test_typing.py +223 -0
  1415. tests/replication/tcp/test_commands.py +50 -0
  1416. tests/replication/tcp/test_handler.py +211 -0
  1417. tests/replication/test_auth.py +120 -0
  1418. tests/replication/test_client_reader_shard.py +101 -0
  1419. tests/replication/test_federation_ack.py +88 -0
  1420. tests/replication/test_federation_sender_shard.py +352 -0
  1421. tests/replication/test_module_cache_invalidation.py +89 -0
  1422. tests/replication/test_multi_media_repo.py +496 -0
  1423. tests/replication/test_pusher_shard.py +192 -0
  1424. tests/replication/test_sharded_event_persister.py +332 -0
  1425. tests/replication/test_sharded_receipts.py +250 -0
  1426. tests/rest/__init__.py +20 -0
  1427. tests/rest/admin/__init__.py +19 -0
  1428. tests/rest/admin/test_admin.py +614 -0
  1429. tests/rest/admin/test_background_updates.py +375 -0
  1430. tests/rest/admin/test_device.py +600 -0
  1431. tests/rest/admin/test_event.py +74 -0
  1432. tests/rest/admin/test_event_reports.py +781 -0
  1433. tests/rest/admin/test_federation.py +863 -0
  1434. tests/rest/admin/test_jwks.py +106 -0
  1435. tests/rest/admin/test_media.py +1091 -0
  1436. tests/rest/admin/test_registration_tokens.py +729 -0
  1437. tests/rest/admin/test_room.py +3626 -0
  1438. tests/rest/admin/test_scheduled_tasks.py +192 -0
  1439. tests/rest/admin/test_server_notice.py +753 -0
  1440. tests/rest/admin/test_statistics.py +523 -0
  1441. tests/rest/admin/test_user.py +6061 -0
  1442. tests/rest/admin/test_username_available.py +82 -0
  1443. tests/rest/client/__init__.py +20 -0
  1444. tests/rest/client/sliding_sync/__init__.py +13 -0
  1445. tests/rest/client/sliding_sync/test_connection_tracking.py +505 -0
  1446. tests/rest/client/sliding_sync/test_extension_account_data.py +1056 -0
  1447. tests/rest/client/sliding_sync/test_extension_e2ee.py +459 -0
  1448. tests/rest/client/sliding_sync/test_extension_receipts.py +934 -0
  1449. tests/rest/client/sliding_sync/test_extension_thread_subscriptions.py +497 -0
  1450. tests/rest/client/sliding_sync/test_extension_to_device.py +294 -0
  1451. tests/rest/client/sliding_sync/test_extension_typing.py +500 -0
  1452. tests/rest/client/sliding_sync/test_extensions.py +306 -0
  1453. tests/rest/client/sliding_sync/test_lists_filters.py +1975 -0
  1454. tests/rest/client/sliding_sync/test_room_subscriptions.py +303 -0
  1455. tests/rest/client/sliding_sync/test_rooms_invites.py +528 -0
  1456. tests/rest/client/sliding_sync/test_rooms_meta.py +1338 -0
  1457. tests/rest/client/sliding_sync/test_rooms_required_state.py +2247 -0
  1458. tests/rest/client/sliding_sync/test_rooms_timeline.py +718 -0
  1459. tests/rest/client/sliding_sync/test_sliding_sync.py +1688 -0
  1460. tests/rest/client/test_account.py +1543 -0
  1461. tests/rest/client/test_account_data.py +81 -0
  1462. tests/rest/client/test_auth.py +1508 -0
  1463. tests/rest/client/test_auth_metadata.py +145 -0
  1464. tests/rest/client/test_capabilities.py +318 -0
  1465. tests/rest/client/test_consent.py +138 -0
  1466. tests/rest/client/test_delayed_events.py +553 -0
  1467. tests/rest/client/test_devices.py +634 -0
  1468. tests/rest/client/test_directory.py +249 -0
  1469. tests/rest/client/test_ephemeral_message.py +113 -0
  1470. tests/rest/client/test_events.py +165 -0
  1471. tests/rest/client/test_filter.py +124 -0
  1472. tests/rest/client/test_identity.py +67 -0
  1473. tests/rest/client/test_keys.py +516 -0
  1474. tests/rest/client/test_login.py +1881 -0
  1475. tests/rest/client/test_login_token_request.py +175 -0
  1476. tests/rest/client/test_matrixrtc.py +105 -0
  1477. tests/rest/client/test_media.py +3156 -0
  1478. tests/rest/client/test_models.py +83 -0
  1479. tests/rest/client/test_mutual_rooms.py +235 -0
  1480. tests/rest/client/test_notifications.py +231 -0
  1481. tests/rest/client/test_owned_state.py +308 -0
  1482. tests/rest/client/test_password_policy.py +186 -0
  1483. tests/rest/client/test_power_levels.py +295 -0
  1484. tests/rest/client/test_presence.py +149 -0
  1485. tests/rest/client/test_profile.py +925 -0
  1486. tests/rest/client/test_push_rule_attrs.py +510 -0
  1487. tests/rest/client/test_read_marker.py +151 -0
  1488. tests/rest/client/test_receipts.py +287 -0
  1489. tests/rest/client/test_redactions.py +657 -0
  1490. tests/rest/client/test_register.py +1314 -0
  1491. tests/rest/client/test_relations.py +1954 -0
  1492. tests/rest/client/test_rendezvous.py +468 -0
  1493. tests/rest/client/test_reporting.py +324 -0
  1494. tests/rest/client/test_retention.py +389 -0
  1495. tests/rest/client/test_rooms.py +5486 -0
  1496. tests/rest/client/test_sendtodevice.py +271 -0
  1497. tests/rest/client/test_shadow_banned.py +335 -0
  1498. tests/rest/client/test_sync.py +1147 -0
  1499. tests/rest/client/test_tags.py +161 -0
  1500. tests/rest/client/test_third_party_rules.py +1076 -0
  1501. tests/rest/client/test_thread_subscriptions.py +351 -0
  1502. tests/rest/client/test_transactions.py +204 -0
  1503. tests/rest/client/test_typing.py +114 -0
  1504. tests/rest/client/test_upgrade_room.py +433 -0
  1505. tests/rest/client/utils.py +985 -0
  1506. tests/rest/key/__init__.py +0 -0
  1507. tests/rest/key/v2/__init__.py +0 -0
  1508. tests/rest/key/v2/test_remote_key_resource.py +282 -0
  1509. tests/rest/media/__init__.py +19 -0
  1510. tests/rest/media/test_domain_blocking.py +148 -0
  1511. tests/rest/media/test_url_preview.py +1445 -0
  1512. tests/rest/synapse/__init__.py +12 -0
  1513. tests/rest/synapse/client/__init__.py +12 -0
  1514. tests/rest/synapse/client/test_federation_whitelist.py +118 -0
  1515. tests/rest/synapse/mas/__init__.py +12 -0
  1516. tests/rest/synapse/mas/_base.py +43 -0
  1517. tests/rest/synapse/mas/test_devices.py +693 -0
  1518. tests/rest/synapse/mas/test_users.py +1399 -0
  1519. tests/rest/test_health.py +35 -0
  1520. tests/rest/test_well_known.py +155 -0
  1521. tests/scripts/__init__.py +0 -0
  1522. tests/scripts/test_new_matrix_user.py +172 -0
  1523. tests/server.py +1374 -0
  1524. tests/server_notices/__init__.py +241 -0
  1525. tests/server_notices/test_consent.py +111 -0
  1526. tests/server_notices/test_resource_limits_server_notices.py +409 -0
  1527. tests/state/__init__.py +0 -0
  1528. tests/state/test_v2.py +1096 -0
  1529. tests/state/test_v21.py +506 -0
  1530. tests/storage/__init__.py +0 -0
  1531. tests/storage/databases/__init__.py +20 -0
  1532. tests/storage/databases/main/__init__.py +20 -0
  1533. tests/storage/databases/main/test_cache.py +124 -0
  1534. tests/storage/databases/main/test_deviceinbox.py +323 -0
  1535. tests/storage/databases/main/test_end_to_end_keys.py +127 -0
  1536. tests/storage/databases/main/test_events_worker.py +594 -0
  1537. tests/storage/databases/main/test_lock.py +499 -0
  1538. tests/storage/databases/main/test_metrics.py +88 -0
  1539. tests/storage/databases/main/test_receipts.py +218 -0
  1540. tests/storage/databases/main/test_room.py +192 -0
  1541. tests/storage/test__base.py +178 -0
  1542. tests/storage/test_account_data.py +186 -0
  1543. tests/storage/test_appservice.py +568 -0
  1544. tests/storage/test_background_update.py +671 -0
  1545. tests/storage/test_base.py +813 -0
  1546. tests/storage/test_cleanup_extrems.py +396 -0
  1547. tests/storage/test_client_ips.py +788 -0
  1548. tests/storage/test_database.py +288 -0
  1549. tests/storage/test_devices.py +353 -0
  1550. tests/storage/test_directory.py +74 -0
  1551. tests/storage/test_e2e_room_keys.py +87 -0
  1552. tests/storage/test_end_to_end_keys.py +120 -0
  1553. tests/storage/test_event_chain.py +826 -0
  1554. tests/storage/test_event_federation.py +1433 -0
  1555. tests/storage/test_event_push_actions.py +809 -0
  1556. tests/storage/test_events.py +591 -0
  1557. tests/storage/test_events_bg_updates.py +156 -0
  1558. tests/storage/test_id_generators.py +791 -0
  1559. tests/storage/test_invite_rule.py +171 -0
  1560. tests/storage/test_main.py +56 -0
  1561. tests/storage/test_monthly_active_users.py +500 -0
  1562. tests/storage/test_profile.py +134 -0
  1563. tests/storage/test_purge.py +459 -0
  1564. tests/storage/test_receipts.py +309 -0
  1565. tests/storage/test_redaction.py +462 -0
  1566. tests/storage/test_registration.py +277 -0
  1567. tests/storage/test_relations.py +118 -0
  1568. tests/storage/test_rollback_worker.py +132 -0
  1569. tests/storage/test_room.py +69 -0
  1570. tests/storage/test_room_search.py +383 -0
  1571. tests/storage/test_roommember.py +812 -0
  1572. tests/storage/test_sliding_sync_tables.py +5187 -0
  1573. tests/storage/test_state.py +959 -0
  1574. tests/storage/test_state_deletion.py +475 -0
  1575. tests/storage/test_stream.py +1533 -0
  1576. tests/storage/test_thread_subscriptions.py +369 -0
  1577. tests/storage/test_transactions.py +77 -0
  1578. tests/storage/test_txn_limit.py +49 -0
  1579. tests/storage/test_unsafe_locale.py +67 -0
  1580. tests/storage/test_user_directory.py +691 -0
  1581. tests/storage/test_user_filters.py +101 -0
  1582. tests/storage/util/__init__.py +20 -0
  1583. tests/storage/util/test_partial_state_events_tracker.py +181 -0
  1584. tests/synapse_rust/__init__.py +11 -0
  1585. tests/synapse_rust/test_http_client.py +225 -0
  1586. tests/test_distributor.py +74 -0
  1587. tests/test_event_auth.py +921 -0
  1588. tests/test_mau.py +347 -0
  1589. tests/test_phone_home.py +102 -0
  1590. tests/test_rust.py +11 -0
  1591. tests/test_server.py +557 -0
  1592. tests/test_state.py +902 -0
  1593. tests/test_terms_auth.py +128 -0
  1594. tests/test_types.py +201 -0
  1595. tests/test_utils/__init__.py +161 -0
  1596. tests/test_utils/event_injection.py +150 -0
  1597. tests/test_utils/html_parsers.py +59 -0
  1598. tests/test_utils/logging_setup.py +74 -0
  1599. tests/test_utils/oidc.py +370 -0
  1600. tests/test_visibility.py +712 -0
  1601. tests/types/__init__.py +0 -0
  1602. tests/types/test_init.py +51 -0
  1603. tests/types/test_state.py +627 -0
  1604. tests/unittest.py +1108 -0
  1605. tests/util/__init__.py +20 -0
  1606. tests/util/caches/__init__.py +20 -0
  1607. tests/util/caches/test_cached_call.py +168 -0
  1608. tests/util/caches/test_deferred_cache.py +317 -0
  1609. tests/util/caches/test_descriptors.py +1110 -0
  1610. tests/util/caches/test_response_cache.py +225 -0
  1611. tests/util/caches/test_ttlcache.py +90 -0
  1612. tests/util/test_async_helpers.py +808 -0
  1613. tests/util/test_background_queue.py +117 -0
  1614. tests/util/test_batching_queue.py +252 -0
  1615. tests/util/test_check_dependencies.py +243 -0
  1616. tests/util/test_dict_cache.py +130 -0
  1617. tests/util/test_events.py +118 -0
  1618. tests/util/test_expiring_cache.py +113 -0
  1619. tests/util/test_file_consumer.py +199 -0
  1620. tests/util/test_itertools.py +190 -0
  1621. tests/util/test_linearizer.py +264 -0
  1622. tests/util/test_logcontext.py +715 -0
  1623. tests/util/test_logformatter.py +44 -0
  1624. tests/util/test_lrucache.py +479 -0
  1625. tests/util/test_macaroons.py +126 -0
  1626. tests/util/test_mutable_overlay_mapping.py +189 -0
  1627. tests/util/test_ratelimitutils.py +146 -0
  1628. tests/util/test_retryutils.py +314 -0
  1629. tests/util/test_rwlock.py +401 -0
  1630. tests/util/test_stream_change_cache.py +304 -0
  1631. tests/util/test_stringutils.py +86 -0
  1632. tests/util/test_task_scheduler.py +227 -0
  1633. tests/util/test_threepids.py +55 -0
  1634. tests/util/test_treecache.py +93 -0
  1635. tests/util/test_wheel_timer.py +82 -0
  1636. tests/utils.py +342 -0
@@ -0,0 +1,2482 @@
1
+ #
2
+ # This file is licensed under the Affero General Public License (AGPL) version 3.
3
+ #
4
+ # Copyright 2019 - 2020 The Matrix.org Foundation C.I.C.
5
+ # Copyright 2017 Vector Creations Ltd
6
+ # Copyright 2014 - 2016 OpenMarket Ltd
7
+ # Copyright (C) 2023 New Vector, Ltd
8
+ #
9
+ # This program is free software: you can redistribute it and/or modify
10
+ # it under the terms of the GNU Affero General Public License as
11
+ # published by the Free Software Foundation, either version 3 of the
12
+ # License, or (at your option) any later version.
13
+ #
14
+ # See the GNU Affero General Public License for more details:
15
+ # <https://www.gnu.org/licenses/agpl-3.0.html>.
16
+ #
17
+ # Originally licensed under the Apache License, Version 2.0:
18
+ # <http://www.apache.org/licenses/LICENSE-2.0>.
19
+ #
20
+ # [This file includes modifications made by New Vector Limited]
21
+ #
22
+ #
23
+ import logging
24
+ import time
25
+ import unicodedata
26
+ import urllib.parse
27
+ from binascii import crc32
28
+ from http import HTTPStatus
29
+ from typing import (
30
+ TYPE_CHECKING,
31
+ Any,
32
+ Awaitable,
33
+ Callable,
34
+ Iterable,
35
+ Mapping,
36
+ cast,
37
+ )
38
+
39
+ import attr
40
+ import bcrypt
41
+ import unpaddedbase64
42
+ from prometheus_client import Counter
43
+
44
+ from twisted.internet.defer import CancelledError
45
+ from twisted.web.server import Request
46
+
47
+ from synapse.api.constants import LoginType
48
+ from synapse.api.errors import (
49
+ AuthError,
50
+ Codes,
51
+ InteractiveAuthIncompleteError,
52
+ LoginError,
53
+ NotFoundError,
54
+ StoreError,
55
+ SynapseError,
56
+ )
57
+ from synapse.api.ratelimiting import Ratelimiter
58
+ from synapse.handlers.ui_auth import (
59
+ INTERACTIVE_AUTH_CHECKERS,
60
+ UIAuthSessionDataConstants,
61
+ )
62
+ from synapse.handlers.ui_auth.checkers import UserInteractiveAuthChecker
63
+ from synapse.http import get_request_user_agent
64
+ from synapse.http.server import finish_request, respond_with_html
65
+ from synapse.http.site import SynapseRequest
66
+ from synapse.logging.context import defer_to_thread
67
+ from synapse.metrics import SERVER_NAME_LABEL
68
+ from synapse.metrics.background_process_metrics import run_as_background_process
69
+ from synapse.storage.databases.main.registration import (
70
+ LoginTokenExpired,
71
+ LoginTokenLookupResult,
72
+ LoginTokenReused,
73
+ )
74
+ from synapse.types import JsonDict, Requester, StrCollection, UserID
75
+ from synapse.util import stringutils as stringutils
76
+ from synapse.util.async_helpers import delay_cancellation, maybe_awaitable
77
+ from synapse.util.duration import Duration
78
+ from synapse.util.msisdn import phone_number_to_msisdn
79
+ from synapse.util.stringutils import base62_encode
80
+ from synapse.util.threepids import canonicalise_email
81
+
82
+ if TYPE_CHECKING:
83
+ from synapse.module_api import ModuleApi
84
+ from synapse.rest.client.login import LoginResponse
85
+ from synapse.server import HomeServer
86
+
87
+ logger = logging.getLogger(__name__)
88
+
89
+ INVALID_USERNAME_OR_PASSWORD = "Invalid username or password"
90
+
91
+ invalid_login_token_counter = Counter(
92
+ "synapse_user_login_invalid_login_tokens",
93
+ "Counts the number of rejected m.login.token on /login",
94
+ labelnames=["reason", SERVER_NAME_LABEL],
95
+ )
96
+
97
+
98
+ def convert_client_dict_legacy_fields_to_identifier(
99
+ submission: JsonDict,
100
+ ) -> dict[str, str]:
101
+ """
102
+ Convert a legacy-formatted login submission to an identifier dict.
103
+
104
+ Legacy login submissions (used in both login and user-interactive authentication)
105
+ provide user-identifying information at the top-level instead.
106
+
107
+ These are now deprecated and replaced with identifiers:
108
+ https://matrix.org/docs/spec/client_server/r0.6.1#identifier-types
109
+
110
+ Args:
111
+ submission: The client dict to convert
112
+
113
+ Returns:
114
+ The matching identifier dict
115
+
116
+ Raises:
117
+ SynapseError: If the format of the client dict is invalid
118
+ """
119
+ identifier = submission.get("identifier", {})
120
+
121
+ # Generate an m.id.user identifier if "user" parameter is present
122
+ user = submission.get("user")
123
+ if user:
124
+ identifier = {"type": "m.id.user", "user": user}
125
+
126
+ # Generate an m.id.thirdparty identifier if "medium" and "address" parameters are present
127
+ medium = submission.get("medium")
128
+ address = submission.get("address")
129
+ if medium and address:
130
+ identifier = {
131
+ "type": "m.id.thirdparty",
132
+ "medium": medium,
133
+ "address": address,
134
+ }
135
+
136
+ # We've converted valid, legacy login submissions to an identifier. If the
137
+ # submission still doesn't have an identifier, it's invalid
138
+ if not identifier:
139
+ raise SynapseError(400, "Invalid login submission", Codes.INVALID_PARAM)
140
+
141
+ # Ensure the identifier has a type
142
+ if "type" not in identifier:
143
+ raise SynapseError(
144
+ 400,
145
+ "'identifier' dict has no key 'type'",
146
+ errcode=Codes.MISSING_PARAM,
147
+ )
148
+
149
+ return identifier
150
+
151
+
152
+ def login_id_phone_to_thirdparty(identifier: JsonDict) -> dict[str, str]:
153
+ """
154
+ Convert a phone login identifier type to a generic threepid identifier.
155
+
156
+ Args:
157
+ identifier: Login identifier dict of type 'm.id.phone'
158
+
159
+ Returns:
160
+ An equivalent m.id.thirdparty identifier dict
161
+ """
162
+ if "country" not in identifier or (
163
+ # The specification requires a "phone" field, while Synapse used to require a "number"
164
+ # field. Accept both for backwards compatibility.
165
+ "phone" not in identifier and "number" not in identifier
166
+ ):
167
+ raise SynapseError(
168
+ 400, "Invalid phone-type identifier", errcode=Codes.INVALID_PARAM
169
+ )
170
+
171
+ # Accept both "phone" and "number" as valid keys in m.id.phone
172
+ phone_number = identifier.get("phone", identifier["number"])
173
+ assert isinstance(phone_number, str)
174
+
175
+ # Convert user-provided phone number to a consistent representation
176
+ msisdn = phone_number_to_msisdn(identifier["country"], phone_number)
177
+
178
+ return {
179
+ "type": "m.id.thirdparty",
180
+ "medium": "msisdn",
181
+ "address": msisdn,
182
+ }
183
+
184
+
185
+ @attr.s(slots=True, auto_attribs=True)
186
+ class SsoLoginExtraAttributes:
187
+ """Data we track about SAML2 sessions"""
188
+
189
+ # time the session was created, in milliseconds
190
+ creation_time: int
191
+ extra_attributes: JsonDict
192
+
193
+
194
+ class AuthHandler:
195
+ SESSION_EXPIRE_MS = 48 * 60 * 60 * 1000
196
+
197
+ def __init__(self, hs: "HomeServer"):
198
+ self.server_name = hs.hostname
199
+ self.store = hs.get_datastores().main
200
+ self.auth = hs.get_auth()
201
+ self.auth_blocking = hs.get_auth_blocking()
202
+ self.clock = hs.get_clock()
203
+ self.checkers: dict[str, UserInteractiveAuthChecker] = {}
204
+ for auth_checker_class in INTERACTIVE_AUTH_CHECKERS:
205
+ inst = auth_checker_class(hs)
206
+ if inst.is_enabled():
207
+ self.checkers[inst.AUTH_TYPE] = inst
208
+
209
+ self.bcrypt_rounds = hs.config.registration.bcrypt_rounds
210
+
211
+ self.password_auth_provider = hs.get_password_auth_provider()
212
+
213
+ self.hs = hs # FIXME better possibility to access registrationHandler later?
214
+ self.macaroon_gen = hs.get_macaroon_generator()
215
+ self._password_enabled_for_login = hs.config.auth.password_enabled_for_login
216
+ self._password_enabled_for_reauth = hs.config.auth.password_enabled_for_reauth
217
+ self._password_localdb_enabled = hs.config.auth.password_localdb_enabled
218
+ self._third_party_rules = hs.get_module_api_callbacks().third_party_event_rules
219
+ self._account_validity_handler = hs.get_account_validity_handler()
220
+ self._pusher_pool = hs.get_pusherpool()
221
+
222
+ # Ratelimiter for failed auth during UIA. Uses same ratelimit config
223
+ # as per `rc_login.failed_attempts`.
224
+ self._failed_uia_attempts_ratelimiter = Ratelimiter(
225
+ store=self.store,
226
+ clock=self.clock,
227
+ cfg=self.hs.config.ratelimiting.rc_login_failed_attempts,
228
+ )
229
+
230
+ # The number of seconds to keep a UI auth session active.
231
+ self._ui_auth_session_timeout = hs.config.auth.ui_auth_session_timeout
232
+
233
+ # Ratelimiter for failed /login attempts
234
+ self._failed_login_attempts_ratelimiter = Ratelimiter(
235
+ store=self.store,
236
+ clock=hs.get_clock(),
237
+ cfg=self.hs.config.ratelimiting.rc_login_failed_attempts,
238
+ )
239
+
240
+ self._clock = self.hs.get_clock()
241
+
242
+ # Expire old UI auth sessions after a period of time.
243
+ if hs.config.worker.run_background_tasks:
244
+ self._clock.looping_call(
245
+ run_as_background_process,
246
+ Duration(minutes=5),
247
+ "expire_old_sessions",
248
+ self.server_name,
249
+ self._expire_old_sessions,
250
+ )
251
+
252
+ # Load the SSO HTML templates.
253
+
254
+ # The following template is shown to the user during a client login via SSO,
255
+ # after the SSO completes and before redirecting them back to their client.
256
+ # It notifies the user they are about to give access to their matrix account
257
+ # to the client.
258
+ self._sso_redirect_confirm_template = (
259
+ hs.config.sso.sso_redirect_confirm_template
260
+ )
261
+
262
+ # The following template is shown during user interactive authentication
263
+ # in the fallback auth scenario. It notifies the user that they are
264
+ # authenticating for an operation to occur on their account.
265
+ self._sso_auth_confirm_template = hs.config.sso.sso_auth_confirm_template
266
+
267
+ # The following template is shown during the SSO authentication process if
268
+ # the account is deactivated.
269
+ self._sso_account_deactivated_template = (
270
+ hs.config.sso.sso_account_deactivated_template
271
+ )
272
+
273
+ # cast to tuple for use with str.startswith
274
+ self._whitelisted_sso_clients = tuple(hs.config.sso.sso_client_whitelist)
275
+
276
+ # A mapping of user ID to extra attributes to include in the login
277
+ # response.
278
+ self._extra_attributes: dict[str, SsoLoginExtraAttributes] = {}
279
+
280
+ self._auth_delegation_enabled = (
281
+ hs.config.mas.enabled or hs.config.experimental.msc3861.enabled
282
+ )
283
+
284
+ async def validate_user_via_ui_auth(
285
+ self,
286
+ requester: Requester,
287
+ request: SynapseRequest,
288
+ request_body: dict[str, Any],
289
+ description: str,
290
+ can_skip_ui_auth: bool = False,
291
+ ) -> tuple[dict, str | None]:
292
+ """
293
+ Checks that the user is who they claim to be, via a UI auth.
294
+
295
+ This is used for things like device deletion and password reset where
296
+ the user already has a valid access token, but we want to double-check
297
+ that it isn't stolen by re-authenticating them.
298
+
299
+ Args:
300
+ requester: The user making the request, according to the access token.
301
+
302
+ request: The request sent by the client.
303
+
304
+ request_body: The body of the request sent by the client
305
+
306
+ description: A human readable string to be displayed to the user that
307
+ describes the operation happening on their account.
308
+
309
+ can_skip_ui_auth: True if the UI auth session timeout applies this
310
+ action. Should be set to False for any "dangerous"
311
+ actions (e.g. deactivating an account).
312
+
313
+ Returns:
314
+ A tuple of (params, session_id).
315
+
316
+ 'params' contains the parameters for this request (which may
317
+ have been given only in a previous call).
318
+
319
+ 'session_id' is the ID of this session, either passed in by the
320
+ client or assigned by this call. This is None if UI auth was
321
+ skipped (by re-using a previous validation).
322
+
323
+ Raises:
324
+ InteractiveAuthIncompleteError if the client has not yet completed
325
+ any of the permitted login flows
326
+
327
+ AuthError if the client has completed a login flow, and it gives
328
+ a different user to `requester`
329
+
330
+ LimitExceededError if the ratelimiter's failed request count for this
331
+ user is too high to proceed
332
+ """
333
+ if self._auth_delegation_enabled:
334
+ raise SynapseError(
335
+ HTTPStatus.INTERNAL_SERVER_ERROR, "UIA shouldn't be used with MSC3861"
336
+ )
337
+
338
+ if not requester.access_token_id:
339
+ raise ValueError("Cannot validate a user without an access token")
340
+ if can_skip_ui_auth and self._ui_auth_session_timeout:
341
+ last_validated = await self.store.get_access_token_last_validated(
342
+ requester.access_token_id
343
+ )
344
+ if self.clock.time_msec() - last_validated < self._ui_auth_session_timeout:
345
+ # Return the input parameters, minus the auth key, which matches
346
+ # the logic in check_ui_auth.
347
+ request_body.pop("auth", None)
348
+ return request_body, None
349
+
350
+ requester_user_id = requester.user.to_string()
351
+
352
+ # Check if we should be ratelimited due to too many previous failed attempts
353
+ await self._failed_uia_attempts_ratelimiter.ratelimit(requester, update=False)
354
+
355
+ # build a list of supported flows
356
+ supported_ui_auth_types = await self._get_available_ui_auth_types(
357
+ requester.user
358
+ )
359
+ flows = [[login_type] for login_type in supported_ui_auth_types]
360
+
361
+ def get_new_session_data() -> JsonDict:
362
+ return {UIAuthSessionDataConstants.REQUEST_USER_ID: requester_user_id}
363
+
364
+ try:
365
+ result, params, session_id = await self.check_ui_auth(
366
+ flows,
367
+ request,
368
+ request_body,
369
+ description,
370
+ get_new_session_data,
371
+ )
372
+ except LoginError:
373
+ # Update the ratelimiter to say we failed (`can_do_action` doesn't raise).
374
+ await self._failed_uia_attempts_ratelimiter.can_do_action(
375
+ requester,
376
+ )
377
+ raise
378
+
379
+ # find the completed login type
380
+ for login_type in supported_ui_auth_types:
381
+ if login_type not in result:
382
+ continue
383
+
384
+ validated_user_id = result[login_type]
385
+ break
386
+ else:
387
+ # this can't happen
388
+ raise Exception("check_auth returned True but no successful login type")
389
+
390
+ # check that the UI auth matched the access token
391
+ if validated_user_id != requester_user_id:
392
+ raise AuthError(403, "Invalid auth")
393
+
394
+ # Note that the access token has been validated.
395
+ await self.store.update_access_token_last_validated(requester.access_token_id)
396
+
397
+ return params, session_id
398
+
399
+ async def _get_available_ui_auth_types(self, user: UserID) -> Iterable[str]:
400
+ """Get a list of the user-interactive authentication types this user can use."""
401
+
402
+ ui_auth_types = set()
403
+
404
+ # if the HS supports password auth, and the user has a non-null password, we
405
+ # support password auth
406
+ if self._password_localdb_enabled and self._password_enabled_for_reauth:
407
+ lookupres = await self._find_user_id_and_pwd_hash(user.to_string())
408
+ if lookupres:
409
+ _, password_hash = lookupres
410
+ if password_hash:
411
+ ui_auth_types.add(LoginType.PASSWORD)
412
+
413
+ # also allow auth from password providers
414
+ for t in self.password_auth_provider.get_supported_login_types().keys():
415
+ if t == LoginType.PASSWORD and not self._password_enabled_for_reauth:
416
+ continue
417
+ ui_auth_types.add(t)
418
+
419
+ # if sso is enabled, allow the user to log in via SSO iff they have a mapping
420
+ # from sso to mxid.
421
+ if await self.hs.get_sso_handler().get_identity_providers_for_user(
422
+ user.to_string()
423
+ ):
424
+ ui_auth_types.add(LoginType.SSO)
425
+
426
+ return ui_auth_types
427
+
428
+ def get_enabled_auth_types(self) -> Iterable[str]:
429
+ """Return the enabled user-interactive authentication types
430
+
431
+ Returns the UI-Auth types which are supported by the homeserver's current
432
+ config.
433
+ """
434
+ return self.checkers.keys()
435
+
436
+ async def check_ui_auth(
437
+ self,
438
+ flows: list[list[str]],
439
+ request: SynapseRequest,
440
+ clientdict: dict[str, Any],
441
+ description: str,
442
+ get_new_session_data: Callable[[], JsonDict] | None = None,
443
+ ) -> tuple[dict, dict, str]:
444
+ """
445
+ Takes a dictionary sent by the client in the login / registration
446
+ protocol and handles the User-Interactive Auth flow.
447
+
448
+ If no auth flows have been completed successfully, raises an
449
+ InteractiveAuthIncompleteError. To handle this, you can use
450
+ synapse.rest.client._base.interactive_auth_handler as a
451
+ decorator.
452
+
453
+ Args:
454
+ flows: A list of login flows. Each flow is an ordered list of
455
+ strings representing auth-types. At least one full
456
+ flow must be completed in order for auth to be successful.
457
+
458
+ request: The request sent by the client.
459
+
460
+ clientdict: The dictionary from the client root level, not the
461
+ 'auth' key: this method prompts for auth if none is sent.
462
+
463
+ description: A human readable string to be displayed to the user that
464
+ describes the operation happening on their account.
465
+
466
+ get_new_session_data:
467
+ an optional callback which will be called when starting a new session.
468
+ it should return data to be stored as part of the session.
469
+
470
+ The keys of the returned data should be entries in
471
+ UIAuthSessionDataConstants.
472
+
473
+ Returns:
474
+ A tuple of (creds, params, session_id).
475
+
476
+ 'creds' contains the authenticated credentials of each stage.
477
+
478
+ 'params' contains the parameters for this request (which may
479
+ have been given only in a previous call).
480
+
481
+ 'session_id' is the ID of this session, either passed in by the
482
+ client or assigned by this call
483
+
484
+ Raises:
485
+ InteractiveAuthIncompleteError if the client has not yet completed
486
+ all the stages in any of the permitted flows.
487
+ """
488
+
489
+ sid: str | None = None
490
+ authdict = clientdict.pop("auth", {})
491
+ if "session" in authdict:
492
+ sid = authdict["session"]
493
+
494
+ # Convert the URI and method to strings.
495
+ uri = request.uri.decode("utf-8")
496
+ method = request.method.decode("utf-8")
497
+
498
+ # If there's no session ID, create a new session.
499
+ if not sid:
500
+ new_session_data = get_new_session_data() if get_new_session_data else {}
501
+
502
+ session = await self.store.create_ui_auth_session(
503
+ clientdict, uri, method, description
504
+ )
505
+
506
+ for k, v in new_session_data.items():
507
+ await self.set_session_data(session.session_id, k, v)
508
+
509
+ else:
510
+ try:
511
+ session = await self.store.get_ui_auth_session(sid)
512
+ except StoreError:
513
+ raise SynapseError(400, "Unknown session ID: %s" % (sid,))
514
+
515
+ # If the client provides parameters, update what is persisted,
516
+ # otherwise use whatever was last provided.
517
+ #
518
+ # This was designed to allow the client to omit the parameters
519
+ # and just supply the session in subsequent calls so it split
520
+ # auth between devices by just sharing the session, (eg. so you
521
+ # could continue registration from your phone having clicked the
522
+ # email auth link on there). It's probably too open to abuse
523
+ # because it lets unauthenticated clients store arbitrary objects
524
+ # on a homeserver.
525
+ #
526
+ # Revisit: Assuming the REST APIs do sensible validation, the data
527
+ # isn't arbitrary.
528
+ #
529
+ # Note that the registration endpoint explicitly removes the
530
+ # "initial_device_display_name" parameter if it is provided
531
+ # without a "password" parameter. See the changes to
532
+ # synapse.rest.client.register.RegisterRestServlet.on_POST
533
+ # in commit 544722bad23fc31056b9240189c3cbbbf0ffd3f9.
534
+ if not clientdict:
535
+ clientdict = session.clientdict
536
+
537
+ # Ensure that the queried operation does not vary between stages of
538
+ # the UI authentication session. This is done by generating a stable
539
+ # comparator and storing it during the initial query. Subsequent
540
+ # queries ensure that this comparator has not changed.
541
+ #
542
+ # The comparator is based on the requested URI and HTTP method. The
543
+ # client dict (minus the auth dict) should also be checked, but some
544
+ # clients are not spec compliant, just warn for now if the client
545
+ # dict changes.
546
+ if (session.uri, session.method) != (uri, method):
547
+ raise SynapseError(
548
+ 403,
549
+ "Requested operation has changed during the UI authentication session.",
550
+ )
551
+
552
+ if session.clientdict != clientdict:
553
+ logger.warning(
554
+ "Requested operation has changed during the UI "
555
+ "authentication session. A future version of Synapse "
556
+ "will remove this capability."
557
+ )
558
+
559
+ # For backwards compatibility, changes to the client dict are
560
+ # persisted as clients modify them throughout their user interactive
561
+ # authentication flow.
562
+ await self.store.set_ui_auth_clientdict(sid, clientdict)
563
+
564
+ user_agent = get_request_user_agent(request)
565
+ clientip = request.getClientAddress().host
566
+
567
+ await self.store.add_user_agent_ip_to_ui_auth_session(
568
+ session.session_id, user_agent, clientip
569
+ )
570
+
571
+ if not authdict:
572
+ raise InteractiveAuthIncompleteError(
573
+ session.session_id, self._auth_dict_for_flows(flows, session.session_id)
574
+ )
575
+
576
+ # check auth type currently being presented
577
+ errordict: dict[str, Any] = {}
578
+ if "type" in authdict:
579
+ login_type: str = authdict["type"]
580
+ try:
581
+ result = await self._check_auth_dict(authdict, clientip)
582
+ if result:
583
+ await self.store.mark_ui_auth_stage_complete(
584
+ session.session_id, login_type, result
585
+ )
586
+ except LoginError as e:
587
+ # this step failed. Merge the error dict into the response
588
+ # so that the client can have another go.
589
+ errordict = e.error_dict(self.hs.config)
590
+
591
+ creds = await self.store.get_completed_ui_auth_stages(session.session_id)
592
+ for f in flows:
593
+ # If all the required credentials have been supplied, the user has
594
+ # successfully completed the UI auth process!
595
+ if len(set(f) - set(creds)) == 0:
596
+ # it's very useful to know what args are stored, but this can
597
+ # include the password in the case of registering, so only log
598
+ # the keys (confusingly, clientdict may contain a password
599
+ # param, creds is just what the user authed as for UI auth
600
+ # and is not sensitive).
601
+ logger.info(
602
+ "Auth completed with creds: %r. Client dict has keys: %r",
603
+ creds,
604
+ list(clientdict),
605
+ )
606
+
607
+ return creds, clientdict, session.session_id
608
+
609
+ ret = self._auth_dict_for_flows(flows, session.session_id)
610
+ ret["completed"] = list(creds)
611
+ ret.update(errordict)
612
+ raise InteractiveAuthIncompleteError(session.session_id, ret)
613
+
614
+ async def add_oob_auth(
615
+ self, stagetype: str, authdict: dict[str, Any], clientip: str
616
+ ) -> None:
617
+ """
618
+ Adds the result of out-of-band authentication into an existing auth
619
+ session. Currently used for adding the result of fallback auth.
620
+
621
+ Raises:
622
+ LoginError if the stagetype is unknown or the session is missing.
623
+ LoginError is raised by check_auth if authentication fails.
624
+ """
625
+ if stagetype not in self.checkers:
626
+ raise LoginError(
627
+ 400, f"Unknown UIA stage type: {stagetype}", Codes.INVALID_PARAM
628
+ )
629
+ if "session" not in authdict:
630
+ raise LoginError(400, "Missing session ID", Codes.MISSING_PARAM)
631
+
632
+ # If authentication fails a LoginError is raised. Otherwise, store
633
+ # the successful result.
634
+ result = await self.checkers[stagetype].check_auth(authdict, clientip)
635
+ await self.store.mark_ui_auth_stage_complete(
636
+ authdict["session"], stagetype, result
637
+ )
638
+
639
+ def get_session_id(self, clientdict: dict[str, Any]) -> str | None:
640
+ """
641
+ Gets the session ID for a client given the client dictionary
642
+
643
+ Args:
644
+ clientdict: The dictionary sent by the client in the request
645
+
646
+ Returns:
647
+ The string session ID the client sent. If the client did
648
+ not send a session ID, returns None.
649
+ """
650
+ sid = None
651
+ if clientdict and "auth" in clientdict:
652
+ authdict = clientdict["auth"]
653
+ if "session" in authdict:
654
+ sid = authdict["session"]
655
+ return sid
656
+
657
+ async def set_session_data(self, session_id: str, key: str, value: Any) -> None:
658
+ """
659
+ Store a key-value pair into the sessions data associated with this
660
+ request. This data is stored server-side and cannot be modified by
661
+ the client.
662
+
663
+ Args:
664
+ session_id: The ID of this session as returned from check_auth
665
+ key: The key to store the data under. An entry from
666
+ UIAuthSessionDataConstants.
667
+ value: The data to store
668
+ """
669
+ try:
670
+ await self.store.set_ui_auth_session_data(session_id, key, value)
671
+ except StoreError:
672
+ raise SynapseError(400, "Unknown session ID: %s" % (session_id,))
673
+
674
+ async def get_session_data(
675
+ self, session_id: str, key: str, default: Any | None = None
676
+ ) -> Any:
677
+ """
678
+ Retrieve data stored with set_session_data
679
+
680
+ Args:
681
+ session_id: The ID of this session as returned from check_auth
682
+ key: The key the data was stored under. An entry from
683
+ UIAuthSessionDataConstants.
684
+ default: Value to return if the key has not been set
685
+ """
686
+ try:
687
+ return await self.store.get_ui_auth_session_data(session_id, key, default)
688
+ except StoreError:
689
+ raise SynapseError(400, "Unknown session ID: %s" % (session_id,))
690
+
691
+ async def _expire_old_sessions(self) -> None:
692
+ """
693
+ Invalidate any user interactive authentication sessions that have expired.
694
+ """
695
+ now = self._clock.time_msec()
696
+ expiration_time = now - self.SESSION_EXPIRE_MS
697
+ await self.store.delete_old_ui_auth_sessions(expiration_time)
698
+
699
+ async def _check_auth_dict(
700
+ self, authdict: dict[str, Any], clientip: str
701
+ ) -> dict[str, Any] | str:
702
+ """Attempt to validate the auth dict provided by a client
703
+
704
+ Args:
705
+ authdict: auth dict provided by the client
706
+ clientip: IP address of the client
707
+
708
+ Returns:
709
+ Result of the stage verification.
710
+
711
+ Raises:
712
+ StoreError if there was a problem accessing the database
713
+ SynapseError if there was a problem with the request
714
+ LoginError if there was an authentication problem.
715
+ """
716
+ login_type = authdict["type"]
717
+ checker = self.checkers.get(login_type)
718
+ if checker is not None:
719
+ res = await checker.check_auth(authdict, clientip=clientip)
720
+ return res
721
+
722
+ # fall back to the v1 login flow
723
+ canonical_id, _ = await self.validate_login(authdict, is_reauth=True)
724
+ return canonical_id
725
+
726
+ def _get_params_recaptcha(self) -> dict:
727
+ return {"public_key": self.hs.config.captcha.recaptcha_public_key}
728
+
729
+ def _get_params_terms(self) -> dict:
730
+ return {
731
+ "policies": {
732
+ "privacy_policy": {
733
+ "version": self.hs.config.consent.user_consent_version,
734
+ "en": {
735
+ "name": self.hs.config.consent.user_consent_policy_name,
736
+ "url": "%s_matrix/consent?v=%s"
737
+ % (
738
+ self.hs.config.server.public_baseurl,
739
+ self.hs.config.consent.user_consent_version,
740
+ ),
741
+ },
742
+ }
743
+ }
744
+ }
745
+
746
+ def _auth_dict_for_flows(
747
+ self,
748
+ flows: list[list[str]],
749
+ session_id: str,
750
+ ) -> dict[str, Any]:
751
+ public_flows = []
752
+ for f in flows:
753
+ public_flows.append(f)
754
+
755
+ get_params = {
756
+ LoginType.RECAPTCHA: self._get_params_recaptcha,
757
+ LoginType.TERMS: self._get_params_terms,
758
+ }
759
+
760
+ params: dict[str, Any] = {}
761
+
762
+ for f in public_flows:
763
+ for stage in f:
764
+ if stage in get_params and stage not in params:
765
+ params[stage] = get_params[stage]()
766
+
767
+ return {
768
+ "session": session_id,
769
+ "flows": [{"stages": f} for f in public_flows],
770
+ "params": params,
771
+ }
772
+
773
+ async def refresh_token(
774
+ self,
775
+ refresh_token: str,
776
+ access_token_valid_until_ms: int | None,
777
+ refresh_token_valid_until_ms: int | None,
778
+ ) -> tuple[str, str, int | None]:
779
+ """
780
+ Consumes a refresh token and generate both a new access token and a new refresh token from it.
781
+
782
+ The consumed refresh token is considered invalid after the first use of the new access token or the new refresh token.
783
+
784
+ The lifetime of both the access token and refresh token will be capped so that they
785
+ do not exceed the session's ultimate expiry time, if applicable.
786
+
787
+ Args:
788
+ refresh_token: The token to consume.
789
+ access_token_valid_until_ms: The expiration timestamp of the new access token.
790
+ None if the access token does not expire.
791
+ refresh_token_valid_until_ms: The expiration timestamp of the new refresh token.
792
+ None if the refresh token does not expire.
793
+ Returns:
794
+ A tuple containing:
795
+ - the new access token
796
+ - the new refresh token
797
+ - the actual expiry time of the access token, which may be earlier than
798
+ `access_token_valid_until_ms`.
799
+ """
800
+
801
+ # Verify the token signature first before looking up the token
802
+ if not self._verify_refresh_token(refresh_token):
803
+ raise SynapseError(
804
+ HTTPStatus.UNAUTHORIZED, "invalid refresh token", Codes.UNKNOWN_TOKEN
805
+ )
806
+
807
+ existing_token = await self.store.lookup_refresh_token(refresh_token)
808
+ if existing_token is None:
809
+ raise SynapseError(
810
+ HTTPStatus.UNAUTHORIZED,
811
+ "refresh token does not exist",
812
+ Codes.UNKNOWN_TOKEN,
813
+ )
814
+
815
+ if (
816
+ existing_token.has_next_access_token_been_used
817
+ or existing_token.has_next_refresh_token_been_refreshed
818
+ ):
819
+ raise SynapseError(
820
+ HTTPStatus.FORBIDDEN,
821
+ "refresh token isn't valid anymore",
822
+ Codes.FORBIDDEN,
823
+ )
824
+
825
+ now_ms = self._clock.time_msec()
826
+
827
+ if existing_token.expiry_ts is not None and existing_token.expiry_ts < now_ms:
828
+ raise SynapseError(
829
+ HTTPStatus.FORBIDDEN,
830
+ "The supplied refresh token has expired",
831
+ Codes.FORBIDDEN,
832
+ )
833
+
834
+ if existing_token.ultimate_session_expiry_ts is not None:
835
+ # This session has a bounded lifetime, even across refreshes.
836
+
837
+ if access_token_valid_until_ms is not None:
838
+ access_token_valid_until_ms = min(
839
+ access_token_valid_until_ms,
840
+ existing_token.ultimate_session_expiry_ts,
841
+ )
842
+ else:
843
+ access_token_valid_until_ms = existing_token.ultimate_session_expiry_ts
844
+
845
+ if refresh_token_valid_until_ms is not None:
846
+ refresh_token_valid_until_ms = min(
847
+ refresh_token_valid_until_ms,
848
+ existing_token.ultimate_session_expiry_ts,
849
+ )
850
+ else:
851
+ refresh_token_valid_until_ms = existing_token.ultimate_session_expiry_ts
852
+ if existing_token.ultimate_session_expiry_ts < now_ms:
853
+ raise SynapseError(
854
+ HTTPStatus.FORBIDDEN,
855
+ "The session has expired and can no longer be refreshed",
856
+ Codes.FORBIDDEN,
857
+ )
858
+
859
+ (
860
+ new_refresh_token,
861
+ new_refresh_token_id,
862
+ ) = await self.create_refresh_token_for_user_id(
863
+ user_id=existing_token.user_id,
864
+ device_id=existing_token.device_id,
865
+ expiry_ts=refresh_token_valid_until_ms,
866
+ ultimate_session_expiry_ts=existing_token.ultimate_session_expiry_ts,
867
+ )
868
+ access_token = await self.create_access_token_for_user_id(
869
+ user_id=existing_token.user_id,
870
+ device_id=existing_token.device_id,
871
+ valid_until_ms=access_token_valid_until_ms,
872
+ refresh_token_id=new_refresh_token_id,
873
+ )
874
+ await self.store.replace_refresh_token(
875
+ existing_token.token_id, new_refresh_token_id
876
+ )
877
+ return access_token, new_refresh_token, access_token_valid_until_ms
878
+
879
+ def _verify_refresh_token(self, token: str) -> bool:
880
+ """
881
+ Verifies the shape of a refresh token.
882
+
883
+ Args:
884
+ token: The refresh token to verify
885
+
886
+ Returns:
887
+ Whether the token has the right shape
888
+ """
889
+ parts = token.split("_", maxsplit=4)
890
+ if len(parts) != 4:
891
+ return False
892
+
893
+ type, localpart, rand, crc = parts
894
+
895
+ # Refresh tokens are prefixed by "syr_", let's check that
896
+ if type != "syr":
897
+ return False
898
+
899
+ # Check the CRC
900
+ base = f"{type}_{localpart}_{rand}"
901
+ expected_crc = base62_encode(crc32(base.encode("ascii")), minwidth=6)
902
+ if crc != expected_crc:
903
+ return False
904
+
905
+ return True
906
+
907
+ async def create_login_token_for_user_id(
908
+ self,
909
+ user_id: str,
910
+ duration_ms: int = (2 * 60 * 1000),
911
+ auth_provider_id: str | None = None,
912
+ auth_provider_session_id: str | None = None,
913
+ ) -> str:
914
+ login_token = self.generate_login_token()
915
+ now = self._clock.time_msec()
916
+ expiry_ts = now + duration_ms
917
+ await self.store.add_login_token_to_user(
918
+ user_id=user_id,
919
+ token=login_token,
920
+ expiry_ts=expiry_ts,
921
+ auth_provider_id=auth_provider_id,
922
+ auth_provider_session_id=auth_provider_session_id,
923
+ )
924
+ return login_token
925
+
926
+ async def create_refresh_token_for_user_id(
927
+ self,
928
+ user_id: str,
929
+ device_id: str,
930
+ expiry_ts: int | None,
931
+ ultimate_session_expiry_ts: int | None,
932
+ ) -> tuple[str, int]:
933
+ """
934
+ Creates a new refresh token for the user with the given user ID.
935
+
936
+ Args:
937
+ user_id: canonical user ID
938
+ device_id: the device ID to associate with the token.
939
+ expiry_ts (milliseconds since the epoch): Time after which the
940
+ refresh token cannot be used.
941
+ If None, the refresh token never expires until it has been used.
942
+ ultimate_session_expiry_ts (milliseconds since the epoch):
943
+ Time at which the session will end and can not be extended any
944
+ further.
945
+ If None, the session can be refreshed indefinitely.
946
+
947
+ Returns:
948
+ The newly created refresh token and its ID in the database
949
+ """
950
+ refresh_token = self.generate_refresh_token(UserID.from_string(user_id))
951
+ refresh_token_id = await self.store.add_refresh_token_to_user(
952
+ user_id=user_id,
953
+ token=refresh_token,
954
+ device_id=device_id,
955
+ expiry_ts=expiry_ts,
956
+ ultimate_session_expiry_ts=ultimate_session_expiry_ts,
957
+ )
958
+ return refresh_token, refresh_token_id
959
+
960
+ async def create_access_token_for_user_id(
961
+ self,
962
+ user_id: str,
963
+ device_id: str | None,
964
+ valid_until_ms: int | None,
965
+ puppets_user_id: str | None = None,
966
+ is_appservice_ghost: bool = False,
967
+ refresh_token_id: int | None = None,
968
+ ) -> str:
969
+ """
970
+ Creates a new access token for the user with the given user ID.
971
+
972
+ The user is assumed to have been authenticated by some other
973
+ mechanism (e.g. CAS), and the user_id converted to the canonical case.
974
+
975
+ The device will be recorded in the table if it is not there already.
976
+
977
+ Args:
978
+ user_id: canonical User ID
979
+ device_id: the device ID to associate with the tokens.
980
+ None to leave the tokens unassociated with a device (deprecated:
981
+ we should always have a device ID)
982
+ valid_until_ms: when the token is valid until. None for
983
+ no expiry.
984
+ is_appservice_ghost: Whether the user is an application ghost user
985
+ refresh_token_id: the refresh token ID that will be associated with
986
+ this access token.
987
+ Returns:
988
+ The access token for the user's session.
989
+ Raises:
990
+ StoreError if there was a problem storing the token.
991
+ """
992
+ fmt_expiry = ""
993
+ if valid_until_ms is not None:
994
+ fmt_expiry = time.strftime(
995
+ " until %Y-%m-%d %H:%M:%S", time.localtime(valid_until_ms / 1000.0)
996
+ )
997
+
998
+ if puppets_user_id:
999
+ logger.info(
1000
+ "Logging in user %s as %s%s", user_id, puppets_user_id, fmt_expiry
1001
+ )
1002
+ target_user_id_obj = UserID.from_string(puppets_user_id)
1003
+ else:
1004
+ logger.info(
1005
+ "Logging in user %s on device %s%s", user_id, device_id, fmt_expiry
1006
+ )
1007
+ target_user_id_obj = UserID.from_string(user_id)
1008
+
1009
+ if (
1010
+ not is_appservice_ghost
1011
+ or self.hs.config.appservice.track_appservice_user_ips
1012
+ ):
1013
+ await self.auth_blocking.check_auth_blocking(user_id)
1014
+
1015
+ access_token = self.generate_access_token(target_user_id_obj)
1016
+ await self.store.add_access_token_to_user(
1017
+ user_id=user_id,
1018
+ token=access_token,
1019
+ device_id=device_id,
1020
+ valid_until_ms=valid_until_ms,
1021
+ puppets_user_id=puppets_user_id,
1022
+ refresh_token_id=refresh_token_id,
1023
+ )
1024
+
1025
+ # the device *should* have been registered before we got here; however,
1026
+ # it's possible we raced against a DELETE operation. The thing we
1027
+ # really don't want is active access_tokens without a record of the
1028
+ # device, so we double-check it here.
1029
+ if device_id is not None:
1030
+ if await self.store.get_device(user_id, device_id) is None:
1031
+ await self.store.delete_access_token(access_token)
1032
+ raise StoreError(400, "Login raced against device deletion")
1033
+
1034
+ return access_token
1035
+
1036
+ async def check_user_exists(self, user_id: str) -> str | None:
1037
+ """
1038
+ Checks to see if a user with the given id exists. Will check case
1039
+ insensitively, but return None if there are multiple inexact matches.
1040
+
1041
+ Args:
1042
+ user_id: complete @user:id
1043
+
1044
+ Returns:
1045
+ The canonical_user_id, or None if zero or multiple matches
1046
+ """
1047
+ res = await self._find_user_id_and_pwd_hash(user_id)
1048
+ if res is not None:
1049
+ return res[0]
1050
+ return None
1051
+
1052
+ async def is_user_approved(self, user_id: str) -> bool:
1053
+ """Checks if a user is approved and therefore can be allowed to log in.
1054
+
1055
+ Args:
1056
+ user_id: the user to check the approval status of.
1057
+
1058
+ Returns:
1059
+ A boolean that is True if the user is approved, False otherwise.
1060
+ """
1061
+ return await self.store.is_user_approved(user_id)
1062
+
1063
+ async def _find_user_id_and_pwd_hash(self, user_id: str) -> tuple[str, str] | None:
1064
+ """Checks to see if a user with the given id exists. Will check case
1065
+ insensitively, but will return None if there are multiple inexact
1066
+ matches.
1067
+
1068
+ Returns:
1069
+ A 2-tuple of `(canonical_user_id, password_hash)` or `None`
1070
+ if there is not exactly one match
1071
+ """
1072
+ user_infos = await self.store.get_users_by_id_case_insensitive(user_id)
1073
+
1074
+ result = None
1075
+ if not user_infos:
1076
+ logger.warning("Attempted to login as %s but they do not exist", user_id)
1077
+ elif len(user_infos) == 1:
1078
+ # a single match (possibly not exact)
1079
+ result = user_infos.popitem()
1080
+ elif user_id in user_infos:
1081
+ # multiple matches, but one is exact
1082
+ result = (user_id, user_infos[user_id])
1083
+ else:
1084
+ # multiple matches, none of them exact
1085
+ logger.warning(
1086
+ "Attempted to login as %s but it matches more than one user "
1087
+ "inexactly: %r",
1088
+ user_id,
1089
+ user_infos.keys(),
1090
+ )
1091
+ return result
1092
+
1093
+ def can_change_password(self) -> bool:
1094
+ """Get whether users on this server are allowed to change or set a password.
1095
+
1096
+ Both `config.auth.password_enabled` and `config.auth.password_localdb_enabled` must be true.
1097
+
1098
+ Note that any account (even SSO accounts) are allowed to add passwords if the above
1099
+ is true.
1100
+
1101
+ Returns:
1102
+ Whether users on this server are allowed to change or set a password
1103
+ """
1104
+ return self._password_enabled_for_login and self._password_localdb_enabled
1105
+
1106
+ def get_supported_login_types(self) -> Iterable[str]:
1107
+ """Get a the login types supported for the /login API
1108
+
1109
+ By default this is just 'm.login.password' (unless password_enabled is
1110
+ False in the config file), but password auth providers can provide
1111
+ other login types.
1112
+
1113
+ Returns:
1114
+ login types
1115
+ """
1116
+ # Load any login types registered by modules
1117
+ # This is stored in the password_auth_provider so this doesn't trigger
1118
+ # any callbacks
1119
+ types = list(self.password_auth_provider.get_supported_login_types().keys())
1120
+
1121
+ # This list should include PASSWORD if (either _password_localdb_enabled is
1122
+ # true or if one of the modules registered it) AND _password_enabled is true
1123
+ # Also:
1124
+ # Some clients just pick the first type in the list. In this case, we want
1125
+ # them to use PASSWORD (rather than token or whatever), so we want to make sure
1126
+ # that comes first, where it's present.
1127
+ if LoginType.PASSWORD in types:
1128
+ types.remove(LoginType.PASSWORD)
1129
+ if self._password_enabled_for_login:
1130
+ types.insert(0, LoginType.PASSWORD)
1131
+ elif self._password_localdb_enabled and self._password_enabled_for_login:
1132
+ types.insert(0, LoginType.PASSWORD)
1133
+
1134
+ return types
1135
+
1136
+ async def validate_login(
1137
+ self,
1138
+ login_submission: dict[str, Any],
1139
+ ratelimit: bool = False,
1140
+ is_reauth: bool = False,
1141
+ ) -> tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None]:
1142
+ """Authenticates the user for the /login API
1143
+
1144
+ Also used by the user-interactive auth flow to validate auth types which don't
1145
+ have an explicit UIA handler, including m.password.auth.
1146
+
1147
+ Args:
1148
+ login_submission: the whole of the login submission
1149
+ (including 'type' and other relevant fields)
1150
+ ratelimit: whether to apply the failed_login_attempt ratelimiter
1151
+ is_reauth: whether this is part of a User-Interactive Authorisation
1152
+ flow to reauthenticate for a privileged action (rather than a
1153
+ new login)
1154
+ Returns:
1155
+ A tuple of the canonical user id, and optional callback
1156
+ to be called once the access token and device id are issued
1157
+ Raises:
1158
+ StoreError if there was a problem accessing the database
1159
+ SynapseError if there was a problem with the request
1160
+ LoginError if there was an authentication problem.
1161
+ """
1162
+ login_type = login_submission.get("type")
1163
+ if not isinstance(login_type, str):
1164
+ raise SynapseError(400, "Bad parameter: type", Codes.INVALID_PARAM)
1165
+
1166
+ # ideally, we wouldn't be checking the identifier unless we know we have a login
1167
+ # method which uses it (https://github.com/matrix-org/synapse/issues/8836)
1168
+ #
1169
+ # But the auth providers' check_auth interface requires a username, so in
1170
+ # practice we can only support login methods which we can map to a username
1171
+ # anyway.
1172
+
1173
+ # special case to check for "password" for the check_password interface
1174
+ # for the auth providers
1175
+ password = login_submission.get("password")
1176
+
1177
+ if login_type == LoginType.PASSWORD:
1178
+ if is_reauth:
1179
+ passwords_allowed_here = self._password_enabled_for_reauth
1180
+ else:
1181
+ passwords_allowed_here = self._password_enabled_for_login
1182
+
1183
+ if not passwords_allowed_here:
1184
+ raise SynapseError(400, "Password login has been disabled.")
1185
+ if not isinstance(password, str):
1186
+ raise SynapseError(400, "Bad parameter: password", Codes.INVALID_PARAM)
1187
+
1188
+ # map old-school login fields into new-school "identifier" fields.
1189
+ identifier_dict = convert_client_dict_legacy_fields_to_identifier(
1190
+ login_submission
1191
+ )
1192
+
1193
+ # convert phone type identifiers to generic threepids
1194
+ if identifier_dict["type"] == "m.id.phone":
1195
+ identifier_dict = login_id_phone_to_thirdparty(identifier_dict)
1196
+
1197
+ # convert threepid identifiers to user IDs
1198
+ if identifier_dict["type"] == "m.id.thirdparty":
1199
+ address = identifier_dict.get("address")
1200
+ medium = identifier_dict.get("medium")
1201
+
1202
+ if medium is None or address is None:
1203
+ raise SynapseError(400, "Invalid thirdparty identifier")
1204
+
1205
+ # For emails, canonicalise the address.
1206
+ # We store all email addresses canonicalised in the DB.
1207
+ # (See add_threepid in synapse/handlers/auth.py)
1208
+ if medium == "email":
1209
+ try:
1210
+ address = canonicalise_email(address)
1211
+ except ValueError as e:
1212
+ raise SynapseError(400, str(e))
1213
+
1214
+ # We also apply account rate limiting using the 3PID as a key, as
1215
+ # otherwise using 3PID bypasses the ratelimiting based on user ID.
1216
+ if ratelimit:
1217
+ await self._failed_login_attempts_ratelimiter.ratelimit(
1218
+ None, (medium, address), update=False
1219
+ )
1220
+
1221
+ # Check for login providers that support 3pid login types
1222
+ if login_type == LoginType.PASSWORD:
1223
+ # we've already checked that there is a (valid) password field
1224
+ assert isinstance(password, str)
1225
+ (
1226
+ canonical_user_id,
1227
+ callback_3pid,
1228
+ ) = await self.check_password_provider_3pid(medium, address, password)
1229
+ if canonical_user_id:
1230
+ # Authentication through password provider and 3pid succeeded
1231
+ return canonical_user_id, callback_3pid
1232
+
1233
+ # No password providers were able to handle this 3pid
1234
+ # Check local store
1235
+ user_id = await self.hs.get_datastores().main.get_user_id_by_threepid(
1236
+ medium, address
1237
+ )
1238
+ if not user_id:
1239
+ logger.warning(
1240
+ "unknown 3pid identifier medium %s, address %r", medium, address
1241
+ )
1242
+ # We mark that we've failed to log in here, as
1243
+ # `check_password_provider_3pid` might have returned `None` due
1244
+ # to an incorrect password, rather than the account not
1245
+ # existing.
1246
+ #
1247
+ # If it returned None but the 3PID was bound then we won't hit
1248
+ # this code path, which is fine as then the per-user ratelimit
1249
+ # will kick in below.
1250
+ if ratelimit:
1251
+ await self._failed_login_attempts_ratelimiter.can_do_action(
1252
+ None, (medium, address)
1253
+ )
1254
+ raise LoginError(
1255
+ 403, msg=INVALID_USERNAME_OR_PASSWORD, errcode=Codes.FORBIDDEN
1256
+ )
1257
+
1258
+ identifier_dict = {"type": "m.id.user", "user": user_id}
1259
+
1260
+ # by this point, the identifier should be an m.id.user: if it's anything
1261
+ # else, we haven't understood it.
1262
+ if identifier_dict["type"] != "m.id.user":
1263
+ raise SynapseError(400, "Unknown login identifier type")
1264
+
1265
+ username = identifier_dict.get("user")
1266
+ if not username:
1267
+ raise SynapseError(400, "User identifier is missing 'user' key")
1268
+
1269
+ if username.startswith("@"):
1270
+ qualified_user_id = username
1271
+ else:
1272
+ qualified_user_id = UserID(username, self.hs.hostname).to_string()
1273
+
1274
+ # Check if we've hit the failed ratelimit (but don't update it)
1275
+ if ratelimit:
1276
+ await self._failed_login_attempts_ratelimiter.ratelimit(
1277
+ None, qualified_user_id.lower(), update=False
1278
+ )
1279
+
1280
+ try:
1281
+ return await self._validate_userid_login(username, login_submission)
1282
+ except LoginError:
1283
+ # The user has failed to log in, so we need to update the rate
1284
+ # limiter. Using `can_do_action` avoids us raising a ratelimit
1285
+ # exception and masking the LoginError. The actual ratelimiting
1286
+ # should have happened above.
1287
+ if ratelimit:
1288
+ await self._failed_login_attempts_ratelimiter.can_do_action(
1289
+ None, qualified_user_id.lower()
1290
+ )
1291
+ raise
1292
+
1293
+ async def _validate_userid_login(
1294
+ self,
1295
+ username: str,
1296
+ login_submission: dict[str, Any],
1297
+ ) -> tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None]:
1298
+ """Helper for validate_login
1299
+
1300
+ Handles login, once we've mapped 3pids onto userids
1301
+
1302
+ Args:
1303
+ username: the username, from the identifier dict
1304
+ login_submission: the whole of the login submission
1305
+ (including 'type' and other relevant fields)
1306
+ Returns:
1307
+ A tuple of the canonical user id, and optional callback
1308
+ to be called once the access token and device id are issued
1309
+ Raises:
1310
+ StoreError if there was a problem accessing the database
1311
+ SynapseError if there was a problem with the request
1312
+ LoginError if there was an authentication problem.
1313
+ """
1314
+ if username.startswith("@"):
1315
+ qualified_user_id = username
1316
+ else:
1317
+ qualified_user_id = UserID(username, self.hs.hostname).to_string()
1318
+
1319
+ login_type = login_submission.get("type")
1320
+ # we already checked that we have a valid login type
1321
+ assert isinstance(login_type, str)
1322
+
1323
+ known_login_type = False
1324
+
1325
+ # Check if login_type matches a type registered by one of the modules
1326
+ # We don't need to remove LoginType.PASSWORD from the list if password login is
1327
+ # disabled, since if that were the case then by this point we know that the
1328
+ # login_type is not LoginType.PASSWORD
1329
+ supported_login_types = self.password_auth_provider.get_supported_login_types()
1330
+ # check if the login type being used is supported by a module
1331
+ if login_type in supported_login_types:
1332
+ # Make a note that this login type is supported by the server
1333
+ known_login_type = True
1334
+ # Get all the fields expected for this login types
1335
+ login_fields = supported_login_types[login_type]
1336
+
1337
+ # go through the login submission and keep track of which required fields are
1338
+ # provided/not provided
1339
+ missing_fields = []
1340
+ login_dict = {}
1341
+ for f in login_fields:
1342
+ if f not in login_submission:
1343
+ missing_fields.append(f)
1344
+ else:
1345
+ login_dict[f] = login_submission[f]
1346
+ # raise an error if any of the expected fields for that login type weren't provided
1347
+ if missing_fields:
1348
+ raise SynapseError(
1349
+ 400,
1350
+ "Missing parameters for login type %s: %s"
1351
+ % (login_type, missing_fields),
1352
+ )
1353
+
1354
+ # call all of the check_auth hooks for that login_type
1355
+ # it will return a result once the first success is found (or None otherwise)
1356
+ result = await self.password_auth_provider.check_auth(
1357
+ username, login_type, login_dict
1358
+ )
1359
+ if result:
1360
+ return result
1361
+
1362
+ # if no module managed to authenticate the user, then fallback to built in password based auth
1363
+ if login_type == LoginType.PASSWORD and self._password_localdb_enabled:
1364
+ known_login_type = True
1365
+
1366
+ # we've already checked that there is a (valid) password field
1367
+ password = login_submission["password"]
1368
+ assert isinstance(password, str)
1369
+
1370
+ canonical_user_id = await self._check_local_password(
1371
+ qualified_user_id, password
1372
+ )
1373
+
1374
+ if canonical_user_id:
1375
+ return canonical_user_id, None
1376
+
1377
+ if not known_login_type:
1378
+ raise SynapseError(400, "Unknown login type %s" % login_type)
1379
+
1380
+ # We raise a 403 here, but note that if we're doing user-interactive
1381
+ # login, it turns all LoginErrors into a 401 anyway.
1382
+ raise LoginError(403, msg=INVALID_USERNAME_OR_PASSWORD, errcode=Codes.FORBIDDEN)
1383
+
1384
+ async def check_password_provider_3pid(
1385
+ self, medium: str, address: str, password: str
1386
+ ) -> tuple[str | None, Callable[["LoginResponse"], Awaitable[None]] | None]:
1387
+ """Check if a password provider is able to validate a thirdparty login
1388
+
1389
+ Args:
1390
+ medium: The medium of the 3pid (ex. email).
1391
+ address: The address of the 3pid (ex. jdoe@example.com).
1392
+ password: The password of the user.
1393
+
1394
+ Returns:
1395
+ A tuple of `(user_id, callback)`. If authentication is successful,
1396
+ `user_id`is the authenticated, canonical user ID. `callback` is
1397
+ then either a function to be later run after the server has
1398
+ completed login/registration, or `None`. If authentication was
1399
+ unsuccessful, `user_id` and `callback` are both `None`.
1400
+ """
1401
+ # call all of the check_3pid_auth callbacks
1402
+ # Result will be from the first callback that returns something other than None
1403
+ # If all the callbacks return None, then result is also set to None
1404
+ result = await self.password_auth_provider.check_3pid_auth(
1405
+ medium, address, password
1406
+ )
1407
+ if result:
1408
+ return result
1409
+
1410
+ # if result is None then return (None, None)
1411
+ return None, None
1412
+
1413
+ async def _check_local_password(self, user_id: str, password: str) -> str | None:
1414
+ """Authenticate a user against the local password database.
1415
+
1416
+ user_id is checked case insensitively, but will return None if there are
1417
+ multiple inexact matches.
1418
+
1419
+ Args:
1420
+ user_id: complete @user:id
1421
+ password: the provided password
1422
+ Returns:
1423
+ The canonical_user_id, or None if unknown user/bad password
1424
+ """
1425
+ lookupres = await self._find_user_id_and_pwd_hash(user_id)
1426
+ if not lookupres:
1427
+ return None
1428
+ (user_id, password_hash) = lookupres
1429
+
1430
+ result = await self.validate_hash(password, password_hash)
1431
+ if not result:
1432
+ logger.warning("Failed password login for user %s", user_id)
1433
+ return None
1434
+ return user_id
1435
+
1436
+ def generate_login_token(self) -> str:
1437
+ """Generates an opaque string, for use as an short-term login token"""
1438
+
1439
+ # we use the following format for access tokens:
1440
+ # syl_<random string>_<base62 crc check>
1441
+
1442
+ random_string = stringutils.random_string(20)
1443
+ base = f"syl_{random_string}"
1444
+
1445
+ crc = base62_encode(crc32(base.encode("ascii")), minwidth=6)
1446
+ return f"{base}_{crc}"
1447
+
1448
+ def generate_access_token(self, for_user: UserID) -> str:
1449
+ """Generates an opaque string, for use as an access token"""
1450
+
1451
+ # we use the following format for access tokens:
1452
+ # syt_<base64 local part>_<random string>_<base62 crc check>
1453
+
1454
+ b64local = unpaddedbase64.encode_base64(for_user.localpart.encode("utf-8"))
1455
+ random_string = stringutils.random_string(20)
1456
+ base = f"syt_{b64local}_{random_string}"
1457
+
1458
+ crc = base62_encode(crc32(base.encode("ascii")), minwidth=6)
1459
+ return f"{base}_{crc}"
1460
+
1461
+ def generate_refresh_token(self, for_user: UserID) -> str:
1462
+ """Generates an opaque string, for use as a refresh token"""
1463
+
1464
+ # we use the following format for refresh tokens:
1465
+ # syr_<base64 local part>_<random string>_<base62 crc check>
1466
+
1467
+ b64local = unpaddedbase64.encode_base64(for_user.localpart.encode("utf-8"))
1468
+ random_string = stringutils.random_string(20)
1469
+ base = f"syr_{b64local}_{random_string}"
1470
+
1471
+ crc = base62_encode(crc32(base.encode("ascii")), minwidth=6)
1472
+ return f"{base}_{crc}"
1473
+
1474
+ async def consume_login_token(self, login_token: str) -> LoginTokenLookupResult:
1475
+ try:
1476
+ return await self.store.consume_login_token(login_token)
1477
+ except LoginTokenExpired:
1478
+ invalid_login_token_counter.labels(
1479
+ reason="expired",
1480
+ **{SERVER_NAME_LABEL: self.server_name},
1481
+ ).inc()
1482
+ except LoginTokenReused:
1483
+ invalid_login_token_counter.labels(
1484
+ reason="reused",
1485
+ **{SERVER_NAME_LABEL: self.server_name},
1486
+ ).inc()
1487
+ except NotFoundError:
1488
+ invalid_login_token_counter.labels(
1489
+ reason="not found",
1490
+ **{SERVER_NAME_LABEL: self.server_name},
1491
+ ).inc()
1492
+
1493
+ raise AuthError(403, "Invalid login token", errcode=Codes.FORBIDDEN)
1494
+
1495
+ async def delete_access_token(self, access_token: str) -> None:
1496
+ """Invalidate a single access token
1497
+
1498
+ Args:
1499
+ access_token: access token to be deleted
1500
+
1501
+ """
1502
+ token = await self.store.get_user_by_access_token(access_token)
1503
+ if not token:
1504
+ # At this point, the token should already have been fetched once by
1505
+ # the caller, so this should not happen, unless of a race condition
1506
+ # between two delete requests
1507
+ raise SynapseError(HTTPStatus.UNAUTHORIZED, "Unrecognised access token")
1508
+ await self.store.delete_access_token(access_token)
1509
+
1510
+ # see if any modules want to know about this
1511
+ await self.password_auth_provider.on_logged_out(
1512
+ user_id=token.user_id,
1513
+ device_id=token.device_id,
1514
+ access_token=access_token,
1515
+ )
1516
+
1517
+ # delete pushers associated with this access token
1518
+ # XXX(quenting): This is only needed until the 'set_device_id_for_pushers'
1519
+ # background update completes.
1520
+ if token.token_id is not None:
1521
+ await self.hs.get_pusherpool().remove_pushers_by_access_tokens(
1522
+ token.user_id, (token.token_id,)
1523
+ )
1524
+
1525
+ async def delete_access_tokens_for_user(
1526
+ self,
1527
+ user_id: str,
1528
+ except_token_id: int | None = None,
1529
+ device_id: str | None = None,
1530
+ ) -> None:
1531
+ """Invalidate access tokens belonging to a user
1532
+
1533
+ Args:
1534
+ user_id: ID of user the tokens belong to
1535
+ except_token_id: access_token ID which should *not* be deleted
1536
+ device_id: ID of device the tokens are associated with.
1537
+ If None, tokens associated with any device (or no device) will
1538
+ be deleted
1539
+ """
1540
+ tokens_and_devices = await self.store.user_delete_access_tokens(
1541
+ user_id, except_token_id=except_token_id, device_id=device_id
1542
+ )
1543
+
1544
+ # see if any modules want to know about this
1545
+ for token, _, device_id in tokens_and_devices:
1546
+ await self.password_auth_provider.on_logged_out(
1547
+ user_id=user_id, device_id=device_id, access_token=token
1548
+ )
1549
+
1550
+ # delete pushers associated with the access tokens
1551
+ # XXX(quenting): This is only needed until the 'set_device_id_for_pushers'
1552
+ # background update completes.
1553
+ await self.hs.get_pusherpool().remove_pushers_by_access_tokens(
1554
+ user_id, (token_id for _, token_id, _ in tokens_and_devices)
1555
+ )
1556
+
1557
+ async def delete_access_tokens_for_devices(
1558
+ self,
1559
+ user_id: str,
1560
+ device_ids: StrCollection,
1561
+ ) -> None:
1562
+ """Invalidate access tokens for the devices
1563
+
1564
+ Args:
1565
+ user_id: ID of user the tokens belong to
1566
+ device_ids: ID of device the tokens are associated with.
1567
+ If None, tokens associated with any device (or no device) will
1568
+ be deleted
1569
+ """
1570
+ tokens_and_devices = await self.store.user_delete_access_tokens_for_devices(
1571
+ user_id,
1572
+ device_ids,
1573
+ )
1574
+
1575
+ # see if any modules want to know about this
1576
+ if self.password_auth_provider.on_logged_out_callbacks:
1577
+ for token, _, device_id in tokens_and_devices:
1578
+ await self.password_auth_provider.on_logged_out(
1579
+ user_id=user_id, device_id=device_id, access_token=token
1580
+ )
1581
+
1582
+ async def add_threepid(
1583
+ self, user_id: str, medium: str, address: str, validated_at: int
1584
+ ) -> None:
1585
+ """
1586
+ Adds an association between a user's Matrix ID and a third-party ID (email,
1587
+ phone number).
1588
+
1589
+ Args:
1590
+ user_id: The ID of the user to associate.
1591
+ medium: The medium of the third-party ID (email, msisdn).
1592
+ address: The address of the third-party ID (i.e. an email address).
1593
+ validated_at: The timestamp in ms of when the validation that the user owns
1594
+ this third-party ID occurred.
1595
+ """
1596
+ # check if medium has a valid value
1597
+ if medium not in ["email", "msisdn"]:
1598
+ raise SynapseError(
1599
+ code=400,
1600
+ msg=("'%s' is not a valid value for 'medium'" % (medium,)),
1601
+ errcode=Codes.INVALID_PARAM,
1602
+ )
1603
+
1604
+ # 'Canonicalise' email addresses down to lower case.
1605
+ # We've now moving towards the homeserver being the entity that
1606
+ # is responsible for validating threepids used for resetting passwords
1607
+ # on accounts, so in future Synapse will gain knowledge of specific
1608
+ # types (mediums) of threepid. For now, we still use the existing
1609
+ # infrastructure, but this is the start of synapse gaining knowledge
1610
+ # of specific types of threepid (and fixes the fact that checking
1611
+ # for the presence of an email address during password reset was
1612
+ # case sensitive).
1613
+ if medium == "email":
1614
+ try:
1615
+ address = canonicalise_email(address)
1616
+ except ValueError as e:
1617
+ raise SynapseError(400, str(e))
1618
+
1619
+ await self.store.user_add_threepid(
1620
+ user_id, medium, address, validated_at, self.hs.get_clock().time_msec()
1621
+ )
1622
+
1623
+ # Inform Synapse modules that a 3PID association has been created.
1624
+ await self._third_party_rules.on_add_user_third_party_identifier(
1625
+ user_id, medium, address
1626
+ )
1627
+
1628
+ # Deprecated method for informing Synapse modules that a 3PID association
1629
+ # has successfully been created.
1630
+ await self._third_party_rules.on_threepid_bind(user_id, medium, address)
1631
+
1632
+ async def delete_local_threepid(
1633
+ self, user_id: str, medium: str, address: str
1634
+ ) -> None:
1635
+ """Deletes an association between a third-party ID and a user ID from the local
1636
+ database. This method does not unbind the association from any identity servers.
1637
+
1638
+ If `medium` is 'email' and a pusher is associated with this third-party ID, the
1639
+ pusher will also be deleted.
1640
+
1641
+ Args:
1642
+ user_id: ID of user to remove the 3pid from.
1643
+ medium: The medium of the 3pid being removed: "email" or "msisdn".
1644
+ address: The 3pid address to remove.
1645
+ """
1646
+ # 'Canonicalise' email addresses as per above
1647
+ if medium == "email":
1648
+ try:
1649
+ address = canonicalise_email(address)
1650
+ except ValueError as e:
1651
+ raise SynapseError(400, str(e))
1652
+
1653
+ await self.store.user_delete_threepid(user_id, medium, address)
1654
+
1655
+ # Inform Synapse modules that a 3PID association has been deleted.
1656
+ await self._third_party_rules.on_remove_user_third_party_identifier(
1657
+ user_id, medium, address
1658
+ )
1659
+
1660
+ if medium == "email":
1661
+ await self._pusher_pool.remove_pusher(
1662
+ app_id="m.email", pushkey=address, user_id=user_id
1663
+ )
1664
+
1665
+ async def hash(self, password: str) -> str:
1666
+ """Computes a secure hash of password.
1667
+
1668
+ Args:
1669
+ password: Password to hash.
1670
+
1671
+ Returns:
1672
+ Hashed password.
1673
+ """
1674
+
1675
+ def _do_hash() -> str:
1676
+ # Normalise the Unicode in the password
1677
+ pw = unicodedata.normalize("NFKC", password)
1678
+
1679
+ bytes_to_hash = pw.encode(
1680
+ "utf8"
1681
+ ) + self.hs.config.auth.password_pepper.encode("utf8")
1682
+ if len(bytes_to_hash) > 72:
1683
+ # bcrypt only looks at the first 72 bytes.
1684
+ #
1685
+ # Note: we explicitly DO NOT log the length of the user's password here.
1686
+ logger.debug(
1687
+ "Password + pepper is too long; truncating to 72 bytes for bcrypt. "
1688
+ "This is expected behaviour and will not affect a user's ability to log in. 72 bytes is "
1689
+ "sufficient entropy for a password."
1690
+ )
1691
+ bytes_to_hash = bytes_to_hash[:72]
1692
+
1693
+ return bcrypt.hashpw(
1694
+ bytes_to_hash,
1695
+ bcrypt.gensalt(self.bcrypt_rounds),
1696
+ ).decode("ascii")
1697
+
1698
+ return await defer_to_thread(self.hs.get_reactor(), _do_hash)
1699
+
1700
+ async def validate_hash(self, password: str, stored_hash: bytes | str) -> bool:
1701
+ """Validates that self.hash(password) == stored_hash.
1702
+
1703
+ Args:
1704
+ password: Password to hash.
1705
+ stored_hash: Expected hash value.
1706
+
1707
+ Returns:
1708
+ Whether self.hash(password) == stored_hash.
1709
+ """
1710
+
1711
+ def _do_validate_hash(checked_hash: bytes) -> bool:
1712
+ # Normalise the Unicode in the password
1713
+ pw = unicodedata.normalize("NFKC", password)
1714
+ password_pepper = self.hs.config.auth.password_pepper
1715
+
1716
+ bytes_to_hash = pw.encode("utf8") + password_pepper.encode("utf8")
1717
+ if len(bytes_to_hash) > 72:
1718
+ # bcrypt only looks at the first 72 bytes
1719
+ logger.debug(
1720
+ "Password + pepper is too long; truncating to 72 bytes for bcrypt. "
1721
+ "This is expected behaviour and will not affect a user's ability to log in. 72 bytes is "
1722
+ "sufficient entropy for a password."
1723
+ )
1724
+ bytes_to_hash = bytes_to_hash[:72]
1725
+
1726
+ return bcrypt.checkpw(
1727
+ bytes_to_hash,
1728
+ checked_hash,
1729
+ )
1730
+
1731
+ if stored_hash:
1732
+ if not isinstance(stored_hash, bytes):
1733
+ stored_hash = stored_hash.encode("ascii")
1734
+
1735
+ return await defer_to_thread(
1736
+ self.hs.get_reactor(), _do_validate_hash, stored_hash
1737
+ )
1738
+ else:
1739
+ return False
1740
+
1741
+ async def start_sso_ui_auth(self, request: SynapseRequest, session_id: str) -> str:
1742
+ """
1743
+ Get the HTML for the SSO redirect confirmation page.
1744
+
1745
+ Args:
1746
+ request: The incoming HTTP request
1747
+ session_id: The user interactive authentication session ID.
1748
+
1749
+ Returns:
1750
+ The HTML to render.
1751
+ """
1752
+ try:
1753
+ session = await self.store.get_ui_auth_session(session_id)
1754
+ except StoreError:
1755
+ raise SynapseError(400, "Unknown session ID: %s" % (session_id,))
1756
+
1757
+ user_id_to_verify: str = await self.get_session_data(
1758
+ session_id, UIAuthSessionDataConstants.REQUEST_USER_ID
1759
+ )
1760
+
1761
+ idps = await self.hs.get_sso_handler().get_identity_providers_for_user(
1762
+ user_id_to_verify
1763
+ )
1764
+
1765
+ if not idps:
1766
+ # we checked that the user had some remote identities before offering an SSO
1767
+ # flow, so either it's been deleted or the client has requested SSO despite
1768
+ # it not being offered.
1769
+ raise SynapseError(400, "User has no SSO identities")
1770
+
1771
+ # for now, just pick one
1772
+ idp_id, sso_auth_provider = next(iter(idps.items()))
1773
+ if len(idps) > 0:
1774
+ logger.warning(
1775
+ "User %r has previously logged in with multiple SSO IdPs; arbitrarily "
1776
+ "picking %r",
1777
+ user_id_to_verify,
1778
+ idp_id,
1779
+ )
1780
+
1781
+ redirect_url = await sso_auth_provider.handle_redirect_request(
1782
+ request, None, session_id
1783
+ )
1784
+
1785
+ return self._sso_auth_confirm_template.render(
1786
+ description=session.description,
1787
+ redirect_url=redirect_url,
1788
+ idp=sso_auth_provider,
1789
+ )
1790
+
1791
+ async def complete_sso_login(
1792
+ self,
1793
+ registered_user_id: str,
1794
+ auth_provider_id: str,
1795
+ request: Request,
1796
+ client_redirect_url: str,
1797
+ extra_attributes: JsonDict | None = None,
1798
+ new_user: bool = False,
1799
+ auth_provider_session_id: str | None = None,
1800
+ ) -> None:
1801
+ """Having figured out a mxid for this user, complete the HTTP request
1802
+
1803
+ Args:
1804
+ registered_user_id: The registered user ID to complete SSO login for.
1805
+ auth_provider_id: The id of the SSO Identity provider that was used for
1806
+ login. This will be stored in the login token for future tracking in
1807
+ prometheus metrics.
1808
+ request: The request to complete.
1809
+ client_redirect_url: The URL to which to redirect the user at the end of the
1810
+ process.
1811
+ extra_attributes: Extra attributes which will be passed to the client
1812
+ during successful login. Must be JSON serializable.
1813
+ new_user: True if we should use wording appropriate to a user who has just
1814
+ registered.
1815
+ auth_provider_session_id: The session ID from the SSO IdP received during login.
1816
+ """
1817
+ # If the account has been deactivated, do not proceed with the login.
1818
+ #
1819
+ # This gets checked again when the token is submitted but this lets us
1820
+ # provide an HTML error page to the user (instead of issuing a token and
1821
+ # having it error later).
1822
+ deactivated = await self.store.get_user_deactivated_status(registered_user_id)
1823
+ if deactivated:
1824
+ respond_with_html(request, 403, self._sso_account_deactivated_template)
1825
+ return
1826
+
1827
+ user_profile_data = await self.store.get_profileinfo(
1828
+ UserID.from_string(registered_user_id)
1829
+ )
1830
+
1831
+ # Store any extra attributes which will be passed in the login response.
1832
+ # Note that this is per-user so it may overwrite a previous value, this
1833
+ # is considered OK since the newest SSO attributes should be most valid.
1834
+ if extra_attributes:
1835
+ self._extra_attributes[registered_user_id] = SsoLoginExtraAttributes(
1836
+ self._clock.time_msec(),
1837
+ extra_attributes,
1838
+ )
1839
+
1840
+ # Create a login token
1841
+ login_token = await self.create_login_token_for_user_id(
1842
+ registered_user_id,
1843
+ auth_provider_id=auth_provider_id,
1844
+ auth_provider_session_id=auth_provider_session_id,
1845
+ )
1846
+
1847
+ # Append the login token to the original redirect URL (i.e. with its query
1848
+ # parameters kept intact) to build the URL to which the template needs to
1849
+ # redirect the users once they have clicked on the confirmation link.
1850
+ redirect_url = self.add_query_param_to_url(
1851
+ client_redirect_url, "loginToken", login_token
1852
+ )
1853
+
1854
+ # Run post-login module callback handlers
1855
+ await self._account_validity_handler.on_user_login(
1856
+ user_id=registered_user_id,
1857
+ auth_provider_type=LoginType.SSO,
1858
+ auth_provider_id=auth_provider_id,
1859
+ )
1860
+
1861
+ # if the client is whitelisted, we can redirect straight to it
1862
+ if client_redirect_url.startswith(self._whitelisted_sso_clients):
1863
+ request.redirect(redirect_url)
1864
+ finish_request(request)
1865
+ return
1866
+
1867
+ # Otherwise, serve the redirect confirmation page.
1868
+
1869
+ # Remove the query parameters from the redirect URL to get a shorter version of
1870
+ # it. This is only to display a human-readable URL in the template, but not the
1871
+ # URL we redirect users to.
1872
+ url_parts = urllib.parse.urlsplit(client_redirect_url)
1873
+
1874
+ if url_parts.scheme == "https":
1875
+ # for an https uri, just show the netloc (ie, the hostname. Specifically,
1876
+ # the bit between "//" and "/"; this includes any potential
1877
+ # "username:password@" prefix.)
1878
+ display_url = url_parts.netloc
1879
+ else:
1880
+ # for other uris, strip the query-params (including the login token) and
1881
+ # fragment.
1882
+ display_url = urllib.parse.urlunsplit(
1883
+ (url_parts.scheme, url_parts.netloc, url_parts.path, "", "")
1884
+ )
1885
+
1886
+ html = self._sso_redirect_confirm_template.render(
1887
+ display_url=display_url,
1888
+ redirect_url=redirect_url,
1889
+ server_name=self.server_name,
1890
+ new_user=new_user,
1891
+ user_id=registered_user_id,
1892
+ user_profile=user_profile_data,
1893
+ )
1894
+ respond_with_html(request, 200, html)
1895
+
1896
+ async def _sso_login_callback(self, login_result: "LoginResponse") -> None:
1897
+ """
1898
+ A login callback which might add additional attributes to the login response.
1899
+
1900
+ Args:
1901
+ login_result: The data to be sent to the client. Includes the user
1902
+ ID and access token.
1903
+ """
1904
+ # Expire attributes before processing. Note that there shouldn't be any
1905
+ # valid logins that still have extra attributes.
1906
+ self._expire_sso_extra_attributes()
1907
+
1908
+ extra_attributes = self._extra_attributes.get(login_result["user_id"])
1909
+ if extra_attributes:
1910
+ login_result_dict = cast(dict[str, Any], login_result)
1911
+ login_result_dict.update(extra_attributes.extra_attributes)
1912
+
1913
+ def _expire_sso_extra_attributes(self) -> None:
1914
+ """
1915
+ Iterate through the mapping of user IDs to extra attributes and remove any that are no longer valid.
1916
+ """
1917
+ # TODO This should match the amount of time the macaroon is valid for.
1918
+ LOGIN_TOKEN_EXPIRATION_TIME = 2 * 60 * 1000
1919
+ expire_before = self._clock.time_msec() - LOGIN_TOKEN_EXPIRATION_TIME
1920
+ to_expire = set()
1921
+ for user_id, data in self._extra_attributes.items():
1922
+ if data.creation_time < expire_before:
1923
+ to_expire.add(user_id)
1924
+ for user_id in to_expire:
1925
+ logger.debug("Expiring extra attributes for user %s", user_id)
1926
+ del self._extra_attributes[user_id]
1927
+
1928
+ @staticmethod
1929
+ def add_query_param_to_url(url: str, param_name: str, param: Any) -> str:
1930
+ url_parts = list(urllib.parse.urlparse(url))
1931
+ query = urllib.parse.parse_qsl(url_parts[4], keep_blank_values=True)
1932
+ query.append((param_name, param))
1933
+ url_parts[4] = urllib.parse.urlencode(query)
1934
+ return urllib.parse.urlunparse(url_parts)
1935
+
1936
+
1937
+ def load_legacy_password_auth_providers(hs: "HomeServer") -> None:
1938
+ module_api = hs.get_module_api()
1939
+ for module, config in hs.config.authproviders.password_providers:
1940
+ load_single_legacy_password_auth_provider(
1941
+ module=module, config=config, api=module_api
1942
+ )
1943
+
1944
+
1945
+ def load_single_legacy_password_auth_provider(
1946
+ module: type,
1947
+ config: JsonDict,
1948
+ api: "ModuleApi",
1949
+ ) -> None:
1950
+ try:
1951
+ provider = module(config=config, account_handler=api)
1952
+ except Exception as e:
1953
+ logger.exception("Error while initializing %r: %s", module, e)
1954
+ raise
1955
+
1956
+ # All methods that the module provides should be async, but this wasn't enforced
1957
+ # in the old module system, so we wrap them if needed
1958
+ def async_wrapper(f: Callable | None) -> Callable[..., Awaitable] | None:
1959
+ # f might be None if the callback isn't implemented by the module. In this
1960
+ # case we don't want to register a callback at all so we return None.
1961
+ if f is None:
1962
+ return None
1963
+
1964
+ # We need to wrap check_password because its old form would return a boolean
1965
+ # but we now want it to behave just like check_auth() and return the matrix id of
1966
+ # the user if authentication succeeded or None otherwise
1967
+ if f.__name__ == "check_password":
1968
+
1969
+ async def wrapped_check_password(
1970
+ username: str, login_type: str, login_dict: JsonDict
1971
+ ) -> tuple[str, Callable | None] | None:
1972
+ # We've already made sure f is not None above, but mypy doesn't do well
1973
+ # across function boundaries so we need to tell it f is definitely not
1974
+ # None.
1975
+ assert f is not None
1976
+
1977
+ matrix_user_id = api.get_qualified_user_id(username)
1978
+ password = login_dict["password"]
1979
+
1980
+ is_valid = await f(matrix_user_id, password)
1981
+
1982
+ if is_valid:
1983
+ return matrix_user_id, None
1984
+
1985
+ return None
1986
+
1987
+ return wrapped_check_password
1988
+
1989
+ # We need to wrap check_auth as in the old form it could return
1990
+ # just a str, but now it must return tuple[str, Callable | None] | None
1991
+ if f.__name__ == "check_auth":
1992
+
1993
+ async def wrapped_check_auth(
1994
+ username: str, login_type: str, login_dict: JsonDict
1995
+ ) -> tuple[str, Callable | None] | None:
1996
+ # We've already made sure f is not None above, but mypy doesn't do well
1997
+ # across function boundaries so we need to tell it f is definitely not
1998
+ # None.
1999
+ assert f is not None
2000
+
2001
+ result = await f(username, login_type, login_dict)
2002
+
2003
+ if isinstance(result, str):
2004
+ return result, None
2005
+
2006
+ return result
2007
+
2008
+ return wrapped_check_auth
2009
+
2010
+ # We need to wrap check_3pid_auth as in the old form it could return
2011
+ # just a str, but now it must return tuple[str, Callable | None] | None
2012
+ if f.__name__ == "check_3pid_auth":
2013
+
2014
+ async def wrapped_check_3pid_auth(
2015
+ medium: str, address: str, password: str
2016
+ ) -> tuple[str, Callable | None] | None:
2017
+ # We've already made sure f is not None above, but mypy doesn't do well
2018
+ # across function boundaries so we need to tell it f is definitely not
2019
+ # None.
2020
+ assert f is not None
2021
+
2022
+ result = await f(medium, address, password)
2023
+
2024
+ if isinstance(result, str):
2025
+ return result, None
2026
+
2027
+ return result
2028
+
2029
+ return wrapped_check_3pid_auth
2030
+
2031
+ def run(*args: tuple, **kwargs: dict) -> Awaitable:
2032
+ # mypy doesn't do well across function boundaries so we need to tell it
2033
+ # f is definitely not None.
2034
+ assert f is not None
2035
+
2036
+ return maybe_awaitable(f(*args, **kwargs))
2037
+
2038
+ return run
2039
+
2040
+ # If the module has these methods implemented, then we pull them out
2041
+ # and register them as hooks.
2042
+ check_3pid_auth_hook: CHECK_3PID_AUTH_CALLBACK | None = async_wrapper(
2043
+ getattr(provider, "check_3pid_auth", None)
2044
+ )
2045
+ on_logged_out_hook: ON_LOGGED_OUT_CALLBACK | None = async_wrapper(
2046
+ getattr(provider, "on_logged_out", None)
2047
+ )
2048
+
2049
+ supported_login_types = {}
2050
+ # call get_supported_login_types and add that to the dict
2051
+ g = getattr(provider, "get_supported_login_types", None)
2052
+ if g is not None:
2053
+ # Note the old module style also called get_supported_login_types at loading time
2054
+ # and it is synchronous
2055
+ supported_login_types.update(g())
2056
+
2057
+ auth_checkers = {}
2058
+ # Legacy modules have a check_auth method which expects to be called with one of
2059
+ # the keys returned by get_supported_login_types. New style modules register a
2060
+ # dictionary of login_type->check_auth_method mappings
2061
+ check_auth = async_wrapper(getattr(provider, "check_auth", None))
2062
+ if check_auth is not None:
2063
+ for login_type, fields in supported_login_types.items():
2064
+ # need tuple(fields) since fields can be any Iterable type (so may not be hashable)
2065
+ auth_checkers[(login_type, tuple(fields))] = check_auth
2066
+
2067
+ # if it has a "check_password" method then it should handle all auth checks
2068
+ # with login type of LoginType.PASSWORD
2069
+ check_password = async_wrapper(getattr(provider, "check_password", None))
2070
+ if check_password is not None:
2071
+ # need to use a tuple here for ("password",) not a list since lists aren't hashable
2072
+ auth_checkers[(LoginType.PASSWORD, ("password",))] = check_password
2073
+
2074
+ api.register_password_auth_provider_callbacks(
2075
+ check_3pid_auth=check_3pid_auth_hook,
2076
+ on_logged_out=on_logged_out_hook,
2077
+ auth_checkers=auth_checkers,
2078
+ )
2079
+
2080
+
2081
+ CHECK_3PID_AUTH_CALLBACK = Callable[
2082
+ [str, str, str],
2083
+ Awaitable[tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None] | None],
2084
+ ]
2085
+ ON_LOGGED_OUT_CALLBACK = Callable[[str, str | None, str], Awaitable]
2086
+ CHECK_AUTH_CALLBACK = Callable[
2087
+ [str, str, JsonDict],
2088
+ Awaitable[tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None] | None],
2089
+ ]
2090
+ GET_USERNAME_FOR_REGISTRATION_CALLBACK = Callable[
2091
+ [JsonDict, JsonDict],
2092
+ Awaitable[str | None],
2093
+ ]
2094
+ GET_DISPLAYNAME_FOR_REGISTRATION_CALLBACK = Callable[
2095
+ [JsonDict, JsonDict],
2096
+ Awaitable[str | None],
2097
+ ]
2098
+ IS_3PID_ALLOWED_CALLBACK = Callable[[str, str, bool], Awaitable[bool]]
2099
+
2100
+
2101
+ class PasswordAuthProvider:
2102
+ """
2103
+ A class that the AuthHandler calls when authenticating users
2104
+ It allows modules to provide alternative methods for authentication
2105
+ """
2106
+
2107
+ def __init__(self) -> None:
2108
+ # lists of callbacks
2109
+ self.check_3pid_auth_callbacks: list[CHECK_3PID_AUTH_CALLBACK] = []
2110
+ self.on_logged_out_callbacks: list[ON_LOGGED_OUT_CALLBACK] = []
2111
+ self.get_username_for_registration_callbacks: list[
2112
+ GET_USERNAME_FOR_REGISTRATION_CALLBACK
2113
+ ] = []
2114
+ self.get_displayname_for_registration_callbacks: list[
2115
+ GET_DISPLAYNAME_FOR_REGISTRATION_CALLBACK
2116
+ ] = []
2117
+ self.is_3pid_allowed_callbacks: list[IS_3PID_ALLOWED_CALLBACK] = []
2118
+
2119
+ # Mapping from login type to login parameters
2120
+ self._supported_login_types: dict[str, tuple[str, ...]] = {}
2121
+
2122
+ # Mapping from login type to auth checker callbacks
2123
+ self.auth_checker_callbacks: dict[str, list[CHECK_AUTH_CALLBACK]] = {}
2124
+
2125
+ def register_password_auth_provider_callbacks(
2126
+ self,
2127
+ check_3pid_auth: CHECK_3PID_AUTH_CALLBACK | None = None,
2128
+ on_logged_out: ON_LOGGED_OUT_CALLBACK | None = None,
2129
+ is_3pid_allowed: IS_3PID_ALLOWED_CALLBACK | None = None,
2130
+ auth_checkers: dict[tuple[str, tuple[str, ...]], CHECK_AUTH_CALLBACK]
2131
+ | None = None,
2132
+ get_username_for_registration: GET_USERNAME_FOR_REGISTRATION_CALLBACK
2133
+ | None = None,
2134
+ get_displayname_for_registration: GET_DISPLAYNAME_FOR_REGISTRATION_CALLBACK
2135
+ | None = None,
2136
+ ) -> None:
2137
+ # Register check_3pid_auth callback
2138
+ if check_3pid_auth is not None:
2139
+ self.check_3pid_auth_callbacks.append(check_3pid_auth)
2140
+
2141
+ # register on_logged_out callback
2142
+ if on_logged_out is not None:
2143
+ self.on_logged_out_callbacks.append(on_logged_out)
2144
+
2145
+ if auth_checkers is not None:
2146
+ # register a new supported login_type
2147
+ # Iterate through all of the types being registered
2148
+ for (login_type, fields), callback in auth_checkers.items():
2149
+ # Note: fields may be empty here. This would allow a modules auth checker to
2150
+ # be called with just 'login_type' and no password or other secrets
2151
+
2152
+ # Need to check that all the field names are strings or may get nasty errors later
2153
+ for f in fields:
2154
+ if not isinstance(f, str):
2155
+ raise RuntimeError(
2156
+ "A module tried to register support for login type: %s with parameters %s"
2157
+ " but all parameter names must be strings"
2158
+ % (login_type, fields)
2159
+ )
2160
+
2161
+ # 2 modules supporting the same login type must expect the same fields
2162
+ # e.g. 1 can't expect "pass" if the other expects "password"
2163
+ # so throw an exception if that happens
2164
+ if login_type not in self._supported_login_types.get(login_type, []):
2165
+ self._supported_login_types[login_type] = fields
2166
+ else:
2167
+ fields_currently_supported = self._supported_login_types.get(
2168
+ login_type
2169
+ )
2170
+ if fields_currently_supported != fields:
2171
+ raise RuntimeError(
2172
+ "A module tried to register support for login type: %s with parameters %s"
2173
+ " but another module had already registered support for that type with parameters %s"
2174
+ % (login_type, fields, fields_currently_supported)
2175
+ )
2176
+
2177
+ # Add the new method to the list of auth_checker_callbacks for this login type
2178
+ self.auth_checker_callbacks.setdefault(login_type, []).append(callback)
2179
+
2180
+ if get_username_for_registration is not None:
2181
+ self.get_username_for_registration_callbacks.append(
2182
+ get_username_for_registration,
2183
+ )
2184
+
2185
+ if get_displayname_for_registration is not None:
2186
+ self.get_displayname_for_registration_callbacks.append(
2187
+ get_displayname_for_registration,
2188
+ )
2189
+
2190
+ if is_3pid_allowed is not None:
2191
+ self.is_3pid_allowed_callbacks.append(is_3pid_allowed)
2192
+
2193
+ def get_supported_login_types(self) -> Mapping[str, Iterable[str]]:
2194
+ """Get the login types supported by this password provider
2195
+
2196
+ Returns a map from a login type identifier (such as m.login.password) to an
2197
+ iterable giving the fields which must be provided by the user in the submission
2198
+ to the /login API.
2199
+ """
2200
+
2201
+ return self._supported_login_types
2202
+
2203
+ async def check_auth(
2204
+ self, username: str, login_type: str, login_dict: JsonDict
2205
+ ) -> tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None] | None:
2206
+ """Check if the user has presented valid login credentials
2207
+
2208
+ Args:
2209
+ username: user id presented by the client. Either an MXID or an unqualified
2210
+ username.
2211
+
2212
+ login_type: the login type being attempted - one of the types returned by
2213
+ get_supported_login_types()
2214
+
2215
+ login_dict: the dictionary of login secrets passed by the client.
2216
+
2217
+ Returns: (user_id, callback) where `user_id` is the fully-qualified mxid of the
2218
+ user, and `callback` is an optional callback which will be called with the
2219
+ result from the /login call (including access_token, device_id, etc.)
2220
+ """
2221
+
2222
+ # Go through all callbacks for the login type until one returns with a value
2223
+ # other than None (i.e. until a callback returns a success)
2224
+ for callback in self.auth_checker_callbacks[login_type]:
2225
+ try:
2226
+ result = await delay_cancellation(
2227
+ callback(username, login_type, login_dict)
2228
+ )
2229
+ except CancelledError:
2230
+ raise
2231
+ except Exception as e:
2232
+ logger.warning("Failed to run module API callback %s: %s", callback, e)
2233
+ continue
2234
+
2235
+ if result is not None:
2236
+ # Check that the callback returned a tuple[str, Callable | None]
2237
+ # "type: ignore[unreachable]" is used after some isinstance checks because mypy thinks
2238
+ # result is always the right type, but as it is 3rd party code it might not be
2239
+
2240
+ if not isinstance(result, tuple) or len(result) != 2:
2241
+ logger.warning( # type: ignore[unreachable]
2242
+ "Wrong type returned by module API callback %s: %s, expected"
2243
+ " tuple[str, Callable | None] | None",
2244
+ callback,
2245
+ result,
2246
+ )
2247
+ continue
2248
+
2249
+ # pull out the two parts of the tuple so we can do type checking
2250
+ str_result, callback_result = result
2251
+
2252
+ # the 1st item in the tuple should be a str
2253
+ if not isinstance(str_result, str):
2254
+ logger.warning( # type: ignore[unreachable]
2255
+ "Wrong type returned by module API callback %s: %s, expected"
2256
+ " tuple[str, Callable | None] | None",
2257
+ callback,
2258
+ result,
2259
+ )
2260
+ continue
2261
+
2262
+ # the second should be Callable | None
2263
+ if callback_result is not None:
2264
+ if not callable(callback_result):
2265
+ logger.warning( # type: ignore[unreachable]
2266
+ "Wrong type returned by module API callback %s: %s, expected"
2267
+ " tuple[str, Callable | None] | None",
2268
+ callback,
2269
+ result,
2270
+ )
2271
+ continue
2272
+
2273
+ # The result is a (str, callback | None) tuple so return the successful result
2274
+ return result
2275
+
2276
+ # If this point has been reached then none of the callbacks successfully authenticated
2277
+ # the user so return None
2278
+ return None
2279
+
2280
+ async def check_3pid_auth(
2281
+ self, medium: str, address: str, password: str
2282
+ ) -> tuple[str, Callable[["LoginResponse"], Awaitable[None]] | None] | None:
2283
+ # This function is able to return a deferred that either
2284
+ # resolves None, meaning authentication failure, or upon
2285
+ # success, to a str (which is the user_id) or a tuple of
2286
+ # (user_id, callback_func), where callback_func should be run
2287
+ # after we've finished everything else
2288
+
2289
+ for callback in self.check_3pid_auth_callbacks:
2290
+ try:
2291
+ result = await delay_cancellation(callback(medium, address, password))
2292
+ except CancelledError:
2293
+ raise
2294
+ except Exception as e:
2295
+ logger.warning("Failed to run module API callback %s: %s", callback, e)
2296
+ continue
2297
+
2298
+ if result is not None:
2299
+ # Check that the callback returned a tuple[str, Callable | None]
2300
+ # "type: ignore[unreachable]" is used after some isinstance checks because mypy thinks
2301
+ # result is always the right type, but as it is 3rd party code it might not be
2302
+
2303
+ if not isinstance(result, tuple) or len(result) != 2:
2304
+ logger.warning( # type: ignore[unreachable]
2305
+ "Wrong type returned by module API callback %s: %s, expected"
2306
+ " tuple[str, Callable | None] | None",
2307
+ callback,
2308
+ result,
2309
+ )
2310
+ continue
2311
+
2312
+ # pull out the two parts of the tuple so we can do type checking
2313
+ str_result, callback_result = result
2314
+
2315
+ # the 1st item in the tuple should be a str
2316
+ if not isinstance(str_result, str):
2317
+ logger.warning( # type: ignore[unreachable]
2318
+ "Wrong type returned by module API callback %s: %s, expected"
2319
+ " tuple[str, Callable | None] | None",
2320
+ callback,
2321
+ result,
2322
+ )
2323
+ continue
2324
+
2325
+ # the second should be Callable | None
2326
+ if callback_result is not None:
2327
+ if not callable(callback_result):
2328
+ logger.warning( # type: ignore[unreachable]
2329
+ "Wrong type returned by module API callback %s: %s, expected"
2330
+ " tuple[str, Callable | None] | None",
2331
+ callback,
2332
+ result,
2333
+ )
2334
+ continue
2335
+
2336
+ # The result is a (str, callback | None) tuple so return the successful result
2337
+ return result
2338
+
2339
+ # If this point has been reached then none of the callbacks successfully authenticated
2340
+ # the user so return None
2341
+ return None
2342
+
2343
+ async def on_logged_out(
2344
+ self, user_id: str, device_id: str | None, access_token: str
2345
+ ) -> None:
2346
+ # call all of the on_logged_out callbacks
2347
+ for callback in self.on_logged_out_callbacks:
2348
+ try:
2349
+ await callback(user_id, device_id, access_token)
2350
+ except Exception as e:
2351
+ logger.warning("Failed to run module API callback %s: %s", callback, e)
2352
+ continue
2353
+
2354
+ async def get_username_for_registration(
2355
+ self,
2356
+ uia_results: JsonDict,
2357
+ params: JsonDict,
2358
+ ) -> str | None:
2359
+ """Defines the username to use when registering the user, using the credentials
2360
+ and parameters provided during the UIA flow.
2361
+
2362
+ Stops at the first callback that returns a string.
2363
+
2364
+ Args:
2365
+ uia_results: The credentials provided during the UIA flow.
2366
+ params: The parameters provided by the registration request.
2367
+
2368
+ Returns:
2369
+ The localpart to use when registering this user, or None if no module
2370
+ returned a localpart.
2371
+ """
2372
+ for callback in self.get_username_for_registration_callbacks:
2373
+ try:
2374
+ res = await delay_cancellation(callback(uia_results, params))
2375
+
2376
+ if isinstance(res, str):
2377
+ return res
2378
+ elif res is not None:
2379
+ # mypy complains that this line is unreachable because it assumes the
2380
+ # data returned by the module fits the expected type. We just want
2381
+ # to make sure this is the case.
2382
+ logger.warning( # type: ignore[unreachable]
2383
+ "Ignoring non-string value returned by"
2384
+ " get_username_for_registration callback %s: %s",
2385
+ callback,
2386
+ res,
2387
+ )
2388
+ except CancelledError:
2389
+ raise
2390
+ except Exception as e:
2391
+ logger.error(
2392
+ "Module raised an exception in get_username_for_registration: %s",
2393
+ e,
2394
+ )
2395
+ raise SynapseError(code=500, msg="Internal Server Error")
2396
+
2397
+ return None
2398
+
2399
+ async def get_displayname_for_registration(
2400
+ self,
2401
+ uia_results: JsonDict,
2402
+ params: JsonDict,
2403
+ ) -> str | None:
2404
+ """Defines the display name to use when registering the user, using the
2405
+ credentials and parameters provided during the UIA flow.
2406
+
2407
+ Stops at the first callback that returns a tuple containing at least one string.
2408
+
2409
+ Args:
2410
+ uia_results: The credentials provided during the UIA flow.
2411
+ params: The parameters provided by the registration request.
2412
+
2413
+ Returns:
2414
+ A tuple which first element is the display name, and the second is an MXC URL
2415
+ to the user's avatar.
2416
+ """
2417
+ for callback in self.get_displayname_for_registration_callbacks:
2418
+ try:
2419
+ res = await delay_cancellation(callback(uia_results, params))
2420
+
2421
+ if isinstance(res, str):
2422
+ return res
2423
+ elif res is not None:
2424
+ # mypy complains that this line is unreachable because it assumes the
2425
+ # data returned by the module fits the expected type. We just want
2426
+ # to make sure this is the case.
2427
+ logger.warning( # type: ignore[unreachable]
2428
+ "Ignoring non-string value returned by"
2429
+ " get_displayname_for_registration callback %s: %s",
2430
+ callback,
2431
+ res,
2432
+ )
2433
+ except CancelledError:
2434
+ raise
2435
+ except Exception as e:
2436
+ logger.error(
2437
+ "Module raised an exception in get_displayname_for_registration: %s",
2438
+ e,
2439
+ )
2440
+ raise SynapseError(code=500, msg="Internal Server Error")
2441
+
2442
+ return None
2443
+
2444
+ async def is_3pid_allowed(
2445
+ self,
2446
+ medium: str,
2447
+ address: str,
2448
+ registration: bool,
2449
+ ) -> bool:
2450
+ """Check if the user can be allowed to bind a 3PID on this homeserver.
2451
+
2452
+ Args:
2453
+ medium: The medium of the 3PID.
2454
+ address: The address of the 3PID.
2455
+ registration: Whether the 3PID is being bound when registering a new user.
2456
+
2457
+ Returns:
2458
+ Whether the 3PID is allowed to be bound on this homeserver
2459
+ """
2460
+ for callback in self.is_3pid_allowed_callbacks:
2461
+ try:
2462
+ res = await delay_cancellation(callback(medium, address, registration))
2463
+
2464
+ if res is False:
2465
+ return res
2466
+ elif not isinstance(res, bool):
2467
+ # mypy complains that this line is unreachable because it assumes the
2468
+ # data returned by the module fits the expected type. We just want
2469
+ # to make sure this is the case.
2470
+ logger.warning( # type: ignore[unreachable]
2471
+ "Ignoring non-string value returned by"
2472
+ " is_3pid_allowed callback %s: %s",
2473
+ callback,
2474
+ res,
2475
+ )
2476
+ except CancelledError:
2477
+ raise
2478
+ except Exception as e:
2479
+ logger.exception("Module raised an exception in is_3pid_allowed: %s", e)
2480
+ raise SynapseError(code=500, msg="Internal Server Error")
2481
+
2482
+ return True