2019-01-25 14:16:29 +03:00
|
|
|
# Copyright 2019 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2022-02-11 12:32:11 +03:00
|
|
|
from http import HTTPStatus
|
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
2019-05-01 17:32:38 +03:00
|
|
|
import synapse.rest.admin
|
2019-05-23 17:00:20 +03:00
|
|
|
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS
|
2021-08-17 14:57:58 +03:00
|
|
|
from synapse.rest.client import capabilities, login
|
2022-02-23 16:33:19 +03:00
|
|
|
from synapse.server import HomeServer
|
|
|
|
from synapse.util import Clock
|
2019-01-29 15:44:10 +03:00
|
|
|
|
2019-01-25 14:16:29 +03:00
|
|
|
from tests import unittest
|
2021-03-16 18:44:25 +03:00
|
|
|
from tests.unittest import override_config
|
2019-01-25 14:16:29 +03:00
|
|
|
|
|
|
|
|
|
|
|
class CapabilitiesTestCase(unittest.HomeserverTestCase):
|
2019-01-29 14:37:56 +03:00
|
|
|
servlets = [
|
2019-05-02 13:59:16 +03:00
|
|
|
synapse.rest.admin.register_servlets_for_client_rest_resource,
|
2019-01-29 14:37:56 +03:00
|
|
|
capabilities.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
2019-01-25 14:16:29 +03:00
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2022-02-11 12:32:11 +03:00
|
|
|
self.url = b"/capabilities"
|
2019-01-25 14:16:29 +03:00
|
|
|
hs = self.setup_test_homeserver()
|
2019-05-23 17:00:20 +03:00
|
|
|
self.config = hs.config
|
2021-03-16 18:44:25 +03:00
|
|
|
self.auth_handler = hs.get_auth_handler()
|
2019-01-25 14:16:29 +03:00
|
|
|
return hs
|
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
self.localpart = "user"
|
|
|
|
self.password = "pass"
|
|
|
|
self.user = self.register_user(self.localpart, self.password)
|
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_check_auth_required(self) -> None:
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("GET", self.url)
|
2019-01-29 14:37:56 +03:00
|
|
|
|
|
|
|
self.assertEqual(channel.code, 401)
|
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_room_version_capabilities(self) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
2019-01-29 14:37:56 +03:00
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-01-25 14:16:29 +03:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
2019-01-29 14:37:56 +03:00
|
|
|
|
2019-01-25 14:16:29 +03:00
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
for room_version in capabilities["m.room_versions"]["available"].keys():
|
|
|
|
self.assertTrue(room_version in KNOWN_ROOM_VERSIONS, "" + room_version)
|
2019-05-23 17:00:20 +03:00
|
|
|
|
2019-01-25 14:16:29 +03:00
|
|
|
self.assertEqual(
|
2021-09-29 13:44:15 +03:00
|
|
|
self.config.server.default_room_version.identifier,
|
2019-05-23 17:00:20 +03:00
|
|
|
capabilities["m.room_versions"]["default"],
|
2019-01-25 14:16:29 +03:00
|
|
|
)
|
2019-01-29 18:58:37 +03:00
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_change_password_capabilities_password_login(self) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
2019-01-29 18:58:37 +03:00
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-01-29 18:58:37 +03:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
2019-01-29 21:04:56 +03:00
|
|
|
self.assertTrue(capabilities["m.change_password"]["enabled"])
|
2021-03-16 18:44:25 +03:00
|
|
|
|
|
|
|
@override_config({"password_config": {"localdb_enabled": False}})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_change_password_capabilities_localdb_disabled(self) -> None:
|
2021-03-16 18:44:25 +03:00
|
|
|
access_token = self.get_success(
|
2021-11-17 17:10:57 +03:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 12:40:40 +03:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-03-16 18:44:25 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
self.assertFalse(capabilities["m.change_password"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"password_config": {"enabled": False}})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_change_password_capabilities_password_disabled(self) -> None:
|
2021-03-16 18:44:25 +03:00
|
|
|
access_token = self.get_success(
|
2021-11-17 17:10:57 +03:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 12:40:40 +03:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-03-16 18:44:25 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
2019-01-29 18:58:37 +03:00
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
2019-01-29 21:04:56 +03:00
|
|
|
self.assertFalse(capabilities["m.change_password"]["enabled"])
|
2021-07-20 14:59:23 +03:00
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_change_users_attributes_capabilities(self) -> None:
|
2022-02-11 12:32:11 +03:00
|
|
|
"""Test that server returns capabilities by default."""
|
2021-08-19 12:40:40 +03:00
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 12:32:11 +03:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
2021-08-19 12:40:40 +03:00
|
|
|
self.assertTrue(capabilities["m.change_password"]["enabled"])
|
2022-02-11 12:32:11 +03:00
|
|
|
self.assertTrue(capabilities["m.set_displayname"]["enabled"])
|
|
|
|
self.assertTrue(capabilities["m.set_avatar_url"]["enabled"])
|
|
|
|
self.assertTrue(capabilities["m.3pid_changes"]["enabled"])
|
2021-08-19 12:40:40 +03:00
|
|
|
|
2022-02-11 12:32:11 +03:00
|
|
|
@override_config({"enable_set_displayname": False})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_set_displayname_capabilities_displayname_disabled(self) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
"""Test if set displayname is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 12:32:11 +03:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.set_displayname"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"enable_set_avatar_url": False})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_set_avatar_url_capabilities_avatar_url_disabled(self) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
"""Test if set avatar_url is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 12:32:11 +03:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.set_avatar_url"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"enable_3pid_changes": False})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_change_3pid_capabilities_3pid_disabled(self) -> None:
|
2021-08-19 12:40:40 +03:00
|
|
|
"""Test if change 3pid is disabled that the server responds it."""
|
|
|
|
access_token = self.login(self.localpart, self.password)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
2022-02-11 12:32:11 +03:00
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.3pid_changes"]["enabled"])
|
2021-08-19 12:40:40 +03:00
|
|
|
|
2021-08-20 14:17:50 +03:00
|
|
|
@override_config({"experimental_features": {"msc3244_enabled": False}})
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_does_not_include_msc3244_fields_when_disabled(self) -> None:
|
2021-07-20 14:59:23 +03:00
|
|
|
access_token = self.get_success(
|
2021-11-17 17:10:57 +03:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 12:40:40 +03:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-07-20 14:59:23 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
self.assertNotIn(
|
|
|
|
"org.matrix.msc3244.room_capabilities", capabilities["m.room_versions"]
|
|
|
|
)
|
|
|
|
|
2022-02-23 16:33:19 +03:00
|
|
|
def test_get_does_include_msc3244_fields_when_enabled(self) -> None:
|
2021-07-20 14:59:23 +03:00
|
|
|
access_token = self.get_success(
|
2021-11-17 17:10:57 +03:00
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
2021-08-19 12:40:40 +03:00
|
|
|
self.user, device_id=None, valid_until_ms=None
|
2021-07-20 14:59:23 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, 200)
|
|
|
|
for details in capabilities["m.room_versions"][
|
|
|
|
"org.matrix.msc3244.room_capabilities"
|
|
|
|
].values():
|
|
|
|
if details["preferred"] is not None:
|
|
|
|
self.assertTrue(
|
|
|
|
details["preferred"] in KNOWN_ROOM_VERSIONS,
|
|
|
|
str(details["preferred"]),
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assertGreater(len(details["support"]), 0)
|
|
|
|
for room_version in details["support"]:
|
|
|
|
self.assertTrue(room_version in KNOWN_ROOM_VERSIONS, str(room_version))
|
2023-06-01 15:52:51 +03:00
|
|
|
|
|
|
|
def test_get_get_token_login_fields_when_disabled(self) -> None:
|
|
|
|
"""By default login via an existing session is disabled."""
|
|
|
|
access_token = self.get_success(
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
|
|
|
self.user, device_id=None, valid_until_ms=None
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertFalse(capabilities["m.get_login_token"]["enabled"])
|
|
|
|
|
|
|
|
@override_config({"login_via_existing_session": {"enabled": True}})
|
|
|
|
def test_get_get_token_login_fields_when_enabled(self) -> None:
|
|
|
|
access_token = self.get_success(
|
|
|
|
self.auth_handler.create_access_token_for_user_id(
|
|
|
|
self.user, device_id=None, valid_until_ms=None
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request("GET", self.url, access_token=access_token)
|
|
|
|
capabilities = channel.json_body["capabilities"]
|
|
|
|
|
|
|
|
self.assertEqual(channel.code, HTTPStatus.OK)
|
|
|
|
self.assertTrue(capabilities["m.get_login_token"]["enabled"])
|