Skip to content

Commit 8f01eb8

Browse files
authored
Add an Admin API to fetch an event by ID (#18963)
Adds an endpoint to allow server admins to fetch an event regardless of their membership in the originating room.
1 parent 21d125e commit 8f01eb8

5 files changed

Lines changed: 201 additions & 0 deletions

File tree

changelog.d/18963.feature

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Add an Admin API to fetch an event by ID.

docs/admin_api/fetch_event.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Fetch Event API
2+
3+
The fetch event API allows admins to fetch an event regardless of their membership in the room it
4+
originated in.
5+
6+
To use it, you will need to authenticate by providing an `access_token`
7+
for a server admin: see [Admin API](../usage/administration/admin_api/).
8+
9+
Request:
10+
```http
11+
GET /_synapse/admin/v1/fetch_event/<event_id>
12+
```
13+
14+
The API returns a JSON body like the following:
15+
16+
Response:
17+
```json
18+
{
19+
"event": {
20+
"auth_events": [
21+
"$WhLChbYg6atHuFRP7cUd95naUtc8L0f7fqeizlsUVvc",
22+
"$9Wj8dt02lrNEWweeq-KjRABUYKba0K9DL2liRvsAdtQ",
23+
"$qJxBFxBt8_ODd9b3pgOL_jXP98S_igc1_kizuPSZFi4"
24+
],
25+
"content": {
26+
"body": "Hey now",
27+
"msgtype": "m.text"
28+
},
29+
"depth": 6,
30+
"event_id": "$hJ_kcXbVMcI82JDrbqfUJIHu61tJD86uIFJ_8hNHi7s",
31+
"hashes": {
32+
"sha256": "LiNw8DtrRVf55EgAH8R42Wz7WCJUqGsPt2We6qZO5Rg"
33+
},
34+
"origin_server_ts": 799,
35+
"prev_events": [
36+
"$cnSUrNMnC3Ywh9_W7EquFxYQjC_sT3BAAVzcUVxZq1g"
37+
],
38+
"room_id": "!aIhKToCqgPTBloWMpf:test",
39+
"sender": "@user:test",
40+
"signatures": {
41+
"test": {
42+
"ed25519:a_lPym": "7mqSDwK1k7rnw34Dd8Fahu0rhPW7jPmcWPRtRDoEN9Yuv+BCM2+Rfdpv2MjxNKy3AYDEBwUwYEuaKMBaEMiKAQ"
43+
}
44+
},
45+
"type": "m.room.message",
46+
"unsigned": {
47+
"age_ts": 799
48+
}
49+
}
50+
}
51+
```
52+
53+

synapse/rest/admin/__init__.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,9 @@
5757
EventReportDetailRestServlet,
5858
EventReportsRestServlet,
5959
)
60+
from synapse.rest.admin.events import (
61+
EventRestServlet,
62+
)
6063
from synapse.rest.admin.experimental_features import ExperimentalFeaturesRestServlet
6164
from synapse.rest.admin.federation import (
6265
DestinationMembershipRestServlet,
@@ -339,6 +342,7 @@ def register_servlets(hs: "HomeServer", http_server: HttpServer) -> None:
339342
ExperimentalFeaturesRestServlet(hs).register(http_server)
340343
SuspendAccountRestServlet(hs).register(http_server)
341344
ScheduledTasksRestServlet(hs).register(http_server)
345+
EventRestServlet(hs).register(http_server)
342346

343347

344348
def register_servlets_for_client_rest_resource(

synapse/rest/admin/events.py

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
from http import HTTPStatus
2+
from typing import TYPE_CHECKING, Tuple
3+
4+
from synapse.api.errors import NotFoundError
5+
from synapse.events.utils import (
6+
SerializeEventConfig,
7+
format_event_raw,
8+
serialize_event,
9+
)
10+
from synapse.http.servlet import RestServlet
11+
from synapse.http.site import SynapseRequest
12+
from synapse.rest.admin import admin_patterns
13+
from synapse.rest.admin._base import assert_user_is_admin
14+
from synapse.storage.databases.main.events_worker import EventRedactBehaviour
15+
from synapse.types import JsonDict
16+
17+
if TYPE_CHECKING:
18+
from synapse.server import HomeServer
19+
20+
21+
class EventRestServlet(RestServlet):
22+
"""
23+
Get an event that is known to the homeserver.
24+
The requester must have administrator access in Synapse.
25+
26+
GET /_synapse/admin/v1/fetch_event/<event_id>
27+
returns:
28+
200 OK with event json if the event is known to the homeserver. Otherwise raises
29+
a NotFound error.
30+
31+
Args:
32+
event_id: the id of the requested event.
33+
Returns:
34+
JSON blob of the event
35+
"""
36+
37+
PATTERNS = admin_patterns("/fetch_event/(?P<event_id>[^/]*)$")
38+
39+
def __init__(self, hs: "HomeServer"):
40+
self._auth = hs.get_auth()
41+
self._store = hs.get_datastores().main
42+
self._clock = hs.get_clock()
43+
44+
async def on_GET(
45+
self, request: SynapseRequest, event_id: str
46+
) -> Tuple[int, JsonDict]:
47+
requester = await self._auth.get_user_by_req(request)
48+
await assert_user_is_admin(self._auth, requester)
49+
50+
event = await self._store.get_event(
51+
event_id,
52+
EventRedactBehaviour.as_is,
53+
allow_none=True,
54+
)
55+
56+
if event is None:
57+
raise NotFoundError("Event not found")
58+
59+
config = SerializeEventConfig(
60+
as_client_event=False,
61+
event_format=format_event_raw,
62+
requester=requester,
63+
only_event_fields=None,
64+
include_stripped_room_state=True,
65+
include_admin_metadata=True,
66+
)
67+
res = {"event": serialize_event(event, self._clock.time_msec(), config=config)}
68+
69+
return HTTPStatus.OK, res

tests/rest/admin/test_event.py

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
from twisted.internet.testing import MemoryReactor
2+
3+
import synapse.rest.admin
4+
from synapse.api.errors import Codes
5+
from synapse.rest.client import login, room
6+
from synapse.server import HomeServer
7+
from synapse.util.clock import Clock
8+
9+
from tests import unittest
10+
11+
12+
class FetchEventTestCase(unittest.HomeserverTestCase):
13+
servlets = [
14+
synapse.rest.admin.register_servlets,
15+
login.register_servlets,
16+
room.register_servlets,
17+
]
18+
19+
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
20+
self.admin_user = self.register_user("admin", "pass", admin=True)
21+
self.admin_user_tok = self.login("admin", "pass")
22+
23+
self.other_user = self.register_user("user", "pass")
24+
self.other_user_tok = self.login("user", "pass")
25+
26+
self.room_id1 = self.helper.create_room_as(
27+
self.other_user, tok=self.other_user_tok, is_public=True
28+
)
29+
resp = self.helper.send(self.room_id1, body="Hey now", tok=self.other_user_tok)
30+
self.event_id = resp["event_id"]
31+
32+
def test_no_auth(self) -> None:
33+
"""
34+
Try to get an event without authentication.
35+
"""
36+
channel = self.make_request(
37+
"GET",
38+
f"/_synapse/admin/v1/fetch_event/{self.event_id}",
39+
)
40+
41+
self.assertEqual(401, channel.code, msg=channel.json_body)
42+
self.assertEqual(Codes.MISSING_TOKEN, channel.json_body["errcode"])
43+
44+
def test_requester_is_not_admin(self) -> None:
45+
"""
46+
If the user is not a server admin, an error 403 is returned.
47+
"""
48+
49+
channel = self.make_request(
50+
"GET",
51+
f"/_synapse/admin/v1/fetch_event/{self.event_id}",
52+
access_token=self.other_user_tok,
53+
)
54+
55+
self.assertEqual(403, channel.code, msg=channel.json_body)
56+
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])
57+
58+
def test_fetch_event(self) -> None:
59+
"""
60+
Test that we can successfully fetch an event
61+
"""
62+
channel = self.make_request(
63+
"GET",
64+
f"/_synapse/admin/v1/fetch_event/{self.event_id}",
65+
access_token=self.admin_user_tok,
66+
)
67+
self.assertEqual(200, channel.code, msg=channel.json_body)
68+
self.assertEqual(
69+
channel.json_body["event"]["content"],
70+
{"body": "Hey now", "msgtype": "m.text"},
71+
)
72+
self.assertEqual(channel.json_body["event"]["event_id"], self.event_id)
73+
self.assertEqual(channel.json_body["event"]["type"], "m.room.message")
74+
self.assertEqual(channel.json_body["event"]["sender"], self.other_user)

0 commit comments

Comments
 (0)