matrix-synapse 1.145.0rc2__cp310-abi3-manylinux_2_28_x86_64.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of matrix-synapse might be problematic. Click here for more details.
- AUTHORS.rst +51 -0
- CHANGES.md +1732 -0
- CONTRIBUTING.md +3 -0
- Cargo.lock +1923 -0
- Cargo.toml +6 -0
- INSTALL.md +7 -0
- LICENSE-AGPL-3.0 +661 -0
- LICENSE-COMMERCIAL +6 -0
- UPGRADE.rst +7 -0
- book.toml +47 -0
- changelog.d/.gitignore +1 -0
- demo/.gitignore +4 -0
- demo/clean.sh +22 -0
- demo/start.sh +173 -0
- demo/stop.sh +14 -0
- docs/.sample_config_header.yaml +12 -0
- docs/CAPTCHA_SETUP.md +37 -0
- docs/README.md +86 -0
- docs/SUMMARY.md +126 -0
- docs/admin_api/README.rst +13 -0
- docs/admin_api/account_validity.md +47 -0
- docs/admin_api/client_server_api_extensions.md +67 -0
- docs/admin_api/event_reports.md +185 -0
- docs/admin_api/experimental_features.md +52 -0
- docs/admin_api/fetch_event.md +53 -0
- docs/admin_api/media_admin_api.md +372 -0
- docs/admin_api/purge_history_api.md +77 -0
- docs/admin_api/register_api.md +92 -0
- docs/admin_api/room_membership.md +35 -0
- docs/admin_api/rooms.md +1190 -0
- docs/admin_api/scheduled_tasks.md +54 -0
- docs/admin_api/server_notices.md +48 -0
- docs/admin_api/statistics.md +132 -0
- docs/admin_api/user_admin_api.md +1602 -0
- docs/admin_api/version_api.md +23 -0
- docs/ancient_architecture_notes.md +81 -0
- docs/application_services.md +36 -0
- docs/architecture.md +65 -0
- docs/auth_chain_diff.dot +32 -0
- docs/auth_chain_diff.dot.png +0 -0
- docs/auth_chain_difference_algorithm.md +141 -0
- docs/changelogs/CHANGES-2019.md +1039 -0
- docs/changelogs/CHANGES-2020.md +2145 -0
- docs/changelogs/CHANGES-2021.md +2573 -0
- docs/changelogs/CHANGES-2022.md +2766 -0
- docs/changelogs/CHANGES-2023.md +2202 -0
- docs/changelogs/CHANGES-2024.md +1586 -0
- docs/changelogs/CHANGES-pre-1.0.md +3641 -0
- docs/changelogs/README.md +1 -0
- docs/code_style.md +119 -0
- docs/consent_tracking.md +197 -0
- docs/delegate.md +111 -0
- docs/deprecation_policy.md +89 -0
- docs/development/cas.md +64 -0
- docs/development/contributing_guide.md +554 -0
- docs/development/database_schema.md +404 -0
- docs/development/demo.md +42 -0
- docs/development/dependencies.md +326 -0
- docs/development/experimental_features.md +37 -0
- docs/development/git.md +148 -0
- docs/development/img/git/branches.jpg +0 -0
- docs/development/img/git/clean.png +0 -0
- docs/development/img/git/squash.png +0 -0
- docs/development/internal_documentation/README.md +12 -0
- docs/development/internal_documentation/release_notes_review_checklist.md +12 -0
- docs/development/releases.md +37 -0
- docs/development/reviews.md +41 -0
- docs/development/room-dag-concepts.md +115 -0
- docs/development/saml.md +40 -0
- docs/development/synapse_architecture/cancellation.md +392 -0
- docs/development/synapse_architecture/faster_joins.md +375 -0
- docs/development/synapse_architecture/streams.md +198 -0
- docs/element_logo_white_bg.svg +94 -0
- docs/favicon.png +0 -0
- docs/favicon.svg +58 -0
- docs/federate.md +67 -0
- docs/jwt.md +105 -0
- docs/log_contexts.md +566 -0
- docs/manhole.md +101 -0
- docs/media_repository.md +78 -0
- docs/message_retention_policies.md +207 -0
- docs/metrics-howto.md +315 -0
- docs/modules/account_data_callbacks.md +106 -0
- docs/modules/account_validity_callbacks.md +57 -0
- docs/modules/add_extra_fields_to_client_events_unsigned.md +32 -0
- docs/modules/background_update_controller_callbacks.md +71 -0
- docs/modules/index.md +53 -0
- docs/modules/media_repository_callbacks.md +131 -0
- docs/modules/password_auth_provider_callbacks.md +270 -0
- docs/modules/porting_legacy_module.md +20 -0
- docs/modules/presence_router_callbacks.md +112 -0
- docs/modules/ratelimit_callbacks.md +43 -0
- docs/modules/spam_checker_callbacks.md +517 -0
- docs/modules/third_party_rules_callbacks.md +350 -0
- docs/modules/writing_a_module.md +141 -0
- docs/openid.md +783 -0
- docs/opentracing.md +99 -0
- docs/other/running_synapse_on_single_board_computers.md +75 -0
- docs/password_auth_providers.md +129 -0
- docs/postgres.md +269 -0
- docs/presence_router_module.md +247 -0
- docs/privacy_policy_templates/en/1.0.html +26 -0
- docs/privacy_policy_templates/en/success.html +11 -0
- docs/replication.md +36 -0
- docs/reverse_proxy.md +327 -0
- docs/room_and_user_statistics.md +22 -0
- docs/sample_config.yaml +47 -0
- docs/sample_log_config.yaml +75 -0
- docs/server_notices.md +66 -0
- docs/setup/forward_proxy.md +89 -0
- docs/setup/installation.md +656 -0
- docs/setup/security.md +41 -0
- docs/setup/turn/coturn.md +197 -0
- docs/setup/turn/eturnal.md +170 -0
- docs/spam_checker.md +122 -0
- docs/sso_mapping_providers.md +208 -0
- docs/structured_logging.md +80 -0
- docs/synctl_workers.md +36 -0
- docs/systemd-with-workers/README.md +101 -0
- docs/systemd-with-workers/system/matrix-synapse-worker@.service +26 -0
- docs/systemd-with-workers/system/matrix-synapse.service +23 -0
- docs/systemd-with-workers/system/matrix-synapse.target +6 -0
- docs/systemd-with-workers/workers/background_worker.yaml +4 -0
- docs/systemd-with-workers/workers/event_persister.yaml +20 -0
- docs/systemd-with-workers/workers/federation_sender.yaml +4 -0
- docs/systemd-with-workers/workers/generic_worker.yaml +11 -0
- docs/systemd-with-workers/workers/media_worker.yaml +11 -0
- docs/systemd-with-workers/workers/pusher_worker.yaml +4 -0
- docs/tcp_replication.md +258 -0
- docs/templates.md +254 -0
- docs/turn-howto.md +168 -0
- docs/upgrade.md +2876 -0
- docs/usage/administration/README.md +7 -0
- docs/usage/administration/admin_api/README.md +47 -0
- docs/usage/administration/admin_api/background_updates.md +109 -0
- docs/usage/administration/admin_api/federation.md +212 -0
- docs/usage/administration/admin_api/registration_tokens.md +298 -0
- docs/usage/administration/admin_faq.md +294 -0
- docs/usage/administration/backups.md +125 -0
- docs/usage/administration/database_maintenance_tools.md +18 -0
- docs/usage/administration/monitoring/reporting_homeserver_usage_statistics.md +77 -0
- docs/usage/administration/monthly_active_users.md +84 -0
- docs/usage/administration/request_log.md +44 -0
- docs/usage/administration/state_groups.md +25 -0
- docs/usage/administration/understanding_synapse_through_grafana_graphs.md +83 -0
- docs/usage/administration/useful_sql_for_admins.md +216 -0
- docs/usage/configuration/README.md +4 -0
- docs/usage/configuration/config_documentation.md +4768 -0
- docs/usage/configuration/homeserver_sample_config.md +17 -0
- docs/usage/configuration/logging_sample_config.md +19 -0
- docs/usage/configuration/user_authentication/README.md +15 -0
- docs/usage/configuration/user_authentication/refresh_tokens.md +139 -0
- docs/usage/configuration/user_authentication/single_sign_on/README.md +5 -0
- docs/usage/configuration/user_authentication/single_sign_on/cas.md +8 -0
- docs/usage/configuration/user_authentication/single_sign_on/saml.md +8 -0
- docs/user_directory.md +130 -0
- docs/website_files/README.md +35 -0
- docs/website_files/indent-section-headers.css +7 -0
- docs/website_files/remove-nav-buttons.css +8 -0
- docs/website_files/table-of-contents.css +47 -0
- docs/website_files/table-of-contents.js +148 -0
- docs/website_files/theme/index.hbs +324 -0
- docs/website_files/version-picker.css +78 -0
- docs/website_files/version-picker.js +147 -0
- docs/website_files/version.js +1 -0
- docs/welcome_and_overview.md +67 -0
- docs/workers.md +897 -0
- matrix_synapse-1.145.0rc2.dist-info/METADATA +260 -0
- matrix_synapse-1.145.0rc2.dist-info/RECORD +1636 -0
- matrix_synapse-1.145.0rc2.dist-info/WHEEL +5 -0
- matrix_synapse-1.145.0rc2.dist-info/entry_points.txt +13 -0
- matrix_synapse-1.145.0rc2.dist-info/licenses/AUTHORS.rst +51 -0
- matrix_synapse-1.145.0rc2.dist-info/licenses/LICENSE-AGPL-3.0 +661 -0
- matrix_synapse-1.145.0rc2.dist-info/licenses/LICENSE-COMMERCIAL +6 -0
- mypy.ini +115 -0
- rust/Cargo.toml +63 -0
- rust/build.rs +45 -0
- scripts-dev/build_debian_packages.py +228 -0
- scripts-dev/check-newsfragment.sh +62 -0
- scripts-dev/check_line_terminators.sh +29 -0
- scripts-dev/check_locked_deps_have_sdists.py +64 -0
- scripts-dev/check_schema_delta.py +240 -0
- scripts-dev/complement.sh +332 -0
- scripts-dev/config-lint.sh +15 -0
- scripts-dev/database-save.sh +15 -0
- scripts-dev/docker_update_debian_changelog.sh +70 -0
- scripts-dev/dump_macaroon.py +25 -0
- scripts-dev/federation_client.py +428 -0
- scripts-dev/gen_config_documentation.py +510 -0
- scripts-dev/generate_sample_config.sh +28 -0
- scripts-dev/lint.sh +141 -0
- scripts-dev/make_full_schema.sh +310 -0
- scripts-dev/mypy_synapse_plugin.py +918 -0
- scripts-dev/next_github_number.sh +9 -0
- scripts-dev/release.py +986 -0
- scripts-dev/schema_versions.py +182 -0
- scripts-dev/sign_json.py +172 -0
- synapse/__init__.py +97 -0
- synapse/_scripts/__init__.py +0 -0
- synapse/_scripts/export_signing_key.py +109 -0
- synapse/_scripts/generate_config.py +83 -0
- synapse/_scripts/generate_log_config.py +56 -0
- synapse/_scripts/generate_signing_key.py +55 -0
- synapse/_scripts/generate_workers_map.py +318 -0
- synapse/_scripts/hash_password.py +95 -0
- synapse/_scripts/move_remote_media_to_new_store.py +128 -0
- synapse/_scripts/register_new_matrix_user.py +402 -0
- synapse/_scripts/review_recent_signups.py +212 -0
- synapse/_scripts/synapse_port_db.py +1604 -0
- synapse/_scripts/synctl.py +365 -0
- synapse/_scripts/update_synapse_database.py +130 -0
- synapse/api/__init__.py +20 -0
- synapse/api/auth/__init__.py +207 -0
- synapse/api/auth/base.py +406 -0
- synapse/api/auth/internal.py +299 -0
- synapse/api/auth/mas.py +436 -0
- synapse/api/auth/msc3861_delegated.py +617 -0
- synapse/api/auth_blocking.py +144 -0
- synapse/api/constants.py +379 -0
- synapse/api/errors.py +913 -0
- synapse/api/filtering.py +537 -0
- synapse/api/presence.py +102 -0
- synapse/api/ratelimiting.py +481 -0
- synapse/api/room_versions.py +535 -0
- synapse/api/urls.py +118 -0
- synapse/app/__init__.py +62 -0
- synapse/app/_base.py +906 -0
- synapse/app/admin_cmd.py +388 -0
- synapse/app/appservice.py +30 -0
- synapse/app/client_reader.py +30 -0
- synapse/app/complement_fork_starter.py +206 -0
- synapse/app/event_creator.py +29 -0
- synapse/app/federation_reader.py +30 -0
- synapse/app/federation_sender.py +30 -0
- synapse/app/frontend_proxy.py +30 -0
- synapse/app/generic_worker.py +475 -0
- synapse/app/homeserver.py +505 -0
- synapse/app/media_repository.py +30 -0
- synapse/app/phone_stats_home.py +292 -0
- synapse/app/pusher.py +30 -0
- synapse/app/synchrotron.py +30 -0
- synapse/app/user_dir.py +31 -0
- synapse/appservice/__init__.py +458 -0
- synapse/appservice/api.py +567 -0
- synapse/appservice/scheduler.py +565 -0
- synapse/config/__init__.py +27 -0
- synapse/config/__main__.py +62 -0
- synapse/config/_base.py +1154 -0
- synapse/config/_base.pyi +216 -0
- synapse/config/_util.py +99 -0
- synapse/config/account_validity.py +116 -0
- synapse/config/api.py +141 -0
- synapse/config/appservice.py +210 -0
- synapse/config/auth.py +80 -0
- synapse/config/auto_accept_invites.py +43 -0
- synapse/config/background_updates.py +44 -0
- synapse/config/cache.py +231 -0
- synapse/config/captcha.py +90 -0
- synapse/config/cas.py +116 -0
- synapse/config/consent.py +73 -0
- synapse/config/database.py +184 -0
- synapse/config/emailconfig.py +367 -0
- synapse/config/experimental.py +601 -0
- synapse/config/federation.py +114 -0
- synapse/config/homeserver.py +141 -0
- synapse/config/jwt.py +55 -0
- synapse/config/key.py +447 -0
- synapse/config/logger.py +390 -0
- synapse/config/mas.py +192 -0
- synapse/config/matrixrtc.py +66 -0
- synapse/config/metrics.py +93 -0
- synapse/config/modules.py +40 -0
- synapse/config/oembed.py +185 -0
- synapse/config/oidc.py +509 -0
- synapse/config/password_auth_providers.py +82 -0
- synapse/config/push.py +64 -0
- synapse/config/ratelimiting.py +260 -0
- synapse/config/redis.py +74 -0
- synapse/config/registration.py +296 -0
- synapse/config/repository.py +311 -0
- synapse/config/retention.py +162 -0
- synapse/config/room.py +88 -0
- synapse/config/room_directory.py +165 -0
- synapse/config/saml2.py +251 -0
- synapse/config/server.py +1139 -0
- synapse/config/server_notices.py +84 -0
- synapse/config/spam_checker.py +66 -0
- synapse/config/sso.py +121 -0
- synapse/config/stats.py +54 -0
- synapse/config/third_party_event_rules.py +40 -0
- synapse/config/tls.py +192 -0
- synapse/config/tracer.py +71 -0
- synapse/config/user_directory.py +47 -0
- synapse/config/user_types.py +42 -0
- synapse/config/voip.py +59 -0
- synapse/config/workers.py +642 -0
- synapse/crypto/__init__.py +20 -0
- synapse/crypto/context_factory.py +278 -0
- synapse/crypto/event_signing.py +194 -0
- synapse/crypto/keyring.py +980 -0
- synapse/event_auth.py +1266 -0
- synapse/events/__init__.py +667 -0
- synapse/events/auto_accept_invites.py +216 -0
- synapse/events/builder.py +387 -0
- synapse/events/presence_router.py +243 -0
- synapse/events/snapshot.py +559 -0
- synapse/events/utils.py +924 -0
- synapse/events/validator.py +305 -0
- synapse/federation/__init__.py +22 -0
- synapse/federation/federation_base.py +382 -0
- synapse/federation/federation_client.py +2133 -0
- synapse/federation/federation_server.py +1543 -0
- synapse/federation/persistence.py +70 -0
- synapse/federation/send_queue.py +532 -0
- synapse/federation/sender/__init__.py +1165 -0
- synapse/federation/sender/per_destination_queue.py +886 -0
- synapse/federation/sender/transaction_manager.py +210 -0
- synapse/federation/transport/__init__.py +28 -0
- synapse/federation/transport/client.py +1199 -0
- synapse/federation/transport/server/__init__.py +334 -0
- synapse/federation/transport/server/_base.py +429 -0
- synapse/federation/transport/server/federation.py +910 -0
- synapse/federation/units.py +133 -0
- synapse/handlers/__init__.py +20 -0
- synapse/handlers/account.py +162 -0
- synapse/handlers/account_data.py +360 -0
- synapse/handlers/account_validity.py +362 -0
- synapse/handlers/admin.py +615 -0
- synapse/handlers/appservice.py +989 -0
- synapse/handlers/auth.py +2482 -0
- synapse/handlers/cas.py +413 -0
- synapse/handlers/deactivate_account.py +363 -0
- synapse/handlers/delayed_events.py +607 -0
- synapse/handlers/device.py +1869 -0
- synapse/handlers/devicemessage.py +399 -0
- synapse/handlers/directory.py +545 -0
- synapse/handlers/e2e_keys.py +1835 -0
- synapse/handlers/e2e_room_keys.py +455 -0
- synapse/handlers/event_auth.py +390 -0
- synapse/handlers/events.py +203 -0
- synapse/handlers/federation.py +2042 -0
- synapse/handlers/federation_event.py +2420 -0
- synapse/handlers/identity.py +812 -0
- synapse/handlers/initial_sync.py +528 -0
- synapse/handlers/jwt.py +120 -0
- synapse/handlers/message.py +2357 -0
- synapse/handlers/oidc.py +1801 -0
- synapse/handlers/pagination.py +811 -0
- synapse/handlers/password_policy.py +102 -0
- synapse/handlers/presence.py +2634 -0
- synapse/handlers/profile.py +656 -0
- synapse/handlers/push_rules.py +164 -0
- synapse/handlers/read_marker.py +79 -0
- synapse/handlers/receipts.py +351 -0
- synapse/handlers/register.py +1059 -0
- synapse/handlers/relations.py +623 -0
- synapse/handlers/reports.py +98 -0
- synapse/handlers/room.py +2449 -0
- synapse/handlers/room_list.py +632 -0
- synapse/handlers/room_member.py +2366 -0
- synapse/handlers/room_member_worker.py +146 -0
- synapse/handlers/room_policy.py +186 -0
- synapse/handlers/room_summary.py +1057 -0
- synapse/handlers/saml.py +524 -0
- synapse/handlers/search.py +723 -0
- synapse/handlers/send_email.py +209 -0
- synapse/handlers/set_password.py +71 -0
- synapse/handlers/sliding_sync/__init__.py +1961 -0
- synapse/handlers/sliding_sync/extensions.py +969 -0
- synapse/handlers/sliding_sync/room_lists.py +2317 -0
- synapse/handlers/sliding_sync/store.py +126 -0
- synapse/handlers/sso.py +1291 -0
- synapse/handlers/state_deltas.py +82 -0
- synapse/handlers/stats.py +322 -0
- synapse/handlers/sync.py +3096 -0
- synapse/handlers/thread_subscriptions.py +190 -0
- synapse/handlers/typing.py +612 -0
- synapse/handlers/ui_auth/__init__.py +48 -0
- synapse/handlers/ui_auth/checkers.py +332 -0
- synapse/handlers/user_directory.py +786 -0
- synapse/handlers/worker_lock.py +371 -0
- synapse/http/__init__.py +105 -0
- synapse/http/additional_resource.py +62 -0
- synapse/http/client.py +1377 -0
- synapse/http/connectproxyclient.py +316 -0
- synapse/http/federation/__init__.py +19 -0
- synapse/http/federation/matrix_federation_agent.py +490 -0
- synapse/http/federation/srv_resolver.py +196 -0
- synapse/http/federation/well_known_resolver.py +368 -0
- synapse/http/matrixfederationclient.py +1874 -0
- synapse/http/proxy.py +290 -0
- synapse/http/proxyagent.py +497 -0
- synapse/http/replicationagent.py +203 -0
- synapse/http/request_metrics.py +309 -0
- synapse/http/server.py +1111 -0
- synapse/http/servlet.py +1018 -0
- synapse/http/site.py +952 -0
- synapse/http/types.py +27 -0
- synapse/logging/__init__.py +31 -0
- synapse/logging/_remote.py +261 -0
- synapse/logging/_terse_json.py +95 -0
- synapse/logging/context.py +1209 -0
- synapse/logging/formatter.py +62 -0
- synapse/logging/handlers.py +99 -0
- synapse/logging/loggers.py +25 -0
- synapse/logging/opentracing.py +1132 -0
- synapse/logging/scopecontextmanager.py +160 -0
- synapse/media/_base.py +831 -0
- synapse/media/filepath.py +417 -0
- synapse/media/media_repository.py +1595 -0
- synapse/media/media_storage.py +703 -0
- synapse/media/oembed.py +277 -0
- synapse/media/preview_html.py +556 -0
- synapse/media/storage_provider.py +195 -0
- synapse/media/thumbnailer.py +833 -0
- synapse/media/url_previewer.py +884 -0
- synapse/metrics/__init__.py +748 -0
- synapse/metrics/_gc.py +219 -0
- synapse/metrics/_reactor_metrics.py +171 -0
- synapse/metrics/_types.py +38 -0
- synapse/metrics/background_process_metrics.py +555 -0
- synapse/metrics/common_usage_metrics.py +95 -0
- synapse/metrics/jemalloc.py +248 -0
- synapse/module_api/__init__.py +2131 -0
- synapse/module_api/callbacks/__init__.py +50 -0
- synapse/module_api/callbacks/account_validity_callbacks.py +106 -0
- synapse/module_api/callbacks/media_repository_callbacks.py +157 -0
- synapse/module_api/callbacks/ratelimit_callbacks.py +78 -0
- synapse/module_api/callbacks/spamchecker_callbacks.py +991 -0
- synapse/module_api/callbacks/third_party_event_rules_callbacks.py +592 -0
- synapse/module_api/errors.py +42 -0
- synapse/notifier.py +969 -0
- synapse/push/__init__.py +212 -0
- synapse/push/bulk_push_rule_evaluator.py +635 -0
- synapse/push/clientformat.py +126 -0
- synapse/push/emailpusher.py +334 -0
- synapse/push/httppusher.py +565 -0
- synapse/push/mailer.py +1009 -0
- synapse/push/presentable_names.py +216 -0
- synapse/push/push_tools.py +114 -0
- synapse/push/push_types.py +141 -0
- synapse/push/pusher.py +87 -0
- synapse/push/pusherpool.py +501 -0
- synapse/push/rulekinds.py +33 -0
- synapse/py.typed +0 -0
- synapse/replication/__init__.py +20 -0
- synapse/replication/http/__init__.py +68 -0
- synapse/replication/http/_base.py +469 -0
- synapse/replication/http/account_data.py +297 -0
- synapse/replication/http/deactivate_account.py +81 -0
- synapse/replication/http/delayed_events.py +62 -0
- synapse/replication/http/devices.py +254 -0
- synapse/replication/http/federation.py +334 -0
- synapse/replication/http/login.py +106 -0
- synapse/replication/http/membership.py +364 -0
- synapse/replication/http/presence.py +133 -0
- synapse/replication/http/push.py +156 -0
- synapse/replication/http/register.py +172 -0
- synapse/replication/http/send_events.py +182 -0
- synapse/replication/http/state.py +82 -0
- synapse/replication/http/streams.py +101 -0
- synapse/replication/tcp/__init__.py +56 -0
- synapse/replication/tcp/client.py +553 -0
- synapse/replication/tcp/commands.py +569 -0
- synapse/replication/tcp/context.py +41 -0
- synapse/replication/tcp/external_cache.py +156 -0
- synapse/replication/tcp/handler.py +922 -0
- synapse/replication/tcp/protocol.py +611 -0
- synapse/replication/tcp/redis.py +510 -0
- synapse/replication/tcp/resource.py +349 -0
- synapse/replication/tcp/streams/__init__.py +96 -0
- synapse/replication/tcp/streams/_base.py +765 -0
- synapse/replication/tcp/streams/events.py +287 -0
- synapse/replication/tcp/streams/federation.py +92 -0
- synapse/replication/tcp/streams/partial_state.py +80 -0
- synapse/res/providers.json +29 -0
- synapse/res/templates/_base.html +29 -0
- synapse/res/templates/account_previously_renewed.html +6 -0
- synapse/res/templates/account_renewed.html +6 -0
- synapse/res/templates/add_threepid.html +8 -0
- synapse/res/templates/add_threepid.txt +6 -0
- synapse/res/templates/add_threepid_failure.html +7 -0
- synapse/res/templates/add_threepid_success.html +6 -0
- synapse/res/templates/already_in_use.html +12 -0
- synapse/res/templates/already_in_use.txt +10 -0
- synapse/res/templates/auth_success.html +21 -0
- synapse/res/templates/invalid_token.html +6 -0
- synapse/res/templates/mail-Element.css +7 -0
- synapse/res/templates/mail-Vector.css +7 -0
- synapse/res/templates/mail-expiry.css +4 -0
- synapse/res/templates/mail.css +156 -0
- synapse/res/templates/notice_expiry.html +46 -0
- synapse/res/templates/notice_expiry.txt +7 -0
- synapse/res/templates/notif.html +51 -0
- synapse/res/templates/notif.txt +22 -0
- synapse/res/templates/notif_mail.html +59 -0
- synapse/res/templates/notif_mail.txt +10 -0
- synapse/res/templates/password_reset.html +10 -0
- synapse/res/templates/password_reset.txt +7 -0
- synapse/res/templates/password_reset_confirmation.html +15 -0
- synapse/res/templates/password_reset_failure.html +7 -0
- synapse/res/templates/password_reset_success.html +6 -0
- synapse/res/templates/recaptcha.html +42 -0
- synapse/res/templates/registration.html +12 -0
- synapse/res/templates/registration.txt +10 -0
- synapse/res/templates/registration_failure.html +6 -0
- synapse/res/templates/registration_success.html +6 -0
- synapse/res/templates/registration_token.html +18 -0
- synapse/res/templates/room.html +33 -0
- synapse/res/templates/room.txt +9 -0
- synapse/res/templates/sso.css +129 -0
- synapse/res/templates/sso_account_deactivated.html +25 -0
- synapse/res/templates/sso_auth_account_details.html +186 -0
- synapse/res/templates/sso_auth_account_details.js +116 -0
- synapse/res/templates/sso_auth_bad_user.html +26 -0
- synapse/res/templates/sso_auth_confirm.html +27 -0
- synapse/res/templates/sso_auth_success.html +26 -0
- synapse/res/templates/sso_error.html +71 -0
- synapse/res/templates/sso_footer.html +19 -0
- synapse/res/templates/sso_login_idp_picker.html +60 -0
- synapse/res/templates/sso_new_user_consent.html +30 -0
- synapse/res/templates/sso_partial_profile.html +19 -0
- synapse/res/templates/sso_redirect_confirm.html +39 -0
- synapse/res/templates/style.css +33 -0
- synapse/res/templates/terms.html +27 -0
- synapse/rest/__init__.py +197 -0
- synapse/rest/admin/__init__.py +395 -0
- synapse/rest/admin/_base.py +72 -0
- synapse/rest/admin/background_updates.py +171 -0
- synapse/rest/admin/devices.py +221 -0
- synapse/rest/admin/event_reports.py +173 -0
- synapse/rest/admin/events.py +69 -0
- synapse/rest/admin/experimental_features.py +137 -0
- synapse/rest/admin/federation.py +243 -0
- synapse/rest/admin/media.py +540 -0
- synapse/rest/admin/registration_tokens.py +358 -0
- synapse/rest/admin/rooms.py +1092 -0
- synapse/rest/admin/scheduled_tasks.py +70 -0
- synapse/rest/admin/server_notice_servlet.py +132 -0
- synapse/rest/admin/statistics.py +132 -0
- synapse/rest/admin/username_available.py +58 -0
- synapse/rest/admin/users.py +1634 -0
- synapse/rest/client/__init__.py +20 -0
- synapse/rest/client/_base.py +113 -0
- synapse/rest/client/account.py +937 -0
- synapse/rest/client/account_data.py +319 -0
- synapse/rest/client/account_validity.py +103 -0
- synapse/rest/client/appservice_ping.py +125 -0
- synapse/rest/client/auth.py +218 -0
- synapse/rest/client/auth_metadata.py +122 -0
- synapse/rest/client/capabilities.py +121 -0
- synapse/rest/client/delayed_events.py +165 -0
- synapse/rest/client/devices.py +587 -0
- synapse/rest/client/directory.py +211 -0
- synapse/rest/client/events.py +116 -0
- synapse/rest/client/filter.py +112 -0
- synapse/rest/client/initial_sync.py +65 -0
- synapse/rest/client/keys.py +678 -0
- synapse/rest/client/knock.py +104 -0
- synapse/rest/client/login.py +750 -0
- synapse/rest/client/login_token_request.py +127 -0
- synapse/rest/client/logout.py +93 -0
- synapse/rest/client/matrixrtc.py +52 -0
- synapse/rest/client/media.py +307 -0
- synapse/rest/client/mutual_rooms.py +145 -0
- synapse/rest/client/notifications.py +137 -0
- synapse/rest/client/openid.py +109 -0
- synapse/rest/client/password_policy.py +69 -0
- synapse/rest/client/presence.py +131 -0
- synapse/rest/client/profile.py +291 -0
- synapse/rest/client/push_rule.py +331 -0
- synapse/rest/client/pusher.py +181 -0
- synapse/rest/client/read_marker.py +104 -0
- synapse/rest/client/receipts.py +165 -0
- synapse/rest/client/register.py +1072 -0
- synapse/rest/client/relations.py +138 -0
- synapse/rest/client/rendezvous.py +76 -0
- synapse/rest/client/reporting.py +207 -0
- synapse/rest/client/room.py +1763 -0
- synapse/rest/client/room_keys.py +426 -0
- synapse/rest/client/room_upgrade_rest_servlet.py +112 -0
- synapse/rest/client/sendtodevice.py +85 -0
- synapse/rest/client/sync.py +1131 -0
- synapse/rest/client/tags.py +129 -0
- synapse/rest/client/thirdparty.py +130 -0
- synapse/rest/client/thread_subscriptions.py +247 -0
- synapse/rest/client/tokenrefresh.py +52 -0
- synapse/rest/client/transactions.py +150 -0
- synapse/rest/client/user_directory.py +99 -0
- synapse/rest/client/versions.py +193 -0
- synapse/rest/client/voip.py +88 -0
- synapse/rest/consent/__init__.py +0 -0
- synapse/rest/consent/consent_resource.py +210 -0
- synapse/rest/health.py +38 -0
- synapse/rest/key/__init__.py +20 -0
- synapse/rest/key/v2/__init__.py +40 -0
- synapse/rest/key/v2/local_key_resource.py +125 -0
- synapse/rest/key/v2/remote_key_resource.py +302 -0
- synapse/rest/media/__init__.py +0 -0
- synapse/rest/media/config_resource.py +53 -0
- synapse/rest/media/create_resource.py +90 -0
- synapse/rest/media/download_resource.py +110 -0
- synapse/rest/media/media_repository_resource.py +113 -0
- synapse/rest/media/preview_url_resource.py +77 -0
- synapse/rest/media/thumbnail_resource.py +142 -0
- synapse/rest/media/upload_resource.py +187 -0
- synapse/rest/media/v1/__init__.py +39 -0
- synapse/rest/media/v1/_base.py +23 -0
- synapse/rest/media/v1/media_storage.py +23 -0
- synapse/rest/media/v1/storage_provider.py +23 -0
- synapse/rest/synapse/__init__.py +20 -0
- synapse/rest/synapse/client/__init__.py +93 -0
- synapse/rest/synapse/client/federation_whitelist.py +66 -0
- synapse/rest/synapse/client/jwks.py +77 -0
- synapse/rest/synapse/client/new_user_consent.py +115 -0
- synapse/rest/synapse/client/oidc/__init__.py +45 -0
- synapse/rest/synapse/client/oidc/backchannel_logout_resource.py +42 -0
- synapse/rest/synapse/client/oidc/callback_resource.py +48 -0
- synapse/rest/synapse/client/password_reset.py +129 -0
- synapse/rest/synapse/client/pick_idp.py +107 -0
- synapse/rest/synapse/client/pick_username.py +153 -0
- synapse/rest/synapse/client/rendezvous.py +58 -0
- synapse/rest/synapse/client/saml2/__init__.py +42 -0
- synapse/rest/synapse/client/saml2/metadata_resource.py +46 -0
- synapse/rest/synapse/client/saml2/response_resource.py +52 -0
- synapse/rest/synapse/client/sso_register.py +56 -0
- synapse/rest/synapse/client/unsubscribe.py +88 -0
- synapse/rest/synapse/mas/__init__.py +71 -0
- synapse/rest/synapse/mas/_base.py +55 -0
- synapse/rest/synapse/mas/devices.py +239 -0
- synapse/rest/synapse/mas/users.py +469 -0
- synapse/rest/well_known.py +148 -0
- synapse/server.py +1279 -0
- synapse/server_notices/__init__.py +0 -0
- synapse/server_notices/consent_server_notices.py +136 -0
- synapse/server_notices/resource_limits_server_notices.py +215 -0
- synapse/server_notices/server_notices_manager.py +388 -0
- synapse/server_notices/server_notices_sender.py +67 -0
- synapse/server_notices/worker_server_notices_sender.py +46 -0
- synapse/spam_checker_api/__init__.py +31 -0
- synapse/state/__init__.py +1023 -0
- synapse/state/v1.py +369 -0
- synapse/state/v2.py +985 -0
- synapse/static/client/login/index.html +47 -0
- synapse/static/client/login/js/jquery-3.4.1.min.js +2 -0
- synapse/static/client/login/js/login.js +291 -0
- synapse/static/client/login/spinner.gif +0 -0
- synapse/static/client/login/style.css +79 -0
- synapse/static/index.html +63 -0
- synapse/storage/__init__.py +43 -0
- synapse/storage/_base.py +245 -0
- synapse/storage/admin_client_config.py +25 -0
- synapse/storage/background_updates.py +1189 -0
- synapse/storage/controllers/__init__.py +57 -0
- synapse/storage/controllers/persist_events.py +1237 -0
- synapse/storage/controllers/purge_events.py +456 -0
- synapse/storage/controllers/state.py +950 -0
- synapse/storage/controllers/stats.py +119 -0
- synapse/storage/database.py +2720 -0
- synapse/storage/databases/__init__.py +175 -0
- synapse/storage/databases/main/__init__.py +420 -0
- synapse/storage/databases/main/account_data.py +1073 -0
- synapse/storage/databases/main/appservice.py +473 -0
- synapse/storage/databases/main/cache.py +912 -0
- synapse/storage/databases/main/censor_events.py +226 -0
- synapse/storage/databases/main/client_ips.py +816 -0
- synapse/storage/databases/main/delayed_events.py +577 -0
- synapse/storage/databases/main/deviceinbox.py +1272 -0
- synapse/storage/databases/main/devices.py +2579 -0
- synapse/storage/databases/main/directory.py +212 -0
- synapse/storage/databases/main/e2e_room_keys.py +689 -0
- synapse/storage/databases/main/end_to_end_keys.py +1894 -0
- synapse/storage/databases/main/event_federation.py +2511 -0
- synapse/storage/databases/main/event_push_actions.py +1936 -0
- synapse/storage/databases/main/events.py +3765 -0
- synapse/storage/databases/main/events_bg_updates.py +2910 -0
- synapse/storage/databases/main/events_forward_extremities.py +126 -0
- synapse/storage/databases/main/events_worker.py +2787 -0
- synapse/storage/databases/main/experimental_features.py +130 -0
- synapse/storage/databases/main/filtering.py +231 -0
- synapse/storage/databases/main/keys.py +291 -0
- synapse/storage/databases/main/lock.py +554 -0
- synapse/storage/databases/main/media_repository.py +1068 -0
- synapse/storage/databases/main/metrics.py +461 -0
- synapse/storage/databases/main/monthly_active_users.py +443 -0
- synapse/storage/databases/main/openid.py +60 -0
- synapse/storage/databases/main/presence.py +509 -0
- synapse/storage/databases/main/profile.py +539 -0
- synapse/storage/databases/main/purge_events.py +521 -0
- synapse/storage/databases/main/push_rule.py +970 -0
- synapse/storage/databases/main/pusher.py +793 -0
- synapse/storage/databases/main/receipts.py +1341 -0
- synapse/storage/databases/main/registration.py +3071 -0
- synapse/storage/databases/main/rejections.py +37 -0
- synapse/storage/databases/main/relations.py +1116 -0
- synapse/storage/databases/main/room.py +2779 -0
- synapse/storage/databases/main/roommember.py +2132 -0
- synapse/storage/databases/main/search.py +939 -0
- synapse/storage/databases/main/session.py +152 -0
- synapse/storage/databases/main/signatures.py +94 -0
- synapse/storage/databases/main/sliding_sync.py +842 -0
- synapse/storage/databases/main/state.py +1002 -0
- synapse/storage/databases/main/state_deltas.py +360 -0
- synapse/storage/databases/main/stats.py +789 -0
- synapse/storage/databases/main/stream.py +2589 -0
- synapse/storage/databases/main/tags.py +360 -0
- synapse/storage/databases/main/task_scheduler.py +225 -0
- synapse/storage/databases/main/thread_subscriptions.py +589 -0
- synapse/storage/databases/main/transactions.py +676 -0
- synapse/storage/databases/main/ui_auth.py +420 -0
- synapse/storage/databases/main/user_directory.py +1330 -0
- synapse/storage/databases/main/user_erasure_store.py +117 -0
- synapse/storage/databases/state/__init__.py +22 -0
- synapse/storage/databases/state/bg_updates.py +497 -0
- synapse/storage/databases/state/deletion.py +557 -0
- synapse/storage/databases/state/store.py +948 -0
- synapse/storage/engines/__init__.py +70 -0
- synapse/storage/engines/_base.py +154 -0
- synapse/storage/engines/postgres.py +261 -0
- synapse/storage/engines/sqlite.py +199 -0
- synapse/storage/invite_rule.py +152 -0
- synapse/storage/keys.py +40 -0
- synapse/storage/prepare_database.py +730 -0
- synapse/storage/push_rule.py +28 -0
- synapse/storage/roommember.py +88 -0
- synapse/storage/schema/README.md +4 -0
- synapse/storage/schema/__init__.py +186 -0
- synapse/storage/schema/common/delta/25/00background_updates.sql +40 -0
- synapse/storage/schema/common/delta/35/00background_updates_add_col.sql +36 -0
- synapse/storage/schema/common/delta/58/00background_update_ordering.sql +38 -0
- synapse/storage/schema/common/full_schemas/72/full.sql.postgres +8 -0
- synapse/storage/schema/common/full_schemas/72/full.sql.sqlite +6 -0
- synapse/storage/schema/common/schema_version.sql +60 -0
- synapse/storage/schema/main/delta/12/v12.sql +82 -0
- synapse/storage/schema/main/delta/13/v13.sql +38 -0
- synapse/storage/schema/main/delta/14/v14.sql +42 -0
- synapse/storage/schema/main/delta/15/appservice_txns.sql +50 -0
- synapse/storage/schema/main/delta/15/presence_indices.sql +2 -0
- synapse/storage/schema/main/delta/15/v15.sql +24 -0
- synapse/storage/schema/main/delta/16/events_order_index.sql +4 -0
- synapse/storage/schema/main/delta/16/remote_media_cache_index.sql +2 -0
- synapse/storage/schema/main/delta/16/remove_duplicates.sql +9 -0
- synapse/storage/schema/main/delta/16/room_alias_index.sql +3 -0
- synapse/storage/schema/main/delta/16/unique_constraints.sql +72 -0
- synapse/storage/schema/main/delta/16/users.sql +56 -0
- synapse/storage/schema/main/delta/17/drop_indexes.sql +37 -0
- synapse/storage/schema/main/delta/17/server_keys.sql +43 -0
- synapse/storage/schema/main/delta/17/user_threepids.sql +9 -0
- synapse/storage/schema/main/delta/18/server_keys_bigger_ints.sql +51 -0
- synapse/storage/schema/main/delta/19/event_index.sql +38 -0
- synapse/storage/schema/main/delta/20/dummy.sql +1 -0
- synapse/storage/schema/main/delta/20/pushers.py +93 -0
- synapse/storage/schema/main/delta/21/end_to_end_keys.sql +53 -0
- synapse/storage/schema/main/delta/21/receipts.sql +57 -0
- synapse/storage/schema/main/delta/22/receipts_index.sql +41 -0
- synapse/storage/schema/main/delta/22/user_threepids_unique.sql +19 -0
- synapse/storage/schema/main/delta/24/stats_reporting.sql +37 -0
- synapse/storage/schema/main/delta/25/fts.py +81 -0
- synapse/storage/schema/main/delta/25/guest_access.sql +44 -0
- synapse/storage/schema/main/delta/25/history_visibility.sql +44 -0
- synapse/storage/schema/main/delta/25/tags.sql +57 -0
- synapse/storage/schema/main/delta/26/account_data.sql +36 -0
- synapse/storage/schema/main/delta/27/account_data.sql +55 -0
- synapse/storage/schema/main/delta/27/forgotten_memberships.sql +45 -0
- synapse/storage/schema/main/delta/27/ts.py +61 -0
- synapse/storage/schema/main/delta/28/event_push_actions.sql +46 -0
- synapse/storage/schema/main/delta/28/events_room_stream.sql +39 -0
- synapse/storage/schema/main/delta/28/public_roms_index.sql +39 -0
- synapse/storage/schema/main/delta/28/receipts_user_id_index.sql +41 -0
- synapse/storage/schema/main/delta/28/upgrade_times.sql +40 -0
- synapse/storage/schema/main/delta/28/users_is_guest.sql +41 -0
- synapse/storage/schema/main/delta/29/push_actions.sql +54 -0
- synapse/storage/schema/main/delta/30/alias_creator.sql +35 -0
- synapse/storage/schema/main/delta/30/as_users.py +82 -0
- synapse/storage/schema/main/delta/30/deleted_pushers.sql +44 -0
- synapse/storage/schema/main/delta/30/presence_stream.sql +49 -0
- synapse/storage/schema/main/delta/30/public_rooms.sql +42 -0
- synapse/storage/schema/main/delta/30/push_rule_stream.sql +57 -0
- synapse/storage/schema/main/delta/30/threepid_guest_access_tokens.sql +43 -0
- synapse/storage/schema/main/delta/31/invites.sql +61 -0
- synapse/storage/schema/main/delta/31/local_media_repository_url_cache.sql +46 -0
- synapse/storage/schema/main/delta/31/pushers_0.py +92 -0
- synapse/storage/schema/main/delta/31/pushers_index.sql +41 -0
- synapse/storage/schema/main/delta/31/search_update.py +65 -0
- synapse/storage/schema/main/delta/32/events.sql +35 -0
- synapse/storage/schema/main/delta/32/openid.sql +9 -0
- synapse/storage/schema/main/delta/32/pusher_throttle.sql +42 -0
- synapse/storage/schema/main/delta/32/remove_indices.sql +52 -0
- synapse/storage/schema/main/delta/32/reports.sql +44 -0
- synapse/storage/schema/main/delta/33/access_tokens_device_index.sql +36 -0
- synapse/storage/schema/main/delta/33/devices.sql +40 -0
- synapse/storage/schema/main/delta/33/devices_for_e2e_keys.sql +38 -0
- synapse/storage/schema/main/delta/33/devices_for_e2e_keys_clear_unknown_device.sql +39 -0
- synapse/storage/schema/main/delta/33/event_fields.py +61 -0
- synapse/storage/schema/main/delta/33/remote_media_ts.py +43 -0
- synapse/storage/schema/main/delta/33/user_ips_index.sql +36 -0
- synapse/storage/schema/main/delta/34/appservice_stream.sql +42 -0
- synapse/storage/schema/main/delta/34/cache_stream.py +50 -0
- synapse/storage/schema/main/delta/34/device_inbox.sql +43 -0
- synapse/storage/schema/main/delta/34/push_display_name_rename.sql +39 -0
- synapse/storage/schema/main/delta/34/received_txn_purge.py +36 -0
- synapse/storage/schema/main/delta/35/contains_url.sql +36 -0
- synapse/storage/schema/main/delta/35/device_outbox.sql +58 -0
- synapse/storage/schema/main/delta/35/device_stream_id.sql +40 -0
- synapse/storage/schema/main/delta/35/event_push_actions_index.sql +36 -0
- synapse/storage/schema/main/delta/35/public_room_list_change_stream.sql +52 -0
- synapse/storage/schema/main/delta/35/stream_order_to_extrem.sql +56 -0
- synapse/storage/schema/main/delta/36/readd_public_rooms.sql +45 -0
- synapse/storage/schema/main/delta/37/remove_auth_idx.py +89 -0
- synapse/storage/schema/main/delta/37/user_threepids.sql +71 -0
- synapse/storage/schema/main/delta/38/postgres_fts_gist.sql +38 -0
- synapse/storage/schema/main/delta/39/appservice_room_list.sql +48 -0
- synapse/storage/schema/main/delta/39/device_federation_stream_idx.sql +35 -0
- synapse/storage/schema/main/delta/39/event_push_index.sql +36 -0
- synapse/storage/schema/main/delta/39/federation_out_position.sql +41 -0
- synapse/storage/schema/main/delta/39/membership_profile.sql +39 -0
- synapse/storage/schema/main/delta/40/current_state_idx.sql +36 -0
- synapse/storage/schema/main/delta/40/device_inbox.sql +40 -0
- synapse/storage/schema/main/delta/40/device_list_streams.sql +79 -0
- synapse/storage/schema/main/delta/40/event_push_summary.sql +57 -0
- synapse/storage/schema/main/delta/40/pushers.sql +58 -0
- synapse/storage/schema/main/delta/41/device_list_stream_idx.sql +36 -0
- synapse/storage/schema/main/delta/41/device_outbound_index.sql +35 -0
- synapse/storage/schema/main/delta/41/event_search_event_id_idx.sql +36 -0
- synapse/storage/schema/main/delta/41/ratelimit.sql +41 -0
- synapse/storage/schema/main/delta/42/current_state_delta.sql +48 -0
- synapse/storage/schema/main/delta/42/device_list_last_id.sql +52 -0
- synapse/storage/schema/main/delta/42/event_auth_state_only.sql +36 -0
- synapse/storage/schema/main/delta/42/user_dir.py +88 -0
- synapse/storage/schema/main/delta/43/blocked_rooms.sql +40 -0
- synapse/storage/schema/main/delta/43/quarantine_media.sql +36 -0
- synapse/storage/schema/main/delta/43/url_cache.sql +35 -0
- synapse/storage/schema/main/delta/43/user_share.sql +52 -0
- synapse/storage/schema/main/delta/44/expire_url_cache.sql +60 -0
- synapse/storage/schema/main/delta/45/group_server.sql +186 -0
- synapse/storage/schema/main/delta/45/profile_cache.sql +47 -0
- synapse/storage/schema/main/delta/46/drop_refresh_tokens.sql +36 -0
- synapse/storage/schema/main/delta/46/drop_unique_deleted_pushers.sql +54 -0
- synapse/storage/schema/main/delta/46/group_server.sql +51 -0
- synapse/storage/schema/main/delta/46/local_media_repository_url_idx.sql +43 -0
- synapse/storage/schema/main/delta/46/user_dir_null_room_ids.sql +54 -0
- synapse/storage/schema/main/delta/46/user_dir_typos.sql +43 -0
- synapse/storage/schema/main/delta/47/last_access_media.sql +35 -0
- synapse/storage/schema/main/delta/47/postgres_fts_gin.sql +36 -0
- synapse/storage/schema/main/delta/47/push_actions_staging.sql +47 -0
- synapse/storage/schema/main/delta/48/add_user_consent.sql +37 -0
- synapse/storage/schema/main/delta/48/add_user_ips_last_seen_index.sql +36 -0
- synapse/storage/schema/main/delta/48/deactivated_users.sql +44 -0
- synapse/storage/schema/main/delta/48/group_unique_indexes.py +67 -0
- synapse/storage/schema/main/delta/48/groups_joinable.sql +41 -0
- synapse/storage/schema/main/delta/49/add_user_consent_server_notice_sent.sql +39 -0
- synapse/storage/schema/main/delta/49/add_user_daily_visits.sql +40 -0
- synapse/storage/schema/main/delta/49/add_user_ips_last_seen_only_index.sql +36 -0
- synapse/storage/schema/main/delta/50/add_creation_ts_users_index.sql +38 -0
- synapse/storage/schema/main/delta/50/erasure_store.sql +40 -0
- synapse/storage/schema/main/delta/50/make_event_content_nullable.py +102 -0
- synapse/storage/schema/main/delta/51/e2e_room_keys.sql +58 -0
- synapse/storage/schema/main/delta/51/monthly_active_users.sql +46 -0
- synapse/storage/schema/main/delta/52/add_event_to_state_group_index.sql +38 -0
- synapse/storage/schema/main/delta/52/device_list_streams_unique_idx.sql +55 -0
- synapse/storage/schema/main/delta/52/e2e_room_keys.sql +72 -0
- synapse/storage/schema/main/delta/53/add_user_type_to_users.sql +38 -0
- synapse/storage/schema/main/delta/53/drop_sent_transactions.sql +35 -0
- synapse/storage/schema/main/delta/53/event_format_version.sql +35 -0
- synapse/storage/schema/main/delta/53/user_dir_populate.sql +49 -0
- synapse/storage/schema/main/delta/53/user_ips_index.sql +49 -0
- synapse/storage/schema/main/delta/53/user_share.sql +63 -0
- synapse/storage/schema/main/delta/53/user_threepid_id.sql +48 -0
- synapse/storage/schema/main/delta/53/users_in_public_rooms.sql +47 -0
- synapse/storage/schema/main/delta/54/account_validity_with_renewal.sql +49 -0
- synapse/storage/schema/main/delta/54/add_validity_to_server_keys.sql +42 -0
- synapse/storage/schema/main/delta/54/delete_forward_extremities.sql +42 -0
- synapse/storage/schema/main/delta/54/drop_legacy_tables.sql +49 -0
- synapse/storage/schema/main/delta/54/drop_presence_list.sql +35 -0
- synapse/storage/schema/main/delta/54/relations.sql +46 -0
- synapse/storage/schema/main/delta/54/stats.sql +99 -0
- synapse/storage/schema/main/delta/54/stats2.sql +47 -0
- synapse/storage/schema/main/delta/55/access_token_expiry.sql +37 -0
- synapse/storage/schema/main/delta/55/track_threepid_validations.sql +50 -0
- synapse/storage/schema/main/delta/55/users_alter_deactivated.sql +38 -0
- synapse/storage/schema/main/delta/56/add_spans_to_device_lists.sql +39 -0
- synapse/storage/schema/main/delta/56/current_state_events_membership.sql +41 -0
- synapse/storage/schema/main/delta/56/current_state_events_membership_mk2.sql +43 -0
- synapse/storage/schema/main/delta/56/delete_keys_from_deleted_backups.sql +44 -0
- synapse/storage/schema/main/delta/56/destinations_failure_ts.sql +44 -0
- synapse/storage/schema/main/delta/56/destinations_retry_interval_type.sql.postgres +18 -0
- synapse/storage/schema/main/delta/56/device_stream_id_insert.sql +39 -0
- synapse/storage/schema/main/delta/56/devices_last_seen.sql +43 -0
- synapse/storage/schema/main/delta/56/drop_unused_event_tables.sql +39 -0
- synapse/storage/schema/main/delta/56/event_expiry.sql +40 -0
- synapse/storage/schema/main/delta/56/event_labels.sql +49 -0
- synapse/storage/schema/main/delta/56/event_labels_background_update.sql +36 -0
- synapse/storage/schema/main/delta/56/fix_room_keys_index.sql +37 -0
- synapse/storage/schema/main/delta/56/hidden_devices.sql +37 -0
- synapse/storage/schema/main/delta/56/hidden_devices_fix.sql.sqlite +42 -0
- synapse/storage/schema/main/delta/56/nuke_empty_communities_from_db.sql +48 -0
- synapse/storage/schema/main/delta/56/public_room_list_idx.sql +35 -0
- synapse/storage/schema/main/delta/56/redaction_censor.sql +35 -0
- synapse/storage/schema/main/delta/56/redaction_censor2.sql +41 -0
- synapse/storage/schema/main/delta/56/redaction_censor3_fix_update.sql.postgres +25 -0
- synapse/storage/schema/main/delta/56/redaction_censor4.sql +35 -0
- synapse/storage/schema/main/delta/56/remove_tombstoned_rooms_from_directory.sql +38 -0
- synapse/storage/schema/main/delta/56/room_key_etag.sql +36 -0
- synapse/storage/schema/main/delta/56/room_membership_idx.sql +37 -0
- synapse/storage/schema/main/delta/56/room_retention.sql +52 -0
- synapse/storage/schema/main/delta/56/signing_keys.sql +75 -0
- synapse/storage/schema/main/delta/56/signing_keys_nonunique_signatures.sql +41 -0
- synapse/storage/schema/main/delta/56/stats_separated.sql +175 -0
- synapse/storage/schema/main/delta/56/unique_user_filter_index.py +46 -0
- synapse/storage/schema/main/delta/56/user_external_ids.sql +43 -0
- synapse/storage/schema/main/delta/56/users_in_public_rooms_idx.sql +36 -0
- synapse/storage/schema/main/delta/57/delete_old_current_state_events.sql +41 -0
- synapse/storage/schema/main/delta/57/device_list_remote_cache_stale.sql +44 -0
- synapse/storage/schema/main/delta/57/local_current_membership.py +111 -0
- synapse/storage/schema/main/delta/57/remove_sent_outbound_pokes.sql +40 -0
- synapse/storage/schema/main/delta/57/rooms_version_column.sql +43 -0
- synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.postgres +35 -0
- synapse/storage/schema/main/delta/57/rooms_version_column_2.sql.sqlite +22 -0
- synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.postgres +39 -0
- synapse/storage/schema/main/delta/57/rooms_version_column_3.sql.sqlite +23 -0
- synapse/storage/schema/main/delta/58/02remove_dup_outbound_pokes.sql +41 -0
- synapse/storage/schema/main/delta/58/03persist_ui_auth.sql +55 -0
- synapse/storage/schema/main/delta/58/05cache_instance.sql.postgres +30 -0
- synapse/storage/schema/main/delta/58/06dlols_unique_idx.py +83 -0
- synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.postgres +33 -0
- synapse/storage/schema/main/delta/58/07add_method_to_thumbnail_constraint.sql.sqlite +44 -0
- synapse/storage/schema/main/delta/58/07persist_ui_auth_ips.sql +44 -0
- synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.postgres +18 -0
- synapse/storage/schema/main/delta/58/08_media_safe_from_quarantine.sql.sqlite +18 -0
- synapse/storage/schema/main/delta/58/09shadow_ban.sql +37 -0
- synapse/storage/schema/main/delta/58/10_pushrules_enabled_delete_obsolete.sql +47 -0
- synapse/storage/schema/main/delta/58/10drop_local_rejections_stream.sql +41 -0
- synapse/storage/schema/main/delta/58/10federation_pos_instance_name.sql +41 -0
- synapse/storage/schema/main/delta/58/11dehydration.sql +39 -0
- synapse/storage/schema/main/delta/58/11fallback.sql +43 -0
- synapse/storage/schema/main/delta/58/11user_id_seq.py +38 -0
- synapse/storage/schema/main/delta/58/12room_stats.sql +51 -0
- synapse/storage/schema/main/delta/58/13remove_presence_allow_inbound.sql +36 -0
- synapse/storage/schema/main/delta/58/14events_instance_name.sql +35 -0
- synapse/storage/schema/main/delta/58/14events_instance_name.sql.postgres +28 -0
- synapse/storage/schema/main/delta/58/15_catchup_destination_rooms.sql +61 -0
- synapse/storage/schema/main/delta/58/15unread_count.sql +45 -0
- synapse/storage/schema/main/delta/58/16populate_stats_process_rooms_fix.sql +41 -0
- synapse/storage/schema/main/delta/58/17_catchup_last_successful.sql +40 -0
- synapse/storage/schema/main/delta/58/18stream_positions.sql +41 -0
- synapse/storage/schema/main/delta/58/19instance_map.sql.postgres +25 -0
- synapse/storage/schema/main/delta/58/19txn_id.sql +59 -0
- synapse/storage/schema/main/delta/58/20instance_name_event_tables.sql +36 -0
- synapse/storage/schema/main/delta/58/20user_daily_visits.sql +37 -0
- synapse/storage/schema/main/delta/58/21as_device_stream.sql +36 -0
- synapse/storage/schema/main/delta/58/21drop_device_max_stream_id.sql +1 -0
- synapse/storage/schema/main/delta/58/22puppet_token.sql +36 -0
- synapse/storage/schema/main/delta/58/22users_have_local_media.sql +2 -0
- synapse/storage/schema/main/delta/58/23e2e_cross_signing_keys_idx.sql +36 -0
- synapse/storage/schema/main/delta/58/24drop_event_json_index.sql +38 -0
- synapse/storage/schema/main/delta/58/25user_external_ids_user_id_idx.sql +36 -0
- synapse/storage/schema/main/delta/58/26access_token_last_validated.sql +37 -0
- synapse/storage/schema/main/delta/58/27local_invites.sql +37 -0
- synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.postgres +16 -0
- synapse/storage/schema/main/delta/58/28drop_last_used_column.sql.sqlite +62 -0
- synapse/storage/schema/main/delta/59/01ignored_user.py +85 -0
- synapse/storage/schema/main/delta/59/02shard_send_to_device.sql +37 -0
- synapse/storage/schema/main/delta/59/03shard_send_to_device_sequence.sql.postgres +25 -0
- synapse/storage/schema/main/delta/59/04_event_auth_chains.sql +71 -0
- synapse/storage/schema/main/delta/59/04_event_auth_chains.sql.postgres +16 -0
- synapse/storage/schema/main/delta/59/04drop_account_data.sql +36 -0
- synapse/storage/schema/main/delta/59/05cache_invalidation.sql +36 -0
- synapse/storage/schema/main/delta/59/06chain_cover_index.sql +36 -0
- synapse/storage/schema/main/delta/59/06shard_account_data.sql +39 -0
- synapse/storage/schema/main/delta/59/06shard_account_data.sql.postgres +32 -0
- synapse/storage/schema/main/delta/59/07shard_account_data_fix.sql +37 -0
- synapse/storage/schema/main/delta/59/08delete_pushers_for_deactivated_accounts.sql +39 -0
- synapse/storage/schema/main/delta/59/08delete_stale_pushers.sql +39 -0
- synapse/storage/schema/main/delta/59/09rejected_events_metadata.sql +45 -0
- synapse/storage/schema/main/delta/59/10delete_purged_chain_cover.sql +36 -0
- synapse/storage/schema/main/delta/59/11add_knock_members_to_stats.sql +39 -0
- synapse/storage/schema/main/delta/59/11drop_thumbnail_constraint.sql.postgres +22 -0
- synapse/storage/schema/main/delta/59/12account_validity_token_used_ts_ms.sql +37 -0
- synapse/storage/schema/main/delta/59/12presence_stream_instance.sql +37 -0
- synapse/storage/schema/main/delta/59/12presence_stream_instance_seq.sql.postgres +20 -0
- synapse/storage/schema/main/delta/59/13users_to_send_full_presence_to.sql +53 -0
- synapse/storage/schema/main/delta/59/14refresh_tokens.sql +53 -0
- synapse/storage/schema/main/delta/59/15locks.sql +56 -0
- synapse/storage/schema/main/delta/59/16federation_inbound_staging.sql +51 -0
- synapse/storage/schema/main/delta/60/01recreate_stream_ordering.sql.postgres +45 -0
- synapse/storage/schema/main/delta/60/02change_stream_ordering_columns.sql.postgres +30 -0
- synapse/storage/schema/main/delta/61/01change_appservices_txns.sql.postgres +23 -0
- synapse/storage/schema/main/delta/61/01insertion_event_lookups.sql +68 -0
- synapse/storage/schema/main/delta/61/02drop_redundant_room_depth_index.sql +37 -0
- synapse/storage/schema/main/delta/61/03recreate_min_depth.py +74 -0
- synapse/storage/schema/main/delta/62/01insertion_event_extremities.sql +43 -0
- synapse/storage/schema/main/delta/63/01create_registration_tokens.sql +42 -0
- synapse/storage/schema/main/delta/63/02delete_unlinked_email_pushers.sql +39 -0
- synapse/storage/schema/main/delta/63/02populate-rooms-creator.sql +36 -0
- synapse/storage/schema/main/delta/63/03session_store.sql +42 -0
- synapse/storage/schema/main/delta/63/04add_presence_stream_not_offline_index.sql +37 -0
- synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.postgres +23 -0
- synapse/storage/schema/main/delta/64/01msc2716_chunk_to_batch_rename.sql.sqlite +37 -0
- synapse/storage/schema/main/delta/65/01msc2716_insertion_event_edges.sql +38 -0
- synapse/storage/schema/main/delta/65/03remove_hidden_devices_from_device_inbox.sql +41 -0
- synapse/storage/schema/main/delta/65/04_local_group_updates.sql +37 -0
- synapse/storage/schema/main/delta/65/05_remove_room_stats_historical_and_user_stats_historical.sql +38 -0
- synapse/storage/schema/main/delta/65/06remove_deleted_devices_from_device_inbox.sql +53 -0
- synapse/storage/schema/main/delta/65/07_arbitrary_relations.sql +37 -0
- synapse/storage/schema/main/delta/65/08_device_inbox_background_updates.sql +37 -0
- synapse/storage/schema/main/delta/65/10_expirable_refresh_tokens.sql +47 -0
- synapse/storage/schema/main/delta/65/11_devices_auth_provider_session.sql +46 -0
- synapse/storage/schema/main/delta/67/01drop_public_room_list_stream.sql +37 -0
- synapse/storage/schema/main/delta/68/01event_columns.sql +45 -0
- synapse/storage/schema/main/delta/68/02_msc2409_add_device_id_appservice_stream_type.sql +40 -0
- synapse/storage/schema/main/delta/68/03_delete_account_data_for_deactivated_accounts.sql +39 -0
- synapse/storage/schema/main/delta/68/04_refresh_tokens_index_next_token_id.sql +47 -0
- synapse/storage/schema/main/delta/68/04partial_state_rooms.sql +60 -0
- synapse/storage/schema/main/delta/68/05_delete_non_strings_from_event_search.sql.sqlite +22 -0
- synapse/storage/schema/main/delta/68/05partial_state_rooms_triggers.py +80 -0
- synapse/storage/schema/main/delta/68/06_msc3202_add_device_list_appservice_stream_type.sql +42 -0
- synapse/storage/schema/main/delta/69/01as_txn_seq.py +54 -0
- synapse/storage/schema/main/delta/69/01device_list_oubound_by_room.sql +57 -0
- synapse/storage/schema/main/delta/69/02cache_invalidation_index.sql +37 -0
- synapse/storage/schema/main/delta/70/01clean_table_purged_rooms.sql +39 -0
- synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.postgres +43 -0
- synapse/storage/schema/main/delta/71/01rebuild_event_edges.sql.sqlite +47 -0
- synapse/storage/schema/main/delta/71/01remove_noop_background_updates.sql +80 -0
- synapse/storage/schema/main/delta/71/02event_push_summary_unique.sql +37 -0
- synapse/storage/schema/main/delta/72/01add_room_type_to_state_stats.sql +38 -0
- synapse/storage/schema/main/delta/72/01event_push_summary_receipt.sql +54 -0
- synapse/storage/schema/main/delta/72/02event_push_actions_index.sql +38 -0
- synapse/storage/schema/main/delta/72/03bg_populate_events_columns.py +57 -0
- synapse/storage/schema/main/delta/72/03drop_event_reference_hashes.sql +36 -0
- synapse/storage/schema/main/delta/72/03remove_groups.sql +50 -0
- synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.postgres +17 -0
- synapse/storage/schema/main/delta/72/04drop_column_application_services_state_last_txn.sql.sqlite +40 -0
- synapse/storage/schema/main/delta/72/05receipts_event_stream_ordering.sql +38 -0
- synapse/storage/schema/main/delta/72/05remove_unstable_private_read_receipts.sql +38 -0
- synapse/storage/schema/main/delta/72/06add_consent_ts_to_users.sql +35 -0
- synapse/storage/schema/main/delta/72/06thread_notifications.sql +49 -0
- synapse/storage/schema/main/delta/72/07force_update_current_state_events_membership.py +67 -0
- synapse/storage/schema/main/delta/72/07thread_receipts.sql.postgres +30 -0
- synapse/storage/schema/main/delta/72/07thread_receipts.sql.sqlite +70 -0
- synapse/storage/schema/main/delta/72/08begin_cache_invalidation_seq_at_2.sql.postgres +23 -0
- synapse/storage/schema/main/delta/72/08thread_receipts.sql +39 -0
- synapse/storage/schema/main/delta/72/09partial_indices.sql.sqlite +56 -0
- synapse/storage/schema/main/delta/73/01event_failed_pull_attempts.sql +48 -0
- synapse/storage/schema/main/delta/73/02add_pusher_enabled.sql +35 -0
- synapse/storage/schema/main/delta/73/02room_id_indexes_for_purging.sql +41 -0
- synapse/storage/schema/main/delta/73/03pusher_device_id.sql +39 -0
- synapse/storage/schema/main/delta/73/03users_approved_column.sql +39 -0
- synapse/storage/schema/main/delta/73/04partial_join_details.sql +42 -0
- synapse/storage/schema/main/delta/73/04pending_device_list_updates.sql +47 -0
- synapse/storage/schema/main/delta/73/05old_push_actions.sql.postgres +22 -0
- synapse/storage/schema/main/delta/73/05old_push_actions.sql.sqlite +24 -0
- synapse/storage/schema/main/delta/73/06thread_notifications_thread_id_idx.sql +42 -0
- synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.postgres +23 -0
- synapse/storage/schema/main/delta/73/08thread_receipts_non_null.sql.sqlite +76 -0
- synapse/storage/schema/main/delta/73/09partial_joined_via_destination.sql +37 -0
- synapse/storage/schema/main/delta/73/09threads_table.sql +49 -0
- synapse/storage/schema/main/delta/73/10_update_sqlite_fts4_tokenizer.py +71 -0
- synapse/storage/schema/main/delta/73/10login_tokens.sql +54 -0
- synapse/storage/schema/main/delta/73/11event_search_room_id_n_distinct.sql.postgres +33 -0
- synapse/storage/schema/main/delta/73/12refactor_device_list_outbound_pokes.sql +72 -0
- synapse/storage/schema/main/delta/73/13add_device_lists_index.sql +39 -0
- synapse/storage/schema/main/delta/73/20_un_partial_stated_room_stream.sql +51 -0
- synapse/storage/schema/main/delta/73/21_un_partial_stated_room_stream_seq.sql.postgres +20 -0
- synapse/storage/schema/main/delta/73/22_rebuild_user_dir_stats.sql +48 -0
- synapse/storage/schema/main/delta/73/22_un_partial_stated_event_stream.sql +53 -0
- synapse/storage/schema/main/delta/73/23_fix_thread_index.sql +52 -0
- synapse/storage/schema/main/delta/73/23_un_partial_stated_room_stream_seq.sql.postgres +20 -0
- synapse/storage/schema/main/delta/73/24_events_jump_to_date_index.sql +36 -0
- synapse/storage/schema/main/delta/73/25drop_presence.sql +36 -0
- synapse/storage/schema/main/delta/74/01_user_directory_stale_remote_users.sql +58 -0
- synapse/storage/schema/main/delta/74/02_set_device_id_for_pushers_bg_update.sql +38 -0
- synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.postgres +29 -0
- synapse/storage/schema/main/delta/74/03_membership_tables_event_stream_ordering.sql.sqlite +23 -0
- synapse/storage/schema/main/delta/74/03_room_membership_index.sql +38 -0
- synapse/storage/schema/main/delta/74/04_delete_e2e_backup_keys_for_deactivated_users.sql +36 -0
- synapse/storage/schema/main/delta/74/04_membership_tables_event_stream_ordering_triggers.py +87 -0
- synapse/storage/schema/main/delta/74/05_events_txn_id_device_id.sql +72 -0
- synapse/storage/schema/main/delta/74/90COMMENTS_destinations.sql.postgres +52 -0
- synapse/storage/schema/main/delta/76/01_add_profiles_full_user_id_column.sql +39 -0
- synapse/storage/schema/main/delta/76/02_add_user_filters_full_user_id_column.sql +39 -0
- synapse/storage/schema/main/delta/76/03_per_user_experimental_features.sql +46 -0
- synapse/storage/schema/main/delta/76/04_add_room_forgetter.sql +43 -0
- synapse/storage/schema/main/delta/77/01_add_profiles_not_valid_check.sql.postgres +16 -0
- synapse/storage/schema/main/delta/77/02_add_user_filters_not_valid_check.sql.postgres +16 -0
- synapse/storage/schema/main/delta/77/03bg_populate_full_user_id_profiles.sql +35 -0
- synapse/storage/schema/main/delta/77/04bg_populate_full_user_id_user_filters.sql +35 -0
- synapse/storage/schema/main/delta/77/05thread_notifications_backfill.sql +67 -0
- synapse/storage/schema/main/delta/77/06thread_notifications_not_null.sql.sqlite +102 -0
- synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions.sql.postgres +27 -0
- synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_actions_staging.sql.postgres +27 -0
- synapse/storage/schema/main/delta/77/06thread_notifications_not_null_event_push_summary.sql.postgres +29 -0
- synapse/storage/schema/main/delta/77/14bg_indices_event_stream_ordering.sql +39 -0
- synapse/storage/schema/main/delta/78/01_validate_and_update_profiles.py +99 -0
- synapse/storage/schema/main/delta/78/02_validate_and_update_user_filters.py +100 -0
- synapse/storage/schema/main/delta/78/03_remove_unused_indexes_user_filters.py +72 -0
- synapse/storage/schema/main/delta/78/03event_extremities_constraints.py +65 -0
- synapse/storage/schema/main/delta/78/04_add_full_user_id_index_user_filters.py +32 -0
- synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.postgres +102 -0
- synapse/storage/schema/main/delta/79/03_read_write_locks_triggers.sql.sqlite +72 -0
- synapse/storage/schema/main/delta/79/04_mitigate_stream_ordering_update_race.py +70 -0
- synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.postgres +69 -0
- synapse/storage/schema/main/delta/79/05_read_write_locks_triggers.sql.sqlite +65 -0
- synapse/storage/schema/main/delta/80/01_users_alter_locked.sql +35 -0
- synapse/storage/schema/main/delta/80/02_read_write_locks_unlogged.sql.postgres +30 -0
- synapse/storage/schema/main/delta/80/02_scheduled_tasks.sql +47 -0
- synapse/storage/schema/main/delta/80/03_read_write_locks_triggers.sql.postgres +37 -0
- synapse/storage/schema/main/delta/80/04_read_write_locks_deadlock.sql.postgres +71 -0
- synapse/storage/schema/main/delta/82/02_scheduled_tasks_index.sql +35 -0
- synapse/storage/schema/main/delta/82/04_add_indices_for_purging_rooms.sql +39 -0
- synapse/storage/schema/main/delta/82/05gaps.sql +44 -0
- synapse/storage/schema/main/delta/83/01_drop_old_tables.sql +43 -0
- synapse/storage/schema/main/delta/83/03_instance_name_receipts.sql.sqlite +17 -0
- synapse/storage/schema/main/delta/83/05_cross_signing_key_update_grant.sql +34 -0
- synapse/storage/schema/main/delta/83/06_event_push_summary_room.sql +36 -0
- synapse/storage/schema/main/delta/84/01_auth_links_stats.sql.postgres +20 -0
- synapse/storage/schema/main/delta/84/02_auth_links_index.sql +16 -0
- synapse/storage/schema/main/delta/84/03_auth_links_analyze.sql.postgres +16 -0
- synapse/storage/schema/main/delta/84/04_access_token_index.sql +15 -0
- synapse/storage/schema/main/delta/85/01_add_suspended.sql +14 -0
- synapse/storage/schema/main/delta/85/02_add_instance_names.sql +27 -0
- synapse/storage/schema/main/delta/85/03_new_sequences.sql.postgres +54 -0
- synapse/storage/schema/main/delta/85/04_cleanup_device_federation_outbox.sql +15 -0
- synapse/storage/schema/main/delta/85/05_add_instance_names_converted_pos.sql +16 -0
- synapse/storage/schema/main/delta/85/06_add_room_reports.sql +20 -0
- synapse/storage/schema/main/delta/86/01_authenticate_media.sql +15 -0
- synapse/storage/schema/main/delta/86/02_receipts_event_id_index.sql +15 -0
- synapse/storage/schema/main/delta/87/01_sliding_sync_memberships.sql +169 -0
- synapse/storage/schema/main/delta/87/02_per_connection_state.sql +81 -0
- synapse/storage/schema/main/delta/87/03_current_state_index.sql +19 -0
- synapse/storage/schema/main/delta/88/01_add_delayed_events.sql +43 -0
- synapse/storage/schema/main/delta/88/01_custom_profile_fields.sql +15 -0
- synapse/storage/schema/main/delta/88/02_fix_sliding_sync_membership_snapshots_forgotten_column.sql +21 -0
- synapse/storage/schema/main/delta/88/03_add_otk_ts_added_index.sql +18 -0
- synapse/storage/schema/main/delta/88/04_current_state_delta_index.sql +18 -0
- synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.postgres +19 -0
- synapse/storage/schema/main/delta/88/05_drop_old_otks.sql.sqlite +19 -0
- synapse/storage/schema/main/delta/88/05_sliding_sync_room_config_index.sql +20 -0
- synapse/storage/schema/main/delta/88/06_events_received_ts_index.sql +17 -0
- synapse/storage/schema/main/delta/89/01_sliding_sync_membership_snapshot_index.sql +15 -0
- synapse/storage/schema/main/delta/90/01_add_column_participant_room_memberships_table.sql +16 -0
- synapse/storage/schema/main/delta/91/01_media_hash.sql +28 -0
- synapse/storage/schema/main/delta/92/01_remove_trigger.sql.postgres +16 -0
- synapse/storage/schema/main/delta/92/01_remove_trigger.sql.sqlite +16 -0
- synapse/storage/schema/main/delta/92/02_remove_populate_participant_bg_update.sql +17 -0
- synapse/storage/schema/main/delta/92/04_ss_membership_snapshot_idx.sql +16 -0
- synapse/storage/schema/main/delta/92/04_thread_subscriptions.sql +59 -0
- synapse/storage/schema/main/delta/92/04_thread_subscriptions_seq.sql.postgres +19 -0
- synapse/storage/schema/main/delta/92/05_fixup_max_depth_cap.sql +17 -0
- synapse/storage/schema/main/delta/92/05_thread_subscriptions_comments.sql.postgres +18 -0
- synapse/storage/schema/main/delta/92/06_device_federation_inbox_index.sql +16 -0
- synapse/storage/schema/main/delta/92/06_threads_last_sent_stream_ordering_comments.sql.postgres +24 -0
- synapse/storage/schema/main/delta/92/07_add_user_reports.sql +22 -0
- synapse/storage/schema/main/delta/92/07_event_txn_id_device_id_txn_id2.sql +15 -0
- synapse/storage/schema/main/delta/92/08_room_ban_redactions.sql +21 -0
- synapse/storage/schema/main/delta/92/08_thread_subscriptions_seq_fixup.sql.postgres +19 -0
- synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql +20 -0
- synapse/storage/schema/main/delta/92/09_thread_subscriptions_update.sql.postgres +18 -0
- synapse/storage/schema/main/delta/93/01_add_delayed_events.sql +15 -0
- synapse/storage/schema/main/delta/93/02_sliding_sync_members.sql +60 -0
- synapse/storage/schema/main/delta/93/03_sss_pos_last_used.sql +27 -0
- synapse/storage/schema/main/full_schemas/72/full.sql.postgres +1344 -0
- synapse/storage/schema/main/full_schemas/72/full.sql.sqlite +646 -0
- synapse/storage/schema/state/delta/23/drop_state_index.sql +35 -0
- synapse/storage/schema/state/delta/32/remove_state_indices.sql +38 -0
- synapse/storage/schema/state/delta/35/add_state_index.sql +36 -0
- synapse/storage/schema/state/delta/35/state.sql +41 -0
- synapse/storage/schema/state/delta/35/state_dedupe.sql +36 -0
- synapse/storage/schema/state/delta/47/state_group_seq.py +38 -0
- synapse/storage/schema/state/delta/56/state_group_room_idx.sql +36 -0
- synapse/storage/schema/state/delta/61/02state_groups_state_n_distinct.sql.postgres +34 -0
- synapse/storage/schema/state/delta/70/08_state_group_edges_unique.sql +36 -0
- synapse/storage/schema/state/delta/89/01_state_groups_deletion.sql +39 -0
- synapse/storage/schema/state/delta/90/02_delete_unreferenced_state_groups.sql +16 -0
- synapse/storage/schema/state/delta/90/03_remove_old_deletion_bg_update.sql +15 -0
- synapse/storage/schema/state/full_schemas/72/full.sql.postgres +30 -0
- synapse/storage/schema/state/full_schemas/72/full.sql.sqlite +20 -0
- synapse/storage/types.py +183 -0
- synapse/storage/util/__init__.py +20 -0
- synapse/storage/util/id_generators.py +928 -0
- synapse/storage/util/partial_state_events_tracker.py +194 -0
- synapse/storage/util/sequence.py +315 -0
- synapse/streams/__init__.py +43 -0
- synapse/streams/config.py +91 -0
- synapse/streams/events.py +203 -0
- synapse/synapse_rust/__init__.pyi +3 -0
- synapse/synapse_rust/acl.pyi +20 -0
- synapse/synapse_rust/events.pyi +136 -0
- synapse/synapse_rust/http_client.pyi +32 -0
- synapse/synapse_rust/push.pyi +86 -0
- synapse/synapse_rust/rendezvous.pyi +30 -0
- synapse/synapse_rust/segmenter.pyi +1 -0
- synapse/synapse_rust.abi3.so +0 -0
- synapse/types/__init__.py +1600 -0
- synapse/types/handlers/__init__.py +93 -0
- synapse/types/handlers/policy_server.py +16 -0
- synapse/types/handlers/sliding_sync.py +1004 -0
- synapse/types/rest/__init__.py +25 -0
- synapse/types/rest/client/__init__.py +413 -0
- synapse/types/state.py +634 -0
- synapse/types/storage/__init__.py +66 -0
- synapse/util/__init__.py +160 -0
- synapse/util/async_helpers.py +1048 -0
- synapse/util/background_queue.py +142 -0
- synapse/util/batching_queue.py +203 -0
- synapse/util/caches/__init__.py +300 -0
- synapse/util/caches/cached_call.py +143 -0
- synapse/util/caches/deferred_cache.py +530 -0
- synapse/util/caches/descriptors.py +692 -0
- synapse/util/caches/dictionary_cache.py +346 -0
- synapse/util/caches/expiringcache.py +250 -0
- synapse/util/caches/lrucache.py +976 -0
- synapse/util/caches/response_cache.py +323 -0
- synapse/util/caches/stream_change_cache.py +370 -0
- synapse/util/caches/treecache.py +189 -0
- synapse/util/caches/ttlcache.py +197 -0
- synapse/util/cancellation.py +63 -0
- synapse/util/check_dependencies.py +335 -0
- synapse/util/clock.py +592 -0
- synapse/util/daemonize.py +165 -0
- synapse/util/distributor.py +157 -0
- synapse/util/duration.py +117 -0
- synapse/util/events.py +134 -0
- synapse/util/file_consumer.py +164 -0
- synapse/util/frozenutils.py +57 -0
- synapse/util/gai_resolver.py +178 -0
- synapse/util/hash.py +38 -0
- synapse/util/httpresourcetree.py +108 -0
- synapse/util/iterutils.py +190 -0
- synapse/util/json.py +56 -0
- synapse/util/linked_list.py +156 -0
- synapse/util/logcontext.py +46 -0
- synapse/util/logformatter.py +28 -0
- synapse/util/macaroons.py +325 -0
- synapse/util/manhole.py +191 -0
- synapse/util/metrics.py +339 -0
- synapse/util/module_loader.py +116 -0
- synapse/util/msisdn.py +51 -0
- synapse/util/patch_inline_callbacks.py +250 -0
- synapse/util/pydantic_models.py +63 -0
- synapse/util/ratelimitutils.py +422 -0
- synapse/util/retryutils.py +339 -0
- synapse/util/rlimit.py +42 -0
- synapse/util/rust.py +164 -0
- synapse/util/sentinel.py +21 -0
- synapse/util/stringutils.py +293 -0
- synapse/util/task_scheduler.py +494 -0
- synapse/util/templates.py +126 -0
- synapse/util/threepids.py +123 -0
- synapse/util/wheel_timer.py +112 -0
- synapse/visibility.py +869 -0
- synmark/__init__.py +47 -0
- synmark/__main__.py +128 -0
- synmark/suites/__init__.py +9 -0
- synmark/suites/logging.py +154 -0
- synmark/suites/lrucache.py +48 -0
- synmark/suites/lrucache_evict.py +49 -0
- sytest-blacklist +33 -0
- tests/__init__.py +29 -0
- tests/api/__init__.py +0 -0
- tests/api/test_auth.py +548 -0
- tests/api/test_errors.py +46 -0
- tests/api/test_filtering.py +622 -0
- tests/api/test_ratelimiting.py +505 -0
- tests/api/test_urls.py +81 -0
- tests/app/__init__.py +0 -0
- tests/app/test_homeserver_shutdown.py +271 -0
- tests/app/test_homeserver_start.py +49 -0
- tests/app/test_openid_listener.py +139 -0
- tests/app/test_phone_stats_home.py +248 -0
- tests/appservice/__init__.py +20 -0
- tests/appservice/test_api.py +253 -0
- tests/appservice/test_appservice.py +259 -0
- tests/appservice/test_scheduler.py +477 -0
- tests/config/__init__.py +20 -0
- tests/config/test___main__.py +38 -0
- tests/config/test_api.py +146 -0
- tests/config/test_appservice.py +48 -0
- tests/config/test_background_update.py +65 -0
- tests/config/test_base.py +151 -0
- tests/config/test_cache.py +193 -0
- tests/config/test_database.py +42 -0
- tests/config/test_generate.py +72 -0
- tests/config/test_load.py +322 -0
- tests/config/test_oauth_delegation.py +454 -0
- tests/config/test_ratelimiting.py +77 -0
- tests/config/test_registration_config.py +203 -0
- tests/config/test_room_directory.py +203 -0
- tests/config/test_server.py +248 -0
- tests/config/test_tls.py +209 -0
- tests/config/test_util.py +59 -0
- tests/config/test_workers.py +332 -0
- tests/config/utils.py +66 -0
- tests/crypto/__init__.py +20 -0
- tests/crypto/test_event_signing.py +109 -0
- tests/crypto/test_keyring.py +737 -0
- tests/events/__init__.py +0 -0
- tests/events/test_auto_accept_invites.py +827 -0
- tests/events/test_presence_router.py +540 -0
- tests/events/test_snapshot.py +121 -0
- tests/events/test_utils.py +986 -0
- tests/federation/__init__.py +0 -0
- tests/federation/test_complexity.py +257 -0
- tests/federation/test_federation_catch_up.py +585 -0
- tests/federation/test_federation_client.py +316 -0
- tests/federation/test_federation_devices.py +161 -0
- tests/federation/test_federation_media.py +295 -0
- tests/federation/test_federation_out_of_band_membership.py +671 -0
- tests/federation/test_federation_sender.py +956 -0
- tests/federation/test_federation_server.py +631 -0
- tests/federation/transport/__init__.py +0 -0
- tests/federation/transport/server/__init__.py +20 -0
- tests/federation/transport/server/test__base.py +156 -0
- tests/federation/transport/test_client.py +157 -0
- tests/federation/transport/test_knocking.py +323 -0
- tests/federation/transport/test_server.py +74 -0
- tests/handlers/__init__.py +0 -0
- tests/handlers/oidc_test_key.p8 +5 -0
- tests/handlers/oidc_test_key.pub.pem +4 -0
- tests/handlers/test_admin.py +361 -0
- tests/handlers/test_appservice.py +1336 -0
- tests/handlers/test_auth.py +248 -0
- tests/handlers/test_cas.py +239 -0
- tests/handlers/test_deactivate_account.py +485 -0
- tests/handlers/test_device.py +665 -0
- tests/handlers/test_directory.py +613 -0
- tests/handlers/test_e2e_keys.py +2025 -0
- tests/handlers/test_e2e_room_keys.py +569 -0
- tests/handlers/test_federation.py +794 -0
- tests/handlers/test_federation_event.py +1181 -0
- tests/handlers/test_message.py +322 -0
- tests/handlers/test_oauth_delegation.py +1314 -0
- tests/handlers/test_oidc.py +1688 -0
- tests/handlers/test_password_providers.py +987 -0
- tests/handlers/test_presence.py +2144 -0
- tests/handlers/test_profile.py +401 -0
- tests/handlers/test_receipts.py +342 -0
- tests/handlers/test_register.py +880 -0
- tests/handlers/test_room.py +108 -0
- tests/handlers/test_room_list.py +93 -0
- tests/handlers/test_room_member.py +764 -0
- tests/handlers/test_room_policy.py +468 -0
- tests/handlers/test_room_summary.py +1248 -0
- tests/handlers/test_saml.py +427 -0
- tests/handlers/test_send_email.py +230 -0
- tests/handlers/test_sliding_sync.py +5065 -0
- tests/handlers/test_sso.py +152 -0
- tests/handlers/test_stats.py +594 -0
- tests/handlers/test_sync.py +1275 -0
- tests/handlers/test_typing.py +557 -0
- tests/handlers/test_user_directory.py +1435 -0
- tests/handlers/test_worker_lock.py +126 -0
- tests/http/__init__.py +196 -0
- tests/http/ca.crt +19 -0
- tests/http/ca.key +27 -0
- tests/http/federation/__init__.py +19 -0
- tests/http/federation/test_matrix_federation_agent.py +1855 -0
- tests/http/federation/test_srv_resolver.py +220 -0
- tests/http/server/__init__.py +20 -0
- tests/http/server/_base.py +621 -0
- tests/http/server.key +27 -0
- tests/http/test_additional_resource.py +76 -0
- tests/http/test_client.py +422 -0
- tests/http/test_endpoint.py +62 -0
- tests/http/test_matrixfederationclient.py +1092 -0
- tests/http/test_proxy.py +75 -0
- tests/http/test_proxyagent.py +1008 -0
- tests/http/test_servlet.py +145 -0
- tests/http/test_simple_client.py +188 -0
- tests/http/test_site.py +247 -0
- tests/logging/__init__.py +42 -0
- tests/logging/test_loggers.py +127 -0
- tests/logging/test_opentracing.py +524 -0
- tests/logging/test_remote_handler.py +184 -0
- tests/logging/test_terse_json.py +253 -0
- tests/media/__init__.py +20 -0
- tests/media/test_base.py +88 -0
- tests/media/test_filepath.py +602 -0
- tests/media/test_html_preview.py +565 -0
- tests/media/test_media_retention.py +299 -0
- tests/media/test_media_storage.py +1401 -0
- tests/media/test_oembed.py +172 -0
- tests/media/test_url_previewer.py +120 -0
- tests/metrics/__init__.py +0 -0
- tests/metrics/test_background_process_metrics.py +21 -0
- tests/metrics/test_metrics.py +407 -0
- tests/metrics/test_phone_home_stats.py +263 -0
- tests/module_api/__init__.py +0 -0
- tests/module_api/test_account_data_manager.py +171 -0
- tests/module_api/test_api.py +1035 -0
- tests/module_api/test_event_unsigned_addition.py +66 -0
- tests/module_api/test_spamchecker.py +286 -0
- tests/push/__init__.py +0 -0
- tests/push/test_bulk_push_rule_evaluator.py +652 -0
- tests/push/test_email.py +570 -0
- tests/push/test_http.py +1247 -0
- tests/push/test_presentable_names.py +238 -0
- tests/push/test_push_rule_evaluator.py +1069 -0
- tests/replication/__init__.py +20 -0
- tests/replication/_base.py +619 -0
- tests/replication/http/__init__.py +20 -0
- tests/replication/http/test__base.py +113 -0
- tests/replication/storage/__init__.py +20 -0
- tests/replication/storage/_base.py +85 -0
- tests/replication/storage/test_events.py +299 -0
- tests/replication/tcp/__init__.py +19 -0
- tests/replication/tcp/streams/__init__.py +19 -0
- tests/replication/tcp/streams/test_account_data.py +133 -0
- tests/replication/tcp/streams/test_events.py +565 -0
- tests/replication/tcp/streams/test_federation.py +117 -0
- tests/replication/tcp/streams/test_partial_state.py +72 -0
- tests/replication/tcp/streams/test_receipts.py +110 -0
- tests/replication/tcp/streams/test_thread_subscriptions.py +157 -0
- tests/replication/tcp/streams/test_to_device.py +112 -0
- tests/replication/tcp/streams/test_typing.py +223 -0
- tests/replication/tcp/test_commands.py +50 -0
- tests/replication/tcp/test_handler.py +211 -0
- tests/replication/test_auth.py +120 -0
- tests/replication/test_client_reader_shard.py +101 -0
- tests/replication/test_federation_ack.py +88 -0
- tests/replication/test_federation_sender_shard.py +352 -0
- tests/replication/test_module_cache_invalidation.py +89 -0
- tests/replication/test_multi_media_repo.py +496 -0
- tests/replication/test_pusher_shard.py +192 -0
- tests/replication/test_sharded_event_persister.py +332 -0
- tests/replication/test_sharded_receipts.py +250 -0
- tests/rest/__init__.py +20 -0
- tests/rest/admin/__init__.py +19 -0
- tests/rest/admin/test_admin.py +614 -0
- tests/rest/admin/test_background_updates.py +375 -0
- tests/rest/admin/test_device.py +600 -0
- tests/rest/admin/test_event.py +74 -0
- tests/rest/admin/test_event_reports.py +781 -0
- tests/rest/admin/test_federation.py +863 -0
- tests/rest/admin/test_jwks.py +106 -0
- tests/rest/admin/test_media.py +1091 -0
- tests/rest/admin/test_registration_tokens.py +729 -0
- tests/rest/admin/test_room.py +3626 -0
- tests/rest/admin/test_scheduled_tasks.py +192 -0
- tests/rest/admin/test_server_notice.py +753 -0
- tests/rest/admin/test_statistics.py +523 -0
- tests/rest/admin/test_user.py +6061 -0
- tests/rest/admin/test_username_available.py +82 -0
- tests/rest/client/__init__.py +20 -0
- tests/rest/client/sliding_sync/__init__.py +13 -0
- tests/rest/client/sliding_sync/test_connection_tracking.py +505 -0
- tests/rest/client/sliding_sync/test_extension_account_data.py +1056 -0
- tests/rest/client/sliding_sync/test_extension_e2ee.py +459 -0
- tests/rest/client/sliding_sync/test_extension_receipts.py +934 -0
- tests/rest/client/sliding_sync/test_extension_thread_subscriptions.py +497 -0
- tests/rest/client/sliding_sync/test_extension_to_device.py +294 -0
- tests/rest/client/sliding_sync/test_extension_typing.py +500 -0
- tests/rest/client/sliding_sync/test_extensions.py +306 -0
- tests/rest/client/sliding_sync/test_lists_filters.py +1975 -0
- tests/rest/client/sliding_sync/test_room_subscriptions.py +303 -0
- tests/rest/client/sliding_sync/test_rooms_invites.py +528 -0
- tests/rest/client/sliding_sync/test_rooms_meta.py +1338 -0
- tests/rest/client/sliding_sync/test_rooms_required_state.py +2247 -0
- tests/rest/client/sliding_sync/test_rooms_timeline.py +718 -0
- tests/rest/client/sliding_sync/test_sliding_sync.py +1688 -0
- tests/rest/client/test_account.py +1543 -0
- tests/rest/client/test_account_data.py +81 -0
- tests/rest/client/test_auth.py +1508 -0
- tests/rest/client/test_auth_metadata.py +145 -0
- tests/rest/client/test_capabilities.py +318 -0
- tests/rest/client/test_consent.py +138 -0
- tests/rest/client/test_delayed_events.py +553 -0
- tests/rest/client/test_devices.py +634 -0
- tests/rest/client/test_directory.py +249 -0
- tests/rest/client/test_ephemeral_message.py +113 -0
- tests/rest/client/test_events.py +165 -0
- tests/rest/client/test_filter.py +124 -0
- tests/rest/client/test_identity.py +67 -0
- tests/rest/client/test_keys.py +516 -0
- tests/rest/client/test_login.py +1881 -0
- tests/rest/client/test_login_token_request.py +175 -0
- tests/rest/client/test_matrixrtc.py +105 -0
- tests/rest/client/test_media.py +3156 -0
- tests/rest/client/test_models.py +83 -0
- tests/rest/client/test_mutual_rooms.py +235 -0
- tests/rest/client/test_notifications.py +231 -0
- tests/rest/client/test_owned_state.py +308 -0
- tests/rest/client/test_password_policy.py +186 -0
- tests/rest/client/test_power_levels.py +295 -0
- tests/rest/client/test_presence.py +149 -0
- tests/rest/client/test_profile.py +925 -0
- tests/rest/client/test_push_rule_attrs.py +510 -0
- tests/rest/client/test_read_marker.py +151 -0
- tests/rest/client/test_receipts.py +287 -0
- tests/rest/client/test_redactions.py +657 -0
- tests/rest/client/test_register.py +1314 -0
- tests/rest/client/test_relations.py +1954 -0
- tests/rest/client/test_rendezvous.py +468 -0
- tests/rest/client/test_reporting.py +324 -0
- tests/rest/client/test_retention.py +389 -0
- tests/rest/client/test_rooms.py +5486 -0
- tests/rest/client/test_sendtodevice.py +271 -0
- tests/rest/client/test_shadow_banned.py +335 -0
- tests/rest/client/test_sync.py +1147 -0
- tests/rest/client/test_tags.py +161 -0
- tests/rest/client/test_third_party_rules.py +1076 -0
- tests/rest/client/test_thread_subscriptions.py +351 -0
- tests/rest/client/test_transactions.py +204 -0
- tests/rest/client/test_typing.py +114 -0
- tests/rest/client/test_upgrade_room.py +433 -0
- tests/rest/client/utils.py +985 -0
- tests/rest/key/__init__.py +0 -0
- tests/rest/key/v2/__init__.py +0 -0
- tests/rest/key/v2/test_remote_key_resource.py +282 -0
- tests/rest/media/__init__.py +19 -0
- tests/rest/media/test_domain_blocking.py +148 -0
- tests/rest/media/test_url_preview.py +1445 -0
- tests/rest/synapse/__init__.py +12 -0
- tests/rest/synapse/client/__init__.py +12 -0
- tests/rest/synapse/client/test_federation_whitelist.py +118 -0
- tests/rest/synapse/mas/__init__.py +12 -0
- tests/rest/synapse/mas/_base.py +43 -0
- tests/rest/synapse/mas/test_devices.py +693 -0
- tests/rest/synapse/mas/test_users.py +1399 -0
- tests/rest/test_health.py +35 -0
- tests/rest/test_well_known.py +155 -0
- tests/scripts/__init__.py +0 -0
- tests/scripts/test_new_matrix_user.py +172 -0
- tests/server.py +1374 -0
- tests/server_notices/__init__.py +241 -0
- tests/server_notices/test_consent.py +111 -0
- tests/server_notices/test_resource_limits_server_notices.py +409 -0
- tests/state/__init__.py +0 -0
- tests/state/test_v2.py +1096 -0
- tests/state/test_v21.py +506 -0
- tests/storage/__init__.py +0 -0
- tests/storage/databases/__init__.py +20 -0
- tests/storage/databases/main/__init__.py +20 -0
- tests/storage/databases/main/test_cache.py +124 -0
- tests/storage/databases/main/test_deviceinbox.py +323 -0
- tests/storage/databases/main/test_end_to_end_keys.py +127 -0
- tests/storage/databases/main/test_events_worker.py +594 -0
- tests/storage/databases/main/test_lock.py +499 -0
- tests/storage/databases/main/test_metrics.py +88 -0
- tests/storage/databases/main/test_receipts.py +218 -0
- tests/storage/databases/main/test_room.py +192 -0
- tests/storage/test__base.py +178 -0
- tests/storage/test_account_data.py +186 -0
- tests/storage/test_appservice.py +568 -0
- tests/storage/test_background_update.py +671 -0
- tests/storage/test_base.py +813 -0
- tests/storage/test_cleanup_extrems.py +396 -0
- tests/storage/test_client_ips.py +788 -0
- tests/storage/test_database.py +288 -0
- tests/storage/test_devices.py +353 -0
- tests/storage/test_directory.py +74 -0
- tests/storage/test_e2e_room_keys.py +87 -0
- tests/storage/test_end_to_end_keys.py +120 -0
- tests/storage/test_event_chain.py +826 -0
- tests/storage/test_event_federation.py +1433 -0
- tests/storage/test_event_push_actions.py +809 -0
- tests/storage/test_events.py +591 -0
- tests/storage/test_events_bg_updates.py +156 -0
- tests/storage/test_id_generators.py +791 -0
- tests/storage/test_invite_rule.py +171 -0
- tests/storage/test_main.py +56 -0
- tests/storage/test_monthly_active_users.py +500 -0
- tests/storage/test_profile.py +134 -0
- tests/storage/test_purge.py +459 -0
- tests/storage/test_receipts.py +309 -0
- tests/storage/test_redaction.py +462 -0
- tests/storage/test_registration.py +277 -0
- tests/storage/test_relations.py +118 -0
- tests/storage/test_rollback_worker.py +132 -0
- tests/storage/test_room.py +69 -0
- tests/storage/test_room_search.py +383 -0
- tests/storage/test_roommember.py +812 -0
- tests/storage/test_sliding_sync_tables.py +5187 -0
- tests/storage/test_state.py +959 -0
- tests/storage/test_state_deletion.py +475 -0
- tests/storage/test_stream.py +1533 -0
- tests/storage/test_thread_subscriptions.py +369 -0
- tests/storage/test_transactions.py +77 -0
- tests/storage/test_txn_limit.py +49 -0
- tests/storage/test_unsafe_locale.py +67 -0
- tests/storage/test_user_directory.py +691 -0
- tests/storage/test_user_filters.py +101 -0
- tests/storage/util/__init__.py +20 -0
- tests/storage/util/test_partial_state_events_tracker.py +181 -0
- tests/synapse_rust/__init__.py +11 -0
- tests/synapse_rust/test_http_client.py +225 -0
- tests/test_distributor.py +74 -0
- tests/test_event_auth.py +921 -0
- tests/test_mau.py +347 -0
- tests/test_phone_home.py +102 -0
- tests/test_rust.py +11 -0
- tests/test_server.py +557 -0
- tests/test_state.py +902 -0
- tests/test_terms_auth.py +128 -0
- tests/test_types.py +201 -0
- tests/test_utils/__init__.py +161 -0
- tests/test_utils/event_injection.py +150 -0
- tests/test_utils/html_parsers.py +59 -0
- tests/test_utils/logging_setup.py +74 -0
- tests/test_utils/oidc.py +370 -0
- tests/test_visibility.py +712 -0
- tests/types/__init__.py +0 -0
- tests/types/test_init.py +51 -0
- tests/types/test_state.py +627 -0
- tests/unittest.py +1108 -0
- tests/util/__init__.py +20 -0
- tests/util/caches/__init__.py +20 -0
- tests/util/caches/test_cached_call.py +168 -0
- tests/util/caches/test_deferred_cache.py +317 -0
- tests/util/caches/test_descriptors.py +1110 -0
- tests/util/caches/test_response_cache.py +225 -0
- tests/util/caches/test_ttlcache.py +90 -0
- tests/util/test_async_helpers.py +808 -0
- tests/util/test_background_queue.py +117 -0
- tests/util/test_batching_queue.py +252 -0
- tests/util/test_check_dependencies.py +243 -0
- tests/util/test_dict_cache.py +130 -0
- tests/util/test_events.py +118 -0
- tests/util/test_expiring_cache.py +113 -0
- tests/util/test_file_consumer.py +199 -0
- tests/util/test_itertools.py +190 -0
- tests/util/test_linearizer.py +264 -0
- tests/util/test_logcontext.py +715 -0
- tests/util/test_logformatter.py +44 -0
- tests/util/test_lrucache.py +479 -0
- tests/util/test_macaroons.py +126 -0
- tests/util/test_mutable_overlay_mapping.py +189 -0
- tests/util/test_ratelimitutils.py +146 -0
- tests/util/test_retryutils.py +314 -0
- tests/util/test_rwlock.py +401 -0
- tests/util/test_stream_change_cache.py +304 -0
- tests/util/test_stringutils.py +86 -0
- tests/util/test_task_scheduler.py +227 -0
- tests/util/test_threepids.py +55 -0
- tests/util/test_treecache.py +93 -0
- tests/util/test_wheel_timer.py +82 -0
- tests/utils.py +342 -0
|
@@ -0,0 +1,1688 @@
|
|
|
1
|
+
#
|
|
2
|
+
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
3
|
+
#
|
|
4
|
+
# Copyright 2020 Quentin Gliech
|
|
5
|
+
# Copyright (C) 2023 New Vector, Ltd
|
|
6
|
+
#
|
|
7
|
+
# This program is free software: you can redistribute it and/or modify
|
|
8
|
+
# it under the terms of the GNU Affero General Public License as
|
|
9
|
+
# published by the Free Software Foundation, either version 3 of the
|
|
10
|
+
# License, or (at your option) any later version.
|
|
11
|
+
#
|
|
12
|
+
# See the GNU Affero General Public License for more details:
|
|
13
|
+
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
14
|
+
#
|
|
15
|
+
# Originally licensed under the Apache License, Version 2.0:
|
|
16
|
+
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
17
|
+
#
|
|
18
|
+
# [This file includes modifications made by New Vector Limited]
|
|
19
|
+
#
|
|
20
|
+
#
|
|
21
|
+
import os
|
|
22
|
+
from typing import Any, Awaitable, ContextManager
|
|
23
|
+
from unittest.mock import ANY, AsyncMock, Mock, patch
|
|
24
|
+
from urllib.parse import parse_qs, urlparse
|
|
25
|
+
|
|
26
|
+
import pymacaroons
|
|
27
|
+
|
|
28
|
+
from twisted.internet.testing import MemoryReactor
|
|
29
|
+
|
|
30
|
+
from synapse.handlers.sso import MappingException
|
|
31
|
+
from synapse.http.site import SynapseRequest
|
|
32
|
+
from synapse.server import HomeServer
|
|
33
|
+
from synapse.types import JsonDict, UserID
|
|
34
|
+
from synapse.util.clock import Clock
|
|
35
|
+
from synapse.util.macaroons import get_value_from_macaroon
|
|
36
|
+
from synapse.util.stringutils import random_string
|
|
37
|
+
|
|
38
|
+
from tests.test_utils import FakeResponse, get_awaitable_result
|
|
39
|
+
from tests.test_utils.oidc import FakeAuthorizationGrant, FakeOidcServer
|
|
40
|
+
from tests.unittest import HomeserverTestCase, override_config
|
|
41
|
+
|
|
42
|
+
try:
|
|
43
|
+
import authlib # noqa: F401
|
|
44
|
+
from authlib.oidc.core import UserInfo
|
|
45
|
+
from authlib.oidc.discovery import OpenIDProviderMetadata
|
|
46
|
+
|
|
47
|
+
from synapse.handlers.oidc import Token, UserAttributeDict
|
|
48
|
+
|
|
49
|
+
HAS_OIDC = True
|
|
50
|
+
except ImportError:
|
|
51
|
+
HAS_OIDC = False
|
|
52
|
+
|
|
53
|
+
|
|
54
|
+
# These are a few constants that are used as config parameters in the tests.
|
|
55
|
+
ISSUER = "https://issuer/"
|
|
56
|
+
CLIENT_ID = "test-client-id"
|
|
57
|
+
CLIENT_SECRET = "test-client-secret"
|
|
58
|
+
BASE_URL = "https://synapse/"
|
|
59
|
+
CALLBACK_URL = BASE_URL + "_synapse/client/oidc/callback"
|
|
60
|
+
TEST_REDIRECT_URI = "https://test/oidc/callback"
|
|
61
|
+
SCOPES = ["openid"]
|
|
62
|
+
|
|
63
|
+
# config for common cases
|
|
64
|
+
DEFAULT_CONFIG = {
|
|
65
|
+
"enabled": True,
|
|
66
|
+
"client_id": CLIENT_ID,
|
|
67
|
+
"client_secret": CLIENT_SECRET,
|
|
68
|
+
"issuer": ISSUER,
|
|
69
|
+
"scopes": SCOPES,
|
|
70
|
+
"user_mapping_provider": {"module": __name__ + ".TestMappingProvider"},
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
# extends the default config with explicit OAuth2 endpoints instead of using discovery
|
|
74
|
+
#
|
|
75
|
+
# We add "explicit" to things to make them different from the discovered values to make
|
|
76
|
+
# sure that the explicit values override the discovered ones.
|
|
77
|
+
EXPLICIT_ENDPOINT_CONFIG = {
|
|
78
|
+
**DEFAULT_CONFIG,
|
|
79
|
+
"discover": False,
|
|
80
|
+
"authorization_endpoint": ISSUER + "authorize-explicit",
|
|
81
|
+
"token_endpoint": ISSUER + "token-explicit",
|
|
82
|
+
"jwks_uri": ISSUER + "jwks-explicit",
|
|
83
|
+
"id_token_signing_alg_values_supported": ["RS256", "<explicit>"],
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
|
|
87
|
+
class TestMappingProvider:
|
|
88
|
+
@staticmethod
|
|
89
|
+
def parse_config(config: JsonDict) -> None:
|
|
90
|
+
return None
|
|
91
|
+
|
|
92
|
+
def __init__(self, config: None):
|
|
93
|
+
pass
|
|
94
|
+
|
|
95
|
+
def get_remote_user_id(self, userinfo: "UserInfo") -> str:
|
|
96
|
+
return userinfo["sub"]
|
|
97
|
+
|
|
98
|
+
async def map_user_attributes(
|
|
99
|
+
self, userinfo: "UserInfo", token: "Token"
|
|
100
|
+
) -> "UserAttributeDict":
|
|
101
|
+
# This is testing not providing the full map.
|
|
102
|
+
return {"localpart": userinfo["username"], "display_name": None} # type: ignore[typeddict-item]
|
|
103
|
+
|
|
104
|
+
# Do not include get_extra_attributes to test backwards compatibility paths.
|
|
105
|
+
|
|
106
|
+
|
|
107
|
+
class TestMappingProviderExtra(TestMappingProvider):
|
|
108
|
+
async def get_extra_attributes(
|
|
109
|
+
self, userinfo: "UserInfo", token: "Token"
|
|
110
|
+
) -> JsonDict:
|
|
111
|
+
return {"phone": userinfo["phone"]}
|
|
112
|
+
|
|
113
|
+
|
|
114
|
+
class TestMappingProviderFailures(TestMappingProvider):
|
|
115
|
+
# Superclass is testing the legacy interface for map_user_attributes.
|
|
116
|
+
async def map_user_attributes( # type: ignore[override]
|
|
117
|
+
self, userinfo: "UserInfo", token: "Token", failures: int
|
|
118
|
+
) -> "UserAttributeDict":
|
|
119
|
+
return { # type: ignore[typeddict-item]
|
|
120
|
+
"localpart": userinfo["username"] + (str(failures) if failures else ""),
|
|
121
|
+
"display_name": None,
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
|
|
125
|
+
def _key_file_path() -> str:
|
|
126
|
+
"""path to a file containing the private half of a test key"""
|
|
127
|
+
|
|
128
|
+
# this key was generated with:
|
|
129
|
+
# openssl ecparam -name prime256v1 -genkey -noout |
|
|
130
|
+
# openssl pkcs8 -topk8 -nocrypt -out oidc_test_key.p8
|
|
131
|
+
#
|
|
132
|
+
# we use PKCS8 rather than SEC-1 (which is what openssl ecparam spits out), because
|
|
133
|
+
# that's what Apple use, and we want to be sure that we work with Apple's keys.
|
|
134
|
+
#
|
|
135
|
+
# (For the record: both PKCS8 and SEC-1 specify (different) ways of representing
|
|
136
|
+
# keys using ASN.1. Both are then typically formatted using PEM, which says: use the
|
|
137
|
+
# base64-encoded DER encoding of ASN.1, with headers and footers. But we don't
|
|
138
|
+
# really need to care about any of that.)
|
|
139
|
+
return os.path.join(os.path.dirname(__file__), "oidc_test_key.p8")
|
|
140
|
+
|
|
141
|
+
|
|
142
|
+
def _public_key_file_path() -> str:
|
|
143
|
+
"""path to a file containing the public half of a test key"""
|
|
144
|
+
# this was generated with:
|
|
145
|
+
# openssl ec -in oidc_test_key.p8 -pubout -out oidc_test_key.pub.pem
|
|
146
|
+
#
|
|
147
|
+
# See above about where oidc_test_key.p8 came from
|
|
148
|
+
return os.path.join(os.path.dirname(__file__), "oidc_test_key.pub.pem")
|
|
149
|
+
|
|
150
|
+
|
|
151
|
+
class OidcHandlerTestCase(HomeserverTestCase):
|
|
152
|
+
if not HAS_OIDC:
|
|
153
|
+
skip = "requires OIDC"
|
|
154
|
+
|
|
155
|
+
def default_config(self) -> dict[str, Any]:
|
|
156
|
+
config = super().default_config()
|
|
157
|
+
config["public_baseurl"] = BASE_URL
|
|
158
|
+
return config
|
|
159
|
+
|
|
160
|
+
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
|
161
|
+
self.fake_server = FakeOidcServer(clock=clock, issuer=ISSUER)
|
|
162
|
+
|
|
163
|
+
hs = self.setup_test_homeserver()
|
|
164
|
+
self.hs_patcher = self.fake_server.patch_homeserver(hs=hs)
|
|
165
|
+
self.hs_patcher.start() # type: ignore[attr-defined]
|
|
166
|
+
|
|
167
|
+
self.handler = hs.get_oidc_handler()
|
|
168
|
+
self.provider = self.handler._providers["oidc"]
|
|
169
|
+
sso_handler = hs.get_sso_handler()
|
|
170
|
+
# Mock the render error method.
|
|
171
|
+
self.render_error = Mock(return_value=None)
|
|
172
|
+
sso_handler.render_error = self.render_error # type: ignore[method-assign]
|
|
173
|
+
|
|
174
|
+
# Reduce the number of attempts when generating MXIDs.
|
|
175
|
+
sso_handler._MAP_USERNAME_RETRIES = 3
|
|
176
|
+
|
|
177
|
+
auth_handler = hs.get_auth_handler()
|
|
178
|
+
# Mock the complete SSO login method.
|
|
179
|
+
self.complete_sso_login = AsyncMock()
|
|
180
|
+
auth_handler.complete_sso_login = self.complete_sso_login # type: ignore[method-assign]
|
|
181
|
+
|
|
182
|
+
return hs
|
|
183
|
+
|
|
184
|
+
def tearDown(self) -> None:
|
|
185
|
+
self.hs_patcher.stop() # type: ignore[attr-defined]
|
|
186
|
+
return super().tearDown()
|
|
187
|
+
|
|
188
|
+
def reset_mocks(self) -> None:
|
|
189
|
+
"""Reset all the Mocks."""
|
|
190
|
+
self.fake_server.reset_mocks()
|
|
191
|
+
self.render_error.reset_mock()
|
|
192
|
+
self.complete_sso_login.reset_mock()
|
|
193
|
+
|
|
194
|
+
def metadata_edit(self, values: dict) -> ContextManager[Mock]:
|
|
195
|
+
"""Modify the result that will be returned by the well-known query"""
|
|
196
|
+
|
|
197
|
+
metadata = self.fake_server.get_metadata()
|
|
198
|
+
metadata.update(values)
|
|
199
|
+
return patch.object(self.fake_server, "get_metadata", return_value=metadata)
|
|
200
|
+
|
|
201
|
+
def start_authorization(
|
|
202
|
+
self,
|
|
203
|
+
userinfo: dict,
|
|
204
|
+
client_redirect_url: str = "http://client/redirect",
|
|
205
|
+
scope: str = "openid",
|
|
206
|
+
with_sid: bool = False,
|
|
207
|
+
) -> tuple[SynapseRequest, FakeAuthorizationGrant]:
|
|
208
|
+
"""Start an authorization request, and get the callback request back."""
|
|
209
|
+
nonce = random_string(10)
|
|
210
|
+
state = random_string(10)
|
|
211
|
+
|
|
212
|
+
code, grant = self.fake_server.start_authorization(
|
|
213
|
+
userinfo=userinfo,
|
|
214
|
+
scope=scope,
|
|
215
|
+
client_id=self.provider._client_auth.client_id,
|
|
216
|
+
redirect_uri=self.provider._callback_url,
|
|
217
|
+
nonce=nonce,
|
|
218
|
+
with_sid=with_sid,
|
|
219
|
+
)
|
|
220
|
+
session = self._generate_oidc_session_token(state, nonce, client_redirect_url)
|
|
221
|
+
return _build_callback_request(code, state, session), grant
|
|
222
|
+
|
|
223
|
+
def assertRenderedError(
|
|
224
|
+
self, error: str, error_description: str | None = None
|
|
225
|
+
) -> tuple[Any, ...]:
|
|
226
|
+
self.render_error.assert_called_once()
|
|
227
|
+
args = self.render_error.call_args[0]
|
|
228
|
+
self.assertEqual(args[1], error)
|
|
229
|
+
if error_description is not None:
|
|
230
|
+
self.assertEqual(args[2], error_description)
|
|
231
|
+
# Reset the render_error mock
|
|
232
|
+
self.render_error.reset_mock()
|
|
233
|
+
return args
|
|
234
|
+
|
|
235
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
236
|
+
def test_config(self) -> None:
|
|
237
|
+
"""Basic config correctly sets up the callback URL and client auth correctly."""
|
|
238
|
+
self.assertEqual(self.provider._callback_url, CALLBACK_URL)
|
|
239
|
+
self.assertEqual(self.provider._client_auth.client_id, CLIENT_ID)
|
|
240
|
+
self.assertEqual(self.provider._client_auth.client_secret, CLIENT_SECRET)
|
|
241
|
+
|
|
242
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "discover": True}})
|
|
243
|
+
def test_discovery(self) -> None:
|
|
244
|
+
"""The handler should discover the endpoints from OIDC discovery document."""
|
|
245
|
+
# This would throw if some metadata were invalid
|
|
246
|
+
metadata = self.get_success(self.provider.load_metadata())
|
|
247
|
+
self.fake_server.get_metadata_handler.assert_called_once()
|
|
248
|
+
|
|
249
|
+
self.assertEqual(metadata.issuer, self.fake_server.issuer)
|
|
250
|
+
self.assertEqual(
|
|
251
|
+
metadata.authorization_endpoint,
|
|
252
|
+
self.fake_server.authorization_endpoint,
|
|
253
|
+
)
|
|
254
|
+
self.assertEqual(metadata.token_endpoint, self.fake_server.token_endpoint)
|
|
255
|
+
self.assertEqual(metadata.jwks_uri, self.fake_server.jwks_uri)
|
|
256
|
+
# It seems like authlib does not have that defined in its metadata models
|
|
257
|
+
self.assertEqual(
|
|
258
|
+
metadata.get("userinfo_endpoint"),
|
|
259
|
+
self.fake_server.userinfo_endpoint,
|
|
260
|
+
)
|
|
261
|
+
|
|
262
|
+
# subsequent calls should be cached
|
|
263
|
+
self.reset_mocks()
|
|
264
|
+
self.get_success(self.provider.load_metadata())
|
|
265
|
+
self.fake_server.get_metadata_handler.assert_not_called()
|
|
266
|
+
|
|
267
|
+
@override_config({"oidc_config": {**EXPLICIT_ENDPOINT_CONFIG, "discover": True}})
|
|
268
|
+
def test_discovery_with_explicit_config(self) -> None:
|
|
269
|
+
"""
|
|
270
|
+
The handler should discover the endpoints from OIDC discovery document but
|
|
271
|
+
values are overriden by the explicit config.
|
|
272
|
+
"""
|
|
273
|
+
# This would throw if some metadata were invalid
|
|
274
|
+
metadata = self.get_success(self.provider.load_metadata())
|
|
275
|
+
self.fake_server.get_metadata_handler.assert_called_once()
|
|
276
|
+
|
|
277
|
+
self.assertEqual(metadata.issuer, self.fake_server.issuer)
|
|
278
|
+
# It seems like authlib does not have that defined in its metadata models
|
|
279
|
+
self.assertEqual(
|
|
280
|
+
metadata.get("userinfo_endpoint"),
|
|
281
|
+
self.fake_server.userinfo_endpoint,
|
|
282
|
+
)
|
|
283
|
+
|
|
284
|
+
# Ensure the values are overridden correctly since these were configured
|
|
285
|
+
# explicitly
|
|
286
|
+
self.assertEqual(
|
|
287
|
+
metadata.authorization_endpoint,
|
|
288
|
+
EXPLICIT_ENDPOINT_CONFIG["authorization_endpoint"],
|
|
289
|
+
)
|
|
290
|
+
self.assertEqual(
|
|
291
|
+
metadata.token_endpoint, EXPLICIT_ENDPOINT_CONFIG["token_endpoint"]
|
|
292
|
+
)
|
|
293
|
+
self.assertEqual(metadata.jwks_uri, EXPLICIT_ENDPOINT_CONFIG["jwks_uri"])
|
|
294
|
+
self.assertEqual(
|
|
295
|
+
metadata.id_token_signing_alg_values_supported,
|
|
296
|
+
EXPLICIT_ENDPOINT_CONFIG["id_token_signing_alg_values_supported"],
|
|
297
|
+
)
|
|
298
|
+
|
|
299
|
+
# subsequent calls should be cached
|
|
300
|
+
self.reset_mocks()
|
|
301
|
+
self.get_success(self.provider.load_metadata())
|
|
302
|
+
self.fake_server.get_metadata_handler.assert_not_called()
|
|
303
|
+
|
|
304
|
+
@override_config({"oidc_config": EXPLICIT_ENDPOINT_CONFIG})
|
|
305
|
+
def test_no_discovery(self) -> None:
|
|
306
|
+
"""When discovery is disabled, it should not try to load from discovery document."""
|
|
307
|
+
metadata = self.get_success(self.provider.load_metadata())
|
|
308
|
+
self.fake_server.get_metadata_handler.assert_not_called()
|
|
309
|
+
|
|
310
|
+
# Ensure the values are overridden correctly since these were configured
|
|
311
|
+
# explicitly
|
|
312
|
+
self.assertEqual(
|
|
313
|
+
metadata.authorization_endpoint,
|
|
314
|
+
EXPLICIT_ENDPOINT_CONFIG["authorization_endpoint"],
|
|
315
|
+
)
|
|
316
|
+
self.assertEqual(
|
|
317
|
+
metadata.token_endpoint, EXPLICIT_ENDPOINT_CONFIG["token_endpoint"]
|
|
318
|
+
)
|
|
319
|
+
self.assertEqual(metadata.jwks_uri, EXPLICIT_ENDPOINT_CONFIG["jwks_uri"])
|
|
320
|
+
self.assertEqual(
|
|
321
|
+
metadata.id_token_signing_alg_values_supported,
|
|
322
|
+
EXPLICIT_ENDPOINT_CONFIG["id_token_signing_alg_values_supported"],
|
|
323
|
+
)
|
|
324
|
+
|
|
325
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
326
|
+
def test_load_jwks(self) -> None:
|
|
327
|
+
"""JWKS loading is done once (then cached) if used."""
|
|
328
|
+
jwks = self.get_success(self.provider.load_jwks())
|
|
329
|
+
self.fake_server.get_jwks_handler.assert_called_once()
|
|
330
|
+
self.assertEqual(jwks, self.fake_server.get_jwks())
|
|
331
|
+
|
|
332
|
+
# subsequent calls should be cached…
|
|
333
|
+
self.reset_mocks()
|
|
334
|
+
self.get_success(self.provider.load_jwks())
|
|
335
|
+
self.fake_server.get_jwks_handler.assert_not_called()
|
|
336
|
+
|
|
337
|
+
# …unless forced
|
|
338
|
+
self.reset_mocks()
|
|
339
|
+
self.get_success(self.provider.load_jwks(force=True))
|
|
340
|
+
self.fake_server.get_jwks_handler.assert_called_once()
|
|
341
|
+
|
|
342
|
+
with self.metadata_edit({"jwks_uri": None}):
|
|
343
|
+
# If we don't do this, the load_metadata call will throw because of the
|
|
344
|
+
# missing jwks_uri
|
|
345
|
+
self.provider._user_profile_method = "userinfo_endpoint"
|
|
346
|
+
self.get_success(self.provider.load_metadata(force=True))
|
|
347
|
+
self.get_failure(self.provider.load_jwks(force=True), RuntimeError)
|
|
348
|
+
|
|
349
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
350
|
+
def test_validate_config(self) -> None:
|
|
351
|
+
"""Provider metadatas are extensively validated."""
|
|
352
|
+
h = self.provider
|
|
353
|
+
|
|
354
|
+
def force_load_metadata() -> Awaitable[None]:
|
|
355
|
+
async def force_load() -> "OpenIDProviderMetadata":
|
|
356
|
+
return await h.load_metadata(force=True)
|
|
357
|
+
|
|
358
|
+
return get_awaitable_result(force_load())
|
|
359
|
+
|
|
360
|
+
# Default test config does not throw
|
|
361
|
+
force_load_metadata()
|
|
362
|
+
|
|
363
|
+
with self.metadata_edit({"issuer": None}):
|
|
364
|
+
self.assertRaisesRegex(ValueError, "issuer", force_load_metadata)
|
|
365
|
+
|
|
366
|
+
with self.metadata_edit({"issuer": "http://insecure/"}):
|
|
367
|
+
self.assertRaisesRegex(ValueError, "issuer", force_load_metadata)
|
|
368
|
+
|
|
369
|
+
with self.metadata_edit({"issuer": "https://invalid/?because=query"}):
|
|
370
|
+
self.assertRaisesRegex(ValueError, "issuer", force_load_metadata)
|
|
371
|
+
|
|
372
|
+
with self.metadata_edit({"authorization_endpoint": None}):
|
|
373
|
+
self.assertRaisesRegex(
|
|
374
|
+
ValueError, "authorization_endpoint", force_load_metadata
|
|
375
|
+
)
|
|
376
|
+
|
|
377
|
+
with self.metadata_edit({"authorization_endpoint": "http://insecure/auth"}):
|
|
378
|
+
self.assertRaisesRegex(
|
|
379
|
+
ValueError, "authorization_endpoint", force_load_metadata
|
|
380
|
+
)
|
|
381
|
+
|
|
382
|
+
with self.metadata_edit({"token_endpoint": None}):
|
|
383
|
+
self.assertRaisesRegex(ValueError, "token_endpoint", force_load_metadata)
|
|
384
|
+
|
|
385
|
+
with self.metadata_edit({"token_endpoint": "http://insecure/token"}):
|
|
386
|
+
self.assertRaisesRegex(ValueError, "token_endpoint", force_load_metadata)
|
|
387
|
+
|
|
388
|
+
with self.metadata_edit({"jwks_uri": None}):
|
|
389
|
+
self.assertRaisesRegex(ValueError, "jwks_uri", force_load_metadata)
|
|
390
|
+
|
|
391
|
+
with self.metadata_edit({"jwks_uri": "http://insecure/jwks.json"}):
|
|
392
|
+
self.assertRaisesRegex(ValueError, "jwks_uri", force_load_metadata)
|
|
393
|
+
|
|
394
|
+
with self.metadata_edit({"response_types_supported": ["id_token"]}):
|
|
395
|
+
self.assertRaisesRegex(
|
|
396
|
+
ValueError, "response_types_supported", force_load_metadata
|
|
397
|
+
)
|
|
398
|
+
|
|
399
|
+
with self.metadata_edit(
|
|
400
|
+
{"token_endpoint_auth_methods_supported": ["client_secret_basic"]}
|
|
401
|
+
):
|
|
402
|
+
# should not throw, as client_secret_basic is the default auth method
|
|
403
|
+
force_load_metadata()
|
|
404
|
+
|
|
405
|
+
with self.metadata_edit(
|
|
406
|
+
{"token_endpoint_auth_methods_supported": ["client_secret_post"]}
|
|
407
|
+
):
|
|
408
|
+
self.assertRaisesRegex(
|
|
409
|
+
ValueError,
|
|
410
|
+
"token_endpoint_auth_methods_supported",
|
|
411
|
+
force_load_metadata,
|
|
412
|
+
)
|
|
413
|
+
|
|
414
|
+
# Tests for configs that require the userinfo endpoint
|
|
415
|
+
self.assertFalse(h._uses_userinfo)
|
|
416
|
+
self.assertEqual(h._user_profile_method, "auto")
|
|
417
|
+
h._user_profile_method = "userinfo_endpoint"
|
|
418
|
+
self.assertTrue(h._uses_userinfo)
|
|
419
|
+
|
|
420
|
+
# Revert the profile method and do not request the "openid" scope: this should
|
|
421
|
+
# mean that we check for a userinfo endpoint
|
|
422
|
+
h._user_profile_method = "auto"
|
|
423
|
+
h._scopes = []
|
|
424
|
+
self.assertTrue(h._uses_userinfo)
|
|
425
|
+
with self.metadata_edit({"userinfo_endpoint": None}):
|
|
426
|
+
self.assertRaisesRegex(ValueError, "userinfo_endpoint", force_load_metadata)
|
|
427
|
+
|
|
428
|
+
with self.metadata_edit({"jwks_uri": None}):
|
|
429
|
+
# Shouldn't raise with a valid userinfo, even without jwks
|
|
430
|
+
force_load_metadata()
|
|
431
|
+
|
|
432
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "skip_verification": True}})
|
|
433
|
+
def test_skip_verification(self) -> None:
|
|
434
|
+
"""Provider metadata validation can be disabled by config."""
|
|
435
|
+
with self.metadata_edit({"issuer": "http://insecure"}):
|
|
436
|
+
# This should not throw
|
|
437
|
+
get_awaitable_result(self.provider.load_metadata())
|
|
438
|
+
|
|
439
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
440
|
+
def test_redirect_request(self) -> None:
|
|
441
|
+
"""The redirect request has the right arguments & generates a valid session cookie."""
|
|
442
|
+
req = Mock(spec=["cookies"])
|
|
443
|
+
req.cookies = []
|
|
444
|
+
|
|
445
|
+
url = urlparse(
|
|
446
|
+
self.get_success(
|
|
447
|
+
self.provider.handle_redirect_request(req, b"http://client/redirect")
|
|
448
|
+
)
|
|
449
|
+
)
|
|
450
|
+
auth_endpoint = urlparse(self.fake_server.authorization_endpoint)
|
|
451
|
+
|
|
452
|
+
self.assertEqual(url.scheme, auth_endpoint.scheme)
|
|
453
|
+
self.assertEqual(url.netloc, auth_endpoint.netloc)
|
|
454
|
+
self.assertEqual(url.path, auth_endpoint.path)
|
|
455
|
+
|
|
456
|
+
params = parse_qs(url.query)
|
|
457
|
+
self.assertEqual(params["redirect_uri"], [CALLBACK_URL])
|
|
458
|
+
self.assertEqual(params["response_type"], ["code"])
|
|
459
|
+
self.assertEqual(params["scope"], [" ".join(SCOPES)])
|
|
460
|
+
self.assertEqual(params["client_id"], [CLIENT_ID])
|
|
461
|
+
self.assertEqual(len(params["state"]), 1)
|
|
462
|
+
self.assertEqual(len(params["nonce"]), 1)
|
|
463
|
+
self.assertNotIn("code_challenge", params)
|
|
464
|
+
|
|
465
|
+
# Check what is in the cookies
|
|
466
|
+
self.assertEqual(len(req.cookies), 2) # two cookies
|
|
467
|
+
cookie_header = req.cookies[0]
|
|
468
|
+
|
|
469
|
+
# The cookie name and path don't really matter, just that it has to be coherent
|
|
470
|
+
# between the callback & redirect handlers.
|
|
471
|
+
parts = [p.strip() for p in cookie_header.split(b";")]
|
|
472
|
+
self.assertIn(b"Path=/_synapse/client/oidc", parts)
|
|
473
|
+
name, cookie = parts[0].split(b"=")
|
|
474
|
+
self.assertEqual(name, b"oidc_session")
|
|
475
|
+
|
|
476
|
+
macaroon = pymacaroons.Macaroon.deserialize(cookie)
|
|
477
|
+
state = get_value_from_macaroon(macaroon, "state")
|
|
478
|
+
nonce = get_value_from_macaroon(macaroon, "nonce")
|
|
479
|
+
code_verifier = get_value_from_macaroon(macaroon, "code_verifier")
|
|
480
|
+
redirect = get_value_from_macaroon(macaroon, "client_redirect_url")
|
|
481
|
+
|
|
482
|
+
self.assertEqual(params["state"], [state])
|
|
483
|
+
self.assertEqual(params["nonce"], [nonce])
|
|
484
|
+
self.assertEqual(code_verifier, "")
|
|
485
|
+
self.assertEqual(redirect, "http://client/redirect")
|
|
486
|
+
|
|
487
|
+
@override_config(
|
|
488
|
+
{
|
|
489
|
+
"oidc_config": {
|
|
490
|
+
**DEFAULT_CONFIG,
|
|
491
|
+
"passthrough_authorization_parameters": ["additional_parameter"],
|
|
492
|
+
}
|
|
493
|
+
}
|
|
494
|
+
)
|
|
495
|
+
def test_passthrough_parameters(self) -> None:
|
|
496
|
+
"""The redirect request has additional parameters, one is authorized, one is not"""
|
|
497
|
+
req = Mock(spec=["cookies", "args"])
|
|
498
|
+
req.cookies = []
|
|
499
|
+
req.args = {}
|
|
500
|
+
req.args[b"additional_parameter"] = ["a_value".encode("utf-8")]
|
|
501
|
+
req.args[b"not_authorized_parameter"] = ["any".encode("utf-8")]
|
|
502
|
+
|
|
503
|
+
url = urlparse(
|
|
504
|
+
self.get_success(
|
|
505
|
+
self.provider.handle_redirect_request(req, b"http://client/redirect")
|
|
506
|
+
)
|
|
507
|
+
)
|
|
508
|
+
|
|
509
|
+
params = parse_qs(url.query)
|
|
510
|
+
self.assertEqual(params["additional_parameter"], ["a_value"])
|
|
511
|
+
self.assertNotIn("not_authorized_parameters", params)
|
|
512
|
+
|
|
513
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
514
|
+
def test_redirect_request_with_code_challenge(self) -> None:
|
|
515
|
+
"""The redirect request has the right arguments & generates a valid session cookie."""
|
|
516
|
+
req = Mock(spec=["cookies"])
|
|
517
|
+
req.cookies = []
|
|
518
|
+
|
|
519
|
+
with self.metadata_edit({"code_challenge_methods_supported": ["S256"]}):
|
|
520
|
+
url = urlparse(
|
|
521
|
+
self.get_success(
|
|
522
|
+
self.provider.handle_redirect_request(
|
|
523
|
+
req, b"http://client/redirect"
|
|
524
|
+
)
|
|
525
|
+
)
|
|
526
|
+
)
|
|
527
|
+
|
|
528
|
+
# Ensure the code_challenge param is added to the redirect.
|
|
529
|
+
params = parse_qs(url.query)
|
|
530
|
+
self.assertEqual(len(params["code_challenge"]), 1)
|
|
531
|
+
|
|
532
|
+
# Check what is in the cookies
|
|
533
|
+
self.assertEqual(len(req.cookies), 2) # two cookies
|
|
534
|
+
cookie_header = req.cookies[0]
|
|
535
|
+
|
|
536
|
+
# The cookie name and path don't really matter, just that it has to be coherent
|
|
537
|
+
# between the callback & redirect handlers.
|
|
538
|
+
parts = [p.strip() for p in cookie_header.split(b";")]
|
|
539
|
+
self.assertIn(b"Path=/_synapse/client/oidc", parts)
|
|
540
|
+
name, cookie = parts[0].split(b"=")
|
|
541
|
+
self.assertEqual(name, b"oidc_session")
|
|
542
|
+
|
|
543
|
+
# Ensure the code_verifier is set in the cookie.
|
|
544
|
+
macaroon = pymacaroons.Macaroon.deserialize(cookie)
|
|
545
|
+
code_verifier = get_value_from_macaroon(macaroon, "code_verifier")
|
|
546
|
+
self.assertNotEqual(code_verifier, "")
|
|
547
|
+
|
|
548
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "pkce_method": "always"}})
|
|
549
|
+
def test_redirect_request_with_forced_code_challenge(self) -> None:
|
|
550
|
+
"""The redirect request has the right arguments & generates a valid session cookie."""
|
|
551
|
+
req = Mock(spec=["cookies"])
|
|
552
|
+
req.cookies = []
|
|
553
|
+
|
|
554
|
+
url = urlparse(
|
|
555
|
+
self.get_success(
|
|
556
|
+
self.provider.handle_redirect_request(req, b"http://client/redirect")
|
|
557
|
+
)
|
|
558
|
+
)
|
|
559
|
+
|
|
560
|
+
# Ensure the code_challenge param is added to the redirect.
|
|
561
|
+
params = parse_qs(url.query)
|
|
562
|
+
self.assertEqual(len(params["code_challenge"]), 1)
|
|
563
|
+
|
|
564
|
+
# Check what is in the cookies
|
|
565
|
+
self.assertEqual(len(req.cookies), 2) # two cookies
|
|
566
|
+
cookie_header = req.cookies[0]
|
|
567
|
+
|
|
568
|
+
# The cookie name and path don't really matter, just that it has to be coherent
|
|
569
|
+
# between the callback & redirect handlers.
|
|
570
|
+
parts = [p.strip() for p in cookie_header.split(b";")]
|
|
571
|
+
self.assertIn(b"Path=/_synapse/client/oidc", parts)
|
|
572
|
+
name, cookie = parts[0].split(b"=")
|
|
573
|
+
self.assertEqual(name, b"oidc_session")
|
|
574
|
+
|
|
575
|
+
# Ensure the code_verifier is set in the cookie.
|
|
576
|
+
macaroon = pymacaroons.Macaroon.deserialize(cookie)
|
|
577
|
+
code_verifier = get_value_from_macaroon(macaroon, "code_verifier")
|
|
578
|
+
self.assertNotEqual(code_verifier, "")
|
|
579
|
+
|
|
580
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "pkce_method": "never"}})
|
|
581
|
+
def test_redirect_request_with_disabled_code_challenge(self) -> None:
|
|
582
|
+
"""The redirect request has the right arguments & generates a valid session cookie."""
|
|
583
|
+
req = Mock(spec=["cookies"])
|
|
584
|
+
req.cookies = []
|
|
585
|
+
|
|
586
|
+
# The metadata should state that PKCE is enabled.
|
|
587
|
+
with self.metadata_edit({"code_challenge_methods_supported": ["S256"]}):
|
|
588
|
+
url = urlparse(
|
|
589
|
+
self.get_success(
|
|
590
|
+
self.provider.handle_redirect_request(
|
|
591
|
+
req, b"http://client/redirect"
|
|
592
|
+
)
|
|
593
|
+
)
|
|
594
|
+
)
|
|
595
|
+
|
|
596
|
+
# Ensure the code_challenge param is added to the redirect.
|
|
597
|
+
params = parse_qs(url.query)
|
|
598
|
+
self.assertNotIn("code_challenge", params)
|
|
599
|
+
|
|
600
|
+
# Check what is in the cookies
|
|
601
|
+
self.assertEqual(len(req.cookies), 2) # two cookies
|
|
602
|
+
cookie_header = req.cookies[0]
|
|
603
|
+
|
|
604
|
+
# The cookie name and path don't really matter, just that it has to be coherent
|
|
605
|
+
# between the callback & redirect handlers.
|
|
606
|
+
parts = [p.strip() for p in cookie_header.split(b";")]
|
|
607
|
+
self.assertIn(b"Path=/_synapse/client/oidc", parts)
|
|
608
|
+
name, cookie = parts[0].split(b"=")
|
|
609
|
+
self.assertEqual(name, b"oidc_session")
|
|
610
|
+
|
|
611
|
+
# Ensure the code_verifier is blank in the cookie.
|
|
612
|
+
macaroon = pymacaroons.Macaroon.deserialize(cookie)
|
|
613
|
+
code_verifier = get_value_from_macaroon(macaroon, "code_verifier")
|
|
614
|
+
self.assertEqual(code_verifier, "")
|
|
615
|
+
|
|
616
|
+
@override_config(
|
|
617
|
+
{"oidc_config": {**DEFAULT_CONFIG, "redirect_uri": TEST_REDIRECT_URI}}
|
|
618
|
+
)
|
|
619
|
+
def test_redirect_request_with_overridden_redirect_uri(self) -> None:
|
|
620
|
+
"""The authorization endpoint redirect has the overridden `redirect_uri` value."""
|
|
621
|
+
req = Mock(spec=["cookies"])
|
|
622
|
+
req.cookies = []
|
|
623
|
+
|
|
624
|
+
url = urlparse(
|
|
625
|
+
self.get_success(
|
|
626
|
+
self.provider.handle_redirect_request(req, b"http://client/redirect")
|
|
627
|
+
)
|
|
628
|
+
)
|
|
629
|
+
|
|
630
|
+
# Ensure that the redirect_uri in the returned url has been overridden.
|
|
631
|
+
params = parse_qs(url.query)
|
|
632
|
+
self.assertEqual(params["redirect_uri"], [TEST_REDIRECT_URI])
|
|
633
|
+
|
|
634
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
635
|
+
def test_callback_error(self) -> None:
|
|
636
|
+
"""Errors from the provider returned in the callback are displayed."""
|
|
637
|
+
request = Mock(args={})
|
|
638
|
+
request.args[b"error"] = [b"invalid_client"]
|
|
639
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
640
|
+
self.assertRenderedError("invalid_client", "")
|
|
641
|
+
|
|
642
|
+
request.args[b"error_description"] = [b"some description"]
|
|
643
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
644
|
+
self.assertRenderedError("invalid_client", "some description")
|
|
645
|
+
|
|
646
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
647
|
+
def test_callback(self) -> None:
|
|
648
|
+
"""Code callback works and display errors if something went wrong.
|
|
649
|
+
|
|
650
|
+
A lot of scenarios are tested here:
|
|
651
|
+
- when the callback works, with userinfo from ID token
|
|
652
|
+
- when the user mapping fails
|
|
653
|
+
- when ID token verification fails
|
|
654
|
+
- when the callback works, with userinfo fetched from the userinfo endpoint
|
|
655
|
+
- when the userinfo fetching fails
|
|
656
|
+
- when the code exchange fails
|
|
657
|
+
"""
|
|
658
|
+
|
|
659
|
+
# ensure that we are correctly testing the fallback when "get_extra_attributes"
|
|
660
|
+
# is not implemented.
|
|
661
|
+
mapping_provider = self.provider._user_mapping_provider
|
|
662
|
+
with self.assertRaises(AttributeError):
|
|
663
|
+
_ = mapping_provider.get_extra_attributes
|
|
664
|
+
|
|
665
|
+
username = "bar"
|
|
666
|
+
userinfo = {
|
|
667
|
+
"sub": "foo",
|
|
668
|
+
"username": username,
|
|
669
|
+
}
|
|
670
|
+
expected_user_id = "@%s:%s" % (username, self.hs.hostname)
|
|
671
|
+
|
|
672
|
+
client_redirect_url = "http://client/redirect"
|
|
673
|
+
request, _ = self.start_authorization(
|
|
674
|
+
userinfo, client_redirect_url=client_redirect_url
|
|
675
|
+
)
|
|
676
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
677
|
+
|
|
678
|
+
self.complete_sso_login.assert_called_once_with(
|
|
679
|
+
expected_user_id,
|
|
680
|
+
self.provider.idp_id,
|
|
681
|
+
request,
|
|
682
|
+
client_redirect_url,
|
|
683
|
+
None,
|
|
684
|
+
new_user=True,
|
|
685
|
+
auth_provider_session_id=None,
|
|
686
|
+
)
|
|
687
|
+
self.fake_server.post_token_handler.assert_called_once()
|
|
688
|
+
self.fake_server.get_userinfo_handler.assert_not_called()
|
|
689
|
+
self.render_error.assert_not_called()
|
|
690
|
+
|
|
691
|
+
# Handle mapping errors
|
|
692
|
+
request, _ = self.start_authorization(userinfo)
|
|
693
|
+
with patch.object(
|
|
694
|
+
self.provider,
|
|
695
|
+
"_remote_id_from_userinfo",
|
|
696
|
+
new=Mock(side_effect=MappingException()),
|
|
697
|
+
):
|
|
698
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
699
|
+
self.assertRenderedError("mapping_error")
|
|
700
|
+
|
|
701
|
+
# Handle ID token errors
|
|
702
|
+
request, _ = self.start_authorization(userinfo)
|
|
703
|
+
with self.fake_server.id_token_override({"iss": "https://bad.issuer/"}):
|
|
704
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
705
|
+
self.assertRenderedError("invalid_token")
|
|
706
|
+
|
|
707
|
+
self.reset_mocks()
|
|
708
|
+
|
|
709
|
+
# With userinfo fetching
|
|
710
|
+
self.provider._user_profile_method = "userinfo_endpoint"
|
|
711
|
+
# Without the "openid" scope, the FakeProvider does not generate an id_token
|
|
712
|
+
request, _ = self.start_authorization(userinfo, scope="")
|
|
713
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
714
|
+
|
|
715
|
+
self.complete_sso_login.assert_called_once_with(
|
|
716
|
+
expected_user_id,
|
|
717
|
+
self.provider.idp_id,
|
|
718
|
+
request,
|
|
719
|
+
ANY,
|
|
720
|
+
None,
|
|
721
|
+
new_user=False,
|
|
722
|
+
auth_provider_session_id=None,
|
|
723
|
+
)
|
|
724
|
+
self.fake_server.post_token_handler.assert_called_once()
|
|
725
|
+
self.fake_server.get_userinfo_handler.assert_called_once()
|
|
726
|
+
self.render_error.assert_not_called()
|
|
727
|
+
|
|
728
|
+
self.reset_mocks()
|
|
729
|
+
|
|
730
|
+
# With an ID token, userinfo fetching and sid in the ID token
|
|
731
|
+
self.provider._user_profile_method = "userinfo_endpoint"
|
|
732
|
+
request, grant = self.start_authorization(userinfo, with_sid=True)
|
|
733
|
+
self.assertIsNotNone(grant.sid)
|
|
734
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
735
|
+
|
|
736
|
+
self.complete_sso_login.assert_called_once_with(
|
|
737
|
+
expected_user_id,
|
|
738
|
+
self.provider.idp_id,
|
|
739
|
+
request,
|
|
740
|
+
ANY,
|
|
741
|
+
None,
|
|
742
|
+
new_user=False,
|
|
743
|
+
auth_provider_session_id=grant.sid,
|
|
744
|
+
)
|
|
745
|
+
self.fake_server.post_token_handler.assert_called_once()
|
|
746
|
+
self.fake_server.get_userinfo_handler.assert_called_once()
|
|
747
|
+
self.render_error.assert_not_called()
|
|
748
|
+
|
|
749
|
+
# Handle userinfo fetching error
|
|
750
|
+
request, _ = self.start_authorization(userinfo)
|
|
751
|
+
with self.fake_server.buggy_endpoint(userinfo=True):
|
|
752
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
753
|
+
self.assertRenderedError("fetch_error")
|
|
754
|
+
|
|
755
|
+
request, _ = self.start_authorization(userinfo)
|
|
756
|
+
with self.fake_server.buggy_endpoint(token=True):
|
|
757
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
758
|
+
self.assertRenderedError("server_error")
|
|
759
|
+
|
|
760
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
761
|
+
def test_callback_session(self) -> None:
|
|
762
|
+
"""The callback verifies the session presence and validity"""
|
|
763
|
+
request = Mock(spec=["args", "getCookie", "cookies"])
|
|
764
|
+
|
|
765
|
+
# Missing cookie
|
|
766
|
+
request.args = {}
|
|
767
|
+
request.getCookie.return_value = None
|
|
768
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
769
|
+
self.assertRenderedError("missing_session", "No session cookie found")
|
|
770
|
+
|
|
771
|
+
# Missing session parameter
|
|
772
|
+
request.args = {}
|
|
773
|
+
request.getCookie.return_value = "session"
|
|
774
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
775
|
+
self.assertRenderedError("invalid_request", "State parameter is missing")
|
|
776
|
+
|
|
777
|
+
# Invalid cookie
|
|
778
|
+
request.args = {}
|
|
779
|
+
request.args[b"state"] = [b"state"]
|
|
780
|
+
request.getCookie.return_value = "session"
|
|
781
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
782
|
+
self.assertRenderedError("invalid_session")
|
|
783
|
+
|
|
784
|
+
# Mismatching session
|
|
785
|
+
session = self._generate_oidc_session_token(
|
|
786
|
+
state="state",
|
|
787
|
+
nonce="nonce",
|
|
788
|
+
client_redirect_url="http://client/redirect",
|
|
789
|
+
)
|
|
790
|
+
request.args = {}
|
|
791
|
+
request.args[b"state"] = [b"mismatching state"]
|
|
792
|
+
request.getCookie.return_value = session
|
|
793
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
794
|
+
self.assertRenderedError("mismatching_session")
|
|
795
|
+
|
|
796
|
+
# Valid session
|
|
797
|
+
request.args = {}
|
|
798
|
+
request.args[b"state"] = [b"state"]
|
|
799
|
+
request.getCookie.return_value = session
|
|
800
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
801
|
+
self.assertRenderedError("invalid_request")
|
|
802
|
+
|
|
803
|
+
@override_config(
|
|
804
|
+
{"oidc_config": {**DEFAULT_CONFIG, "client_auth_method": "client_secret_post"}}
|
|
805
|
+
)
|
|
806
|
+
def test_exchange_code(self) -> None:
|
|
807
|
+
"""Code exchange behaves correctly and handles various error scenarios."""
|
|
808
|
+
token = {
|
|
809
|
+
"type": "Bearer",
|
|
810
|
+
"access_token": "aabbcc",
|
|
811
|
+
}
|
|
812
|
+
|
|
813
|
+
self.fake_server.post_token_handler.side_effect = None
|
|
814
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
815
|
+
payload=token
|
|
816
|
+
)
|
|
817
|
+
code = "code"
|
|
818
|
+
ret = self.get_success(self.provider._exchange_code(code, code_verifier=""))
|
|
819
|
+
kwargs = self.fake_server.request.call_args[1]
|
|
820
|
+
|
|
821
|
+
self.assertEqual(ret, token)
|
|
822
|
+
self.assertEqual(kwargs["method"], "POST")
|
|
823
|
+
self.assertEqual(kwargs["uri"], self.fake_server.token_endpoint)
|
|
824
|
+
|
|
825
|
+
args = parse_qs(kwargs["data"].decode("utf-8"))
|
|
826
|
+
self.assertEqual(args["grant_type"], ["authorization_code"])
|
|
827
|
+
self.assertEqual(args["code"], [code])
|
|
828
|
+
self.assertEqual(args["client_id"], [CLIENT_ID])
|
|
829
|
+
self.assertEqual(args["client_secret"], [CLIENT_SECRET])
|
|
830
|
+
self.assertEqual(args["redirect_uri"], [CALLBACK_URL])
|
|
831
|
+
|
|
832
|
+
# Test providing a code verifier.
|
|
833
|
+
code_verifier = "code_verifier"
|
|
834
|
+
ret = self.get_success(
|
|
835
|
+
self.provider._exchange_code(code, code_verifier=code_verifier)
|
|
836
|
+
)
|
|
837
|
+
kwargs = self.fake_server.request.call_args[1]
|
|
838
|
+
|
|
839
|
+
self.assertEqual(ret, token)
|
|
840
|
+
self.assertEqual(kwargs["method"], "POST")
|
|
841
|
+
self.assertEqual(kwargs["uri"], self.fake_server.token_endpoint)
|
|
842
|
+
|
|
843
|
+
args = parse_qs(kwargs["data"].decode("utf-8"))
|
|
844
|
+
self.assertEqual(args["grant_type"], ["authorization_code"])
|
|
845
|
+
self.assertEqual(args["code"], [code])
|
|
846
|
+
self.assertEqual(args["client_id"], [CLIENT_ID])
|
|
847
|
+
self.assertEqual(args["client_secret"], [CLIENT_SECRET])
|
|
848
|
+
self.assertEqual(args["redirect_uri"], [CALLBACK_URL])
|
|
849
|
+
self.assertEqual(args["code_verifier"], [code_verifier])
|
|
850
|
+
|
|
851
|
+
# Test error handling
|
|
852
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
853
|
+
code=400, payload={"error": "foo", "error_description": "bar"}
|
|
854
|
+
)
|
|
855
|
+
from synapse.handlers.oidc import OidcError
|
|
856
|
+
|
|
857
|
+
exc = self.get_failure(
|
|
858
|
+
self.provider._exchange_code(code, code_verifier=""), OidcError
|
|
859
|
+
)
|
|
860
|
+
self.assertEqual(exc.value.error, "foo")
|
|
861
|
+
self.assertEqual(exc.value.error_description, "bar")
|
|
862
|
+
|
|
863
|
+
# Internal server error with no JSON body
|
|
864
|
+
self.fake_server.post_token_handler.return_value = FakeResponse(
|
|
865
|
+
code=500, body=b"Not JSON"
|
|
866
|
+
)
|
|
867
|
+
exc = self.get_failure(
|
|
868
|
+
self.provider._exchange_code(code, code_verifier=""), OidcError
|
|
869
|
+
)
|
|
870
|
+
self.assertEqual(exc.value.error, "server_error")
|
|
871
|
+
|
|
872
|
+
# Internal server error with JSON body
|
|
873
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
874
|
+
code=500, payload={"error": "internal_server_error"}
|
|
875
|
+
)
|
|
876
|
+
|
|
877
|
+
exc = self.get_failure(
|
|
878
|
+
self.provider._exchange_code(code, code_verifier=""), OidcError
|
|
879
|
+
)
|
|
880
|
+
self.assertEqual(exc.value.error, "internal_server_error")
|
|
881
|
+
|
|
882
|
+
# 4xx error without "error" field
|
|
883
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
884
|
+
code=400, payload={}
|
|
885
|
+
)
|
|
886
|
+
exc = self.get_failure(
|
|
887
|
+
self.provider._exchange_code(code, code_verifier=""), OidcError
|
|
888
|
+
)
|
|
889
|
+
self.assertEqual(exc.value.error, "server_error")
|
|
890
|
+
|
|
891
|
+
# 2xx error with "error" field
|
|
892
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
893
|
+
code=200, payload={"error": "some_error"}
|
|
894
|
+
)
|
|
895
|
+
exc = self.get_failure(
|
|
896
|
+
self.provider._exchange_code(code, code_verifier=""), OidcError
|
|
897
|
+
)
|
|
898
|
+
self.assertEqual(exc.value.error, "some_error")
|
|
899
|
+
|
|
900
|
+
@override_config(
|
|
901
|
+
{
|
|
902
|
+
"oidc_config": {
|
|
903
|
+
"enabled": True,
|
|
904
|
+
"client_id": CLIENT_ID,
|
|
905
|
+
"issuer": ISSUER,
|
|
906
|
+
"client_auth_method": "client_secret_post",
|
|
907
|
+
"client_secret_jwt_key": {
|
|
908
|
+
"key_file": _key_file_path(),
|
|
909
|
+
"jwt_header": {"alg": "ES256", "kid": "ABC789"},
|
|
910
|
+
"jwt_payload": {"iss": "DEFGHI"},
|
|
911
|
+
},
|
|
912
|
+
}
|
|
913
|
+
}
|
|
914
|
+
)
|
|
915
|
+
def test_exchange_code_jwt_key(self) -> None:
|
|
916
|
+
"""Test that code exchange works with a JWK client secret."""
|
|
917
|
+
from authlib.jose import jwt
|
|
918
|
+
|
|
919
|
+
token = {
|
|
920
|
+
"type": "Bearer",
|
|
921
|
+
"access_token": "aabbcc",
|
|
922
|
+
}
|
|
923
|
+
|
|
924
|
+
self.fake_server.post_token_handler.side_effect = None
|
|
925
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
926
|
+
payload=token
|
|
927
|
+
)
|
|
928
|
+
code = "code"
|
|
929
|
+
|
|
930
|
+
# advance the clock a bit before we start, so we aren't working with zero
|
|
931
|
+
# timestamps.
|
|
932
|
+
self.reactor.advance(1000)
|
|
933
|
+
start_time = self.reactor.seconds()
|
|
934
|
+
ret = self.get_success(self.provider._exchange_code(code, code_verifier=""))
|
|
935
|
+
|
|
936
|
+
self.assertEqual(ret, token)
|
|
937
|
+
|
|
938
|
+
# the request should have hit the token endpoint
|
|
939
|
+
kwargs = self.fake_server.request.call_args[1]
|
|
940
|
+
self.assertEqual(kwargs["method"], "POST")
|
|
941
|
+
self.assertEqual(kwargs["uri"], self.fake_server.token_endpoint)
|
|
942
|
+
|
|
943
|
+
# the client secret provided to the should be a jwt which can be checked with
|
|
944
|
+
# the public key
|
|
945
|
+
args = parse_qs(kwargs["data"].decode("utf-8"))
|
|
946
|
+
secret = args["client_secret"][0]
|
|
947
|
+
with open(_public_key_file_path()) as f:
|
|
948
|
+
key = f.read()
|
|
949
|
+
claims = jwt.decode(secret, key)
|
|
950
|
+
self.assertEqual(claims.header["kid"], "ABC789")
|
|
951
|
+
self.assertEqual(claims["aud"], ISSUER)
|
|
952
|
+
self.assertEqual(claims["iss"], "DEFGHI")
|
|
953
|
+
self.assertEqual(claims["sub"], CLIENT_ID)
|
|
954
|
+
self.assertEqual(claims["iat"], start_time)
|
|
955
|
+
self.assertGreater(claims["exp"], start_time)
|
|
956
|
+
|
|
957
|
+
# check the rest of the POSTed data
|
|
958
|
+
self.assertEqual(args["grant_type"], ["authorization_code"])
|
|
959
|
+
self.assertEqual(args["code"], [code])
|
|
960
|
+
self.assertEqual(args["client_id"], [CLIENT_ID])
|
|
961
|
+
self.assertEqual(args["redirect_uri"], [CALLBACK_URL])
|
|
962
|
+
|
|
963
|
+
@override_config(
|
|
964
|
+
{
|
|
965
|
+
"oidc_config": {
|
|
966
|
+
"enabled": True,
|
|
967
|
+
"client_id": CLIENT_ID,
|
|
968
|
+
"issuer": ISSUER,
|
|
969
|
+
"client_auth_method": "none",
|
|
970
|
+
}
|
|
971
|
+
}
|
|
972
|
+
)
|
|
973
|
+
def test_exchange_code_no_auth(self) -> None:
|
|
974
|
+
"""Test that code exchange works with no client secret."""
|
|
975
|
+
token = {
|
|
976
|
+
"type": "Bearer",
|
|
977
|
+
"access_token": "aabbcc",
|
|
978
|
+
}
|
|
979
|
+
|
|
980
|
+
self.fake_server.post_token_handler.side_effect = None
|
|
981
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
982
|
+
payload=token
|
|
983
|
+
)
|
|
984
|
+
code = "code"
|
|
985
|
+
ret = self.get_success(self.provider._exchange_code(code, code_verifier=""))
|
|
986
|
+
|
|
987
|
+
self.assertEqual(ret, token)
|
|
988
|
+
|
|
989
|
+
# the request should have hit the token endpoint
|
|
990
|
+
kwargs = self.fake_server.request.call_args[1]
|
|
991
|
+
self.assertEqual(kwargs["method"], "POST")
|
|
992
|
+
self.assertEqual(kwargs["uri"], self.fake_server.token_endpoint)
|
|
993
|
+
|
|
994
|
+
# check the POSTed data
|
|
995
|
+
args = parse_qs(kwargs["data"].decode("utf-8"))
|
|
996
|
+
self.assertEqual(args["grant_type"], ["authorization_code"])
|
|
997
|
+
self.assertEqual(args["code"], [code])
|
|
998
|
+
self.assertEqual(args["client_id"], [CLIENT_ID])
|
|
999
|
+
self.assertEqual(args["redirect_uri"], [CALLBACK_URL])
|
|
1000
|
+
|
|
1001
|
+
@override_config(
|
|
1002
|
+
{
|
|
1003
|
+
"oidc_config": {
|
|
1004
|
+
**DEFAULT_CONFIG,
|
|
1005
|
+
"redirect_uri": TEST_REDIRECT_URI,
|
|
1006
|
+
}
|
|
1007
|
+
}
|
|
1008
|
+
)
|
|
1009
|
+
def test_code_exchange_with_overridden_redirect_uri(self) -> None:
|
|
1010
|
+
"""Code exchange behaves correctly and handles various error scenarios."""
|
|
1011
|
+
# Set up a fake IdP with a token endpoint handler.
|
|
1012
|
+
token = {
|
|
1013
|
+
"type": "Bearer",
|
|
1014
|
+
"access_token": "aabbcc",
|
|
1015
|
+
}
|
|
1016
|
+
|
|
1017
|
+
self.fake_server.post_token_handler.side_effect = None
|
|
1018
|
+
self.fake_server.post_token_handler.return_value = FakeResponse.json(
|
|
1019
|
+
payload=token
|
|
1020
|
+
)
|
|
1021
|
+
code = "code"
|
|
1022
|
+
|
|
1023
|
+
# Exchange the code against the fake IdP.
|
|
1024
|
+
self.get_success(self.provider._exchange_code(code, code_verifier=""))
|
|
1025
|
+
|
|
1026
|
+
# Check that the `redirect_uri` parameter provided matches our
|
|
1027
|
+
# overridden config value.
|
|
1028
|
+
kwargs = self.fake_server.request.call_args[1]
|
|
1029
|
+
args = parse_qs(kwargs["data"].decode("utf-8"))
|
|
1030
|
+
self.assertEqual(args["redirect_uri"], [TEST_REDIRECT_URI])
|
|
1031
|
+
|
|
1032
|
+
@override_config(
|
|
1033
|
+
{
|
|
1034
|
+
"oidc_config": {
|
|
1035
|
+
**DEFAULT_CONFIG,
|
|
1036
|
+
"redirect_uri": TEST_REDIRECT_URI,
|
|
1037
|
+
}
|
|
1038
|
+
}
|
|
1039
|
+
)
|
|
1040
|
+
def test_code_exchange_ignores_access_token(self) -> None:
|
|
1041
|
+
"""
|
|
1042
|
+
Code exchange completes successfully and doesn't validate the `at_hash`
|
|
1043
|
+
(access token hash) field of an ID token when the access token isn't
|
|
1044
|
+
going to be used.
|
|
1045
|
+
|
|
1046
|
+
The access token won't be used in this test because Synapse (currently)
|
|
1047
|
+
only needs it to fetch a user's metadata if it isn't included in the ID
|
|
1048
|
+
token itself.
|
|
1049
|
+
|
|
1050
|
+
Because we have included "openid" in the requested scopes for this IdP
|
|
1051
|
+
(see `SCOPES`), user metadata is be included in the ID token. Thus the
|
|
1052
|
+
access token isn't needed, and it's unnecessary for Synapse to validate
|
|
1053
|
+
the access token.
|
|
1054
|
+
|
|
1055
|
+
This is a regression test for a situation where an upstream identity
|
|
1056
|
+
provider was providing an invalid `at_hash` value, which Synapse errored
|
|
1057
|
+
on, yet Synapse wasn't using the access token for anything.
|
|
1058
|
+
"""
|
|
1059
|
+
# Exchange the code against the fake IdP.
|
|
1060
|
+
userinfo = {
|
|
1061
|
+
"sub": "foo",
|
|
1062
|
+
"username": "foo",
|
|
1063
|
+
"phone": "1234567",
|
|
1064
|
+
}
|
|
1065
|
+
with self.fake_server.id_token_override(
|
|
1066
|
+
{
|
|
1067
|
+
"at_hash": "invalid-hash",
|
|
1068
|
+
}
|
|
1069
|
+
):
|
|
1070
|
+
request, _ = self.start_authorization(userinfo)
|
|
1071
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1072
|
+
|
|
1073
|
+
# If no error was rendered, then we have success.
|
|
1074
|
+
self.render_error.assert_not_called()
|
|
1075
|
+
|
|
1076
|
+
@override_config(
|
|
1077
|
+
{
|
|
1078
|
+
"oidc_config": {
|
|
1079
|
+
**DEFAULT_CONFIG,
|
|
1080
|
+
"user_mapping_provider": {
|
|
1081
|
+
"module": __name__ + ".TestMappingProviderExtra"
|
|
1082
|
+
},
|
|
1083
|
+
}
|
|
1084
|
+
}
|
|
1085
|
+
)
|
|
1086
|
+
def test_extra_attributes(self) -> None:
|
|
1087
|
+
"""
|
|
1088
|
+
Login while using a mapping provider that implements get_extra_attributes.
|
|
1089
|
+
"""
|
|
1090
|
+
userinfo = {
|
|
1091
|
+
"sub": "foo",
|
|
1092
|
+
"username": "foo",
|
|
1093
|
+
"phone": "1234567",
|
|
1094
|
+
}
|
|
1095
|
+
request, _ = self.start_authorization(userinfo)
|
|
1096
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1097
|
+
|
|
1098
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1099
|
+
"@foo:test",
|
|
1100
|
+
self.provider.idp_id,
|
|
1101
|
+
request,
|
|
1102
|
+
ANY,
|
|
1103
|
+
{"phone": "1234567"},
|
|
1104
|
+
new_user=True,
|
|
1105
|
+
auth_provider_session_id=None,
|
|
1106
|
+
)
|
|
1107
|
+
|
|
1108
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "enable_registration": True}})
|
|
1109
|
+
def test_map_userinfo_to_user(self) -> None:
|
|
1110
|
+
"""Ensure that mapping the userinfo returned from a provider to an MXID works properly."""
|
|
1111
|
+
userinfo: dict = {
|
|
1112
|
+
"sub": "test_user",
|
|
1113
|
+
"username": "test_user",
|
|
1114
|
+
}
|
|
1115
|
+
request, _ = self.start_authorization(userinfo)
|
|
1116
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1117
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1118
|
+
"@test_user:test",
|
|
1119
|
+
self.provider.idp_id,
|
|
1120
|
+
request,
|
|
1121
|
+
ANY,
|
|
1122
|
+
None,
|
|
1123
|
+
new_user=True,
|
|
1124
|
+
auth_provider_session_id=None,
|
|
1125
|
+
)
|
|
1126
|
+
self.reset_mocks()
|
|
1127
|
+
|
|
1128
|
+
# Some providers return an integer ID.
|
|
1129
|
+
userinfo = {
|
|
1130
|
+
"sub": 1234,
|
|
1131
|
+
"username": "test_user_2",
|
|
1132
|
+
}
|
|
1133
|
+
request, _ = self.start_authorization(userinfo)
|
|
1134
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1135
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1136
|
+
"@test_user_2:test",
|
|
1137
|
+
self.provider.idp_id,
|
|
1138
|
+
request,
|
|
1139
|
+
ANY,
|
|
1140
|
+
None,
|
|
1141
|
+
new_user=True,
|
|
1142
|
+
auth_provider_session_id=None,
|
|
1143
|
+
)
|
|
1144
|
+
self.reset_mocks()
|
|
1145
|
+
|
|
1146
|
+
# Test if the mxid is already taken
|
|
1147
|
+
store = self.hs.get_datastores().main
|
|
1148
|
+
user3 = UserID.from_string("@test_user_3:test")
|
|
1149
|
+
self.get_success(
|
|
1150
|
+
store.register_user(user_id=user3.to_string(), password_hash=None)
|
|
1151
|
+
)
|
|
1152
|
+
userinfo = {"sub": "test3", "username": "test_user_3"}
|
|
1153
|
+
request, _ = self.start_authorization(userinfo)
|
|
1154
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1155
|
+
self.complete_sso_login.assert_not_called()
|
|
1156
|
+
self.assertRenderedError(
|
|
1157
|
+
"mapping_error",
|
|
1158
|
+
"Mapping provider does not support de-duplicating Matrix IDs",
|
|
1159
|
+
)
|
|
1160
|
+
|
|
1161
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "enable_registration": False}})
|
|
1162
|
+
def test_map_userinfo_to_user_does_not_register_new_user(self) -> None:
|
|
1163
|
+
"""Ensures new users are not registered if the enabled registration flag is disabled."""
|
|
1164
|
+
userinfo: dict = {
|
|
1165
|
+
"sub": "test_user",
|
|
1166
|
+
"username": "test_user",
|
|
1167
|
+
}
|
|
1168
|
+
request, _ = self.start_authorization(userinfo)
|
|
1169
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1170
|
+
self.complete_sso_login.assert_not_called()
|
|
1171
|
+
self.assertRenderedError(
|
|
1172
|
+
"mapping_error",
|
|
1173
|
+
"User does not exist and registrations are disabled",
|
|
1174
|
+
)
|
|
1175
|
+
|
|
1176
|
+
@override_config({"oidc_config": {**DEFAULT_CONFIG, "allow_existing_users": True}})
|
|
1177
|
+
def test_map_userinfo_to_existing_user(self) -> None:
|
|
1178
|
+
"""Existing users can log in with OpenID Connect when allow_existing_users is True."""
|
|
1179
|
+
store = self.hs.get_datastores().main
|
|
1180
|
+
user = UserID.from_string("@test_user:test")
|
|
1181
|
+
self.get_success(
|
|
1182
|
+
store.register_user(user_id=user.to_string(), password_hash=None)
|
|
1183
|
+
)
|
|
1184
|
+
|
|
1185
|
+
# Map a user via SSO.
|
|
1186
|
+
userinfo = {
|
|
1187
|
+
"sub": "test",
|
|
1188
|
+
"username": "test_user",
|
|
1189
|
+
}
|
|
1190
|
+
request, _ = self.start_authorization(userinfo)
|
|
1191
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1192
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1193
|
+
user.to_string(),
|
|
1194
|
+
self.provider.idp_id,
|
|
1195
|
+
request,
|
|
1196
|
+
ANY,
|
|
1197
|
+
None,
|
|
1198
|
+
new_user=False,
|
|
1199
|
+
auth_provider_session_id=None,
|
|
1200
|
+
)
|
|
1201
|
+
self.reset_mocks()
|
|
1202
|
+
|
|
1203
|
+
# Subsequent calls should map to the same mxid.
|
|
1204
|
+
request, _ = self.start_authorization(userinfo)
|
|
1205
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1206
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1207
|
+
user.to_string(),
|
|
1208
|
+
self.provider.idp_id,
|
|
1209
|
+
request,
|
|
1210
|
+
ANY,
|
|
1211
|
+
None,
|
|
1212
|
+
new_user=False,
|
|
1213
|
+
auth_provider_session_id=None,
|
|
1214
|
+
)
|
|
1215
|
+
self.reset_mocks()
|
|
1216
|
+
|
|
1217
|
+
# Note that a second SSO user can be mapped to the same Matrix ID. (This
|
|
1218
|
+
# requires a unique sub, but something that maps to the same matrix ID,
|
|
1219
|
+
# in this case we'll just use the same username. A more realistic example
|
|
1220
|
+
# would be subs which are email addresses, and mapping from the localpart
|
|
1221
|
+
# of the email, e.g. bob@foo.com and bob@bar.com -> @bob:test.)
|
|
1222
|
+
userinfo = {
|
|
1223
|
+
"sub": "test1",
|
|
1224
|
+
"username": "test_user",
|
|
1225
|
+
}
|
|
1226
|
+
request, _ = self.start_authorization(userinfo)
|
|
1227
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1228
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1229
|
+
user.to_string(),
|
|
1230
|
+
self.provider.idp_id,
|
|
1231
|
+
request,
|
|
1232
|
+
ANY,
|
|
1233
|
+
None,
|
|
1234
|
+
new_user=False,
|
|
1235
|
+
auth_provider_session_id=None,
|
|
1236
|
+
)
|
|
1237
|
+
self.reset_mocks()
|
|
1238
|
+
|
|
1239
|
+
# Register some non-exact matching cases.
|
|
1240
|
+
user2 = UserID.from_string("@TEST_user_2:test")
|
|
1241
|
+
self.get_success(
|
|
1242
|
+
store.register_user(user_id=user2.to_string(), password_hash=None)
|
|
1243
|
+
)
|
|
1244
|
+
user2_caps = UserID.from_string("@test_USER_2:test")
|
|
1245
|
+
self.get_success(
|
|
1246
|
+
store.register_user(user_id=user2_caps.to_string(), password_hash=None)
|
|
1247
|
+
)
|
|
1248
|
+
|
|
1249
|
+
# Attempting to login without matching a name exactly is an error.
|
|
1250
|
+
userinfo = {
|
|
1251
|
+
"sub": "test2",
|
|
1252
|
+
"username": "TEST_USER_2",
|
|
1253
|
+
}
|
|
1254
|
+
request, _ = self.start_authorization(userinfo)
|
|
1255
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1256
|
+
self.complete_sso_login.assert_not_called()
|
|
1257
|
+
args = self.assertRenderedError("mapping_error")
|
|
1258
|
+
self.assertTrue(
|
|
1259
|
+
args[2].startswith(
|
|
1260
|
+
"Attempted to login as '@TEST_USER_2:test' but it matches more than one user inexactly:"
|
|
1261
|
+
)
|
|
1262
|
+
)
|
|
1263
|
+
|
|
1264
|
+
# Logging in when matching a name exactly should work.
|
|
1265
|
+
user2 = UserID.from_string("@TEST_USER_2:test")
|
|
1266
|
+
self.get_success(
|
|
1267
|
+
store.register_user(user_id=user2.to_string(), password_hash=None)
|
|
1268
|
+
)
|
|
1269
|
+
|
|
1270
|
+
request, _ = self.start_authorization(userinfo)
|
|
1271
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1272
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1273
|
+
"@TEST_USER_2:test",
|
|
1274
|
+
self.provider.idp_id,
|
|
1275
|
+
request,
|
|
1276
|
+
ANY,
|
|
1277
|
+
None,
|
|
1278
|
+
new_user=False,
|
|
1279
|
+
auth_provider_session_id=None,
|
|
1280
|
+
)
|
|
1281
|
+
|
|
1282
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
1283
|
+
def test_map_userinfo_to_invalid_localpart(self) -> None:
|
|
1284
|
+
"""If the mapping provider generates an invalid localpart it should be rejected."""
|
|
1285
|
+
userinfo = {"sub": "test2", "username": "föö"}
|
|
1286
|
+
request, _ = self.start_authorization(userinfo)
|
|
1287
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1288
|
+
self.assertRenderedError("mapping_error", "localpart is invalid: föö")
|
|
1289
|
+
|
|
1290
|
+
@override_config(
|
|
1291
|
+
{
|
|
1292
|
+
"oidc_config": {
|
|
1293
|
+
**DEFAULT_CONFIG,
|
|
1294
|
+
"user_mapping_provider": {
|
|
1295
|
+
"module": __name__ + ".TestMappingProviderFailures"
|
|
1296
|
+
},
|
|
1297
|
+
}
|
|
1298
|
+
}
|
|
1299
|
+
)
|
|
1300
|
+
def test_map_userinfo_to_user_retries(self) -> None:
|
|
1301
|
+
"""The mapping provider can retry generating an MXID if the MXID is already in use."""
|
|
1302
|
+
store = self.hs.get_datastores().main
|
|
1303
|
+
self.get_success(
|
|
1304
|
+
store.register_user(user_id="@test_user:test", password_hash=None)
|
|
1305
|
+
)
|
|
1306
|
+
userinfo = {
|
|
1307
|
+
"sub": "test",
|
|
1308
|
+
"username": "test_user",
|
|
1309
|
+
}
|
|
1310
|
+
request, _ = self.start_authorization(userinfo)
|
|
1311
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1312
|
+
|
|
1313
|
+
# test_user is already taken, so test_user1 gets registered instead.
|
|
1314
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1315
|
+
"@test_user1:test",
|
|
1316
|
+
self.provider.idp_id,
|
|
1317
|
+
request,
|
|
1318
|
+
ANY,
|
|
1319
|
+
None,
|
|
1320
|
+
new_user=True,
|
|
1321
|
+
auth_provider_session_id=None,
|
|
1322
|
+
)
|
|
1323
|
+
self.reset_mocks()
|
|
1324
|
+
|
|
1325
|
+
# Register all of the potential mxids for a particular OIDC username.
|
|
1326
|
+
self.get_success(
|
|
1327
|
+
store.register_user(user_id="@tester:test", password_hash=None)
|
|
1328
|
+
)
|
|
1329
|
+
for i in range(1, 3):
|
|
1330
|
+
self.get_success(
|
|
1331
|
+
store.register_user(user_id="@tester%d:test" % i, password_hash=None)
|
|
1332
|
+
)
|
|
1333
|
+
|
|
1334
|
+
# Now attempt to map to a username, this will fail since all potential usernames are taken.
|
|
1335
|
+
userinfo = {
|
|
1336
|
+
"sub": "tester",
|
|
1337
|
+
"username": "tester",
|
|
1338
|
+
}
|
|
1339
|
+
request, _ = self.start_authorization(userinfo)
|
|
1340
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1341
|
+
self.complete_sso_login.assert_not_called()
|
|
1342
|
+
self.assertRenderedError(
|
|
1343
|
+
"mapping_error", "Unable to generate a Matrix ID from the SSO response"
|
|
1344
|
+
)
|
|
1345
|
+
|
|
1346
|
+
@override_config({"oidc_config": DEFAULT_CONFIG})
|
|
1347
|
+
def test_empty_localpart(self) -> None:
|
|
1348
|
+
"""Attempts to map onto an empty localpart should be rejected."""
|
|
1349
|
+
userinfo = {
|
|
1350
|
+
"sub": "tester",
|
|
1351
|
+
"username": "",
|
|
1352
|
+
}
|
|
1353
|
+
request, _ = self.start_authorization(userinfo)
|
|
1354
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1355
|
+
self.assertRenderedError("mapping_error", "localpart is invalid: ")
|
|
1356
|
+
|
|
1357
|
+
@override_config(
|
|
1358
|
+
{
|
|
1359
|
+
"oidc_config": {
|
|
1360
|
+
**DEFAULT_CONFIG,
|
|
1361
|
+
"user_mapping_provider": {
|
|
1362
|
+
"config": {"localpart_template": "{{ user.username }}"}
|
|
1363
|
+
},
|
|
1364
|
+
}
|
|
1365
|
+
}
|
|
1366
|
+
)
|
|
1367
|
+
def test_null_localpart(self) -> None:
|
|
1368
|
+
"""Mapping onto a null localpart via an empty OIDC attribute should be rejected"""
|
|
1369
|
+
userinfo = {
|
|
1370
|
+
"sub": "tester",
|
|
1371
|
+
"username": None,
|
|
1372
|
+
}
|
|
1373
|
+
request, _ = self.start_authorization(userinfo)
|
|
1374
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1375
|
+
self.assertRenderedError("mapping_error", "localpart is invalid: ")
|
|
1376
|
+
|
|
1377
|
+
@override_config(
|
|
1378
|
+
{
|
|
1379
|
+
"oidc_config": {
|
|
1380
|
+
**DEFAULT_CONFIG,
|
|
1381
|
+
"attribute_requirements": [{"attribute": "test", "value": "foobar"}],
|
|
1382
|
+
}
|
|
1383
|
+
}
|
|
1384
|
+
)
|
|
1385
|
+
def test_attribute_requirements(self) -> None:
|
|
1386
|
+
"""The required attributes must be met from the OIDC userinfo response."""
|
|
1387
|
+
# userinfo lacking "test": "foobar" attribute should fail.
|
|
1388
|
+
userinfo = {
|
|
1389
|
+
"sub": "tester",
|
|
1390
|
+
"username": "tester",
|
|
1391
|
+
}
|
|
1392
|
+
request, _ = self.start_authorization(userinfo)
|
|
1393
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1394
|
+
self.complete_sso_login.assert_not_called()
|
|
1395
|
+
|
|
1396
|
+
# userinfo with "test": "foobar" attribute should succeed.
|
|
1397
|
+
userinfo = {
|
|
1398
|
+
"sub": "tester",
|
|
1399
|
+
"username": "tester",
|
|
1400
|
+
"test": "foobar",
|
|
1401
|
+
}
|
|
1402
|
+
request, _ = self.start_authorization(userinfo)
|
|
1403
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1404
|
+
|
|
1405
|
+
# check that the auth handler got called as expected
|
|
1406
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1407
|
+
"@tester:test",
|
|
1408
|
+
self.provider.idp_id,
|
|
1409
|
+
request,
|
|
1410
|
+
ANY,
|
|
1411
|
+
None,
|
|
1412
|
+
new_user=True,
|
|
1413
|
+
auth_provider_session_id=None,
|
|
1414
|
+
)
|
|
1415
|
+
|
|
1416
|
+
@override_config(
|
|
1417
|
+
{
|
|
1418
|
+
"oidc_config": {
|
|
1419
|
+
**DEFAULT_CONFIG,
|
|
1420
|
+
"attribute_requirements": [{"attribute": "test", "value": "foobar"}],
|
|
1421
|
+
}
|
|
1422
|
+
}
|
|
1423
|
+
)
|
|
1424
|
+
def test_attribute_requirements_contains(self) -> None:
|
|
1425
|
+
"""Test that auth succeeds if userinfo attribute CONTAINS required value"""
|
|
1426
|
+
# userinfo with "test": ["foobar", "foo", "bar"] attribute should succeed.
|
|
1427
|
+
userinfo = {
|
|
1428
|
+
"sub": "tester",
|
|
1429
|
+
"username": "tester",
|
|
1430
|
+
"test": ["foobar", "foo", "bar"],
|
|
1431
|
+
}
|
|
1432
|
+
request, _ = self.start_authorization(userinfo)
|
|
1433
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1434
|
+
|
|
1435
|
+
# check that the auth handler got called as expected
|
|
1436
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1437
|
+
"@tester:test",
|
|
1438
|
+
self.provider.idp_id,
|
|
1439
|
+
request,
|
|
1440
|
+
ANY,
|
|
1441
|
+
None,
|
|
1442
|
+
new_user=True,
|
|
1443
|
+
auth_provider_session_id=None,
|
|
1444
|
+
)
|
|
1445
|
+
|
|
1446
|
+
@override_config(
|
|
1447
|
+
{
|
|
1448
|
+
"oidc_config": {
|
|
1449
|
+
**DEFAULT_CONFIG,
|
|
1450
|
+
"attribute_requirements": [
|
|
1451
|
+
{"attribute": "test", "one_of": ["foo", "bar"]}
|
|
1452
|
+
],
|
|
1453
|
+
}
|
|
1454
|
+
}
|
|
1455
|
+
)
|
|
1456
|
+
def test_attribute_requirements_one_of_succeeds(self) -> None:
|
|
1457
|
+
"""Test that auth succeeds if userinfo attribute has multiple values and CONTAINS required value"""
|
|
1458
|
+
# userinfo with "test": ["bar"] attribute should succeed.
|
|
1459
|
+
userinfo = {
|
|
1460
|
+
"sub": "tester",
|
|
1461
|
+
"username": "tester",
|
|
1462
|
+
"test": ["bar"],
|
|
1463
|
+
}
|
|
1464
|
+
request, _ = self.start_authorization(userinfo)
|
|
1465
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1466
|
+
|
|
1467
|
+
# check that the auth handler got called as expected
|
|
1468
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1469
|
+
"@tester:test",
|
|
1470
|
+
self.provider.idp_id,
|
|
1471
|
+
request,
|
|
1472
|
+
ANY,
|
|
1473
|
+
None,
|
|
1474
|
+
new_user=True,
|
|
1475
|
+
auth_provider_session_id=None,
|
|
1476
|
+
)
|
|
1477
|
+
|
|
1478
|
+
@override_config(
|
|
1479
|
+
{
|
|
1480
|
+
"oidc_config": {
|
|
1481
|
+
**DEFAULT_CONFIG,
|
|
1482
|
+
"attribute_requirements": [
|
|
1483
|
+
{"attribute": "test", "one_of": ["foo", "bar"]}
|
|
1484
|
+
],
|
|
1485
|
+
}
|
|
1486
|
+
}
|
|
1487
|
+
)
|
|
1488
|
+
def test_attribute_requirements_one_of_fails(self) -> None:
|
|
1489
|
+
"""Test that auth fails if userinfo attribute has multiple values yet
|
|
1490
|
+
DOES NOT CONTAIN a required value
|
|
1491
|
+
"""
|
|
1492
|
+
# userinfo with "test": ["something else"] attribute should fail.
|
|
1493
|
+
userinfo = {
|
|
1494
|
+
"sub": "tester",
|
|
1495
|
+
"username": "tester",
|
|
1496
|
+
"test": ["something else"],
|
|
1497
|
+
}
|
|
1498
|
+
request, _ = self.start_authorization(userinfo)
|
|
1499
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1500
|
+
self.complete_sso_login.assert_not_called()
|
|
1501
|
+
|
|
1502
|
+
@override_config(
|
|
1503
|
+
{
|
|
1504
|
+
"oidc_config": {
|
|
1505
|
+
**DEFAULT_CONFIG,
|
|
1506
|
+
"attribute_requirements": [{"attribute": "test"}],
|
|
1507
|
+
}
|
|
1508
|
+
}
|
|
1509
|
+
)
|
|
1510
|
+
def test_attribute_requirements_does_not_exist(self) -> None:
|
|
1511
|
+
"""OIDC login fails if the required attribute does not exist in the OIDC userinfo response."""
|
|
1512
|
+
# userinfo lacking "test" attribute should fail.
|
|
1513
|
+
userinfo = {
|
|
1514
|
+
"sub": "tester",
|
|
1515
|
+
"username": "tester",
|
|
1516
|
+
}
|
|
1517
|
+
request, _ = self.start_authorization(userinfo)
|
|
1518
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1519
|
+
self.complete_sso_login.assert_not_called()
|
|
1520
|
+
|
|
1521
|
+
@override_config(
|
|
1522
|
+
{
|
|
1523
|
+
"oidc_config": {
|
|
1524
|
+
**DEFAULT_CONFIG,
|
|
1525
|
+
"attribute_requirements": [{"attribute": "test"}],
|
|
1526
|
+
}
|
|
1527
|
+
}
|
|
1528
|
+
)
|
|
1529
|
+
def test_attribute_requirements_exist(self) -> None:
|
|
1530
|
+
"""OIDC login succeeds if the required attribute exist (regardless of value)
|
|
1531
|
+
in the OIDC userinfo response.
|
|
1532
|
+
"""
|
|
1533
|
+
# userinfo with "test" attribute and random value should succeed.
|
|
1534
|
+
userinfo = {
|
|
1535
|
+
"sub": "tester",
|
|
1536
|
+
"username": "tester",
|
|
1537
|
+
"test": random_string(5), # value does not matter
|
|
1538
|
+
}
|
|
1539
|
+
request, _ = self.start_authorization(userinfo)
|
|
1540
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1541
|
+
|
|
1542
|
+
# check that the auth handler got called as expected
|
|
1543
|
+
self.complete_sso_login.assert_called_once_with(
|
|
1544
|
+
"@tester:test",
|
|
1545
|
+
self.provider.idp_id,
|
|
1546
|
+
request,
|
|
1547
|
+
ANY,
|
|
1548
|
+
None,
|
|
1549
|
+
new_user=True,
|
|
1550
|
+
auth_provider_session_id=None,
|
|
1551
|
+
)
|
|
1552
|
+
|
|
1553
|
+
@override_config(
|
|
1554
|
+
{
|
|
1555
|
+
"oidc_config": {
|
|
1556
|
+
**DEFAULT_CONFIG,
|
|
1557
|
+
"attribute_requirements": [{"attribute": "test", "value": "foobar"}],
|
|
1558
|
+
}
|
|
1559
|
+
}
|
|
1560
|
+
)
|
|
1561
|
+
def test_attribute_requirements_mismatch(self) -> None:
|
|
1562
|
+
"""
|
|
1563
|
+
Test that auth fails if attributes exist but don't match,
|
|
1564
|
+
or are non-string values.
|
|
1565
|
+
"""
|
|
1566
|
+
# userinfo with "test": "not_foobar" attribute should fail
|
|
1567
|
+
userinfo: dict = {
|
|
1568
|
+
"sub": "tester",
|
|
1569
|
+
"username": "tester",
|
|
1570
|
+
"test": "not_foobar",
|
|
1571
|
+
}
|
|
1572
|
+
request, _ = self.start_authorization(userinfo)
|
|
1573
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1574
|
+
self.complete_sso_login.assert_not_called()
|
|
1575
|
+
|
|
1576
|
+
# userinfo with "test": ["foo", "bar"] attribute should fail
|
|
1577
|
+
userinfo = {
|
|
1578
|
+
"sub": "tester",
|
|
1579
|
+
"username": "tester",
|
|
1580
|
+
"test": ["foo", "bar"],
|
|
1581
|
+
}
|
|
1582
|
+
request, _ = self.start_authorization(userinfo)
|
|
1583
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1584
|
+
self.complete_sso_login.assert_not_called()
|
|
1585
|
+
|
|
1586
|
+
# userinfo with "test": False attribute should fail
|
|
1587
|
+
# this is largely just to ensure we don't crash here
|
|
1588
|
+
userinfo = {
|
|
1589
|
+
"sub": "tester",
|
|
1590
|
+
"username": "tester",
|
|
1591
|
+
"test": False,
|
|
1592
|
+
}
|
|
1593
|
+
request, _ = self.start_authorization(userinfo)
|
|
1594
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1595
|
+
self.complete_sso_login.assert_not_called()
|
|
1596
|
+
|
|
1597
|
+
# userinfo with "test": None attribute should fail
|
|
1598
|
+
# a value of None breaks the OIDC spec, but it's important to not crash here
|
|
1599
|
+
userinfo = {
|
|
1600
|
+
"sub": "tester",
|
|
1601
|
+
"username": "tester",
|
|
1602
|
+
"test": None,
|
|
1603
|
+
}
|
|
1604
|
+
request, _ = self.start_authorization(userinfo)
|
|
1605
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1606
|
+
self.complete_sso_login.assert_not_called()
|
|
1607
|
+
|
|
1608
|
+
# userinfo with "test": 1 attribute should fail
|
|
1609
|
+
# this is largely just to ensure we don't crash here
|
|
1610
|
+
userinfo = {
|
|
1611
|
+
"sub": "tester",
|
|
1612
|
+
"username": "tester",
|
|
1613
|
+
"test": 1,
|
|
1614
|
+
}
|
|
1615
|
+
request, _ = self.start_authorization(userinfo)
|
|
1616
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1617
|
+
self.complete_sso_login.assert_not_called()
|
|
1618
|
+
|
|
1619
|
+
# userinfo with "test": 3.14 attribute should fail
|
|
1620
|
+
# this is largely just to ensure we don't crash here
|
|
1621
|
+
userinfo = {
|
|
1622
|
+
"sub": "tester",
|
|
1623
|
+
"username": "tester",
|
|
1624
|
+
"test": 3.14,
|
|
1625
|
+
}
|
|
1626
|
+
request, _ = self.start_authorization(userinfo)
|
|
1627
|
+
self.get_success(self.handler.handle_oidc_callback(request))
|
|
1628
|
+
self.complete_sso_login.assert_not_called()
|
|
1629
|
+
|
|
1630
|
+
def _generate_oidc_session_token(
|
|
1631
|
+
self,
|
|
1632
|
+
state: str,
|
|
1633
|
+
nonce: str,
|
|
1634
|
+
client_redirect_url: str,
|
|
1635
|
+
ui_auth_session_id: str = "",
|
|
1636
|
+
) -> str:
|
|
1637
|
+
from synapse.handlers.oidc import OidcSessionData
|
|
1638
|
+
|
|
1639
|
+
return self.handler._macaroon_generator.generate_oidc_session_token(
|
|
1640
|
+
state=state,
|
|
1641
|
+
session_data=OidcSessionData(
|
|
1642
|
+
idp_id=self.provider.idp_id,
|
|
1643
|
+
nonce=nonce,
|
|
1644
|
+
client_redirect_url=client_redirect_url,
|
|
1645
|
+
ui_auth_session_id=ui_auth_session_id,
|
|
1646
|
+
code_verifier="",
|
|
1647
|
+
),
|
|
1648
|
+
)
|
|
1649
|
+
|
|
1650
|
+
|
|
1651
|
+
def _build_callback_request(
|
|
1652
|
+
code: str,
|
|
1653
|
+
state: str,
|
|
1654
|
+
session: str,
|
|
1655
|
+
ip_address: str = "10.0.0.1",
|
|
1656
|
+
) -> Mock:
|
|
1657
|
+
"""Builds a fake SynapseRequest to mock the browser callback
|
|
1658
|
+
|
|
1659
|
+
Returns a Mock object which looks like the SynapseRequest we get from a browser
|
|
1660
|
+
after SSO (before we return to the client)
|
|
1661
|
+
|
|
1662
|
+
Args:
|
|
1663
|
+
code: the authorization code which would have been returned by the OIDC
|
|
1664
|
+
provider
|
|
1665
|
+
state: the "state" param which would have been passed around in the
|
|
1666
|
+
query param. Should be the same as was embedded in the session in
|
|
1667
|
+
_build_oidc_session.
|
|
1668
|
+
session: the "session" which would have been passed around in the cookie.
|
|
1669
|
+
ip_address: the IP address to pretend the request came from
|
|
1670
|
+
"""
|
|
1671
|
+
request = Mock(
|
|
1672
|
+
spec=[
|
|
1673
|
+
"args",
|
|
1674
|
+
"getCookie",
|
|
1675
|
+
"cookies",
|
|
1676
|
+
"requestHeaders",
|
|
1677
|
+
"getClientAddress",
|
|
1678
|
+
"getHeader",
|
|
1679
|
+
]
|
|
1680
|
+
)
|
|
1681
|
+
|
|
1682
|
+
request.cookies = []
|
|
1683
|
+
request.getCookie.return_value = session
|
|
1684
|
+
request.args = {}
|
|
1685
|
+
request.args[b"code"] = [code.encode("utf-8")]
|
|
1686
|
+
request.args[b"state"] = [state.encode("utf-8")]
|
|
1687
|
+
request.getClientAddress.return_value.host = ip_address
|
|
1688
|
+
return request
|