2020-10-26 20:02:28 +03:00
|
|
|
# Copyright 2020 Dirk Klimpel
|
2021-09-16 19:01:14 +03:00
|
|
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
2020-10-26 20:02:28 +03:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
import os
|
2021-11-30 12:53:54 +03:00
|
|
|
from http import HTTPStatus
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-05-26 13:19:47 +03:00
|
|
|
from parameterized import parameterized
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
2020-10-26 20:02:28 +03:00
|
|
|
import synapse.rest.admin
|
|
|
|
from synapse.api.errors import Codes
|
2021-08-17 14:57:58 +03:00
|
|
|
from synapse.rest.client import login, profile, room
|
2020-10-26 20:02:28 +03:00
|
|
|
from synapse.rest.media.v1.filepath import MediaFilePaths
|
2021-12-03 16:57:13 +03:00
|
|
|
from synapse.server import HomeServer
|
|
|
|
from synapse.util import Clock
|
2020-10-26 20:02:28 +03:00
|
|
|
|
|
|
|
from tests import unittest
|
2020-11-14 02:11:43 +03:00
|
|
|
from tests.server import FakeSite, make_request
|
2021-09-16 19:01:14 +03:00
|
|
|
from tests.test_utils import SMALL_PNG
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-10-20 17:41:48 +03:00
|
|
|
VALID_TIMESTAMP = 1609459200000 # 2021-01-01 in milliseconds
|
|
|
|
INVALID_TIMESTAMP_IN_S = 1893456000 # 2030-01-01 in seconds
|
|
|
|
|
2020-10-26 20:02:28 +03:00
|
|
|
|
|
|
|
class DeleteMediaByIDTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
synapse.rest.admin.register_servlets_for_media_repo,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
self.media_repo = hs.get_media_repository_resource()
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
2021-09-24 14:25:21 +03:00
|
|
|
self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_no_auth(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Try to delete media without authentication.
|
|
|
|
"""
|
|
|
|
url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("DELETE", url, b"{}")
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.UNAUTHORIZED,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_requester_is_no_admin(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
"""
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
|
|
|
"DELETE",
|
|
|
|
url,
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.FORBIDDEN,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_media_does_not_exist(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
2021-11-30 12:53:54 +03:00
|
|
|
Tests that a lookup for a media that does not exist returns a HTTPStatus.NOT_FOUND
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, "12345")
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
|
|
|
"DELETE",
|
|
|
|
url,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.NOT_FOUND, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.NOT_FOUND, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_media_is_not_local(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
2021-11-30 12:53:54 +03:00
|
|
|
Tests that a lookup for a media that is not a local returns a HTTPStatus.BAD_REQUEST
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
url = "/_synapse/admin/v1/media/%s/%s" % ("unknown_domain", "12345")
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
|
|
|
"DELETE",
|
|
|
|
url,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual("Can only delete local media", channel.json_body["error"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_delete_media(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that delete a media is successfully
|
|
|
|
"""
|
|
|
|
|
|
|
|
download_resource = self.media_repo.children[b"download"]
|
|
|
|
upload_resource = self.media_repo.children[b"upload"]
|
|
|
|
|
|
|
|
# Upload some media into the room
|
|
|
|
response = self.helper.upload_media(
|
2021-11-30 12:53:54 +03:00
|
|
|
upload_resource,
|
|
|
|
SMALL_PNG,
|
|
|
|
tok=self.admin_user_tok,
|
|
|
|
expect_code=HTTPStatus.OK,
|
2020-10-26 20:02:28 +03:00
|
|
|
)
|
|
|
|
# Extract media ID from the response
|
|
|
|
server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
|
|
|
|
server_name, media_id = server_and_media_id.split("/")
|
|
|
|
|
|
|
|
self.assertEqual(server_name, self.server_name)
|
|
|
|
|
|
|
|
# Attempt to access media
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = make_request(
|
2020-11-14 02:11:43 +03:00
|
|
|
self.reactor,
|
2021-09-24 13:01:25 +03:00
|
|
|
FakeSite(download_resource, self.reactor),
|
2020-10-26 20:02:28 +03:00
|
|
|
"GET",
|
|
|
|
server_and_media_id,
|
|
|
|
shorthand=False,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
|
|
|
# Should be successful
|
|
|
|
self.assertEqual(
|
2021-11-30 12:53:54 +03:00
|
|
|
HTTPStatus.OK,
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.code,
|
|
|
|
msg=(
|
2021-11-30 12:53:54 +03:00
|
|
|
"Expected to receive a HTTPStatus.OK on accessing media: %s"
|
|
|
|
% server_and_media_id
|
2020-10-26 20:02:28 +03:00
|
|
|
),
|
|
|
|
)
|
|
|
|
|
|
|
|
# Test if the file exists
|
|
|
|
local_path = self.filepaths.local_media_filepath(media_id)
|
|
|
|
self.assertTrue(os.path.exists(local_path))
|
|
|
|
|
|
|
|
url = "/_synapse/admin/v1/media/%s/%s" % (self.server_name, media_id)
|
|
|
|
|
|
|
|
# Delete media
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
|
|
|
"DELETE",
|
|
|
|
url,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
media_id,
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
# Attempt to access media
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = make_request(
|
2020-11-14 02:11:43 +03:00
|
|
|
self.reactor,
|
2021-09-24 13:01:25 +03:00
|
|
|
FakeSite(download_resource, self.reactor),
|
2020-10-26 20:02:28 +03:00
|
|
|
"GET",
|
|
|
|
server_and_media_id,
|
|
|
|
shorthand=False,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
2021-11-30 12:53:54 +03:00
|
|
|
HTTPStatus.NOT_FOUND,
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.code,
|
|
|
|
msg=(
|
2021-11-30 12:53:54 +03:00
|
|
|
"Expected to receive a HTTPStatus.NOT_FOUND on accessing deleted media: %s"
|
2020-10-26 20:02:28 +03:00
|
|
|
% server_and_media_id
|
|
|
|
),
|
|
|
|
)
|
|
|
|
|
|
|
|
# Test if the file is deleted
|
|
|
|
self.assertFalse(os.path.exists(local_path))
|
|
|
|
|
|
|
|
|
|
|
|
class DeleteMediaByDateSizeTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
synapse.rest.admin.register_servlets_for_media_repo,
|
|
|
|
login.register_servlets,
|
|
|
|
profile.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
self.media_repo = hs.get_media_repository_resource()
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
2021-09-24 14:25:21 +03:00
|
|
|
self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.url = "/_synapse/admin/v1/media/%s/delete" % self.server_name
|
|
|
|
|
2021-10-20 17:41:48 +03:00
|
|
|
# Move clock up to somewhat realistic time
|
|
|
|
self.reactor.advance(1000000000)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_no_auth(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Try to delete media without authentication.
|
|
|
|
"""
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request("POST", self.url, b"{}")
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.UNAUTHORIZED,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_requester_is_no_admin(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
"""
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url,
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.FORBIDDEN,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_media_is_not_local(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
2021-11-30 12:53:54 +03:00
|
|
|
Tests that a lookup for media that is not local returns a HTTPStatus.BAD_REQUEST
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
url = "/_synapse/admin/v1/media/%s/delete" % "unknown_domain"
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
2021-10-20 17:41:48 +03:00
|
|
|
url + f"?before_ts={VALID_TIMESTAMP}",
|
2020-10-26 20:02:28 +03:00
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.BAD_REQUEST, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual("Can only delete local media", channel.json_body["error"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_missing_parameter(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
If the parameter `before_ts` is missing, an error is returned.
|
|
|
|
"""
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.MISSING_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
2021-07-21 21:12:22 +03:00
|
|
|
"Missing integer query parameter 'before_ts'", channel.json_body["error"]
|
2020-10-26 20:02:28 +03:00
|
|
|
)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_invalid_parameter(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
If parameters are invalid, an error is returned.
|
|
|
|
"""
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=-1234",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
2021-10-20 17:41:48 +03:00
|
|
|
"Query parameter before_ts must be a positive integer.",
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.json_body["error"],
|
|
|
|
)
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
2021-10-20 17:41:48 +03:00
|
|
|
self.url + f"?before_ts={INVALID_TIMESTAMP_IN_S}",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-10-20 17:41:48 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
|
|
|
"Query parameter before_ts you provided is from the year 1970. "
|
|
|
|
+ "Double check that you are providing a timestamp in milliseconds.",
|
|
|
|
channel.json_body["error"],
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url + f"?before_ts={VALID_TIMESTAMP}&size_gt=-1234",
|
2020-10-26 20:02:28 +03:00
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
|
|
|
"Query parameter size_gt must be a string representing a positive integer.",
|
|
|
|
channel.json_body["error"],
|
|
|
|
)
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
2021-10-20 17:41:48 +03:00
|
|
|
self.url + f"?before_ts={VALID_TIMESTAMP}&keep_profiles=not_bool",
|
2020-10-26 20:02:28 +03:00
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-12-09 14:23:34 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(
|
2021-07-21 21:12:22 +03:00
|
|
|
"Boolean query parameter 'keep_profiles' must be one of ['true', 'false']",
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.json_body["error"],
|
|
|
|
)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_delete_media_never_accessed(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that media deleted if it is older than `before_ts` and never accessed
|
|
|
|
`last_access_ts` is `NULL` and `created_ts` < `before_ts`
|
|
|
|
"""
|
|
|
|
|
|
|
|
# upload and do not access
|
|
|
|
server_and_media_id = self._create_media()
|
|
|
|
self.pump(1.0)
|
|
|
|
|
|
|
|
# test that the file exists
|
|
|
|
media_id = server_and_media_id.split("/")[1]
|
|
|
|
local_path = self.filepaths.local_media_filepath(media_id)
|
|
|
|
self.assertTrue(os.path.exists(local_path))
|
|
|
|
|
|
|
|
# timestamp after upload/create
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
media_id,
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id, False)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_keep_media_by_date(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that media is not deleted if it is newer than `before_ts`
|
|
|
|
"""
|
|
|
|
|
|
|
|
# timestamp before upload
|
|
|
|
now_ms = self.clock.time_msec()
|
|
|
|
server_and_media_id = self._create_media()
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
# timestamp after upload
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
server_and_media_id.split("/")[1],
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id, False)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_keep_media_by_size(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that media is not deleted if its size is smaller than or equal
|
|
|
|
to `size_gt`
|
|
|
|
"""
|
|
|
|
server_and_media_id = self._create_media()
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&size_gt=67",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&size_gt=66",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
server_and_media_id.split("/")[1],
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id, False)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_keep_media_by_user_avatar(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that we do not delete media if is used as a user avatar
|
|
|
|
Tests parameter `keep_profiles`
|
|
|
|
"""
|
|
|
|
server_and_media_id = self._create_media()
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
# set media as avatar
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"PUT",
|
|
|
|
"/profile/%s/avatar_url" % (self.admin_user,),
|
2021-11-30 12:53:54 +03:00
|
|
|
content={"avatar_url": "mxc://%s" % (server_and_media_id,)},
|
2020-10-26 20:02:28 +03:00
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=true",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=false",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
server_and_media_id.split("/")[1],
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id, False)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_keep_media_by_room_avatar(self) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Tests that we do not delete media if it is used as a room avatar
|
|
|
|
Tests parameter `keep_profiles`
|
|
|
|
"""
|
|
|
|
server_and_media_id = self._create_media()
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
# set media as room avatar
|
|
|
|
room_id = self.helper.create_room_as(self.admin_user, tok=self.admin_user_tok)
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"PUT",
|
|
|
|
"/rooms/%s/state/m.room.avatar" % (room_id,),
|
2021-11-30 12:53:54 +03:00
|
|
|
content={"url": "mxc://%s" % (server_and_media_id,)},
|
2020-10-26 20:02:28 +03:00
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=true",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(0, channel.json_body["total"])
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id)
|
|
|
|
|
|
|
|
now_ms = self.clock.time_msec()
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = self.make_request(
|
2020-10-26 20:02:28 +03:00
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=" + str(now_ms) + "&keep_profiles=false",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2020-10-26 20:02:28 +03:00
|
|
|
self.assertEqual(1, channel.json_body["total"])
|
|
|
|
self.assertEqual(
|
|
|
|
server_and_media_id.split("/")[1],
|
|
|
|
channel.json_body["deleted_media"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
self._access_media(server_and_media_id, False)
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def _create_media(self) -> str:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Create a media and return media_id and server_and_media_id
|
|
|
|
"""
|
|
|
|
upload_resource = self.media_repo.children[b"upload"]
|
|
|
|
|
|
|
|
# Upload some media into the room
|
|
|
|
response = self.helper.upload_media(
|
2021-11-30 12:53:54 +03:00
|
|
|
upload_resource,
|
|
|
|
SMALL_PNG,
|
|
|
|
tok=self.admin_user_tok,
|
|
|
|
expect_code=HTTPStatus.OK,
|
2020-10-26 20:02:28 +03:00
|
|
|
)
|
|
|
|
# Extract media ID from the response
|
|
|
|
server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
|
|
|
|
server_name = server_and_media_id.split("/")[0]
|
|
|
|
|
|
|
|
# Check that new media is a local and not remote
|
|
|
|
self.assertEqual(server_name, self.server_name)
|
|
|
|
|
|
|
|
return server_and_media_id
|
|
|
|
|
2021-12-16 22:59:56 +03:00
|
|
|
def _access_media(
|
|
|
|
self, server_and_media_id: str, expect_success: bool = True
|
|
|
|
) -> None:
|
2020-10-26 20:02:28 +03:00
|
|
|
"""
|
|
|
|
Try to access a media and check the result
|
|
|
|
"""
|
|
|
|
download_resource = self.media_repo.children[b"download"]
|
|
|
|
|
|
|
|
media_id = server_and_media_id.split("/")[1]
|
|
|
|
local_path = self.filepaths.local_media_filepath(media_id)
|
|
|
|
|
2020-12-15 17:44:04 +03:00
|
|
|
channel = make_request(
|
2020-11-14 02:11:43 +03:00
|
|
|
self.reactor,
|
2021-09-24 13:01:25 +03:00
|
|
|
FakeSite(download_resource, self.reactor),
|
2020-10-26 20:02:28 +03:00
|
|
|
"GET",
|
|
|
|
server_and_media_id,
|
|
|
|
shorthand=False,
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
|
|
|
if expect_success:
|
|
|
|
self.assertEqual(
|
2021-11-30 12:53:54 +03:00
|
|
|
HTTPStatus.OK,
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.code,
|
|
|
|
msg=(
|
2021-11-30 12:53:54 +03:00
|
|
|
"Expected to receive a HTTPStatus.OK on accessing media: %s"
|
2020-10-26 20:02:28 +03:00
|
|
|
% server_and_media_id
|
|
|
|
),
|
|
|
|
)
|
|
|
|
# Test that the file exists
|
|
|
|
self.assertTrue(os.path.exists(local_path))
|
|
|
|
else:
|
|
|
|
self.assertEqual(
|
2021-11-30 12:53:54 +03:00
|
|
|
HTTPStatus.NOT_FOUND,
|
2020-10-26 20:02:28 +03:00
|
|
|
channel.code,
|
|
|
|
msg=(
|
2021-11-30 12:53:54 +03:00
|
|
|
"Expected to receive a HTTPStatus.NOT_FOUND on accessing deleted media: %s"
|
2020-10-26 20:02:28 +03:00
|
|
|
% (server_and_media_id)
|
|
|
|
),
|
|
|
|
)
|
|
|
|
# Test that the file is deleted
|
|
|
|
self.assertFalse(os.path.exists(local_path))
|
2021-05-26 13:19:47 +03:00
|
|
|
|
|
|
|
|
2021-06-02 20:50:35 +03:00
|
|
|
class QuarantineMediaByIDTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
synapse.rest.admin.register_servlets_for_media_repo,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2021-06-02 20:50:35 +03:00
|
|
|
media_repo = hs.get_media_repository_resource()
|
2022-02-23 14:04:02 +03:00
|
|
|
self.store = hs.get_datastores().main
|
2021-06-02 20:50:35 +03:00
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
# Create media
|
|
|
|
upload_resource = media_repo.children[b"upload"]
|
|
|
|
|
|
|
|
# Upload some media into the room
|
|
|
|
response = self.helper.upload_media(
|
2021-11-30 12:53:54 +03:00
|
|
|
upload_resource,
|
|
|
|
SMALL_PNG,
|
|
|
|
tok=self.admin_user_tok,
|
|
|
|
expect_code=HTTPStatus.OK,
|
2021-06-02 20:50:35 +03:00
|
|
|
)
|
|
|
|
# Extract media ID from the response
|
|
|
|
server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
|
|
|
|
self.media_id = server_and_media_id.split("/")[1]
|
|
|
|
|
|
|
|
self.url = "/_synapse/admin/v1/media/%s/%s/%s"
|
|
|
|
|
|
|
|
@parameterized.expand(["quarantine", "unquarantine"])
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_no_auth(self, action: str) -> None:
|
2021-06-02 20:50:35 +03:00
|
|
|
"""
|
|
|
|
Try to protect media without authentication.
|
|
|
|
"""
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % (action, self.server_name, self.media_id),
|
|
|
|
b"{}",
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.UNAUTHORIZED,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
@parameterized.expand(["quarantine", "unquarantine"])
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_requester_is_no_admin(self, action: str) -> None:
|
2021-06-02 20:50:35 +03:00
|
|
|
"""
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
"""
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % (action, self.server_name, self.media_id),
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.FORBIDDEN,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_quarantine_media(self) -> None:
|
2021-06-02 20:50:35 +03:00
|
|
|
"""
|
|
|
|
Tests that quarantining and remove from quarantine a media is successfully
|
|
|
|
"""
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(media_info["quarantined_by"])
|
|
|
|
|
|
|
|
# quarantining
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % ("quarantine", self.server_name, self.media_id),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(channel.json_body)
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertTrue(media_info["quarantined_by"])
|
|
|
|
|
|
|
|
# remove from quarantine
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % ("unquarantine", self.server_name, self.media_id),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(channel.json_body)
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(media_info["quarantined_by"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_quarantine_protected_media(self) -> None:
|
2021-06-02 20:50:35 +03:00
|
|
|
"""
|
|
|
|
Tests that quarantining from protected media fails
|
|
|
|
"""
|
|
|
|
|
|
|
|
# protect
|
|
|
|
self.get_success(self.store.mark_local_media_as_safe(self.media_id, safe=True))
|
|
|
|
|
|
|
|
# verify protection
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertTrue(media_info["safe_from_quarantine"])
|
|
|
|
|
|
|
|
# quarantining
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % ("quarantine", self.server_name, self.media_id),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(channel.json_body)
|
|
|
|
|
|
|
|
# verify that is not in quarantine
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-06-02 20:50:35 +03:00
|
|
|
self.assertFalse(media_info["quarantined_by"])
|
|
|
|
|
|
|
|
|
2021-05-26 13:19:47 +03:00
|
|
|
class ProtectMediaByIDTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
synapse.rest.admin.register_servlets_for_media_repo,
|
|
|
|
login.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2021-05-26 13:19:47 +03:00
|
|
|
media_repo = hs.get_media_repository_resource()
|
2022-02-23 14:04:02 +03:00
|
|
|
self.store = hs.get_datastores().main
|
2021-05-26 13:19:47 +03:00
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
# Create media
|
|
|
|
upload_resource = media_repo.children[b"upload"]
|
|
|
|
|
|
|
|
# Upload some media into the room
|
|
|
|
response = self.helper.upload_media(
|
2021-11-30 12:53:54 +03:00
|
|
|
upload_resource,
|
|
|
|
SMALL_PNG,
|
|
|
|
tok=self.admin_user_tok,
|
|
|
|
expect_code=HTTPStatus.OK,
|
2021-05-26 13:19:47 +03:00
|
|
|
)
|
|
|
|
# Extract media ID from the response
|
|
|
|
server_and_media_id = response["content_uri"][6:] # Cut off 'mxc://'
|
|
|
|
self.media_id = server_and_media_id.split("/")[1]
|
|
|
|
|
|
|
|
self.url = "/_synapse/admin/v1/media/%s/%s"
|
|
|
|
|
|
|
|
@parameterized.expand(["protect", "unprotect"])
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_no_auth(self, action: str) -> None:
|
2021-05-26 13:19:47 +03:00
|
|
|
"""
|
|
|
|
Try to protect media without authentication.
|
|
|
|
"""
|
|
|
|
|
|
|
|
channel = self.make_request("POST", self.url % (action, self.media_id), b"{}")
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.UNAUTHORIZED,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
|
|
|
@parameterized.expand(["protect", "unprotect"])
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_requester_is_no_admin(self, action: str) -> None:
|
2021-05-26 13:19:47 +03:00
|
|
|
"""
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
"""
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % (action, self.media_id),
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.FORBIDDEN,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_protect_media(self) -> None:
|
2021-05-26 13:19:47 +03:00
|
|
|
"""
|
|
|
|
Tests that protect and unprotect a media is successfully
|
|
|
|
"""
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertFalse(media_info["safe_from_quarantine"])
|
|
|
|
|
|
|
|
# protect
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % ("protect", self.media_id),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertFalse(channel.json_body)
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertTrue(media_info["safe_from_quarantine"])
|
|
|
|
|
|
|
|
# unprotect
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url % ("unprotect", self.media_id),
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.json_body)
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertFalse(channel.json_body)
|
|
|
|
|
|
|
|
media_info = self.get_success(self.store.get_local_media(self.media_id))
|
2022-04-01 19:04:16 +03:00
|
|
|
assert media_info is not None
|
2021-05-26 13:19:47 +03:00
|
|
|
self.assertFalse(media_info["safe_from_quarantine"])
|
2021-10-20 17:41:48 +03:00
|
|
|
|
|
|
|
|
|
|
|
class PurgeMediaCacheTestCase(unittest.HomeserverTestCase):
|
|
|
|
|
|
|
|
servlets = [
|
|
|
|
synapse.rest.admin.register_servlets,
|
|
|
|
synapse.rest.admin.register_servlets_for_media_repo,
|
|
|
|
login.register_servlets,
|
|
|
|
profile.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
]
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2021-10-20 17:41:48 +03:00
|
|
|
self.media_repo = hs.get_media_repository_resource()
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.admin_user = self.register_user("admin", "pass", admin=True)
|
|
|
|
self.admin_user_tok = self.login("admin", "pass")
|
|
|
|
|
|
|
|
self.filepaths = MediaFilePaths(hs.config.media.media_store_path)
|
|
|
|
self.url = "/_synapse/admin/v1/purge_media_cache"
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_no_auth(self) -> None:
|
2021-10-20 17:41:48 +03:00
|
|
|
"""
|
|
|
|
Try to delete media without authentication.
|
|
|
|
"""
|
|
|
|
|
|
|
|
channel = self.make_request("POST", self.url, b"{}")
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.UNAUTHORIZED,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-10-20 17:41:48 +03:00
|
|
|
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_requester_is_not_admin(self) -> None:
|
2021-10-20 17:41:48 +03:00
|
|
|
"""
|
|
|
|
If the user is not a server admin, an error is returned.
|
|
|
|
"""
|
|
|
|
self.other_user = self.register_user("user", "pass")
|
|
|
|
self.other_user_token = self.login("user", "pass")
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url,
|
|
|
|
access_token=self.other_user_token,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.FORBIDDEN,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-10-20 17:41:48 +03:00
|
|
|
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
|
|
|
|
|
2021-12-03 16:57:13 +03:00
|
|
|
def test_invalid_parameter(self) -> None:
|
2021-10-20 17:41:48 +03:00
|
|
|
"""
|
|
|
|
If parameters are invalid, an error is returned.
|
|
|
|
"""
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url + "?before_ts=-1234",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-10-20 17:41:48 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
|
|
|
"Query parameter before_ts must be a positive integer.",
|
|
|
|
channel.json_body["error"],
|
|
|
|
)
|
|
|
|
|
|
|
|
channel = self.make_request(
|
|
|
|
"POST",
|
|
|
|
self.url + f"?before_ts={INVALID_TIMESTAMP_IN_S}",
|
|
|
|
access_token=self.admin_user_tok,
|
|
|
|
)
|
|
|
|
|
2021-11-30 12:53:54 +03:00
|
|
|
self.assertEqual(
|
|
|
|
HTTPStatus.BAD_REQUEST,
|
|
|
|
channel.code,
|
|
|
|
msg=channel.json_body,
|
|
|
|
)
|
2021-10-20 17:41:48 +03:00
|
|
|
self.assertEqual(Codes.INVALID_PARAM, channel.json_body["errcode"])
|
|
|
|
self.assertEqual(
|
|
|
|
"Query parameter before_ts you provided is from the year 1970. "
|
|
|
|
+ "Double check that you are providing a timestamp in milliseconds.",
|
|
|
|
channel.json_body["error"],
|
|
|
|
)
|