Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Commit

Permalink
Disable sending confirmation email when 3pid is disabled #14682 (#14725)
Browse files Browse the repository at this point in the history
* Fixes #12277 :Disable sending confirmation email when 3pid is disabled

* Fix test_add_email_if_disabled test case to reflect changes to enable_3pid_changes flag

* Add changelog file

* Rename newsfragment.

Co-authored-by: Patrick Cloke <clokep@users.noreply.github.com>
  • Loading branch information
JeyRathnam and clokep committed Jan 9, 2023
1 parent b4de0c6 commit 5e08880
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 25 deletions.
1 change: 1 addition & 0 deletions changelog.d/14725.misc
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Disable sending confirmation email when 3pid is disabled.
5 changes: 5 additions & 0 deletions synapse/rest/client/account.py
Original file line number Diff line number Diff line change
Expand Up @@ -338,6 +338,11 @@ def __init__(self, hs: "HomeServer"):
)

async def on_POST(self, request: SynapseRequest) -> Tuple[int, JsonDict]:
if not self.hs.config.registration.enable_3pid_changes:
raise SynapseError(
400, "3PID changes are disabled on this server", Codes.FORBIDDEN
)

if not self.config.email.can_verify_email:
logger.warning(
"Adding emails have been disabled due to lack of an email config"
Expand Down
30 changes: 5 additions & 25 deletions tests/rest/client/test_account.py
Original file line number Diff line number Diff line change
Expand Up @@ -690,41 +690,21 @@ def test_add_email_if_disabled(self) -> None:
self.hs.config.registration.enable_3pid_changes = False

client_secret = "foobar"
session_id = self._request_token(self.email, client_secret)

self.assertEqual(len(self.email_attempts), 1)
link = self._get_link_from_email()

self._validate_token(link)

channel = self.make_request(
"POST",
b"/_matrix/client/unstable/account/3pid/add",
b"/_matrix/client/unstable/account/3pid/email/requestToken",
{
"client_secret": client_secret,
"sid": session_id,
"auth": {
"type": "m.login.password",
"user": self.user_id,
"password": "test",
},
"email": "test@example.com",
"send_attempt": 1,
},
access_token=self.user_id_tok,
)

self.assertEqual(
HTTPStatus.BAD_REQUEST, channel.code, msg=channel.result["body"]
)
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])

# Get user
channel = self.make_request(
"GET",
self.url_3pid,
access_token=self.user_id_tok,
)

self.assertEqual(HTTPStatus.OK, channel.code, msg=channel.result["body"])
self.assertFalse(channel.json_body["threepids"])
self.assertEqual(Codes.FORBIDDEN, channel.json_body["errcode"])

def test_delete_email(self) -> None:
"""Test deleting an email from profile"""
Expand Down

0 comments on commit 5e08880

Please sign in to comment.