mirror of
https://git.anonymousland.org/anonymousland/synapse-product.git
synced 2024-12-28 10:29:25 -05:00
Implementation of MSC2314 (#6176)
This commit is contained in:
parent
0d27aba900
commit
0f87b912ab
1
changelog.d/6176.feature
Normal file
1
changelog.d/6176.feature
Normal file
@ -0,0 +1 @@
|
|||||||
|
Implement the `/_matrix/federation/unstable/net.atleastfornow/state/<context>` API as drafted in MSC2314.
|
@ -1,6 +1,7 @@
|
|||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
# Copyright 2015, 2016 OpenMarket Ltd
|
# Copyright 2015, 2016 OpenMarket Ltd
|
||||||
# Copyright 2018 New Vector Ltd
|
# Copyright 2018 New Vector Ltd
|
||||||
|
# Copyright 2019 Matrix.org Federation C.I.C
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -73,6 +74,7 @@ class FederationServer(FederationBase):
|
|||||||
|
|
||||||
self.auth = hs.get_auth()
|
self.auth = hs.get_auth()
|
||||||
self.handler = hs.get_handlers().federation_handler
|
self.handler = hs.get_handlers().federation_handler
|
||||||
|
self.state = hs.get_state_handler()
|
||||||
|
|
||||||
self._server_linearizer = Linearizer("fed_server")
|
self._server_linearizer = Linearizer("fed_server")
|
||||||
self._transaction_linearizer = Linearizer("fed_txn_handler")
|
self._transaction_linearizer = Linearizer("fed_txn_handler")
|
||||||
@ -264,9 +266,6 @@ class FederationServer(FederationBase):
|
|||||||
await self.registry.on_edu(edu_type, origin, content)
|
await self.registry.on_edu(edu_type, origin, content)
|
||||||
|
|
||||||
async def on_context_state_request(self, origin, room_id, event_id):
|
async def on_context_state_request(self, origin, room_id, event_id):
|
||||||
if not event_id:
|
|
||||||
raise NotImplementedError("Specify an event")
|
|
||||||
|
|
||||||
origin_host, _ = parse_server_name(origin)
|
origin_host, _ = parse_server_name(origin)
|
||||||
await self.check_server_matches_acl(origin_host, room_id)
|
await self.check_server_matches_acl(origin_host, room_id)
|
||||||
|
|
||||||
@ -280,13 +279,18 @@ class FederationServer(FederationBase):
|
|||||||
# - but that's non-trivial to get right, and anyway somewhat defeats
|
# - but that's non-trivial to get right, and anyway somewhat defeats
|
||||||
# the point of the linearizer.
|
# the point of the linearizer.
|
||||||
with (await self._server_linearizer.queue((origin, room_id))):
|
with (await self._server_linearizer.queue((origin, room_id))):
|
||||||
resp = await self._state_resp_cache.wrap(
|
resp = dict(
|
||||||
(room_id, event_id),
|
await self._state_resp_cache.wrap(
|
||||||
self._on_context_state_request_compute,
|
(room_id, event_id),
|
||||||
room_id,
|
self._on_context_state_request_compute,
|
||||||
event_id,
|
room_id,
|
||||||
|
event_id,
|
||||||
|
)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
room_version = await self.store.get_room_version(room_id)
|
||||||
|
resp["room_version"] = room_version
|
||||||
|
|
||||||
return 200, resp
|
return 200, resp
|
||||||
|
|
||||||
async def on_state_ids_request(self, origin, room_id, event_id):
|
async def on_state_ids_request(self, origin, room_id, event_id):
|
||||||
@ -306,7 +310,11 @@ class FederationServer(FederationBase):
|
|||||||
return 200, {"pdu_ids": state_ids, "auth_chain_ids": auth_chain_ids}
|
return 200, {"pdu_ids": state_ids, "auth_chain_ids": auth_chain_ids}
|
||||||
|
|
||||||
async def _on_context_state_request_compute(self, room_id, event_id):
|
async def _on_context_state_request_compute(self, room_id, event_id):
|
||||||
pdus = await self.handler.get_state_for_pdu(room_id, event_id)
|
if event_id:
|
||||||
|
pdus = await self.handler.get_state_for_pdu(room_id, event_id)
|
||||||
|
else:
|
||||||
|
pdus = (await self.state.get_current_state(room_id)).values()
|
||||||
|
|
||||||
auth_chain = await self.store.get_auth_chain([pdu.event_id for pdu in pdus])
|
auth_chain = await self.store.get_auth_chain([pdu.event_id for pdu in pdus])
|
||||||
|
|
||||||
return {
|
return {
|
||||||
|
@ -421,7 +421,7 @@ class FederationEventServlet(BaseFederationServlet):
|
|||||||
return await self.handler.on_pdu_request(origin, event_id)
|
return await self.handler.on_pdu_request(origin, event_id)
|
||||||
|
|
||||||
|
|
||||||
class FederationStateServlet(BaseFederationServlet):
|
class FederationStateV1Servlet(BaseFederationServlet):
|
||||||
PATH = "/state/(?P<context>[^/]*)/?"
|
PATH = "/state/(?P<context>[^/]*)/?"
|
||||||
|
|
||||||
# This is when someone asks for all data for a given context.
|
# This is when someone asks for all data for a given context.
|
||||||
@ -429,7 +429,7 @@ class FederationStateServlet(BaseFederationServlet):
|
|||||||
return await self.handler.on_context_state_request(
|
return await self.handler.on_context_state_request(
|
||||||
origin,
|
origin,
|
||||||
context,
|
context,
|
||||||
parse_string_from_args(query, "event_id", None, required=True),
|
parse_string_from_args(query, "event_id", None, required=False),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@ -1360,7 +1360,7 @@ class RoomComplexityServlet(BaseFederationServlet):
|
|||||||
FEDERATION_SERVLET_CLASSES = (
|
FEDERATION_SERVLET_CLASSES = (
|
||||||
FederationSendServlet,
|
FederationSendServlet,
|
||||||
FederationEventServlet,
|
FederationEventServlet,
|
||||||
FederationStateServlet,
|
FederationStateV1Servlet,
|
||||||
FederationStateIdsServlet,
|
FederationStateIdsServlet,
|
||||||
FederationBackfillServlet,
|
FederationBackfillServlet,
|
||||||
FederationQueryServlet,
|
FederationQueryServlet,
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# This file serves as a blacklist for SyTest tests that we expect will fail in
|
# This file serves as a blacklist for SyTest tests that we expect will fail in
|
||||||
# Synapse.
|
# Synapse.
|
||||||
#
|
#
|
||||||
# Each line of this file is scanned by sytest during a run and if the line
|
# Each line of this file is scanned by sytest during a run and if the line
|
||||||
# exactly matches the name of a test, it will be marked as "expected fail",
|
# exactly matches the name of a test, it will be marked as "expected fail",
|
||||||
# meaning the test will still run, but failure will not mark the entire test
|
# meaning the test will still run, but failure will not mark the entire test
|
||||||
@ -29,3 +29,7 @@ Enabling an unknown default rule fails with 404
|
|||||||
|
|
||||||
# Blacklisted due to https://github.com/matrix-org/synapse/issues/1663
|
# Blacklisted due to https://github.com/matrix-org/synapse/issues/1663
|
||||||
New federated private chats get full presence information (SYN-115)
|
New federated private chats get full presence information (SYN-115)
|
||||||
|
|
||||||
|
# Blacklisted due to https://github.com/matrix-org/matrix-doc/pull/2314 removing
|
||||||
|
# this requirement from the spec
|
||||||
|
Inbound federation of state requires event_id as a mandatory paramater
|
||||||
|
@ -18,17 +18,14 @@ from mock import Mock
|
|||||||
from twisted.internet import defer
|
from twisted.internet import defer
|
||||||
|
|
||||||
from synapse.api.errors import Codes, SynapseError
|
from synapse.api.errors import Codes, SynapseError
|
||||||
from synapse.config.ratelimiting import FederationRateLimitConfig
|
|
||||||
from synapse.federation.transport import server
|
|
||||||
from synapse.rest import admin
|
from synapse.rest import admin
|
||||||
from synapse.rest.client.v1 import login, room
|
from synapse.rest.client.v1 import login, room
|
||||||
from synapse.types import UserID
|
from synapse.types import UserID
|
||||||
from synapse.util.ratelimitutils import FederationRateLimiter
|
|
||||||
|
|
||||||
from tests import unittest
|
from tests import unittest
|
||||||
|
|
||||||
|
|
||||||
class RoomComplexityTests(unittest.HomeserverTestCase):
|
class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
|
||||||
|
|
||||||
servlets = [
|
servlets = [
|
||||||
admin.register_servlets,
|
admin.register_servlets,
|
||||||
@ -41,25 +38,6 @@ class RoomComplexityTests(unittest.HomeserverTestCase):
|
|||||||
config["limit_remote_rooms"] = {"enabled": True, "complexity": 0.05}
|
config["limit_remote_rooms"] = {"enabled": True, "complexity": 0.05}
|
||||||
return config
|
return config
|
||||||
|
|
||||||
def prepare(self, reactor, clock, homeserver):
|
|
||||||
class Authenticator(object):
|
|
||||||
def authenticate_request(self, request, content):
|
|
||||||
return defer.succeed("otherserver.nottld")
|
|
||||||
|
|
||||||
ratelimiter = FederationRateLimiter(
|
|
||||||
clock,
|
|
||||||
FederationRateLimitConfig(
|
|
||||||
window_size=1,
|
|
||||||
sleep_limit=1,
|
|
||||||
sleep_msec=1,
|
|
||||||
reject_limit=1000,
|
|
||||||
concurrent_requests=1000,
|
|
||||||
),
|
|
||||||
)
|
|
||||||
server.register_servlets(
|
|
||||||
homeserver, self.resource, Authenticator(), ratelimiter
|
|
||||||
)
|
|
||||||
|
|
||||||
def test_complexity_simple(self):
|
def test_complexity_simple(self):
|
||||||
|
|
||||||
u1 = self.register_user("u1", "pass")
|
u1 = self.register_user("u1", "pass")
|
||||||
@ -105,7 +83,7 @@ class RoomComplexityTests(unittest.HomeserverTestCase):
|
|||||||
|
|
||||||
d = handler._remote_join(
|
d = handler._remote_join(
|
||||||
None,
|
None,
|
||||||
["otherserver.example"],
|
["other.example.com"],
|
||||||
"roomid",
|
"roomid",
|
||||||
UserID.from_string(u1),
|
UserID.from_string(u1),
|
||||||
{"membership": "join"},
|
{"membership": "join"},
|
||||||
@ -146,7 +124,7 @@ class RoomComplexityTests(unittest.HomeserverTestCase):
|
|||||||
|
|
||||||
d = handler._remote_join(
|
d = handler._remote_join(
|
||||||
None,
|
None,
|
||||||
["otherserver.example"],
|
["other.example.com"],
|
||||||
room_1,
|
room_1,
|
||||||
UserID.from_string(u1),
|
UserID.from_string(u1),
|
||||||
{"membership": "join"},
|
{"membership": "join"},
|
||||||
|
@ -19,7 +19,7 @@ from twisted.internet import defer
|
|||||||
|
|
||||||
from synapse.types import ReadReceipt
|
from synapse.types import ReadReceipt
|
||||||
|
|
||||||
from tests.unittest import HomeserverTestCase
|
from tests.unittest import HomeserverTestCase, override_config
|
||||||
|
|
||||||
|
|
||||||
class FederationSenderTestCases(HomeserverTestCase):
|
class FederationSenderTestCases(HomeserverTestCase):
|
||||||
@ -29,6 +29,7 @@ class FederationSenderTestCases(HomeserverTestCase):
|
|||||||
federation_transport_client=Mock(spec=["send_transaction"]),
|
federation_transport_client=Mock(spec=["send_transaction"]),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@override_config({"send_federation": True})
|
||||||
def test_send_receipts(self):
|
def test_send_receipts(self):
|
||||||
mock_state_handler = self.hs.get_state_handler()
|
mock_state_handler = self.hs.get_state_handler()
|
||||||
mock_state_handler.get_current_hosts_in_room.return_value = ["test", "host2"]
|
mock_state_handler.get_current_hosts_in_room.return_value = ["test", "host2"]
|
||||||
@ -69,6 +70,7 @@ class FederationSenderTestCases(HomeserverTestCase):
|
|||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@override_config({"send_federation": True})
|
||||||
def test_send_receipts_with_backoff(self):
|
def test_send_receipts_with_backoff(self):
|
||||||
"""Send two receipts in quick succession; the second should be flushed, but
|
"""Send two receipts in quick succession; the second should be flushed, but
|
||||||
only after 20ms"""
|
only after 20ms"""
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
# Copyright 2018 New Vector Ltd
|
# Copyright 2018 New Vector Ltd
|
||||||
|
# Copyright 2019 Matrix.org Federation C.I.C
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -16,6 +17,8 @@ import logging
|
|||||||
|
|
||||||
from synapse.events import FrozenEvent
|
from synapse.events import FrozenEvent
|
||||||
from synapse.federation.federation_server import server_matches_acl_event
|
from synapse.federation.federation_server import server_matches_acl_event
|
||||||
|
from synapse.rest import admin
|
||||||
|
from synapse.rest.client.v1 import login, room
|
||||||
|
|
||||||
from tests import unittest
|
from tests import unittest
|
||||||
|
|
||||||
@ -41,6 +44,66 @@ class ServerACLsTestCase(unittest.TestCase):
|
|||||||
self.assertTrue(server_matches_acl_event("1:2:3:4", e))
|
self.assertTrue(server_matches_acl_event("1:2:3:4", e))
|
||||||
|
|
||||||
|
|
||||||
|
class StateQueryTests(unittest.FederatingHomeserverTestCase):
|
||||||
|
|
||||||
|
servlets = [
|
||||||
|
admin.register_servlets,
|
||||||
|
room.register_servlets,
|
||||||
|
login.register_servlets,
|
||||||
|
]
|
||||||
|
|
||||||
|
def test_without_event_id(self):
|
||||||
|
"""
|
||||||
|
Querying v1/state/<room_id> without an event ID will return the current
|
||||||
|
known state.
|
||||||
|
"""
|
||||||
|
u1 = self.register_user("u1", "pass")
|
||||||
|
u1_token = self.login("u1", "pass")
|
||||||
|
|
||||||
|
room_1 = self.helper.create_room_as(u1, tok=u1_token)
|
||||||
|
self.inject_room_member(room_1, "@user:other.example.com", "join")
|
||||||
|
|
||||||
|
request, channel = self.make_request(
|
||||||
|
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
|
||||||
|
)
|
||||||
|
self.render(request)
|
||||||
|
self.assertEquals(200, channel.code, channel.result)
|
||||||
|
|
||||||
|
self.assertEqual(
|
||||||
|
channel.json_body["room_version"],
|
||||||
|
self.hs.config.default_room_version.identifier,
|
||||||
|
)
|
||||||
|
|
||||||
|
members = set(
|
||||||
|
map(
|
||||||
|
lambda x: x["state_key"],
|
||||||
|
filter(
|
||||||
|
lambda x: x["type"] == "m.room.member", channel.json_body["pdus"]
|
||||||
|
),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
self.assertEqual(members, set(["@user:other.example.com", u1]))
|
||||||
|
self.assertEqual(len(channel.json_body["pdus"]), 6)
|
||||||
|
|
||||||
|
def test_needs_to_be_in_room(self):
|
||||||
|
"""
|
||||||
|
Querying v1/state/<room_id> requires the server
|
||||||
|
be in the room to provide data.
|
||||||
|
"""
|
||||||
|
u1 = self.register_user("u1", "pass")
|
||||||
|
u1_token = self.login("u1", "pass")
|
||||||
|
|
||||||
|
room_1 = self.helper.create_room_as(u1, tok=u1_token)
|
||||||
|
|
||||||
|
request, channel = self.make_request(
|
||||||
|
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
|
||||||
|
)
|
||||||
|
self.render(request)
|
||||||
|
self.assertEquals(403, channel.code, channel.result)
|
||||||
|
self.assertEqual(channel.json_body["errcode"], "M_FORBIDDEN")
|
||||||
|
|
||||||
|
|
||||||
def _create_acl_event(content):
|
def _create_acl_event(content):
|
||||||
return FrozenEvent(
|
return FrozenEvent(
|
||||||
{
|
{
|
||||||
|
@ -24,6 +24,7 @@ from synapse.api.errors import AuthError
|
|||||||
from synapse.types import UserID
|
from synapse.types import UserID
|
||||||
|
|
||||||
from tests import unittest
|
from tests import unittest
|
||||||
|
from tests.unittest import override_config
|
||||||
from tests.utils import register_federation_servlets
|
from tests.utils import register_federation_servlets
|
||||||
|
|
||||||
# Some local users to test with
|
# Some local users to test with
|
||||||
@ -174,6 +175,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@override_config({"send_federation": True})
|
||||||
def test_started_typing_remote_send(self):
|
def test_started_typing_remote_send(self):
|
||||||
self.room_members = [U_APPLE, U_ONION]
|
self.room_members = [U_APPLE, U_ONION]
|
||||||
|
|
||||||
@ -237,6 +239,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@override_config({"send_federation": True})
|
||||||
def test_stopped_typing(self):
|
def test_stopped_typing(self):
|
||||||
self.room_members = [U_APPLE, U_BANANA, U_ONION]
|
self.room_members = [U_APPLE, U_BANANA, U_ONION]
|
||||||
|
|
||||||
|
@ -48,7 +48,10 @@ class BaseSlavedStoreTestCase(unittest.HomeserverTestCase):
|
|||||||
server_factory = ReplicationStreamProtocolFactory(self.hs)
|
server_factory = ReplicationStreamProtocolFactory(self.hs)
|
||||||
self.streamer = server_factory.streamer
|
self.streamer = server_factory.streamer
|
||||||
|
|
||||||
|
handler_factory = Mock()
|
||||||
self.replication_handler = ReplicationClientHandler(self.slaved_store)
|
self.replication_handler = ReplicationClientHandler(self.slaved_store)
|
||||||
|
self.replication_handler.factory = handler_factory
|
||||||
|
|
||||||
client_factory = ReplicationClientFactory(
|
client_factory = ReplicationClientFactory(
|
||||||
self.hs, "client_name", self.replication_handler
|
self.hs, "client_name", self.replication_handler
|
||||||
)
|
)
|
||||||
|
@ -12,6 +12,8 @@
|
|||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
from mock import Mock
|
||||||
|
|
||||||
from synapse.replication.tcp.commands import ReplicateCommand
|
from synapse.replication.tcp.commands import ReplicateCommand
|
||||||
from synapse.replication.tcp.protocol import ClientReplicationStreamProtocol
|
from synapse.replication.tcp.protocol import ClientReplicationStreamProtocol
|
||||||
from synapse.replication.tcp.resource import ReplicationStreamProtocolFactory
|
from synapse.replication.tcp.resource import ReplicationStreamProtocolFactory
|
||||||
@ -30,7 +32,9 @@ class BaseStreamTestCase(unittest.HomeserverTestCase):
|
|||||||
server = server_factory.buildProtocol(None)
|
server = server_factory.buildProtocol(None)
|
||||||
|
|
||||||
# build a replication client, with a dummy handler
|
# build a replication client, with a dummy handler
|
||||||
|
handler_factory = Mock()
|
||||||
self.test_handler = TestReplicationClientHandler()
|
self.test_handler = TestReplicationClientHandler()
|
||||||
|
self.test_handler.factory = handler_factory
|
||||||
self.client = ClientReplicationStreamProtocol(
|
self.client = ClientReplicationStreamProtocol(
|
||||||
"client", "test", clock, self.test_handler
|
"client", "test", clock, self.test_handler
|
||||||
)
|
)
|
||||||
|
@ -16,8 +16,7 @@
|
|||||||
|
|
||||||
from unittest.mock import Mock
|
from unittest.mock import Mock
|
||||||
|
|
||||||
from synapse.api.constants import EventTypes, Membership
|
from synapse.api.constants import Membership
|
||||||
from synapse.api.room_versions import RoomVersions
|
|
||||||
from synapse.rest.admin import register_servlets_for_client_rest_resource
|
from synapse.rest.admin import register_servlets_for_client_rest_resource
|
||||||
from synapse.rest.client.v1 import login, room
|
from synapse.rest.client.v1 import login, room
|
||||||
from synapse.types import Requester, UserID
|
from synapse.types import Requester, UserID
|
||||||
@ -44,9 +43,6 @@ class RoomMemberStoreTestCase(unittest.HomeserverTestCase):
|
|||||||
# We can't test the RoomMemberStore on its own without the other event
|
# We can't test the RoomMemberStore on its own without the other event
|
||||||
# storage logic
|
# storage logic
|
||||||
self.store = hs.get_datastore()
|
self.store = hs.get_datastore()
|
||||||
self.storage = hs.get_storage()
|
|
||||||
self.event_builder_factory = hs.get_event_builder_factory()
|
|
||||||
self.event_creation_handler = hs.get_event_creation_handler()
|
|
||||||
|
|
||||||
self.u_alice = self.register_user("alice", "pass")
|
self.u_alice = self.register_user("alice", "pass")
|
||||||
self.t_alice = self.login("alice", "pass")
|
self.t_alice = self.login("alice", "pass")
|
||||||
@ -55,26 +51,6 @@ class RoomMemberStoreTestCase(unittest.HomeserverTestCase):
|
|||||||
# User elsewhere on another host
|
# User elsewhere on another host
|
||||||
self.u_charlie = UserID.from_string("@charlie:elsewhere")
|
self.u_charlie = UserID.from_string("@charlie:elsewhere")
|
||||||
|
|
||||||
def inject_room_member(self, room, user, membership, replaces_state=None):
|
|
||||||
builder = self.event_builder_factory.for_room_version(
|
|
||||||
RoomVersions.V1,
|
|
||||||
{
|
|
||||||
"type": EventTypes.Member,
|
|
||||||
"sender": user,
|
|
||||||
"state_key": user,
|
|
||||||
"room_id": room,
|
|
||||||
"content": {"membership": membership},
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
event, context = self.get_success(
|
|
||||||
self.event_creation_handler.create_new_client_event(builder)
|
|
||||||
)
|
|
||||||
|
|
||||||
self.get_success(self.storage.persistence.persist_event(event, context))
|
|
||||||
|
|
||||||
return event
|
|
||||||
|
|
||||||
def test_one_member(self):
|
def test_one_member(self):
|
||||||
|
|
||||||
# Alice creates the room, and is automatically joined
|
# Alice creates the room, and is automatically joined
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
# Copyright 2014-2016 OpenMarket Ltd
|
# Copyright 2014-2016 OpenMarket Ltd
|
||||||
# Copyright 2018 New Vector
|
# Copyright 2018 New Vector
|
||||||
|
# Copyright 2019 Matrix.org Federation C.I.C
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -13,6 +14,7 @@
|
|||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
import gc
|
import gc
|
||||||
import hashlib
|
import hashlib
|
||||||
import hmac
|
import hmac
|
||||||
@ -27,13 +29,17 @@ from twisted.internet.defer import Deferred, succeed
|
|||||||
from twisted.python.threadpool import ThreadPool
|
from twisted.python.threadpool import ThreadPool
|
||||||
from twisted.trial import unittest
|
from twisted.trial import unittest
|
||||||
|
|
||||||
from synapse.api.constants import EventTypes
|
from synapse.api.constants import EventTypes, Membership
|
||||||
|
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS
|
||||||
from synapse.config.homeserver import HomeServerConfig
|
from synapse.config.homeserver import HomeServerConfig
|
||||||
|
from synapse.config.ratelimiting import FederationRateLimitConfig
|
||||||
|
from synapse.federation.transport import server as federation_server
|
||||||
from synapse.http.server import JsonResource
|
from synapse.http.server import JsonResource
|
||||||
from synapse.http.site import SynapseRequest
|
from synapse.http.site import SynapseRequest
|
||||||
from synapse.logging.context import LoggingContext
|
from synapse.logging.context import LoggingContext
|
||||||
from synapse.server import HomeServer
|
from synapse.server import HomeServer
|
||||||
from synapse.types import Requester, UserID, create_requester
|
from synapse.types import Requester, UserID, create_requester
|
||||||
|
from synapse.util.ratelimitutils import FederationRateLimiter
|
||||||
|
|
||||||
from tests.server import get_clock, make_request, render, setup_test_homeserver
|
from tests.server import get_clock, make_request, render, setup_test_homeserver
|
||||||
from tests.test_utils.logging_setup import setup_logging
|
from tests.test_utils.logging_setup import setup_logging
|
||||||
@ -559,6 +565,66 @@ class HomeserverTestCase(TestCase):
|
|||||||
self.render(request)
|
self.render(request)
|
||||||
self.assertEqual(channel.code, 403, channel.result)
|
self.assertEqual(channel.code, 403, channel.result)
|
||||||
|
|
||||||
|
def inject_room_member(self, room: str, user: str, membership: Membership) -> None:
|
||||||
|
"""
|
||||||
|
Inject a membership event into a room.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
room: Room ID to inject the event into.
|
||||||
|
user: MXID of the user to inject the membership for.
|
||||||
|
membership: The membership type.
|
||||||
|
"""
|
||||||
|
event_builder_factory = self.hs.get_event_builder_factory()
|
||||||
|
event_creation_handler = self.hs.get_event_creation_handler()
|
||||||
|
|
||||||
|
room_version = self.get_success(self.hs.get_datastore().get_room_version(room))
|
||||||
|
|
||||||
|
builder = event_builder_factory.for_room_version(
|
||||||
|
KNOWN_ROOM_VERSIONS[room_version],
|
||||||
|
{
|
||||||
|
"type": EventTypes.Member,
|
||||||
|
"sender": user,
|
||||||
|
"state_key": user,
|
||||||
|
"room_id": room,
|
||||||
|
"content": {"membership": membership},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
event, context = self.get_success(
|
||||||
|
event_creation_handler.create_new_client_event(builder)
|
||||||
|
)
|
||||||
|
|
||||||
|
self.get_success(
|
||||||
|
self.hs.get_storage().persistence.persist_event(event, context)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class FederatingHomeserverTestCase(HomeserverTestCase):
|
||||||
|
"""
|
||||||
|
A federating homeserver that authenticates incoming requests as `other.example.com`.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def prepare(self, reactor, clock, homeserver):
|
||||||
|
class Authenticator(object):
|
||||||
|
def authenticate_request(self, request, content):
|
||||||
|
return succeed("other.example.com")
|
||||||
|
|
||||||
|
ratelimiter = FederationRateLimiter(
|
||||||
|
clock,
|
||||||
|
FederationRateLimitConfig(
|
||||||
|
window_size=1,
|
||||||
|
sleep_limit=1,
|
||||||
|
sleep_msec=1,
|
||||||
|
reject_limit=1000,
|
||||||
|
concurrent_requests=1000,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
federation_server.register_servlets(
|
||||||
|
homeserver, self.resource, Authenticator(), ratelimiter
|
||||||
|
)
|
||||||
|
|
||||||
|
return super().prepare(reactor, clock, homeserver)
|
||||||
|
|
||||||
|
|
||||||
def override_config(extra_config):
|
def override_config(extra_config):
|
||||||
"""A decorator which can be applied to test functions to give additional HS config
|
"""A decorator which can be applied to test functions to give additional HS config
|
||||||
|
@ -109,6 +109,7 @@ def default_config(name, parse=False):
|
|||||||
"""
|
"""
|
||||||
config_dict = {
|
config_dict = {
|
||||||
"server_name": name,
|
"server_name": name,
|
||||||
|
"send_federation": False,
|
||||||
"media_store_path": "media",
|
"media_store_path": "media",
|
||||||
"uploads_path": "uploads",
|
"uploads_path": "uploads",
|
||||||
# the test signing key is just an arbitrary ed25519 key to keep the config
|
# the test signing key is just an arbitrary ed25519 key to keep the config
|
||||||
|
Loading…
Reference in New Issue
Block a user