mirror of
https://git.anonymousland.org/anonymousland/synapse-product.git
synced 2025-11-13 01:10:38 -05:00
Run Black. (#5482)
This commit is contained in:
parent
7dcf984075
commit
32e7c9e7f2
376 changed files with 9142 additions and 10388 deletions
|
|
@ -172,7 +172,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
request.requestHeaders.getRawHeaders = mock_getRawHeaders()
|
||||
requester = yield self.auth.get_user_by_req(request)
|
||||
self.assertEquals(
|
||||
requester.user.to_string(), masquerading_user_id.decode('utf8')
|
||||
requester.user.to_string(), masquerading_user_id.decode("utf8")
|
||||
)
|
||||
|
||||
def test_get_user_by_req_appservice_valid_token_bad_user_id(self):
|
||||
|
|
@ -264,7 +264,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
|
||||
# check the token works
|
||||
request = Mock(args={})
|
||||
request.args[b"access_token"] = [token.encode('ascii')]
|
||||
request.args[b"access_token"] = [token.encode("ascii")]
|
||||
request.requestHeaders.getRawHeaders = mock_getRawHeaders()
|
||||
requester = yield self.auth.get_user_by_req(request, allow_guest=True)
|
||||
self.assertEqual(UserID.from_string(USER_ID), requester.user)
|
||||
|
|
@ -277,7 +277,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
|
||||
# the token should *not* work now
|
||||
request = Mock(args={})
|
||||
request.args[b"access_token"] = [guest_tok.encode('ascii')]
|
||||
request.args[b"access_token"] = [guest_tok.encode("ascii")]
|
||||
request.requestHeaders.getRawHeaders = mock_getRawHeaders()
|
||||
|
||||
with self.assertRaises(AuthError) as cm:
|
||||
|
|
@ -321,11 +321,11 @@ class AuthTestCase(unittest.TestCase):
|
|||
self.hs.config.limit_usage_by_mau = True
|
||||
self.hs.config.max_mau_value = 1
|
||||
self.store.get_monthly_active_count = lambda: defer.succeed(2)
|
||||
threepid = {'medium': 'email', 'address': 'reserved@server.com'}
|
||||
unknown_threepid = {'medium': 'email', 'address': 'unreserved@server.com'}
|
||||
threepid = {"medium": "email", "address": "reserved@server.com"}
|
||||
unknown_threepid = {"medium": "email", "address": "unreserved@server.com"}
|
||||
self.hs.config.mau_limits_reserved_threepids = [threepid]
|
||||
|
||||
yield self.store.register(user_id='user1', token="123", password_hash=None)
|
||||
yield self.store.register(user_id="user1", token="123", password_hash=None)
|
||||
with self.assertRaises(ResourceLimitError):
|
||||
yield self.auth.check_auth_blocking()
|
||||
|
||||
|
|
|
|||
|
|
@ -20,10 +20,10 @@ from tests import unittest
|
|||
|
||||
class ServerConfigTestCase(unittest.TestCase):
|
||||
def test_is_threepid_reserved(self):
|
||||
user1 = {'medium': 'email', 'address': 'user1@example.com'}
|
||||
user2 = {'medium': 'email', 'address': 'user2@example.com'}
|
||||
user3 = {'medium': 'email', 'address': 'user3@example.com'}
|
||||
user1_msisdn = {'medium': 'msisdn', 'address': '447700000000'}
|
||||
user1 = {"medium": "email", "address": "user1@example.com"}
|
||||
user2 = {"medium": "email", "address": "user2@example.com"}
|
||||
user3 = {"medium": "email", "address": "user3@example.com"}
|
||||
user1_msisdn = {"medium": "msisdn", "address": "447700000000"}
|
||||
config = [user1, user2]
|
||||
|
||||
self.assertTrue(is_threepid_reserved(config, user1))
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ class TLSConfigTests(TestCase):
|
|||
"""
|
||||
config_dir = self.mktemp()
|
||||
os.mkdir(config_dir)
|
||||
with open(os.path.join(config_dir, "cert.pem"), 'w') as f:
|
||||
with open(os.path.join(config_dir, "cert.pem"), "w") as f:
|
||||
f.write(
|
||||
"""-----BEGIN CERTIFICATE-----
|
||||
MIID6DCCAtACAws9CjANBgkqhkiG9w0BAQUFADCBtzELMAkGA1UEBhMCVFIxDzAN
|
||||
|
|
|
|||
|
|
@ -41,25 +41,25 @@ class EventSigningTestCase(unittest.TestCase):
|
|||
|
||||
def test_sign_minimal(self):
|
||||
event_dict = {
|
||||
'event_id': "$0:domain",
|
||||
'origin': "domain",
|
||||
'origin_server_ts': 1000000,
|
||||
'signatures': {},
|
||||
'type': "X",
|
||||
'unsigned': {'age_ts': 1000000},
|
||||
"event_id": "$0:domain",
|
||||
"origin": "domain",
|
||||
"origin_server_ts": 1000000,
|
||||
"signatures": {},
|
||||
"type": "X",
|
||||
"unsigned": {"age_ts": 1000000},
|
||||
}
|
||||
|
||||
add_hashes_and_signatures(event_dict, HOSTNAME, self.signing_key)
|
||||
|
||||
event = FrozenEvent(event_dict)
|
||||
|
||||
self.assertTrue(hasattr(event, 'hashes'))
|
||||
self.assertIn('sha256', event.hashes)
|
||||
self.assertTrue(hasattr(event, "hashes"))
|
||||
self.assertIn("sha256", event.hashes)
|
||||
self.assertEquals(
|
||||
event.hashes['sha256'], "6tJjLpXtggfke8UxFhAKg82QVkJzvKOVOOSjUDK4ZSI"
|
||||
event.hashes["sha256"], "6tJjLpXtggfke8UxFhAKg82QVkJzvKOVOOSjUDK4ZSI"
|
||||
)
|
||||
|
||||
self.assertTrue(hasattr(event, 'signatures'))
|
||||
self.assertTrue(hasattr(event, "signatures"))
|
||||
self.assertIn(HOSTNAME, event.signatures)
|
||||
self.assertIn(KEY_NAME, event.signatures["domain"])
|
||||
self.assertEquals(
|
||||
|
|
@ -70,28 +70,28 @@ class EventSigningTestCase(unittest.TestCase):
|
|||
|
||||
def test_sign_message(self):
|
||||
event_dict = {
|
||||
'content': {'body': "Here is the message content"},
|
||||
'event_id': "$0:domain",
|
||||
'origin': "domain",
|
||||
'origin_server_ts': 1000000,
|
||||
'type': "m.room.message",
|
||||
'room_id': "!r:domain",
|
||||
'sender': "@u:domain",
|
||||
'signatures': {},
|
||||
'unsigned': {'age_ts': 1000000},
|
||||
"content": {"body": "Here is the message content"},
|
||||
"event_id": "$0:domain",
|
||||
"origin": "domain",
|
||||
"origin_server_ts": 1000000,
|
||||
"type": "m.room.message",
|
||||
"room_id": "!r:domain",
|
||||
"sender": "@u:domain",
|
||||
"signatures": {},
|
||||
"unsigned": {"age_ts": 1000000},
|
||||
}
|
||||
|
||||
add_hashes_and_signatures(event_dict, HOSTNAME, self.signing_key)
|
||||
|
||||
event = FrozenEvent(event_dict)
|
||||
|
||||
self.assertTrue(hasattr(event, 'hashes'))
|
||||
self.assertIn('sha256', event.hashes)
|
||||
self.assertTrue(hasattr(event, "hashes"))
|
||||
self.assertIn("sha256", event.hashes)
|
||||
self.assertEquals(
|
||||
event.hashes['sha256'], "onLKD1bGljeBWQhWZ1kaP9SorVmRQNdN5aM2JYU2n/g"
|
||||
event.hashes["sha256"], "onLKD1bGljeBWQhWZ1kaP9SorVmRQNdN5aM2JYU2n/g"
|
||||
)
|
||||
|
||||
self.assertTrue(hasattr(event, 'signatures'))
|
||||
self.assertTrue(hasattr(event, "signatures"))
|
||||
self.assertIn(HOSTNAME, event.signatures)
|
||||
self.assertIn(KEY_NAME, event.signatures["domain"])
|
||||
self.assertEquals(
|
||||
|
|
|
|||
|
|
@ -37,88 +37,88 @@ class PruneEventTestCase(unittest.TestCase):
|
|||
|
||||
def test_minimal(self):
|
||||
self.run_test(
|
||||
{'type': 'A', 'event_id': '$test:domain'},
|
||||
{"type": "A", "event_id": "$test:domain"},
|
||||
{
|
||||
'type': 'A',
|
||||
'event_id': '$test:domain',
|
||||
'content': {},
|
||||
'signatures': {},
|
||||
'unsigned': {},
|
||||
"type": "A",
|
||||
"event_id": "$test:domain",
|
||||
"content": {},
|
||||
"signatures": {},
|
||||
"unsigned": {},
|
||||
},
|
||||
)
|
||||
|
||||
def test_basic_keys(self):
|
||||
self.run_test(
|
||||
{
|
||||
'type': 'A',
|
||||
'room_id': '!1:domain',
|
||||
'sender': '@2:domain',
|
||||
'event_id': '$3:domain',
|
||||
'origin': 'domain',
|
||||
"type": "A",
|
||||
"room_id": "!1:domain",
|
||||
"sender": "@2:domain",
|
||||
"event_id": "$3:domain",
|
||||
"origin": "domain",
|
||||
},
|
||||
{
|
||||
'type': 'A',
|
||||
'room_id': '!1:domain',
|
||||
'sender': '@2:domain',
|
||||
'event_id': '$3:domain',
|
||||
'origin': 'domain',
|
||||
'content': {},
|
||||
'signatures': {},
|
||||
'unsigned': {},
|
||||
"type": "A",
|
||||
"room_id": "!1:domain",
|
||||
"sender": "@2:domain",
|
||||
"event_id": "$3:domain",
|
||||
"origin": "domain",
|
||||
"content": {},
|
||||
"signatures": {},
|
||||
"unsigned": {},
|
||||
},
|
||||
)
|
||||
|
||||
def test_unsigned_age_ts(self):
|
||||
self.run_test(
|
||||
{'type': 'B', 'event_id': '$test:domain', 'unsigned': {'age_ts': 20}},
|
||||
{"type": "B", "event_id": "$test:domain", "unsigned": {"age_ts": 20}},
|
||||
{
|
||||
'type': 'B',
|
||||
'event_id': '$test:domain',
|
||||
'content': {},
|
||||
'signatures': {},
|
||||
'unsigned': {'age_ts': 20},
|
||||
"type": "B",
|
||||
"event_id": "$test:domain",
|
||||
"content": {},
|
||||
"signatures": {},
|
||||
"unsigned": {"age_ts": 20},
|
||||
},
|
||||
)
|
||||
|
||||
self.run_test(
|
||||
{
|
||||
'type': 'B',
|
||||
'event_id': '$test:domain',
|
||||
'unsigned': {'other_key': 'here'},
|
||||
"type": "B",
|
||||
"event_id": "$test:domain",
|
||||
"unsigned": {"other_key": "here"},
|
||||
},
|
||||
{
|
||||
'type': 'B',
|
||||
'event_id': '$test:domain',
|
||||
'content': {},
|
||||
'signatures': {},
|
||||
'unsigned': {},
|
||||
"type": "B",
|
||||
"event_id": "$test:domain",
|
||||
"content": {},
|
||||
"signatures": {},
|
||||
"unsigned": {},
|
||||
},
|
||||
)
|
||||
|
||||
def test_content(self):
|
||||
self.run_test(
|
||||
{'type': 'C', 'event_id': '$test:domain', 'content': {'things': 'here'}},
|
||||
{"type": "C", "event_id": "$test:domain", "content": {"things": "here"}},
|
||||
{
|
||||
'type': 'C',
|
||||
'event_id': '$test:domain',
|
||||
'content': {},
|
||||
'signatures': {},
|
||||
'unsigned': {},
|
||||
"type": "C",
|
||||
"event_id": "$test:domain",
|
||||
"content": {},
|
||||
"signatures": {},
|
||||
"unsigned": {},
|
||||
},
|
||||
)
|
||||
|
||||
self.run_test(
|
||||
{
|
||||
'type': 'm.room.create',
|
||||
'event_id': '$test:domain',
|
||||
'content': {'creator': '@2:domain', 'other_field': 'here'},
|
||||
"type": "m.room.create",
|
||||
"event_id": "$test:domain",
|
||||
"content": {"creator": "@2:domain", "other_field": "here"},
|
||||
},
|
||||
{
|
||||
'type': 'm.room.create',
|
||||
'event_id': '$test:domain',
|
||||
'content': {'creator': '@2:domain'},
|
||||
'signatures': {},
|
||||
'unsigned': {},
|
||||
"type": "m.room.create",
|
||||
"event_id": "$test:domain",
|
||||
"content": {"creator": "@2:domain"},
|
||||
"signatures": {},
|
||||
"unsigned": {},
|
||||
},
|
||||
)
|
||||
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ class RoomComplexityTests(unittest.HomeserverTestCase):
|
|||
login.register_servlets,
|
||||
]
|
||||
|
||||
def default_config(self, name='test'):
|
||||
def default_config(self, name="test"):
|
||||
config = super(RoomComplexityTests, self).default_config(name=name)
|
||||
config["limit_large_remote_room_joins"] = True
|
||||
config["limit_large_remote_room_complexity"] = 0.05
|
||||
|
|
|
|||
|
|
@ -51,16 +51,16 @@ class FederationSenderTestCases(HomeserverTestCase):
|
|||
json_cb = mock_send_transaction.call_args[0][1]
|
||||
data = json_cb()
|
||||
self.assertEqual(
|
||||
data['edus'],
|
||||
data["edus"],
|
||||
[
|
||||
{
|
||||
'edu_type': 'm.receipt',
|
||||
'content': {
|
||||
'room_id': {
|
||||
'm.read': {
|
||||
'user_id': {
|
||||
'event_ids': ['event_id'],
|
||||
'data': {'ts': 1234},
|
||||
"edu_type": "m.receipt",
|
||||
"content": {
|
||||
"room_id": {
|
||||
"m.read": {
|
||||
"user_id": {
|
||||
"event_ids": ["event_id"],
|
||||
"data": {"ts": 1234},
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -93,16 +93,16 @@ class FederationSenderTestCases(HomeserverTestCase):
|
|||
json_cb = mock_send_transaction.call_args[0][1]
|
||||
data = json_cb()
|
||||
self.assertEqual(
|
||||
data['edus'],
|
||||
data["edus"],
|
||||
[
|
||||
{
|
||||
'edu_type': 'm.receipt',
|
||||
'content': {
|
||||
'room_id': {
|
||||
'm.read': {
|
||||
'user_id': {
|
||||
'event_ids': ['event_id'],
|
||||
'data': {'ts': 1234},
|
||||
"edu_type": "m.receipt",
|
||||
"content": {
|
||||
"room_id": {
|
||||
"m.read": {
|
||||
"user_id": {
|
||||
"event_ids": ["event_id"],
|
||||
"data": {"ts": 1234},
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -128,16 +128,16 @@ class FederationSenderTestCases(HomeserverTestCase):
|
|||
json_cb = mock_send_transaction.call_args[0][1]
|
||||
data = json_cb()
|
||||
self.assertEqual(
|
||||
data['edus'],
|
||||
data["edus"],
|
||||
[
|
||||
{
|
||||
'edu_type': 'm.receipt',
|
||||
'content': {
|
||||
'room_id': {
|
||||
'm.read': {
|
||||
'user_id': {
|
||||
'event_ids': ['other_id'],
|
||||
'data': {'ts': 1234},
|
||||
"edu_type": "m.receipt",
|
||||
"content": {
|
||||
"room_id": {
|
||||
"m.read": {
|
||||
"user_id": {
|
||||
"event_ids": ["other_id"],
|
||||
"data": {"ts": 1234},
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -117,7 +117,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
def test_mau_limits_disabled(self):
|
||||
self.hs.config.limit_usage_by_mau = False
|
||||
# Ensure does not throw exception
|
||||
yield self.auth_handler.get_access_token_for_user_id('user_a')
|
||||
yield self.auth_handler.get_access_token_for_user_id("user_a")
|
||||
|
||||
yield self.auth_handler.validate_short_term_login_token_and_get_user_id(
|
||||
self._get_macaroon().serialize()
|
||||
|
|
@ -131,7 +131,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
)
|
||||
|
||||
with self.assertRaises(ResourceLimitError):
|
||||
yield self.auth_handler.get_access_token_for_user_id('user_a')
|
||||
yield self.auth_handler.get_access_token_for_user_id("user_a")
|
||||
|
||||
self.hs.get_datastore().get_monthly_active_count = Mock(
|
||||
return_value=defer.succeed(self.large_number_of_users)
|
||||
|
|
@ -150,7 +150,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
return_value=defer.succeed(self.hs.config.max_mau_value)
|
||||
)
|
||||
with self.assertRaises(ResourceLimitError):
|
||||
yield self.auth_handler.get_access_token_for_user_id('user_a')
|
||||
yield self.auth_handler.get_access_token_for_user_id("user_a")
|
||||
|
||||
self.hs.get_datastore().get_monthly_active_count = Mock(
|
||||
return_value=defer.succeed(self.hs.config.max_mau_value)
|
||||
|
|
@ -166,7 +166,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
self.hs.get_datastore().get_monthly_active_count = Mock(
|
||||
return_value=defer.succeed(self.hs.config.max_mau_value)
|
||||
)
|
||||
yield self.auth_handler.get_access_token_for_user_id('user_a')
|
||||
yield self.auth_handler.get_access_token_for_user_id("user_a")
|
||||
self.hs.get_datastore().user_last_seen_monthly_active = Mock(
|
||||
return_value=defer.succeed(self.hs.get_clock().time_msec())
|
||||
)
|
||||
|
|
@ -185,7 +185,7 @@ class AuthTestCase(unittest.TestCase):
|
|||
return_value=defer.succeed(self.small_number_of_users)
|
||||
)
|
||||
# Ensure does not raise exception
|
||||
yield self.auth_handler.get_access_token_for_user_id('user_a')
|
||||
yield self.auth_handler.get_access_token_for_user_id("user_a")
|
||||
|
||||
self.hs.get_datastore().get_monthly_active_count = Mock(
|
||||
return_value=defer.succeed(self.small_number_of_users)
|
||||
|
|
|
|||
|
|
@ -132,7 +132,7 @@ class TestCreateAliasACL(unittest.HomeserverTestCase):
|
|||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
b"directory/room/%23test%3Atest",
|
||||
('{"room_id":"%s"}' % (room_id,)).encode('ascii'),
|
||||
('{"room_id":"%s"}' % (room_id,)).encode("ascii"),
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEquals(403, channel.code, channel.result)
|
||||
|
|
@ -143,7 +143,7 @@ class TestCreateAliasACL(unittest.HomeserverTestCase):
|
|||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
b"directory/room/%23unofficial_test%3Atest",
|
||||
('{"room_id":"%s"}' % (room_id,)).encode('ascii'),
|
||||
('{"room_id":"%s"}' % (room_id,)).encode("ascii"),
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEquals(200, channel.code, channel.result)
|
||||
|
|
@ -158,7 +158,7 @@ class TestRoomListSearchDisabled(unittest.HomeserverTestCase):
|
|||
room_id = self.helper.create_room_as(self.user_id)
|
||||
|
||||
request, channel = self.make_request(
|
||||
"PUT", b"directory/list/room/%s" % (room_id.encode('ascii'),), b'{}'
|
||||
"PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEquals(200, channel.code, channel.result)
|
||||
|
|
@ -190,7 +190,7 @@ class TestRoomListSearchDisabled(unittest.HomeserverTestCase):
|
|||
# Room list disabled so we shouldn't be allowed to publish rooms
|
||||
room_id = self.helper.create_room_as(self.user_id)
|
||||
request, channel = self.make_request(
|
||||
"PUT", b"directory/list/room/%s" % (room_id.encode('ascii'),), b'{}'
|
||||
"PUT", b"directory/list/room/%s" % (room_id.encode("ascii"),), b"{}"
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEquals(403, channel.code, channel.result)
|
||||
|
|
|
|||
|
|
@ -395,37 +395,37 @@ class E2eRoomKeysHandlerTestCase(unittest.TestCase):
|
|||
yield self.handler.upload_room_keys(self.local_user, version, room_keys)
|
||||
|
||||
new_room_keys = copy.deepcopy(room_keys)
|
||||
new_room_key = new_room_keys['rooms']['!abc:matrix.org']['sessions']['c0ff33']
|
||||
new_room_key = new_room_keys["rooms"]["!abc:matrix.org"]["sessions"]["c0ff33"]
|
||||
|
||||
# test that increasing the message_index doesn't replace the existing session
|
||||
new_room_key['first_message_index'] = 2
|
||||
new_room_key['session_data'] = 'new'
|
||||
new_room_key["first_message_index"] = 2
|
||||
new_room_key["session_data"] = "new"
|
||||
yield self.handler.upload_room_keys(self.local_user, version, new_room_keys)
|
||||
|
||||
res = yield self.handler.get_room_keys(self.local_user, version)
|
||||
self.assertEqual(
|
||||
res['rooms']['!abc:matrix.org']['sessions']['c0ff33']['session_data'],
|
||||
res["rooms"]["!abc:matrix.org"]["sessions"]["c0ff33"]["session_data"],
|
||||
"SSBBTSBBIEZJU0gK",
|
||||
)
|
||||
|
||||
# test that marking the session as verified however /does/ replace it
|
||||
new_room_key['is_verified'] = True
|
||||
new_room_key["is_verified"] = True
|
||||
yield self.handler.upload_room_keys(self.local_user, version, new_room_keys)
|
||||
|
||||
res = yield self.handler.get_room_keys(self.local_user, version)
|
||||
self.assertEqual(
|
||||
res['rooms']['!abc:matrix.org']['sessions']['c0ff33']['session_data'], "new"
|
||||
res["rooms"]["!abc:matrix.org"]["sessions"]["c0ff33"]["session_data"], "new"
|
||||
)
|
||||
|
||||
# test that a session with a higher forwarded_count doesn't replace one
|
||||
# with a lower forwarding count
|
||||
new_room_key['forwarded_count'] = 2
|
||||
new_room_key['session_data'] = 'other'
|
||||
new_room_key["forwarded_count"] = 2
|
||||
new_room_key["session_data"] = "other"
|
||||
yield self.handler.upload_room_keys(self.local_user, version, new_room_keys)
|
||||
|
||||
res = yield self.handler.get_room_keys(self.local_user, version)
|
||||
self.assertEqual(
|
||||
res['rooms']['!abc:matrix.org']['sessions']['c0ff33']['session_data'], "new"
|
||||
res["rooms"]["!abc:matrix.org"]["sessions"]["c0ff33"]["session_data"], "new"
|
||||
)
|
||||
|
||||
# TODO: check edge cases as well as the common variations here
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
self.mock_distributor.declare("registered_user")
|
||||
self.mock_captcha_client = Mock()
|
||||
self.macaroon_generator = Mock(
|
||||
generate_access_token=Mock(return_value='secret')
|
||||
generate_access_token=Mock(return_value="secret")
|
||||
)
|
||||
self.hs.get_macaroon_generator = Mock(return_value=self.macaroon_generator)
|
||||
self.handler = self.hs.get_registration_handler()
|
||||
|
|
@ -71,7 +71,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
self.assertEquals(result_user_id, user_id)
|
||||
self.assertTrue(result_token is not None)
|
||||
self.assertEquals(result_token, 'secret')
|
||||
self.assertEquals(result_token, "secret")
|
||||
|
||||
def test_if_user_exists(self):
|
||||
store = self.hs.get_datastore()
|
||||
|
|
@ -96,7 +96,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
self.hs.config.limit_usage_by_mau = False
|
||||
# Ensure does not throw exception
|
||||
self.get_success(
|
||||
self.handler.get_or_create_user(self.requester, 'a', "display_name")
|
||||
self.handler.get_or_create_user(self.requester, "a", "display_name")
|
||||
)
|
||||
|
||||
def test_get_or_create_user_mau_not_blocked(self):
|
||||
|
|
@ -105,7 +105,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
return_value=defer.succeed(self.hs.config.max_mau_value - 1)
|
||||
)
|
||||
# Ensure does not throw exception
|
||||
self.get_success(self.handler.get_or_create_user(self.requester, 'c', "User"))
|
||||
self.get_success(self.handler.get_or_create_user(self.requester, "c", "User"))
|
||||
|
||||
def test_get_or_create_user_mau_blocked(self):
|
||||
self.hs.config.limit_usage_by_mau = True
|
||||
|
|
@ -113,7 +113,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
return_value=defer.succeed(self.lots_of_users)
|
||||
)
|
||||
self.get_failure(
|
||||
self.handler.get_or_create_user(self.requester, 'b', "display_name"),
|
||||
self.handler.get_or_create_user(self.requester, "b", "display_name"),
|
||||
ResourceLimitError,
|
||||
)
|
||||
|
||||
|
|
@ -121,7 +121,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
return_value=defer.succeed(self.hs.config.max_mau_value)
|
||||
)
|
||||
self.get_failure(
|
||||
self.handler.get_or_create_user(self.requester, 'b', "display_name"),
|
||||
self.handler.get_or_create_user(self.requester, "b", "display_name"),
|
||||
ResourceLimitError,
|
||||
)
|
||||
|
||||
|
|
@ -144,13 +144,13 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
def test_auto_create_auto_join_rooms(self):
|
||||
room_alias_str = "#room:test"
|
||||
self.hs.config.auto_join_rooms = [room_alias_str]
|
||||
res = self.get_success(self.handler.register(localpart='jeff'))
|
||||
res = self.get_success(self.handler.register(localpart="jeff"))
|
||||
rooms = self.get_success(self.store.get_rooms_for_user(res[0]))
|
||||
directory_handler = self.hs.get_handlers().directory_handler
|
||||
room_alias = RoomAlias.from_string(room_alias_str)
|
||||
room_id = self.get_success(directory_handler.get_association(room_alias))
|
||||
|
||||
self.assertTrue(room_id['room_id'] in rooms)
|
||||
self.assertTrue(room_id["room_id"] in rooms)
|
||||
self.assertEqual(len(rooms), 1)
|
||||
|
||||
def test_auto_create_auto_join_rooms_with_no_rooms(self):
|
||||
|
|
@ -173,7 +173,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
self.hs.config.autocreate_auto_join_rooms = False
|
||||
room_alias_str = "#room:test"
|
||||
self.hs.config.auto_join_rooms = [room_alias_str]
|
||||
res = self.get_success(self.handler.register(localpart='jeff'))
|
||||
res = self.get_success(self.handler.register(localpart="jeff"))
|
||||
rooms = self.get_success(self.store.get_rooms_for_user(res[0]))
|
||||
self.assertEqual(len(rooms), 0)
|
||||
|
||||
|
|
@ -182,7 +182,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
self.hs.config.auto_join_rooms = [room_alias_str]
|
||||
|
||||
self.store.is_support_user = Mock(return_value=True)
|
||||
res = self.get_success(self.handler.register(localpart='support'))
|
||||
res = self.get_success(self.handler.register(localpart="support"))
|
||||
rooms = self.get_success(self.store.get_rooms_for_user(res[0]))
|
||||
self.assertEqual(len(rooms), 0)
|
||||
directory_handler = self.hs.get_handlers().directory_handler
|
||||
|
|
@ -211,7 +211,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# When:-
|
||||
# * the user is registered and post consent actions are called
|
||||
res = self.get_success(self.handler.register(localpart='jeff'))
|
||||
res = self.get_success(self.handler.register(localpart="jeff"))
|
||||
self.get_success(self.handler.post_consent_actions(res[0]))
|
||||
|
||||
# Then:-
|
||||
|
|
@ -221,17 +221,14 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
def test_register_support_user(self):
|
||||
res = self.get_success(
|
||||
self.handler.register(localpart='user', user_type=UserTypes.SUPPORT)
|
||||
self.handler.register(localpart="user", user_type=UserTypes.SUPPORT)
|
||||
)
|
||||
self.assertTrue(self.store.is_support_user(res[0]))
|
||||
|
||||
def test_register_not_support_user(self):
|
||||
res = self.get_success(self.handler.register(localpart='user'))
|
||||
res = self.get_success(self.handler.register(localpart="user"))
|
||||
self.assertFalse(self.store.is_support_user(res[0]))
|
||||
|
||||
def test_invalid_user_id_length(self):
|
||||
invalid_user_id = "x" * 256
|
||||
self.get_failure(
|
||||
self.handler.register(localpart=invalid_user_id),
|
||||
SynapseError
|
||||
)
|
||||
self.get_failure(self.handler.register(localpart=invalid_user_id), SynapseError)
|
||||
|
|
|
|||
|
|
@ -265,10 +265,7 @@ class StatsRoomTests(unittest.HomeserverTestCase):
|
|||
while not self.get_success(self.store.has_completed_background_updates()):
|
||||
self.get_success(self.store.do_next_background_update(100), by=0.1)
|
||||
|
||||
events = {
|
||||
"a1": None,
|
||||
"a2": {"membership": Membership.JOIN},
|
||||
}
|
||||
events = {"a1": None, "a2": {"membership": Membership.JOIN}}
|
||||
|
||||
def get_event(event_id, allow_none=True):
|
||||
if events.get(event_id):
|
||||
|
|
|
|||
|
|
@ -47,7 +47,7 @@ def _expect_edu_transaction(edu_type, content, origin="test"):
|
|||
|
||||
|
||||
def _make_edu_transaction_json(edu_type, content):
|
||||
return json.dumps(_expect_edu_transaction(edu_type, content)).encode('utf8')
|
||||
return json.dumps(_expect_edu_transaction(edu_type, content)).encode("utf8")
|
||||
|
||||
|
||||
class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
||||
|
|
@ -151,7 +151,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
)
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 1, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 1, rooms=[ROOM_ID])])
|
||||
|
||||
self.assertEquals(self.event_source.get_current_key(), 1)
|
||||
events = self.event_source.get_new_events(room_ids=[ROOM_ID], from_key=0)
|
||||
|
|
@ -209,12 +209,12 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
"typing": True,
|
||||
},
|
||||
),
|
||||
federation_auth_origin=b'farm',
|
||||
federation_auth_origin=b"farm",
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(channel.code, 200)
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 1, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 1, rooms=[ROOM_ID])])
|
||||
|
||||
self.assertEquals(self.event_source.get_current_key(), 1)
|
||||
events = self.event_source.get_new_events(room_ids=[ROOM_ID], from_key=0)
|
||||
|
|
@ -247,7 +247,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
)
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 1, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 1, rooms=[ROOM_ID])])
|
||||
|
||||
put_json = self.hs.get_http_client().put_json
|
||||
put_json.assert_called_once_with(
|
||||
|
|
@ -285,7 +285,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
)
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 1, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 1, rooms=[ROOM_ID])])
|
||||
self.on_new_event.reset_mock()
|
||||
|
||||
self.assertEquals(self.event_source.get_current_key(), 1)
|
||||
|
|
@ -303,7 +303,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
self.reactor.pump([16])
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 2, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 2, rooms=[ROOM_ID])])
|
||||
|
||||
self.assertEquals(self.event_source.get_current_key(), 2)
|
||||
events = self.event_source.get_new_events(room_ids=[ROOM_ID], from_key=1)
|
||||
|
|
@ -320,7 +320,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
)
|
||||
|
||||
self.on_new_event.assert_has_calls([call('typing_key', 3, rooms=[ROOM_ID])])
|
||||
self.on_new_event.assert_has_calls([call("typing_key", 3, rooms=[ROOM_ID])])
|
||||
self.on_new_event.reset_mock()
|
||||
|
||||
self.assertEquals(self.event_source.get_current_key(), 3)
|
||||
|
|
|
|||
|
|
@ -60,15 +60,15 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
|
|||
)
|
||||
profile = self.get_success(self.store.get_user_in_directory(support_user_id))
|
||||
self.assertTrue(profile is None)
|
||||
display_name = 'display_name'
|
||||
display_name = "display_name"
|
||||
|
||||
profile_info = ProfileInfo(avatar_url='avatar_url', display_name=display_name)
|
||||
regular_user_id = '@regular:test'
|
||||
profile_info = ProfileInfo(avatar_url="avatar_url", display_name=display_name)
|
||||
regular_user_id = "@regular:test"
|
||||
self.get_success(
|
||||
self.handler.handle_local_profile_change(regular_user_id, profile_info)
|
||||
)
|
||||
profile = self.get_success(self.store.get_user_in_directory(regular_user_id))
|
||||
self.assertTrue(profile['display_name'] == display_name)
|
||||
self.assertTrue(profile["display_name"] == display_name)
|
||||
|
||||
def test_handle_user_deactivated_support_user(self):
|
||||
s_user_id = "@support:test"
|
||||
|
|
|
|||
|
|
@ -53,13 +53,15 @@ def get_connection_factory():
|
|||
# this needs to happen once, but not until we are ready to run the first test
|
||||
global test_server_connection_factory
|
||||
if test_server_connection_factory is None:
|
||||
test_server_connection_factory = TestServerTLSConnectionFactory(sanlist=[
|
||||
b'DNS:testserv',
|
||||
b'DNS:target-server',
|
||||
b'DNS:xn--bcher-kva.com',
|
||||
b'IP:1.2.3.4',
|
||||
b'IP:::1',
|
||||
])
|
||||
test_server_connection_factory = TestServerTLSConnectionFactory(
|
||||
sanlist=[
|
||||
b"DNS:testserv",
|
||||
b"DNS:target-server",
|
||||
b"DNS:xn--bcher-kva.com",
|
||||
b"IP:1.2.3.4",
|
||||
b"IP:::1",
|
||||
]
|
||||
)
|
||||
return test_server_connection_factory
|
||||
|
||||
|
||||
|
|
@ -133,7 +135,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
Sends a simple GET request via the agent, and checks its logcontext management
|
||||
"""
|
||||
with LoggingContext("one") as context:
|
||||
fetch_d = self.agent.request(b'GET', uri)
|
||||
fetch_d = self.agent.request(b"GET", uri)
|
||||
|
||||
# Nothing happened yet
|
||||
self.assertNoResult(fetch_d)
|
||||
|
|
@ -177,9 +179,9 @@ class MatrixFederationAgentTests(TestCase):
|
|||
"""Check that an incoming request looks like a valid .well-known request, and
|
||||
send back the response.
|
||||
"""
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/.well-known/matrix/server')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'testserv'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/.well-known/matrix/server")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"testserv"])
|
||||
# send back a response
|
||||
for k, v in headers.items():
|
||||
request.setHeader(k, v)
|
||||
|
|
@ -202,7 +204,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
|
|
@ -210,20 +212,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'testserv:8448']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"testserv:8448"]
|
||||
)
|
||||
content = request.content.read()
|
||||
self.assertEqual(content, b'')
|
||||
self.assertEqual(content, b"")
|
||||
|
||||
# Deferred is still without a result
|
||||
self.assertNoResult(test_d)
|
||||
|
||||
# send the headers
|
||||
request.responseHeaders.setRawHeaders(b'Content-Type', [b'application/json'])
|
||||
request.write('')
|
||||
request.responseHeaders.setRawHeaders(b"Content-Type", [b"application/json"])
|
||||
request.write("")
|
||||
|
||||
self.reactor.pump((0.1,))
|
||||
|
||||
|
|
@ -233,7 +235,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
self.assertEqual(response.code, 200)
|
||||
|
||||
# Send the body
|
||||
request.write('{ "a": 1 }'.encode('ascii'))
|
||||
request.write('{ "a": 1 }'.encode("ascii"))
|
||||
request.finish()
|
||||
|
||||
self.reactor.pump((0.1,))
|
||||
|
|
@ -258,7 +260,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
|
|
@ -266,9 +268,9 @@ class MatrixFederationAgentTests(TestCase):
|
|||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'1.2.3.4'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"1.2.3.4"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -293,7 +295,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '::1')
|
||||
self.assertEqual(host, "::1")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
|
|
@ -301,9 +303,9 @@ class MatrixFederationAgentTests(TestCase):
|
|||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'[::1]'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"[::1]"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -328,7 +330,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '::1')
|
||||
self.assertEqual(host, "::1")
|
||||
self.assertEqual(port, 80)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
|
|
@ -336,9 +338,9 @@ class MatrixFederationAgentTests(TestCase):
|
|||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'[::1]:80'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"[::1]:80"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -364,7 +366,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
# fonx the connection
|
||||
|
|
@ -382,11 +384,11 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# we should fall back to a direct connection
|
||||
self.assertEqual(len(clients), 2)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[1]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(client_factory, expected_sni=b'testserv1')
|
||||
http_server = self._make_connection(client_factory, expected_sni=b"testserv1")
|
||||
|
||||
# there should be no requests
|
||||
self.assertEqual(len(http_server.requests), 0)
|
||||
|
|
@ -413,7 +415,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.5')
|
||||
self.assertEqual(host, "1.2.3.5")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
|
|
@ -447,7 +449,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
# fonx the connection
|
||||
|
|
@ -465,17 +467,17 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# we should fall back to a direct connection
|
||||
self.assertEqual(len(clients), 2)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[1]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(client_factory, expected_sni=b'testserv')
|
||||
http_server = self._make_connection(client_factory, expected_sni=b"testserv")
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'testserv'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"testserv"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -499,7 +501,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
self._handle_well_known_connection(
|
||||
|
|
@ -516,20 +518,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# now we should get a connection to the target server
|
||||
self.assertEqual(len(clients), 2)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[1]
|
||||
self.assertEqual(host, '1::f')
|
||||
self.assertEqual(host, "1::f")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(
|
||||
client_factory, expected_sni=b'target-server'
|
||||
client_factory, expected_sni=b"target-server"
|
||||
)
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'target-server']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"target-server"]
|
||||
)
|
||||
|
||||
# finish the request
|
||||
|
|
@ -561,7 +563,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop()
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
redirect_server = self._make_connection(
|
||||
|
|
@ -571,7 +573,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# send a 302 redirect
|
||||
self.assertEqual(len(redirect_server.requests), 1)
|
||||
request = redirect_server.requests[0]
|
||||
request.redirect(b'https://testserv/even_better_known')
|
||||
request.redirect(b"https://testserv/even_better_known")
|
||||
request.finish()
|
||||
|
||||
self.reactor.pump((0.1,))
|
||||
|
|
@ -580,7 +582,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop()
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
well_known_server = self._make_connection(
|
||||
|
|
@ -589,8 +591,8 @@ class MatrixFederationAgentTests(TestCase):
|
|||
|
||||
self.assertEqual(len(well_known_server.requests), 1, "No request after 302")
|
||||
request = well_known_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/even_better_known')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/even_better_known")
|
||||
request.write(b'{ "m.server": "target-server" }')
|
||||
request.finish()
|
||||
|
||||
|
|
@ -604,20 +606,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# now we should get a connection to the target server
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1::f')
|
||||
self.assertEqual(host, "1::f")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(
|
||||
client_factory, expected_sni=b'target-server'
|
||||
client_factory, expected_sni=b"target-server"
|
||||
)
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'target-server']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"target-server"]
|
||||
)
|
||||
|
||||
# finish the request
|
||||
|
|
@ -652,11 +654,11 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop()
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
self._handle_well_known_connection(
|
||||
client_factory, expected_sni=b"testserv", content=b'NOT JSON'
|
||||
client_factory, expected_sni=b"testserv", content=b"NOT JSON"
|
||||
)
|
||||
|
||||
# now there should be a SRV lookup
|
||||
|
|
@ -667,17 +669,17 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# we should fall back to a direct connection
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop()
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(client_factory, expected_sni=b'testserv')
|
||||
http_server = self._make_connection(client_factory, expected_sni=b"testserv")
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'testserv'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"testserv"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -712,12 +714,10 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
http_proto = self._make_connection(
|
||||
client_factory, expected_sni=b"testserv",
|
||||
)
|
||||
http_proto = self._make_connection(client_factory, expected_sni=b"testserv")
|
||||
|
||||
# there should be no requests
|
||||
self.assertEqual(len(http_proto.requests), 0)
|
||||
|
|
@ -750,17 +750,17 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8443)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(client_factory, expected_sni=b'testserv')
|
||||
http_server = self._make_connection(client_factory, expected_sni=b"testserv")
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b'host'), [b'testserv'])
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(request.requestHeaders.getRawHeaders(b"host"), [b"testserv"])
|
||||
|
||||
# finish the request
|
||||
request.finish()
|
||||
|
|
@ -783,7 +783,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
self.mock_resolver.resolve_service.side_effect = lambda _: [
|
||||
|
|
@ -804,20 +804,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
# now we should get a connection to the target of the SRV record
|
||||
self.assertEqual(len(clients), 2)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[1]
|
||||
self.assertEqual(host, '5.6.7.8')
|
||||
self.assertEqual(host, "5.6.7.8")
|
||||
self.assertEqual(port, 8443)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(
|
||||
client_factory, expected_sni=b'target-server'
|
||||
client_factory, expected_sni=b"target-server"
|
||||
)
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'target-server']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"target-server"]
|
||||
)
|
||||
|
||||
# finish the request
|
||||
|
|
@ -846,7 +846,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
# fonx the connection
|
||||
|
|
@ -865,20 +865,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 2)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[1]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8448)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(
|
||||
client_factory, expected_sni=b'xn--bcher-kva.com'
|
||||
client_factory, expected_sni=b"xn--bcher-kva.com"
|
||||
)
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'xn--bcher-kva.com']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"xn--bcher-kva.com"]
|
||||
)
|
||||
|
||||
# finish the request
|
||||
|
|
@ -907,20 +907,20 @@ class MatrixFederationAgentTests(TestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8443)
|
||||
|
||||
# make a test server, and wire up the client
|
||||
http_server = self._make_connection(
|
||||
client_factory, expected_sni=b'xn--bcher-kva.com'
|
||||
client_factory, expected_sni=b"xn--bcher-kva.com"
|
||||
)
|
||||
|
||||
self.assertEqual(len(http_server.requests), 1)
|
||||
request = http_server.requests[0]
|
||||
self.assertEqual(request.method, b'GET')
|
||||
self.assertEqual(request.path, b'/foo/bar')
|
||||
self.assertEqual(request.method, b"GET")
|
||||
self.assertEqual(request.path, b"/foo/bar")
|
||||
self.assertEqual(
|
||||
request.requestHeaders.getRawHeaders(b'host'), [b'xn--bcher-kva.com']
|
||||
request.requestHeaders.getRawHeaders(b"host"), [b"xn--bcher-kva.com"]
|
||||
)
|
||||
|
||||
# finish the request
|
||||
|
|
@ -941,42 +941,42 @@ class MatrixFederationAgentTests(TestCase):
|
|||
def test_well_known_cache(self):
|
||||
self.reactor.lookups["testserv"] = "1.2.3.4"
|
||||
|
||||
fetch_d = self.do_get_well_known(b'testserv')
|
||||
fetch_d = self.do_get_well_known(b"testserv")
|
||||
|
||||
# there should be an attempt to connect on port 443 for the .well-known
|
||||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop(0)
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
well_known_server = self._handle_well_known_connection(
|
||||
client_factory,
|
||||
expected_sni=b"testserv",
|
||||
response_headers={b'Cache-Control': b'max-age=10'},
|
||||
response_headers={b"Cache-Control": b"max-age=10"},
|
||||
content=b'{ "m.server": "target-server" }',
|
||||
)
|
||||
|
||||
r = self.successResultOf(fetch_d)
|
||||
self.assertEqual(r, b'target-server')
|
||||
self.assertEqual(r, b"target-server")
|
||||
|
||||
# close the tcp connection
|
||||
well_known_server.loseConnection()
|
||||
|
||||
# repeat the request: it should hit the cache
|
||||
fetch_d = self.do_get_well_known(b'testserv')
|
||||
fetch_d = self.do_get_well_known(b"testserv")
|
||||
r = self.successResultOf(fetch_d)
|
||||
self.assertEqual(r, b'target-server')
|
||||
self.assertEqual(r, b"target-server")
|
||||
|
||||
# expire the cache
|
||||
self.reactor.pump((10.0,))
|
||||
|
||||
# now it should connect again
|
||||
fetch_d = self.do_get_well_known(b'testserv')
|
||||
fetch_d = self.do_get_well_known(b"testserv")
|
||||
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, client_factory, _timeout, _bindAddress) = clients.pop(0)
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 443)
|
||||
|
||||
self._handle_well_known_connection(
|
||||
|
|
@ -986,7 +986,7 @@ class MatrixFederationAgentTests(TestCase):
|
|||
)
|
||||
|
||||
r = self.successResultOf(fetch_d)
|
||||
self.assertEqual(r, b'other-server')
|
||||
self.assertEqual(r, b"other-server")
|
||||
|
||||
|
||||
class TestCachePeriodFromHeaders(TestCase):
|
||||
|
|
@ -994,27 +994,27 @@ class TestCachePeriodFromHeaders(TestCase):
|
|||
# uppercase
|
||||
self.assertEqual(
|
||||
_cache_period_from_headers(
|
||||
Headers({b'Cache-Control': [b'foo, Max-Age = 100, bar']})
|
||||
Headers({b"Cache-Control": [b"foo, Max-Age = 100, bar"]})
|
||||
),
|
||||
100,
|
||||
)
|
||||
|
||||
# missing value
|
||||
self.assertIsNone(
|
||||
_cache_period_from_headers(Headers({b'Cache-Control': [b'max-age=, bar']}))
|
||||
_cache_period_from_headers(Headers({b"Cache-Control": [b"max-age=, bar"]}))
|
||||
)
|
||||
|
||||
# hackernews: bogus due to semicolon
|
||||
self.assertIsNone(
|
||||
_cache_period_from_headers(
|
||||
Headers({b'Cache-Control': [b'private; max-age=0']})
|
||||
Headers({b"Cache-Control": [b"private; max-age=0"]})
|
||||
)
|
||||
)
|
||||
|
||||
# github
|
||||
self.assertEqual(
|
||||
_cache_period_from_headers(
|
||||
Headers({b'Cache-Control': [b'max-age=0, private, must-revalidate']})
|
||||
Headers({b"Cache-Control": [b"max-age=0, private, must-revalidate"]})
|
||||
),
|
||||
0,
|
||||
)
|
||||
|
|
@ -1022,7 +1022,7 @@ class TestCachePeriodFromHeaders(TestCase):
|
|||
# google
|
||||
self.assertEqual(
|
||||
_cache_period_from_headers(
|
||||
Headers({b'cache-control': [b'private, max-age=0']})
|
||||
Headers({b"cache-control": [b"private, max-age=0"]})
|
||||
),
|
||||
0,
|
||||
)
|
||||
|
|
@ -1030,7 +1030,7 @@ class TestCachePeriodFromHeaders(TestCase):
|
|||
def test_expires(self):
|
||||
self.assertEqual(
|
||||
_cache_period_from_headers(
|
||||
Headers({b'Expires': [b'Wed, 30 Jan 2019 07:35:33 GMT']}),
|
||||
Headers({b"Expires": [b"Wed, 30 Jan 2019 07:35:33 GMT"]}),
|
||||
time_now=lambda: 1548833700,
|
||||
),
|
||||
33,
|
||||
|
|
@ -1041,8 +1041,8 @@ class TestCachePeriodFromHeaders(TestCase):
|
|||
_cache_period_from_headers(
|
||||
Headers(
|
||||
{
|
||||
b'cache-control': [b'max-age=10'],
|
||||
b'Expires': [b'Wed, 30 Jan 2019 07:35:33 GMT'],
|
||||
b"cache-control": [b"max-age=10"],
|
||||
b"Expires": [b"Wed, 30 Jan 2019 07:35:33 GMT"],
|
||||
}
|
||||
),
|
||||
time_now=lambda: 1548833700,
|
||||
|
|
@ -1051,7 +1051,7 @@ class TestCachePeriodFromHeaders(TestCase):
|
|||
)
|
||||
|
||||
# invalid expires means immediate expiry
|
||||
self.assertEqual(_cache_period_from_headers(Headers({b'Expires': [b'0']})), 0)
|
||||
self.assertEqual(_cache_period_from_headers(Headers({b"Expires": [b"0"]})), 0)
|
||||
|
||||
|
||||
def _check_logcontext(context):
|
||||
|
|
|
|||
|
|
@ -100,7 +100,7 @@ class SrvResolverTestCase(unittest.TestCase):
|
|||
def test_from_cache(self):
|
||||
clock = MockClock()
|
||||
|
||||
dns_client_mock = Mock(spec_set=['lookupService'])
|
||||
dns_client_mock = Mock(spec_set=["lookupService"])
|
||||
dns_client_mock.lookupService = Mock(spec_set=[])
|
||||
|
||||
service_name = b"test_service.example.com"
|
||||
|
|
|
|||
|
|
@ -20,12 +20,12 @@ from tests import unittest
|
|||
class ServerNameTestCase(unittest.TestCase):
|
||||
def test_parse_server_name(self):
|
||||
test_data = {
|
||||
'localhost': ('localhost', None),
|
||||
'my-example.com:1234': ('my-example.com', 1234),
|
||||
'1.2.3.4': ('1.2.3.4', None),
|
||||
'[0abc:1def::1234]': ('[0abc:1def::1234]', None),
|
||||
'1.2.3.4:1': ('1.2.3.4', 1),
|
||||
'[0abc:1def::1234]:8080': ('[0abc:1def::1234]', 8080),
|
||||
"localhost": ("localhost", None),
|
||||
"my-example.com:1234": ("my-example.com", 1234),
|
||||
"1.2.3.4": ("1.2.3.4", None),
|
||||
"[0abc:1def::1234]": ("[0abc:1def::1234]", None),
|
||||
"1.2.3.4:1": ("1.2.3.4", 1),
|
||||
"[0abc:1def::1234]:8080": ("[0abc:1def::1234]", 8080),
|
||||
}
|
||||
|
||||
for i, o in test_data.items():
|
||||
|
|
|
|||
|
|
@ -83,7 +83,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8008)
|
||||
|
||||
# complete the connection and wire it up to a fake transport
|
||||
|
|
@ -99,7 +99,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
self.assertNoResult(test_d)
|
||||
|
||||
# Send it the HTTP response
|
||||
res_json = '{ "a": 1 }'.encode('ascii')
|
||||
res_json = '{ "a": 1 }'.encode("ascii")
|
||||
protocol.dataReceived(
|
||||
b"HTTP/1.1 200 OK\r\n"
|
||||
b"Server: Fake\r\n"
|
||||
|
|
@ -138,7 +138,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
(host, port, factory, _timeout, _bindAddress) = clients[0]
|
||||
self.assertEqual(host, '1.2.3.4')
|
||||
self.assertEqual(host, "1.2.3.4")
|
||||
self.assertEqual(port, 8008)
|
||||
e = Exception("go away")
|
||||
factory.clientConnectionFailed(None, e)
|
||||
|
|
@ -164,7 +164,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
# Make sure treq is trying to connect
|
||||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
self.assertEqual(clients[0][0], '1.2.3.4')
|
||||
self.assertEqual(clients[0][0], "1.2.3.4")
|
||||
self.assertEqual(clients[0][1], 8008)
|
||||
|
||||
# Deferred is still without a result
|
||||
|
|
@ -194,7 +194,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
# Make sure treq is trying to connect
|
||||
clients = self.reactor.tcpClients
|
||||
self.assertEqual(len(clients), 1)
|
||||
self.assertEqual(clients[0][0], '1.2.3.4')
|
||||
self.assertEqual(clients[0][0], "1.2.3.4")
|
||||
self.assertEqual(clients[0][1], 8008)
|
||||
|
||||
conn = Mock()
|
||||
|
|
@ -215,10 +215,9 @@ class FederationClientTests(HomeserverTestCase):
|
|||
"""Ensure that Synapse does not try to connect to blacklisted IPs"""
|
||||
|
||||
# Set up the ip_range blacklist
|
||||
self.hs.config.federation_ip_range_blacklist = IPSet([
|
||||
"127.0.0.0/8",
|
||||
"fe80::/64",
|
||||
])
|
||||
self.hs.config.federation_ip_range_blacklist = IPSet(
|
||||
["127.0.0.0/8", "fe80::/64"]
|
||||
)
|
||||
self.reactor.lookups["internal"] = "127.0.0.1"
|
||||
self.reactor.lookups["internalv6"] = "fe80:0:0:0:0:8a2e:370:7337"
|
||||
self.reactor.lookups["fine"] = "10.20.30.40"
|
||||
|
|
@ -382,7 +381,7 @@ class FederationClientTests(HomeserverTestCase):
|
|||
b"Content-Type: application/json\r\n"
|
||||
b"Content-Length: 2\r\n"
|
||||
b"\r\n"
|
||||
b'{}'
|
||||
b"{}"
|
||||
)
|
||||
|
||||
# We should get a successful response
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ class EmailPusherTests(HomeserverTestCase):
|
|||
config["email"] = {
|
||||
"enable_notifs": True,
|
||||
"template_dir": os.path.abspath(
|
||||
pkg_resources.resource_filename('synapse', 'res/templates')
|
||||
pkg_resources.resource_filename("synapse", "res/templates")
|
||||
),
|
||||
"expiry_template_html": "notice_expiry.html",
|
||||
"expiry_template_text": "notice_expiry.txt",
|
||||
|
|
@ -120,7 +120,7 @@ class EmailPusherTests(HomeserverTestCase):
|
|||
# Create a simple room with two users
|
||||
room = self.helper.create_room_as(self.user_id, tok=self.access_token)
|
||||
self.helper.invite(
|
||||
room=room, src=self.user_id, tok=self.access_token, targ=self.others[0].id,
|
||||
room=room, src=self.user_id, tok=self.access_token, targ=self.others[0].id
|
||||
)
|
||||
self.helper.join(room=room, user=self.others[0].id, tok=self.others[0].token)
|
||||
|
||||
|
|
@ -141,7 +141,7 @@ class EmailPusherTests(HomeserverTestCase):
|
|||
|
||||
for other in self.others:
|
||||
self.helper.invite(
|
||||
room=room, src=self.user_id, tok=self.access_token, targ=other.id,
|
||||
room=room, src=self.user_id, tok=self.access_token, targ=other.id
|
||||
)
|
||||
self.helper.join(room=room, user=other.id, tok=other.token)
|
||||
|
||||
|
|
|
|||
|
|
@ -30,7 +30,7 @@ from tests import unittest
|
|||
|
||||
|
||||
class VersionTestCase(unittest.HomeserverTestCase):
|
||||
url = '/_synapse/admin/v1/server_version'
|
||||
url = "/_synapse/admin/v1/server_version"
|
||||
|
||||
def create_test_json_resource(self):
|
||||
resource = JsonResource(self.hs)
|
||||
|
|
@ -43,7 +43,7 @@ class VersionTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
self.assertEqual(200, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual(
|
||||
{'server_version', 'python_version'}, set(channel.json_body.keys())
|
||||
{"server_version", "python_version"}, set(channel.json_body.keys())
|
||||
)
|
||||
|
||||
|
||||
|
|
@ -68,7 +68,7 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
self.hs = self.setup_test_homeserver()
|
||||
|
||||
self.hs.config.registration_shared_secret = u"shared"
|
||||
self.hs.config.registration_shared_secret = "shared"
|
||||
|
||||
self.hs.get_media_repository = Mock()
|
||||
self.hs.get_deactivate_account_handler = Mock()
|
||||
|
|
@ -82,12 +82,12 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
"""
|
||||
self.hs.config.registration_shared_secret = None
|
||||
|
||||
request, channel = self.make_request("POST", self.url, b'{}')
|
||||
request, channel = self.make_request("POST", self.url, b"{}")
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual(
|
||||
'Shared secret registration is not enabled', channel.json_body["error"]
|
||||
"Shared secret registration is not enabled", channel.json_body["error"]
|
||||
)
|
||||
|
||||
def test_get_nonce(self):
|
||||
|
|
@ -118,20 +118,20 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
self.reactor.advance(59)
|
||||
|
||||
body = json.dumps({"nonce": nonce})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('username must be specified', channel.json_body["error"])
|
||||
self.assertEqual("username must be specified", channel.json_body["error"])
|
||||
|
||||
# 61 seconds
|
||||
self.reactor.advance(2)
|
||||
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('unrecognised nonce', channel.json_body["error"])
|
||||
self.assertEqual("unrecognised nonce", channel.json_body["error"])
|
||||
|
||||
def test_register_incorrect_nonce(self):
|
||||
"""
|
||||
|
|
@ -154,7 +154,7 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
"mac": want_mac,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(403, int(channel.result["code"]), msg=channel.result["body"])
|
||||
|
|
@ -171,7 +171,7 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
||||
want_mac.update(
|
||||
nonce.encode('ascii') + b"\x00bob\x00abc123\x00admin\x00support"
|
||||
nonce.encode("ascii") + b"\x00bob\x00abc123\x00admin\x00support"
|
||||
)
|
||||
want_mac = want_mac.hexdigest()
|
||||
|
||||
|
|
@ -185,7 +185,7 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
"mac": want_mac,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(200, int(channel.result["code"]), msg=channel.result["body"])
|
||||
|
|
@ -200,7 +200,7 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
nonce = channel.json_body["nonce"]
|
||||
|
||||
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
||||
want_mac.update(nonce.encode('ascii') + b"\x00bob\x00abc123\x00admin")
|
||||
want_mac.update(nonce.encode("ascii") + b"\x00bob\x00abc123\x00admin")
|
||||
want_mac = want_mac.hexdigest()
|
||||
|
||||
body = json.dumps(
|
||||
|
|
@ -212,18 +212,18 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
"mac": want_mac,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(200, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual("@bob:test", channel.json_body["user_id"])
|
||||
|
||||
# Now, try and reuse it
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('unrecognised nonce', channel.json_body["error"])
|
||||
self.assertEqual("unrecognised nonce", channel.json_body["error"])
|
||||
|
||||
def test_missing_parts(self):
|
||||
"""
|
||||
|
|
@ -243,11 +243,11 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# Must be present
|
||||
body = json.dumps({})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('nonce must be specified', channel.json_body["error"])
|
||||
self.assertEqual("nonce must be specified", channel.json_body["error"])
|
||||
|
||||
#
|
||||
# Username checks
|
||||
|
|
@ -255,35 +255,35 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# Must be present
|
||||
body = json.dumps({"nonce": nonce()})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('username must be specified', channel.json_body["error"])
|
||||
self.assertEqual("username must be specified", channel.json_body["error"])
|
||||
|
||||
# Must be a string
|
||||
body = json.dumps({"nonce": nonce(), "username": 1234})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid username', channel.json_body["error"])
|
||||
self.assertEqual("Invalid username", channel.json_body["error"])
|
||||
|
||||
# Must not have null bytes
|
||||
body = json.dumps({"nonce": nonce(), "username": u"abcd\u0000"})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
body = json.dumps({"nonce": nonce(), "username": "abcd\u0000"})
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid username', channel.json_body["error"])
|
||||
self.assertEqual("Invalid username", channel.json_body["error"])
|
||||
|
||||
# Must not have null bytes
|
||||
body = json.dumps({"nonce": nonce(), "username": "a" * 1000})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid username', channel.json_body["error"])
|
||||
self.assertEqual("Invalid username", channel.json_body["error"])
|
||||
|
||||
#
|
||||
# Password checks
|
||||
|
|
@ -291,37 +291,35 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# Must be present
|
||||
body = json.dumps({"nonce": nonce(), "username": "a"})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('password must be specified', channel.json_body["error"])
|
||||
self.assertEqual("password must be specified", channel.json_body["error"])
|
||||
|
||||
# Must be a string
|
||||
body = json.dumps({"nonce": nonce(), "username": "a", "password": 1234})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid password', channel.json_body["error"])
|
||||
self.assertEqual("Invalid password", channel.json_body["error"])
|
||||
|
||||
# Must not have null bytes
|
||||
body = json.dumps(
|
||||
{"nonce": nonce(), "username": "a", "password": u"abcd\u0000"}
|
||||
)
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
body = json.dumps({"nonce": nonce(), "username": "a", "password": "abcd\u0000"})
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid password', channel.json_body["error"])
|
||||
self.assertEqual("Invalid password", channel.json_body["error"])
|
||||
|
||||
# Super long
|
||||
body = json.dumps({"nonce": nonce(), "username": "a", "password": "A" * 1000})
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid password', channel.json_body["error"])
|
||||
self.assertEqual("Invalid password", channel.json_body["error"])
|
||||
|
||||
#
|
||||
# user_type check
|
||||
|
|
@ -336,11 +334,11 @@ class UserRegisterTestCase(unittest.HomeserverTestCase):
|
|||
"user_type": "invalid",
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request("POST", self.url, body.encode('utf8'))
|
||||
request, channel = self.make_request("POST", self.url, body.encode("utf8"))
|
||||
self.render(request)
|
||||
|
||||
self.assertEqual(400, int(channel.result["code"]), msg=channel.result["body"])
|
||||
self.assertEqual('Invalid user type', channel.json_body["error"])
|
||||
self.assertEqual("Invalid user type", channel.json_body["error"])
|
||||
|
||||
|
||||
class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
||||
|
|
@ -396,7 +394,7 @@ class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
|||
url = "admin/shutdown_room/" + room_id
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
url.encode('ascii'),
|
||||
url.encode("ascii"),
|
||||
json.dumps({"new_room_user_id": self.admin_user}),
|
||||
access_token=self.admin_user_tok,
|
||||
)
|
||||
|
|
@ -421,7 +419,7 @@ class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
|||
url = "rooms/%s/state/m.room.history_visibility" % (room_id,)
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
url.encode('ascii'),
|
||||
url.encode("ascii"),
|
||||
json.dumps({"history_visibility": "world_readable"}),
|
||||
access_token=self.other_user_token,
|
||||
)
|
||||
|
|
@ -432,7 +430,7 @@ class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
|||
url = "admin/shutdown_room/" + room_id
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
url.encode('ascii'),
|
||||
url.encode("ascii"),
|
||||
json.dumps({"new_room_user_id": self.admin_user}),
|
||||
access_token=self.admin_user_tok,
|
||||
)
|
||||
|
|
@ -449,7 +447,7 @@ class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
url = "rooms/%s/initialSync" % (room_id,)
|
||||
request, channel = self.make_request(
|
||||
"GET", url.encode('ascii'), access_token=self.admin_user_tok
|
||||
"GET", url.encode("ascii"), access_token=self.admin_user_tok
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(
|
||||
|
|
@ -458,7 +456,7 @@ class ShutdownRoomTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
url = "events?timeout=0&room_id=" + room_id
|
||||
request, channel = self.make_request(
|
||||
"GET", url.encode('ascii'), access_token=self.admin_user_tok
|
||||
"GET", url.encode("ascii"), access_token=self.admin_user_tok
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(
|
||||
|
|
@ -486,7 +484,7 @@ class DeleteGroupTestCase(unittest.HomeserverTestCase):
|
|||
# Create a new group
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
"/create_group".encode('ascii'),
|
||||
"/create_group".encode("ascii"),
|
||||
access_token=self.admin_user_tok,
|
||||
content={"localpart": "test"},
|
||||
)
|
||||
|
|
@ -502,14 +500,14 @@ class DeleteGroupTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
url = "/groups/%s/admin/users/invite/%s" % (group_id, self.other_user)
|
||||
request, channel = self.make_request(
|
||||
"PUT", url.encode('ascii'), access_token=self.admin_user_tok, content={}
|
||||
"PUT", url.encode("ascii"), access_token=self.admin_user_tok, content={}
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(200, int(channel.result["code"]), msg=channel.result["body"])
|
||||
|
||||
url = "/groups/%s/self/accept_invite" % (group_id,)
|
||||
request, channel = self.make_request(
|
||||
"PUT", url.encode('ascii'), access_token=self.other_user_token, content={}
|
||||
"PUT", url.encode("ascii"), access_token=self.other_user_token, content={}
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(200, int(channel.result["code"]), msg=channel.result["body"])
|
||||
|
|
@ -522,7 +520,7 @@ class DeleteGroupTestCase(unittest.HomeserverTestCase):
|
|||
url = "/admin/delete_group/" + group_id
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
url.encode('ascii'),
|
||||
url.encode("ascii"),
|
||||
access_token=self.admin_user_tok,
|
||||
content={"localpart": "test"},
|
||||
)
|
||||
|
|
@ -544,7 +542,7 @@ class DeleteGroupTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
url = "/groups/%s/profile" % (group_id,)
|
||||
request, channel = self.make_request(
|
||||
"GET", url.encode('ascii'), access_token=self.admin_user_tok
|
||||
"GET", url.encode("ascii"), access_token=self.admin_user_tok
|
||||
)
|
||||
|
||||
self.render(request)
|
||||
|
|
@ -556,7 +554,7 @@ class DeleteGroupTestCase(unittest.HomeserverTestCase):
|
|||
"""Returns the list of groups the user is in (given their access token)
|
||||
"""
|
||||
request, channel = self.make_request(
|
||||
"GET", "/joined_groups".encode('ascii'), access_token=access_token
|
||||
"GET", "/joined_groups".encode("ascii"), access_token=access_token
|
||||
)
|
||||
|
||||
self.render(request)
|
||||
|
|
|
|||
|
|
@ -42,17 +42,17 @@ class ConsentResourceTestCase(unittest.HomeserverTestCase):
|
|||
# Make some temporary templates...
|
||||
temp_consent_path = self.mktemp()
|
||||
os.mkdir(temp_consent_path)
|
||||
os.mkdir(os.path.join(temp_consent_path, 'en'))
|
||||
os.mkdir(os.path.join(temp_consent_path, "en"))
|
||||
|
||||
config["user_consent"] = {
|
||||
"version": "1",
|
||||
"template_dir": os.path.abspath(temp_consent_path),
|
||||
}
|
||||
|
||||
with open(os.path.join(temp_consent_path, "en/1.html"), 'w') as f:
|
||||
with open(os.path.join(temp_consent_path, "en/1.html"), "w") as f:
|
||||
f.write("{{version}},{{has_consented}}")
|
||||
|
||||
with open(os.path.join(temp_consent_path, "en/success.html"), 'w') as f:
|
||||
with open(os.path.join(temp_consent_path, "en/success.html"), "w") as f:
|
||||
f.write("yay!")
|
||||
|
||||
hs = self.setup_test_homeserver(config=config)
|
||||
|
|
@ -88,7 +88,7 @@ class ConsentResourceTestCase(unittest.HomeserverTestCase):
|
|||
self.assertEqual(channel.code, 200)
|
||||
|
||||
# Get the version from the body, and whether we've consented
|
||||
version, consented = channel.result["body"].decode('ascii').split(",")
|
||||
version, consented = channel.result["body"].decode("ascii").split(",")
|
||||
self.assertEqual(consented, "False")
|
||||
|
||||
# POST to the consent page, saying we've agreed
|
||||
|
|
@ -111,6 +111,6 @@ class ConsentResourceTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# Get the version from the body, and check that it's the version we
|
||||
# agreed to, and that we've consented to it.
|
||||
version, consented = channel.result["body"].decode('ascii').split(",")
|
||||
version, consented = channel.result["body"].decode("ascii").split(",")
|
||||
self.assertEqual(consented, "True")
|
||||
self.assertEqual(version, "1")
|
||||
|
|
|
|||
|
|
@ -56,7 +56,7 @@ class IdentityTestCase(unittest.HomeserverTestCase):
|
|||
"address": "test@example.com",
|
||||
}
|
||||
request_data = json.dumps(params)
|
||||
request_url = ("/rooms/%s/invite" % (room_id)).encode('ascii')
|
||||
request_url = ("/rooms/%s/invite" % (room_id)).encode("ascii")
|
||||
request, channel = self.make_request(
|
||||
b"POST", request_url, request_data, access_token=tok
|
||||
)
|
||||
|
|
|
|||
|
|
@ -183,7 +183,7 @@ class ProfileTestCase(unittest.HomeserverTestCase):
|
|||
def test_set_displayname(self):
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
"/profile/%s/displayname" % (self.owner, ),
|
||||
"/profile/%s/displayname" % (self.owner,),
|
||||
content=json.dumps({"displayname": "test"}),
|
||||
access_token=self.owner_tok,
|
||||
)
|
||||
|
|
@ -197,7 +197,7 @@ class ProfileTestCase(unittest.HomeserverTestCase):
|
|||
"""Attempts to set a stupid displayname should get a 400"""
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
"/profile/%s/displayname" % (self.owner, ),
|
||||
"/profile/%s/displayname" % (self.owner,),
|
||||
content=json.dumps({"displayname": "test" * 100}),
|
||||
access_token=self.owner_tok,
|
||||
)
|
||||
|
|
@ -209,8 +209,7 @@ class ProfileTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
def get_displayname(self):
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/profile/%s/displayname" % (self.owner, ),
|
||||
"GET", "/profile/%s/displayname" % (self.owner,)
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(channel.code, 200, channel.result)
|
||||
|
|
|
|||
|
|
@ -79,7 +79,7 @@ class RoomPermissionsTestCase(RoomBase):
|
|||
# send a message in one of the rooms
|
||||
self.created_rmid_msg_path = (
|
||||
"rooms/%s/send/m.room.message/a1" % (self.created_rmid)
|
||||
).encode('ascii')
|
||||
).encode("ascii")
|
||||
request, channel = self.make_request(
|
||||
"PUT", self.created_rmid_msg_path, b'{"msgtype":"m.text","body":"test msg"}'
|
||||
)
|
||||
|
|
@ -89,7 +89,7 @@ class RoomPermissionsTestCase(RoomBase):
|
|||
# set topic for public room
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
("rooms/%s/state/m.room.topic" % self.created_public_rmid).encode('ascii'),
|
||||
("rooms/%s/state/m.room.topic" % self.created_public_rmid).encode("ascii"),
|
||||
b'{"topic":"Public Room Topic"}',
|
||||
)
|
||||
self.render(request)
|
||||
|
|
@ -193,7 +193,7 @@ class RoomPermissionsTestCase(RoomBase):
|
|||
request, channel = self.make_request("GET", topic_path)
|
||||
self.render(request)
|
||||
self.assertEquals(200, channel.code, msg=channel.result["body"])
|
||||
self.assert_dict(json.loads(topic_content.decode('utf8')), channel.json_body)
|
||||
self.assert_dict(json.loads(topic_content.decode("utf8")), channel.json_body)
|
||||
|
||||
# set/get topic in created PRIVATE room and left, expect 403
|
||||
self.helper.leave(room=self.created_rmid, user=self.user_id)
|
||||
|
|
@ -497,7 +497,7 @@ class RoomTopicTestCase(RoomBase):
|
|||
|
||||
def test_invalid_puts(self):
|
||||
# missing keys or invalid json
|
||||
request, channel = self.make_request("PUT", self.path, '{}')
|
||||
request, channel = self.make_request("PUT", self.path, "{}")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -515,11 +515,11 @@ class RoomTopicTestCase(RoomBase):
|
|||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", self.path, 'text only')
|
||||
request, channel = self.make_request("PUT", self.path, "text only")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", self.path, '')
|
||||
request, channel = self.make_request("PUT", self.path, "")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -572,7 +572,7 @@ class RoomMemberStateTestCase(RoomBase):
|
|||
def test_invalid_puts(self):
|
||||
path = "/rooms/%s/state/m.room.member/%s" % (self.room_id, self.user_id)
|
||||
# missing keys or invalid json
|
||||
request, channel = self.make_request("PUT", path, '{}')
|
||||
request, channel = self.make_request("PUT", path, "{}")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -590,11 +590,11 @@ class RoomMemberStateTestCase(RoomBase):
|
|||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", path, 'text only')
|
||||
request, channel = self.make_request("PUT", path, "text only")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", path, '')
|
||||
request, channel = self.make_request("PUT", path, "")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -604,7 +604,7 @@ class RoomMemberStateTestCase(RoomBase):
|
|||
Membership.JOIN,
|
||||
Membership.LEAVE,
|
||||
)
|
||||
request, channel = self.make_request("PUT", path, content.encode('ascii'))
|
||||
request, channel = self.make_request("PUT", path, content.encode("ascii"))
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -616,7 +616,7 @@ class RoomMemberStateTestCase(RoomBase):
|
|||
|
||||
# valid join message (NOOP since we made the room)
|
||||
content = '{"membership":"%s"}' % Membership.JOIN
|
||||
request, channel = self.make_request("PUT", path, content.encode('ascii'))
|
||||
request, channel = self.make_request("PUT", path, content.encode("ascii"))
|
||||
self.render(request)
|
||||
self.assertEquals(200, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -678,7 +678,7 @@ class RoomMessagesTestCase(RoomBase):
|
|||
def test_invalid_puts(self):
|
||||
path = "/rooms/%s/send/m.room.message/mid1" % (urlparse.quote(self.room_id))
|
||||
# missing keys or invalid json
|
||||
request, channel = self.make_request("PUT", path, b'{}')
|
||||
request, channel = self.make_request("PUT", path, b"{}")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -696,11 +696,11 @@ class RoomMessagesTestCase(RoomBase):
|
|||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", path, b'text only')
|
||||
request, channel = self.make_request("PUT", path, b"text only")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
request, channel = self.make_request("PUT", path, b'')
|
||||
request, channel = self.make_request("PUT", path, b"")
|
||||
self.render(request)
|
||||
self.assertEquals(400, channel.code, msg=channel.result["body"])
|
||||
|
||||
|
|
@ -786,7 +786,7 @@ class RoomMessageListTestCase(RoomBase):
|
|||
self.render(request)
|
||||
self.assertEquals(200, channel.code)
|
||||
self.assertTrue("start" in channel.json_body)
|
||||
self.assertEquals(token, channel.json_body['start'])
|
||||
self.assertEquals(token, channel.json_body["start"])
|
||||
self.assertTrue("chunk" in channel.json_body)
|
||||
self.assertTrue("end" in channel.json_body)
|
||||
|
||||
|
|
@ -798,7 +798,7 @@ class RoomMessageListTestCase(RoomBase):
|
|||
self.render(request)
|
||||
self.assertEquals(200, channel.code)
|
||||
self.assertTrue("start" in channel.json_body)
|
||||
self.assertEquals(token, channel.json_body['start'])
|
||||
self.assertEquals(token, channel.json_body["start"])
|
||||
self.assertTrue("chunk" in channel.json_body)
|
||||
self.assertTrue("end" in channel.json_body)
|
||||
|
||||
|
|
@ -961,9 +961,7 @@ class PerRoomProfilesForbiddenTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
# Set a profile for the test user
|
||||
self.displayname = "test user"
|
||||
data = {
|
||||
"displayname": self.displayname,
|
||||
}
|
||||
data = {"displayname": self.displayname}
|
||||
request_data = json.dumps(data)
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
|
|
@ -977,16 +975,12 @@ class PerRoomProfilesForbiddenTestCase(unittest.HomeserverTestCase):
|
|||
self.room_id = self.helper.create_room_as(self.user_id, tok=self.tok)
|
||||
|
||||
def test_per_room_profile_forbidden(self):
|
||||
data = {
|
||||
"membership": "join",
|
||||
"displayname": "other test user"
|
||||
}
|
||||
data = {"membership": "join", "displayname": "other test user"}
|
||||
request_data = json.dumps(data)
|
||||
request, channel = self.make_request(
|
||||
"PUT",
|
||||
"/_matrix/client/r0/rooms/%s/state/m.room.member/%s" % (
|
||||
self.room_id, self.user_id,
|
||||
),
|
||||
"/_matrix/client/r0/rooms/%s/state/m.room.member/%s"
|
||||
% (self.room_id, self.user_id),
|
||||
request_data,
|
||||
access_token=self.tok,
|
||||
)
|
||||
|
|
|
|||
|
|
@ -44,7 +44,7 @@ class RestHelper(object):
|
|||
path = path + "?access_token=%s" % tok
|
||||
|
||||
request, channel = make_request(
|
||||
self.hs.get_reactor(), "POST", path, json.dumps(content).encode('utf8')
|
||||
self.hs.get_reactor(), "POST", path, json.dumps(content).encode("utf8")
|
||||
)
|
||||
render(request, self.resource, self.hs.get_reactor())
|
||||
|
||||
|
|
@ -93,7 +93,7 @@ class RestHelper(object):
|
|||
data = {"membership": membership}
|
||||
|
||||
request, channel = make_request(
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(data).encode('utf8')
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(data).encode("utf8")
|
||||
)
|
||||
|
||||
render(request, self.resource, self.hs.get_reactor())
|
||||
|
|
@ -117,7 +117,7 @@ class RestHelper(object):
|
|||
path = path + "?access_token=%s" % tok
|
||||
|
||||
request, channel = make_request(
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(content).encode('utf8')
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(content).encode("utf8")
|
||||
)
|
||||
render(request, self.resource, self.hs.get_reactor())
|
||||
|
||||
|
|
@ -134,7 +134,7 @@ class RestHelper(object):
|
|||
path = path + "?access_token=%s" % tok
|
||||
|
||||
request, channel = make_request(
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(body).encode('utf8')
|
||||
self.hs.get_reactor(), "PUT", path, json.dumps(body).encode("utf8")
|
||||
)
|
||||
render(request, self.resource, self.hs.get_reactor())
|
||||
|
||||
|
|
|
|||
|
|
@ -135,9 +135,7 @@ class PasswordResetTestCase(unittest.HomeserverTestCase):
|
|||
self.assertEquals(len(self.email_attempts), 1)
|
||||
|
||||
# Attempt to reset password without clicking the link
|
||||
self._reset_password(
|
||||
new_password, session_id, client_secret, expected_code=401,
|
||||
)
|
||||
self._reset_password(new_password, session_id, client_secret, expected_code=401)
|
||||
|
||||
# Assert we can log in with the old password
|
||||
self.login("kermit", old_password)
|
||||
|
|
@ -172,9 +170,7 @@ class PasswordResetTestCase(unittest.HomeserverTestCase):
|
|||
session_id = "weasle"
|
||||
|
||||
# Attempt to reset password without even requesting an email
|
||||
self._reset_password(
|
||||
new_password, session_id, client_secret, expected_code=401,
|
||||
)
|
||||
self._reset_password(new_password, session_id, client_secret, expected_code=401)
|
||||
|
||||
# Assert we can log in with the old password
|
||||
self.login("kermit", old_password)
|
||||
|
|
@ -258,19 +254,18 @@ class DeactivateTestCase(unittest.HomeserverTestCase):
|
|||
user_id = self.register_user("kermit", "test")
|
||||
tok = self.login("kermit", "test")
|
||||
|
||||
request_data = json.dumps({
|
||||
"auth": {
|
||||
"type": "m.login.password",
|
||||
"user": user_id,
|
||||
"password": "test",
|
||||
},
|
||||
"erase": False,
|
||||
})
|
||||
request_data = json.dumps(
|
||||
{
|
||||
"auth": {
|
||||
"type": "m.login.password",
|
||||
"user": user_id,
|
||||
"password": "test",
|
||||
},
|
||||
"erase": False,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
"account/deactivate",
|
||||
request_data,
|
||||
access_token=tok,
|
||||
"POST", "account/deactivate", request_data, access_token=tok
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(request.code, 200)
|
||||
|
|
|
|||
|
|
@ -47,15 +47,15 @@ class CapabilitiesTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
request, channel = self.make_request("GET", self.url, access_token=access_token)
|
||||
self.render(request)
|
||||
capabilities = channel.json_body['capabilities']
|
||||
capabilities = channel.json_body["capabilities"]
|
||||
|
||||
self.assertEqual(channel.code, 200)
|
||||
for room_version in capabilities['m.room_versions']['available'].keys():
|
||||
for room_version in capabilities["m.room_versions"]["available"].keys():
|
||||
self.assertTrue(room_version in KNOWN_ROOM_VERSIONS, "" + room_version)
|
||||
|
||||
self.assertEqual(
|
||||
self.config.default_room_version.identifier,
|
||||
capabilities['m.room_versions']['default'],
|
||||
capabilities["m.room_versions"]["default"],
|
||||
)
|
||||
|
||||
def test_get_change_password_capabilities(self):
|
||||
|
|
@ -66,16 +66,16 @@ class CapabilitiesTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
request, channel = self.make_request("GET", self.url, access_token=access_token)
|
||||
self.render(request)
|
||||
capabilities = channel.json_body['capabilities']
|
||||
capabilities = channel.json_body["capabilities"]
|
||||
|
||||
self.assertEqual(channel.code, 200)
|
||||
|
||||
# Test case where password is handled outside of Synapse
|
||||
self.assertTrue(capabilities['m.change_password']['enabled'])
|
||||
self.assertTrue(capabilities["m.change_password"]["enabled"])
|
||||
self.get_success(self.store.user_set_password_hash(user, None))
|
||||
request, channel = self.make_request("GET", self.url, access_token=access_token)
|
||||
self.render(request)
|
||||
capabilities = channel.json_body['capabilities']
|
||||
capabilities = channel.json_body["capabilities"]
|
||||
|
||||
self.assertEqual(channel.code, 200)
|
||||
self.assertFalse(capabilities['m.change_password']['enabled'])
|
||||
self.assertFalse(capabilities["m.change_password"]["enabled"])
|
||||
|
|
|
|||
|
|
@ -335,7 +335,7 @@ class AccountValidityRenewalByEmailTestCase(unittest.HomeserverTestCase):
|
|||
config["email"] = {
|
||||
"enable_notifs": True,
|
||||
"template_dir": os.path.abspath(
|
||||
pkg_resources.resource_filename('synapse', 'res/templates')
|
||||
pkg_resources.resource_filename("synapse", "res/templates")
|
||||
),
|
||||
"expiry_template_html": "notice_expiry.html",
|
||||
"expiry_template_text": "notice_expiry.txt",
|
||||
|
|
@ -400,19 +400,18 @@ class AccountValidityRenewalByEmailTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
(user_id, tok) = self.create_user()
|
||||
|
||||
request_data = json.dumps({
|
||||
"auth": {
|
||||
"type": "m.login.password",
|
||||
"user": user_id,
|
||||
"password": "monkey",
|
||||
},
|
||||
"erase": False,
|
||||
})
|
||||
request_data = json.dumps(
|
||||
{
|
||||
"auth": {
|
||||
"type": "m.login.password",
|
||||
"user": user_id,
|
||||
"password": "monkey",
|
||||
},
|
||||
"erase": False,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request(
|
||||
"POST",
|
||||
"account/deactivate",
|
||||
request_data,
|
||||
access_token=tok,
|
||||
"POST", "account/deactivate", request_data, access_token=tok
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(request.code, 200)
|
||||
|
|
@ -476,20 +475,16 @@ class AccountValidityRenewalByEmailTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
class AccountValidityBackgroundJobTestCase(unittest.HomeserverTestCase):
|
||||
|
||||
servlets = [
|
||||
synapse.rest.admin.register_servlets_for_client_rest_resource,
|
||||
]
|
||||
servlets = [synapse.rest.admin.register_servlets_for_client_rest_resource]
|
||||
|
||||
def make_homeserver(self, reactor, clock):
|
||||
self.validity_period = 10
|
||||
self.max_delta = self.validity_period * 10. / 100.
|
||||
self.max_delta = self.validity_period * 10.0 / 100.0
|
||||
|
||||
config = self.default_config()
|
||||
|
||||
config["enable_registration"] = True
|
||||
config["account_validity"] = {
|
||||
"enabled": False,
|
||||
}
|
||||
config["account_validity"] = {"enabled": False}
|
||||
|
||||
self.hs = self.setup_test_homeserver(config=config)
|
||||
self.hs.config.account_validity.period = self.validity_period
|
||||
|
|
|
|||
|
|
@ -56,7 +56,7 @@ class RelationsTestCase(unittest.HomeserverTestCase):
|
|||
creates the right shape of event.
|
||||
"""
|
||||
|
||||
channel = self._send_relation(RelationTypes.ANNOTATION, "m.reaction", key=u"👍")
|
||||
channel = self._send_relation(RelationTypes.ANNOTATION, "m.reaction", key="👍")
|
||||
self.assertEquals(200, channel.code, channel.json_body)
|
||||
|
||||
event_id = channel.json_body["event_id"]
|
||||
|
|
@ -76,7 +76,7 @@ class RelationsTestCase(unittest.HomeserverTestCase):
|
|||
"content": {
|
||||
"m.relates_to": {
|
||||
"event_id": self.parent_id,
|
||||
"key": u"👍",
|
||||
"key": "👍",
|
||||
"rel_type": RelationTypes.ANNOTATION,
|
||||
}
|
||||
},
|
||||
|
|
@ -187,7 +187,7 @@ class RelationsTestCase(unittest.HomeserverTestCase):
|
|||
access_tokens.append(token)
|
||||
|
||||
idx = 0
|
||||
sent_groups = {u"👍": 10, u"a": 7, u"b": 5, u"c": 3, u"d": 2, u"e": 1}
|
||||
sent_groups = {"👍": 10, "a": 7, "b": 5, "c": 3, "d": 2, "e": 1}
|
||||
for key in itertools.chain.from_iterable(
|
||||
itertools.repeat(key, num) for key, num in sent_groups.items()
|
||||
):
|
||||
|
|
@ -259,7 +259,7 @@ class RelationsTestCase(unittest.HomeserverTestCase):
|
|||
channel = self._send_relation(
|
||||
RelationTypes.ANNOTATION,
|
||||
"m.reaction",
|
||||
key=u"👍",
|
||||
key="👍",
|
||||
access_token=access_tokens[idx],
|
||||
)
|
||||
self.assertEquals(200, channel.code, channel.json_body)
|
||||
|
|
@ -273,7 +273,7 @@ class RelationsTestCase(unittest.HomeserverTestCase):
|
|||
|
||||
prev_token = None
|
||||
found_event_ids = []
|
||||
encoded_key = six.moves.urllib.parse.quote_plus(u"👍".encode("utf-8"))
|
||||
encoded_key = six.moves.urllib.parse.quote_plus("👍".encode("utf-8"))
|
||||
for _ in range(20):
|
||||
from_token = ""
|
||||
if prev_token:
|
||||
|
|
|
|||
|
|
@ -21,17 +21,17 @@ from tests import unittest
|
|||
class GetFileNameFromHeadersTests(unittest.TestCase):
|
||||
# input -> expected result
|
||||
TEST_CASES = {
|
||||
b"inline; filename=abc.txt": u"abc.txt",
|
||||
b'inline; filename="azerty"': u"azerty",
|
||||
b'inline; filename="aze%20rty"': u"aze%20rty",
|
||||
b'inline; filename="aze\"rty"': u'aze"rty',
|
||||
b'inline; filename="azer;ty"': u"azer;ty",
|
||||
b"inline; filename*=utf-8''foo%C2%A3bar": u"foo£bar",
|
||||
b"inline; filename=abc.txt": "abc.txt",
|
||||
b'inline; filename="azerty"': "azerty",
|
||||
b'inline; filename="aze%20rty"': "aze%20rty",
|
||||
b'inline; filename="aze"rty"': 'aze"rty',
|
||||
b'inline; filename="azer;ty"': "azer;ty",
|
||||
b"inline; filename*=utf-8''foo%C2%A3bar": "foo£bar",
|
||||
}
|
||||
|
||||
def tests(self):
|
||||
for hdr, expected in self.TEST_CASES.items():
|
||||
res = get_filename_from_headers({b'Content-Disposition': [hdr]})
|
||||
res = get_filename_from_headers({b"Content-Disposition": [hdr]})
|
||||
self.assertEqual(
|
||||
res,
|
||||
expected,
|
||||
|
|
|
|||
|
|
@ -143,7 +143,7 @@ class MediaRepoTests(unittest.HomeserverTestCase):
|
|||
def prepare(self, reactor, clock, hs):
|
||||
|
||||
self.media_repo = hs.get_media_repository_resource()
|
||||
self.download_resource = self.media_repo.children[b'download']
|
||||
self.download_resource = self.media_repo.children[b"download"]
|
||||
|
||||
# smol png
|
||||
self.end_content = unhexlify(
|
||||
|
|
@ -171,7 +171,7 @@ class MediaRepoTests(unittest.HomeserverTestCase):
|
|||
|
||||
headers = {
|
||||
b"Content-Length": [b"%d" % (len(self.end_content))],
|
||||
b"Content-Type": [b'image/png'],
|
||||
b"Content-Type": [b"image/png"],
|
||||
}
|
||||
if content_disposition:
|
||||
headers[b"Content-Disposition"] = [content_disposition]
|
||||
|
|
@ -204,7 +204,7 @@ class MediaRepoTests(unittest.HomeserverTestCase):
|
|||
correctly decode it as the UTF-8 string, and use filename* in the
|
||||
response.
|
||||
"""
|
||||
filename = parse.quote(u"\u2603".encode('utf8')).encode('ascii')
|
||||
filename = parse.quote("\u2603".encode("utf8")).encode("ascii")
|
||||
channel = self._req(b"inline; filename*=utf-8''" + filename + b".png")
|
||||
|
||||
headers = channel.headers
|
||||
|
|
|
|||
|
|
@ -55,10 +55,10 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
hijack_auth = True
|
||||
user_id = "@test:user"
|
||||
end_content = (
|
||||
b'<html><head>'
|
||||
b"<html><head>"
|
||||
b'<meta property="og:title" content="~matrix~" />'
|
||||
b'<meta property="og:description" content="hi" />'
|
||||
b'</head></html>'
|
||||
b"</head></html>"
|
||||
)
|
||||
|
||||
def make_homeserver(self, reactor, clock):
|
||||
|
|
@ -98,7 +98,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
def prepare(self, reactor, clock, hs):
|
||||
|
||||
self.media_repo = hs.get_media_repository_resource()
|
||||
self.preview_url = self.media_repo.children[b'preview_url']
|
||||
self.preview_url = self.media_repo.children[b"preview_url"]
|
||||
|
||||
self.lookups = {}
|
||||
|
||||
|
|
@ -109,7 +109,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
hostName,
|
||||
portNumber=0,
|
||||
addressTypes=None,
|
||||
transportSemantics='TCP',
|
||||
transportSemantics="TCP",
|
||||
):
|
||||
|
||||
resolution = HostResolution(hostName)
|
||||
|
|
@ -118,7 +118,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
raise DNSLookupError("OH NO")
|
||||
|
||||
for i in self.lookups[hostName]:
|
||||
resolutionReceiver.addressResolved(i[0]('TCP', i[1], portNumber))
|
||||
resolutionReceiver.addressResolved(i[0]("TCP", i[1], portNumber))
|
||||
resolutionReceiver.resolutionComplete()
|
||||
return resolutionReceiver
|
||||
|
||||
|
|
@ -184,11 +184,11 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.lookups["matrix.org"] = [(IPv4Address, "8.8.8.8")]
|
||||
|
||||
end_content = (
|
||||
b'<html><head>'
|
||||
b"<html><head>"
|
||||
b'<meta http-equiv="Content-Type" content="text/html; charset=windows-1251"/>'
|
||||
b'<meta property="og:title" content="\xe4\xea\xe0" />'
|
||||
b'<meta property="og:description" content="hi" />'
|
||||
b'</head></html>'
|
||||
b"</head></html>"
|
||||
)
|
||||
|
||||
request, channel = self.make_request(
|
||||
|
|
@ -204,7 +204,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
client.dataReceived(
|
||||
(
|
||||
b"HTTP/1.0 200 OK\r\nContent-Length: %d\r\n"
|
||||
b"Content-Type: text/html; charset=\"utf8\"\r\n\r\n"
|
||||
b'Content-Type: text/html; charset="utf8"\r\n\r\n'
|
||||
)
|
||||
% (len(end_content),)
|
||||
+ end_content
|
||||
|
|
@ -212,16 +212,16 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
|
||||
self.pump()
|
||||
self.assertEqual(channel.code, 200)
|
||||
self.assertEqual(channel.json_body["og:title"], u"\u0434\u043a\u0430")
|
||||
self.assertEqual(channel.json_body["og:title"], "\u0434\u043a\u0430")
|
||||
|
||||
def test_non_ascii_preview_content_type(self):
|
||||
self.lookups["matrix.org"] = [(IPv4Address, "8.8.8.8")]
|
||||
|
||||
end_content = (
|
||||
b'<html><head>'
|
||||
b"<html><head>"
|
||||
b'<meta property="og:title" content="\xe4\xea\xe0" />'
|
||||
b'<meta property="og:description" content="hi" />'
|
||||
b'</head></html>'
|
||||
b"</head></html>"
|
||||
)
|
||||
|
||||
request, channel = self.make_request(
|
||||
|
|
@ -237,7 +237,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
client.dataReceived(
|
||||
(
|
||||
b"HTTP/1.0 200 OK\r\nContent-Length: %d\r\n"
|
||||
b"Content-Type: text/html; charset=\"windows-1251\"\r\n\r\n"
|
||||
b'Content-Type: text/html; charset="windows-1251"\r\n\r\n'
|
||||
)
|
||||
% (len(end_content),)
|
||||
+ end_content
|
||||
|
|
@ -245,7 +245,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
|
||||
self.pump()
|
||||
self.assertEqual(channel.code, 200)
|
||||
self.assertEqual(channel.json_body["og:title"], u"\u0434\u043a\u0430")
|
||||
self.assertEqual(channel.json_body["og:title"], "\u0434\u043a\u0430")
|
||||
|
||||
def test_ipaddr(self):
|
||||
"""
|
||||
|
|
@ -293,8 +293,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'DNS resolution failure during URL preview generation',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "DNS resolution failure during URL preview generation",
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -314,8 +314,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'DNS resolution failure during URL preview generation',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "DNS resolution failure during URL preview generation",
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -334,8 +334,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'IP address blocked by IP blacklist entry',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "IP address blocked by IP blacklist entry",
|
||||
},
|
||||
)
|
||||
self.assertEqual(channel.code, 403)
|
||||
|
|
@ -354,8 +354,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'IP address blocked by IP blacklist entry',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "IP address blocked by IP blacklist entry",
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -396,7 +396,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
non-blacklisted one, it will be rejected.
|
||||
"""
|
||||
# Hardcode the URL resolving to the IP we want.
|
||||
self.lookups[u"example.com"] = [
|
||||
self.lookups["example.com"] = [
|
||||
(IPv4Address, "1.1.1.2"),
|
||||
(IPv4Address, "8.8.8.8"),
|
||||
]
|
||||
|
|
@ -410,8 +410,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'DNS resolution failure during URL preview generation',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "DNS resolution failure during URL preview generation",
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -435,8 +435,8 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'DNS resolution failure during URL preview generation',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "DNS resolution failure during URL preview generation",
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -456,7 +456,7 @@ class URLPreviewTests(unittest.HomeserverTestCase):
|
|||
self.assertEqual(
|
||||
channel.json_body,
|
||||
{
|
||||
'errcode': 'M_UNKNOWN',
|
||||
'error': 'DNS resolution failure during URL preview generation',
|
||||
"errcode": "M_UNKNOWN",
|
||||
"error": "DNS resolution failure during URL preview generation",
|
||||
},
|
||||
)
|
||||
|
|
|
|||
|
|
@ -46,7 +46,7 @@ class FakeChannel(object):
|
|||
def json_body(self):
|
||||
if not self.result:
|
||||
raise Exception("No result yet.")
|
||||
return json.loads(self.result["body"].decode('utf8'))
|
||||
return json.loads(self.result["body"].decode("utf8"))
|
||||
|
||||
@property
|
||||
def code(self):
|
||||
|
|
@ -151,10 +151,10 @@ def make_request(
|
|||
Tuple[synapse.http.site.SynapseRequest, channel]
|
||||
"""
|
||||
if not isinstance(method, bytes):
|
||||
method = method.encode('ascii')
|
||||
method = method.encode("ascii")
|
||||
|
||||
if not isinstance(path, bytes):
|
||||
path = path.encode('ascii')
|
||||
path = path.encode("ascii")
|
||||
|
||||
# Decorate it to be the full path, if we're using shorthand
|
||||
if shorthand and not path.startswith(b"/_matrix"):
|
||||
|
|
@ -165,7 +165,7 @@ def make_request(
|
|||
path = b"/" + path
|
||||
|
||||
if isinstance(content, text_type):
|
||||
content = content.encode('utf8')
|
||||
content = content.encode("utf8")
|
||||
|
||||
site = FakeSite()
|
||||
channel = FakeChannel(reactor)
|
||||
|
|
@ -173,11 +173,11 @@ def make_request(
|
|||
req = request(site, channel)
|
||||
req.process = lambda: b""
|
||||
req.content = BytesIO(content)
|
||||
req.postpath = list(map(unquote, path[1:].split(b'/')))
|
||||
req.postpath = list(map(unquote, path[1:].split(b"/")))
|
||||
|
||||
if access_token:
|
||||
req.requestHeaders.addRawHeader(
|
||||
b"Authorization", b"Bearer " + access_token.encode('ascii')
|
||||
b"Authorization", b"Bearer " + access_token.encode("ascii")
|
||||
)
|
||||
|
||||
if federation_auth_origin is not None:
|
||||
|
|
@ -242,7 +242,7 @@ class ThreadedMemoryReactorClock(MemoryReactorClock):
|
|||
self.nameResolver = SimpleResolverComplexifier(FakeResolver())
|
||||
super(ThreadedMemoryReactorClock, self).__init__()
|
||||
|
||||
def listenUDP(self, port, protocol, interface='', maxPacketSize=8196):
|
||||
def listenUDP(self, port, protocol, interface="", maxPacketSize=8196):
|
||||
p = udp.Port(port, protocol, interface, maxPacketSize, self)
|
||||
p.startListening()
|
||||
self._udp.append(p)
|
||||
|
|
@ -371,7 +371,7 @@ class FakeTransport(object):
|
|||
|
||||
disconnecting = False
|
||||
disconnected = False
|
||||
buffer = attr.ib(default=b'')
|
||||
buffer = attr.ib(default=b"")
|
||||
producer = attr.ib(default=None)
|
||||
autoflush = attr.ib(default=True)
|
||||
|
||||
|
|
|
|||
|
|
@ -109,7 +109,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
|
|||
Test when user has blocked notice, but notice ought to be there (NOOP)
|
||||
"""
|
||||
self._rlsn._auth.check_auth_blocking = Mock(
|
||||
side_effect=ResourceLimitError(403, 'foo')
|
||||
side_effect=ResourceLimitError(403, "foo")
|
||||
)
|
||||
|
||||
mock_event = Mock(
|
||||
|
|
@ -128,7 +128,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
|
|||
"""
|
||||
|
||||
self._rlsn._auth.check_auth_blocking = Mock(
|
||||
side_effect=ResourceLimitError(403, 'foo')
|
||||
side_effect=ResourceLimitError(403, "foo")
|
||||
)
|
||||
self.get_success(self._rlsn.maybe_send_server_notice_to_user(self.user_id))
|
||||
|
||||
|
|
|
|||
|
|
@ -181,7 +181,7 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PB",
|
||||
sender=BOB,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
]
|
||||
|
|
@ -229,14 +229,14 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PB",
|
||||
sender=BOB,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50, CHARLIE: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
id="PC",
|
||||
sender=CHARLIE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50, CHARLIE: 0}},
|
||||
),
|
||||
]
|
||||
|
|
@ -256,7 +256,7 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PA1",
|
||||
sender=ALICE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
|
|
@ -266,14 +266,14 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PA2",
|
||||
sender=ALICE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 0}},
|
||||
),
|
||||
FakeEvent(
|
||||
id="PB",
|
||||
sender=BOB,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
|
|
@ -296,7 +296,7 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PA",
|
||||
sender=ALICE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
|
|
@ -326,7 +326,7 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PA1",
|
||||
sender=ALICE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
|
|
@ -336,14 +336,14 @@ class StateTestCase(unittest.TestCase):
|
|||
id="PA2",
|
||||
sender=ALICE,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 0}},
|
||||
),
|
||||
FakeEvent(
|
||||
id="PB",
|
||||
sender=BOB,
|
||||
type=EventTypes.PowerLevels,
|
||||
state_key='',
|
||||
state_key="",
|
||||
content={"users": {ALICE: 100, BOB: 50}},
|
||||
),
|
||||
FakeEvent(
|
||||
|
|
|
|||
|
|
@ -74,7 +74,7 @@ class ApplicationServiceStoreTestCase(unittest.TestCase):
|
|||
namespaces={},
|
||||
)
|
||||
# use the token as the filename
|
||||
with open(as_token, 'w') as outfile:
|
||||
with open(as_token, "w") as outfile:
|
||||
outfile.write(yaml.dump(as_yaml))
|
||||
self.as_yaml_files.append(as_token)
|
||||
|
||||
|
|
@ -135,7 +135,7 @@ class ApplicationServiceTransactionStoreTestCase(unittest.TestCase):
|
|||
namespaces={},
|
||||
)
|
||||
# use the token as the filename
|
||||
with open(as_token, 'w') as outfile:
|
||||
with open(as_token, "w") as outfile:
|
||||
outfile.write(yaml.dump(as_yaml))
|
||||
self.as_yaml_files.append(as_token)
|
||||
|
||||
|
|
|
|||
|
|
@ -94,11 +94,11 @@ class ClientIpStoreTestCase(unittest.HomeserverTestCase):
|
|||
result,
|
||||
[
|
||||
{
|
||||
'access_token': 'access_token',
|
||||
'ip': 'ip',
|
||||
'user_agent': 'user_agent',
|
||||
'device_id': None,
|
||||
'last_seen': 12345678000,
|
||||
"access_token": "access_token",
|
||||
"ip": "ip",
|
||||
"user_agent": "user_agent",
|
||||
"device_id": None,
|
||||
"last_seen": 12345678000,
|
||||
}
|
||||
],
|
||||
)
|
||||
|
|
@ -125,11 +125,11 @@ class ClientIpStoreTestCase(unittest.HomeserverTestCase):
|
|||
result,
|
||||
[
|
||||
{
|
||||
'access_token': 'access_token',
|
||||
'ip': 'ip',
|
||||
'user_agent': 'user_agent',
|
||||
'device_id': None,
|
||||
'last_seen': 12345878000,
|
||||
"access_token": "access_token",
|
||||
"ip": "ip",
|
||||
"user_agent": "user_agent",
|
||||
"device_id": None,
|
||||
"last_seen": 12345878000,
|
||||
}
|
||||
],
|
||||
)
|
||||
|
|
|
|||
|
|
@ -77,12 +77,12 @@ class DeviceStoreTestCase(tests.unittest.TestCase):
|
|||
|
||||
# Add two device updates with a single stream_id
|
||||
yield self.store.add_device_change_to_streams(
|
||||
"user_id", device_ids, ["somehost"],
|
||||
"user_id", device_ids, ["somehost"]
|
||||
)
|
||||
|
||||
# Get all device updates ever meant for this remote
|
||||
now_stream_id, device_updates = yield self.store.get_devices_by_remote(
|
||||
"somehost", -1, limit=100,
|
||||
"somehost", -1, limit=100
|
||||
)
|
||||
|
||||
# Check original device_ids are contained within these updates
|
||||
|
|
@ -95,19 +95,19 @@ class DeviceStoreTestCase(tests.unittest.TestCase):
|
|||
# first add one device
|
||||
device_ids1 = ["device_id0"]
|
||||
yield self.store.add_device_change_to_streams(
|
||||
"user_id", device_ids1, ["someotherhost"],
|
||||
"user_id", device_ids1, ["someotherhost"]
|
||||
)
|
||||
|
||||
# then add 101
|
||||
device_ids2 = ["device_id" + str(i + 1) for i in range(101)]
|
||||
yield self.store.add_device_change_to_streams(
|
||||
"user_id", device_ids2, ["someotherhost"],
|
||||
"user_id", device_ids2, ["someotherhost"]
|
||||
)
|
||||
|
||||
# then one more
|
||||
device_ids3 = ["newdevice"]
|
||||
yield self.store.add_device_change_to_streams(
|
||||
"user_id", device_ids3, ["someotherhost"],
|
||||
"user_id", device_ids3, ["someotherhost"]
|
||||
)
|
||||
|
||||
#
|
||||
|
|
@ -116,20 +116,20 @@ class DeviceStoreTestCase(tests.unittest.TestCase):
|
|||
|
||||
# first we should get a single update
|
||||
now_stream_id, device_updates = yield self.store.get_devices_by_remote(
|
||||
"someotherhost", -1, limit=100,
|
||||
"someotherhost", -1, limit=100
|
||||
)
|
||||
self._check_devices_in_updates(device_ids1, device_updates)
|
||||
|
||||
# Then we should get an empty list back as the 101 devices broke the limit
|
||||
now_stream_id, device_updates = yield self.store.get_devices_by_remote(
|
||||
"someotherhost", now_stream_id, limit=100,
|
||||
"someotherhost", now_stream_id, limit=100
|
||||
)
|
||||
self.assertEqual(len(device_updates), 0)
|
||||
|
||||
# The 101 devices should've been cleared, so we should now just get one device
|
||||
# update
|
||||
now_stream_id, device_updates = yield self.store.get_devices_by_remote(
|
||||
"someotherhost", now_stream_id, limit=100,
|
||||
"someotherhost", now_stream_id, limit=100
|
||||
)
|
||||
self._check_devices_in_updates(device_ids3, device_updates)
|
||||
|
||||
|
|
|
|||
|
|
@ -80,10 +80,10 @@ class EndToEndKeyStoreTestCase(tests.unittest.TestCase):
|
|||
yield self.store.store_device("user2", "device1", None)
|
||||
yield self.store.store_device("user2", "device2", None)
|
||||
|
||||
yield self.store.set_e2e_device_keys("user1", "device1", now, 'json11')
|
||||
yield self.store.set_e2e_device_keys("user1", "device2", now, 'json12')
|
||||
yield self.store.set_e2e_device_keys("user2", "device1", now, 'json21')
|
||||
yield self.store.set_e2e_device_keys("user2", "device2", now, 'json22')
|
||||
yield self.store.set_e2e_device_keys("user1", "device1", now, "json11")
|
||||
yield self.store.set_e2e_device_keys("user1", "device2", now, "json12")
|
||||
yield self.store.set_e2e_device_keys("user2", "device1", now, "json21")
|
||||
yield self.store.set_e2e_device_keys("user2", "device2", now, "json22")
|
||||
|
||||
res = yield self.store.get_e2e_device_keys(
|
||||
(("user1", "device1"), ("user2", "device2"))
|
||||
|
|
|
|||
|
|
@ -27,11 +27,11 @@ class EventFederationWorkerStoreTestCase(tests.unittest.TestCase):
|
|||
|
||||
@defer.inlineCallbacks
|
||||
def test_get_prev_events_for_room(self):
|
||||
room_id = '@ROOM:local'
|
||||
room_id = "@ROOM:local"
|
||||
|
||||
# add a bunch of events and hashes to act as forward extremities
|
||||
def insert_event(txn, i):
|
||||
event_id = '$event_%i:local' % i
|
||||
event_id = "$event_%i:local" % i
|
||||
|
||||
txn.execute(
|
||||
(
|
||||
|
|
@ -45,19 +45,19 @@ class EventFederationWorkerStoreTestCase(tests.unittest.TestCase):
|
|||
|
||||
txn.execute(
|
||||
(
|
||||
'INSERT INTO event_forward_extremities (room_id, event_id) '
|
||||
'VALUES (?, ?)'
|
||||
"INSERT INTO event_forward_extremities (room_id, event_id) "
|
||||
"VALUES (?, ?)"
|
||||
),
|
||||
(room_id, event_id),
|
||||
)
|
||||
|
||||
txn.execute(
|
||||
(
|
||||
'INSERT INTO event_reference_hashes '
|
||||
'(event_id, algorithm, hash) '
|
||||
"INSERT INTO event_reference_hashes "
|
||||
"(event_id, algorithm, hash) "
|
||||
"VALUES (?, 'sha256', ?)"
|
||||
),
|
||||
(event_id, b'ffff'),
|
||||
(event_id, b"ffff"),
|
||||
)
|
||||
|
||||
for i in range(0, 11):
|
||||
|
|
|
|||
|
|
@ -61,22 +61,24 @@ class ExtremStatisticsTestCase(HomeserverTestCase):
|
|||
)
|
||||
)
|
||||
|
||||
expected = set([
|
||||
b'synapse_forward_extremities_bucket{le="1.0"} 0.0',
|
||||
b'synapse_forward_extremities_bucket{le="2.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="3.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="5.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="7.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="10.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="15.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="20.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="50.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="100.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="200.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="500.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="+Inf"} 3.0',
|
||||
b'synapse_forward_extremities_count 3.0',
|
||||
b'synapse_forward_extremities_sum 10.0',
|
||||
])
|
||||
expected = set(
|
||||
[
|
||||
b'synapse_forward_extremities_bucket{le="1.0"} 0.0',
|
||||
b'synapse_forward_extremities_bucket{le="2.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="3.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="5.0"} 2.0',
|
||||
b'synapse_forward_extremities_bucket{le="7.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="10.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="15.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="20.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="50.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="100.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="200.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="500.0"} 3.0',
|
||||
b'synapse_forward_extremities_bucket{le="+Inf"} 3.0',
|
||||
b"synapse_forward_extremities_count 3.0",
|
||||
b"synapse_forward_extremities_sum 10.0",
|
||||
]
|
||||
)
|
||||
|
||||
self.assertEqual(items, expected)
|
||||
|
|
|
|||
|
|
@ -46,9 +46,9 @@ class MonthlyActiveUsersTestCase(unittest.HomeserverTestCase):
|
|||
user3_email = "user3@matrix.org"
|
||||
|
||||
threepids = [
|
||||
{'medium': 'email', 'address': user1_email},
|
||||
{'medium': 'email', 'address': user2_email},
|
||||
{'medium': 'email', 'address': user3_email},
|
||||
{"medium": "email", "address": user1_email},
|
||||
{"medium": "email", "address": user2_email},
|
||||
{"medium": "email", "address": user3_email},
|
||||
]
|
||||
# -1 because user3 is a support user and does not count
|
||||
user_num = len(threepids) - 1
|
||||
|
|
@ -177,7 +177,7 @@ class MonthlyActiveUsersTestCase(unittest.HomeserverTestCase):
|
|||
self.store.user_last_seen_monthly_active = Mock(
|
||||
return_value=defer.succeed(None)
|
||||
)
|
||||
self.store.populate_monthly_active_users('user_id')
|
||||
self.store.populate_monthly_active_users("user_id")
|
||||
self.pump()
|
||||
self.store.upsert_monthly_active_user.assert_called_once()
|
||||
|
||||
|
|
@ -188,7 +188,7 @@ class MonthlyActiveUsersTestCase(unittest.HomeserverTestCase):
|
|||
self.store.user_last_seen_monthly_active = Mock(
|
||||
return_value=defer.succeed(self.hs.get_clock().time_msec())
|
||||
)
|
||||
self.store.populate_monthly_active_users('user_id')
|
||||
self.store.populate_monthly_active_users("user_id")
|
||||
self.pump()
|
||||
self.store.upsert_monthly_active_user.assert_not_called()
|
||||
|
||||
|
|
@ -198,13 +198,13 @@ class MonthlyActiveUsersTestCase(unittest.HomeserverTestCase):
|
|||
self.assertEquals(self.get_success(count), 0)
|
||||
# Test reserved users but no registered users
|
||||
|
||||
user1 = '@user1:example.com'
|
||||
user2 = '@user2:example.com'
|
||||
user1_email = 'user1@example.com'
|
||||
user2_email = 'user2@example.com'
|
||||
user1 = "@user1:example.com"
|
||||
user2 = "@user2:example.com"
|
||||
user1_email = "user1@example.com"
|
||||
user2_email = "user2@example.com"
|
||||
threepids = [
|
||||
{'medium': 'email', 'address': user1_email},
|
||||
{'medium': 'email', 'address': user2_email},
|
||||
{"medium": "email", "address": user1_email},
|
||||
{"medium": "email", "address": user2_email},
|
||||
]
|
||||
self.hs.config.mau_limits_reserved_threepids = threepids
|
||||
self.store.runInteraction(
|
||||
|
|
|
|||
|
|
@ -82,7 +82,7 @@ class RedactionTestCase(unittest.TestCase):
|
|||
"sender": user.to_string(),
|
||||
"state_key": user.to_string(),
|
||||
"room_id": room.to_string(),
|
||||
"content": {"body": body, "msgtype": u"message"},
|
||||
"content": {"body": body, "msgtype": "message"},
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -118,7 +118,7 @@ class RedactionTestCase(unittest.TestCase):
|
|||
def test_redact(self):
|
||||
yield self.inject_room_member(self.room1, self.u_alice, Membership.JOIN)
|
||||
|
||||
msg_event = yield self.inject_message(self.room1, self.u_alice, u"t")
|
||||
msg_event = yield self.inject_message(self.room1, self.u_alice, "t")
|
||||
|
||||
# Check event has not been redacted:
|
||||
event = yield self.store.get_event(msg_event.event_id)
|
||||
|
|
|
|||
|
|
@ -128,4 +128,4 @@ class TokenGenerator:
|
|||
|
||||
def generate(self, user_id):
|
||||
self._last_issued_token += 1
|
||||
return u"%s-%d" % (user_id, self._last_issued_token)
|
||||
return "%s-%d" % (user_id, self._last_issued_token)
|
||||
|
|
|
|||
|
|
@ -78,7 +78,7 @@ class RoomEventsStoreTestCase(unittest.TestCase):
|
|||
|
||||
@defer.inlineCallbacks
|
||||
def STALE_test_room_name(self):
|
||||
name = u"A-Room-Name"
|
||||
name = "A-Room-Name"
|
||||
|
||||
yield self.inject_room_event(
|
||||
etype=EventTypes.Name, name=name, content={"name": name}, depth=1
|
||||
|
|
@ -94,7 +94,7 @@ class RoomEventsStoreTestCase(unittest.TestCase):
|
|||
|
||||
@defer.inlineCallbacks
|
||||
def STALE_test_room_topic(self):
|
||||
topic = u"A place for things"
|
||||
topic = "A place for things"
|
||||
|
||||
yield self.inject_room_event(
|
||||
etype=EventTypes.Topic, topic=topic, content={"topic": topic}, depth=1
|
||||
|
|
|
|||
|
|
@ -76,10 +76,10 @@ class StateStoreTestCase(tests.unittest.TestCase):
|
|||
@defer.inlineCallbacks
|
||||
def test_get_state_groups_ids(self):
|
||||
e1 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Create, '', {}
|
||||
self.room, self.u_alice, EventTypes.Create, "", {}
|
||||
)
|
||||
e2 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Name, '', {"name": "test room"}
|
||||
self.room, self.u_alice, EventTypes.Name, "", {"name": "test room"}
|
||||
)
|
||||
|
||||
state_group_map = yield self.store.get_state_groups_ids(
|
||||
|
|
@ -89,16 +89,16 @@ class StateStoreTestCase(tests.unittest.TestCase):
|
|||
state_map = list(state_group_map.values())[0]
|
||||
self.assertDictEqual(
|
||||
state_map,
|
||||
{(EventTypes.Create, ''): e1.event_id, (EventTypes.Name, ''): e2.event_id},
|
||||
{(EventTypes.Create, ""): e1.event_id, (EventTypes.Name, ""): e2.event_id},
|
||||
)
|
||||
|
||||
@defer.inlineCallbacks
|
||||
def test_get_state_groups(self):
|
||||
e1 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Create, '', {}
|
||||
self.room, self.u_alice, EventTypes.Create, "", {}
|
||||
)
|
||||
e2 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Name, '', {"name": "test room"}
|
||||
self.room, self.u_alice, EventTypes.Name, "", {"name": "test room"}
|
||||
)
|
||||
|
||||
state_group_map = yield self.store.get_state_groups(self.room, [e2.event_id])
|
||||
|
|
@ -113,10 +113,10 @@ class StateStoreTestCase(tests.unittest.TestCase):
|
|||
# this defaults to a linear DAG as each new injection defaults to whatever
|
||||
# forward extremities are currently in the DB for this room.
|
||||
e1 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Create, '', {}
|
||||
self.room, self.u_alice, EventTypes.Create, "", {}
|
||||
)
|
||||
e2 = yield self.inject_state_event(
|
||||
self.room, self.u_alice, EventTypes.Name, '', {"name": "test room"}
|
||||
self.room, self.u_alice, EventTypes.Name, "", {"name": "test room"}
|
||||
)
|
||||
e3 = yield self.inject_state_event(
|
||||
self.room,
|
||||
|
|
@ -158,7 +158,7 @@ class StateStoreTestCase(tests.unittest.TestCase):
|
|||
|
||||
# check we can filter to the m.room.name event (with a '' state key)
|
||||
state = yield self.store.get_state_for_event(
|
||||
e5.event_id, StateFilter.from_types([(EventTypes.Name, '')])
|
||||
e5.event_id, StateFilter.from_types([(EventTypes.Name, "")])
|
||||
)
|
||||
|
||||
self.assertStateMapEqual({(e2.type, e2.state_key): e2}, state)
|
||||
|
|
|
|||
|
|
@ -24,14 +24,14 @@ from . import unittest
|
|||
class PreviewTestCase(unittest.TestCase):
|
||||
def test_long_summarize(self):
|
||||
example_paras = [
|
||||
u"""Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:
|
||||
"""Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:
|
||||
Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in
|
||||
Troms county, Norway. The administrative centre of the municipality is
|
||||
the city of Tromsø. Outside of Norway, Tromso and Tromsö are
|
||||
alternative spellings of the city.Tromsø is considered the northernmost
|
||||
city in the world with a population above 50,000. The most populous town
|
||||
north of it is Alta, Norway, with a population of 14,272 (2013).""",
|
||||
u"""Tromsø lies in Northern Norway. The municipality has a population of
|
||||
"""Tromsø lies in Northern Norway. The municipality has a population of
|
||||
(2015) 72,066, but with an annual influx of students it has over 75,000
|
||||
most of the year. It is the largest urban area in Northern Norway and the
|
||||
third largest north of the Arctic Circle (following Murmansk and Norilsk).
|
||||
|
|
@ -44,7 +44,7 @@ class PreviewTestCase(unittest.TestCase):
|
|||
Sandnessund Bridge. Tromsø Airport connects the city to many destinations
|
||||
in Europe. The city is warmer than most other places located on the same
|
||||
latitude, due to the warming effect of the Gulf Stream.""",
|
||||
u"""The city centre of Tromsø contains the highest number of old wooden
|
||||
"""The city centre of Tromsø contains the highest number of old wooden
|
||||
houses in Northern Norway, the oldest house dating from 1789. The Arctic
|
||||
Cathedral, a modern church from 1965, is probably the most famous landmark
|
||||
in Tromsø. The city is a cultural centre for its region, with several
|
||||
|
|
@ -58,87 +58,87 @@ class PreviewTestCase(unittest.TestCase):
|
|||
|
||||
self.assertEquals(
|
||||
desc,
|
||||
u"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
u" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
u" Troms county, Norway. The administrative centre of the municipality is"
|
||||
u" the city of Tromsø. Outside of Norway, Tromso and Tromsö are"
|
||||
u" alternative spellings of the city.Tromsø is considered the northernmost"
|
||||
u" city in the world with a population above 50,000. The most populous town"
|
||||
u" north of it is Alta, Norway, with a population of 14,272 (2013).",
|
||||
"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
" Troms county, Norway. The administrative centre of the municipality is"
|
||||
" the city of Tromsø. Outside of Norway, Tromso and Tromsö are"
|
||||
" alternative spellings of the city.Tromsø is considered the northernmost"
|
||||
" city in the world with a population above 50,000. The most populous town"
|
||||
" north of it is Alta, Norway, with a population of 14,272 (2013).",
|
||||
)
|
||||
|
||||
desc = summarize_paragraphs(example_paras[1:], min_size=200, max_size=500)
|
||||
|
||||
self.assertEquals(
|
||||
desc,
|
||||
u"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
u" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
u" most of the year. It is the largest urban area in Northern Norway and the"
|
||||
u" third largest north of the Arctic Circle (following Murmansk and Norilsk)."
|
||||
u" Most of Tromsø, including the city centre, is located on the island of"
|
||||
u" Tromsøya, 350 kilometres (217 mi) north of the Arctic Circle. In 2012,"
|
||||
u" Tromsøya had a population of 36,088. Substantial parts of the urban…",
|
||||
"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
" most of the year. It is the largest urban area in Northern Norway and the"
|
||||
" third largest north of the Arctic Circle (following Murmansk and Norilsk)."
|
||||
" Most of Tromsø, including the city centre, is located on the island of"
|
||||
" Tromsøya, 350 kilometres (217 mi) north of the Arctic Circle. In 2012,"
|
||||
" Tromsøya had a population of 36,088. Substantial parts of the urban…",
|
||||
)
|
||||
|
||||
def test_short_summarize(self):
|
||||
example_paras = [
|
||||
u"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
u" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
u" Troms county, Norway.",
|
||||
u"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
u" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
u" most of the year.",
|
||||
u"The city centre of Tromsø contains the highest number of old wooden"
|
||||
u" houses in Northern Norway, the oldest house dating from 1789. The Arctic"
|
||||
u" Cathedral, a modern church from 1965, is probably the most famous landmark"
|
||||
u" in Tromsø.",
|
||||
"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
" Troms county, Norway.",
|
||||
"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
" most of the year.",
|
||||
"The city centre of Tromsø contains the highest number of old wooden"
|
||||
" houses in Northern Norway, the oldest house dating from 1789. The Arctic"
|
||||
" Cathedral, a modern church from 1965, is probably the most famous landmark"
|
||||
" in Tromsø.",
|
||||
]
|
||||
|
||||
desc = summarize_paragraphs(example_paras, min_size=200, max_size=500)
|
||||
|
||||
self.assertEquals(
|
||||
desc,
|
||||
u"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
u" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
u" Troms county, Norway.\n"
|
||||
u"\n"
|
||||
u"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
u" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
u" most of the year.",
|
||||
"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
" Troms county, Norway.\n"
|
||||
"\n"
|
||||
"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
" most of the year.",
|
||||
)
|
||||
|
||||
def test_small_then_large_summarize(self):
|
||||
example_paras = [
|
||||
u"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
u" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
u" Troms county, Norway.",
|
||||
u"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
u" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
u" most of the year."
|
||||
u" The city centre of Tromsø contains the highest number of old wooden"
|
||||
u" houses in Northern Norway, the oldest house dating from 1789. The Arctic"
|
||||
u" Cathedral, a modern church from 1965, is probably the most famous landmark"
|
||||
u" in Tromsø.",
|
||||
"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
" Troms county, Norway.",
|
||||
"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
" most of the year."
|
||||
" The city centre of Tromsø contains the highest number of old wooden"
|
||||
" houses in Northern Norway, the oldest house dating from 1789. The Arctic"
|
||||
" Cathedral, a modern church from 1965, is probably the most famous landmark"
|
||||
" in Tromsø.",
|
||||
]
|
||||
|
||||
desc = summarize_paragraphs(example_paras, min_size=200, max_size=500)
|
||||
self.assertEquals(
|
||||
desc,
|
||||
u"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
u" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
u" Troms county, Norway.\n"
|
||||
u"\n"
|
||||
u"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
u" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
u" most of the year. The city centre of Tromsø contains the highest number"
|
||||
u" of old wooden houses in Northern Norway, the oldest house dating from"
|
||||
u" 1789. The Arctic Cathedral, a modern church from…",
|
||||
"Tromsø (Norwegian pronunciation: [ˈtrʊmsœ] ( listen); Northern Sami:"
|
||||
" Romsa; Finnish: Tromssa[2] Kven: Tromssa) is a city and municipality in"
|
||||
" Troms county, Norway.\n"
|
||||
"\n"
|
||||
"Tromsø lies in Northern Norway. The municipality has a population of"
|
||||
" (2015) 72,066, but with an annual influx of students it has over 75,000"
|
||||
" most of the year. The city centre of Tromsø contains the highest number"
|
||||
" of old wooden houses in Northern Norway, the oldest house dating from"
|
||||
" 1789. The Arctic Cathedral, a modern church from…",
|
||||
)
|
||||
|
||||
|
||||
class PreviewUrlTestCase(unittest.TestCase):
|
||||
def test_simple(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<head><title>Foo</title></head>
|
||||
<body>
|
||||
|
|
@ -149,10 +149,10 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": u"Foo", u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": "Foo", "og:description": "Some text."})
|
||||
|
||||
def test_comment(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<head><title>Foo</title></head>
|
||||
<body>
|
||||
|
|
@ -164,10 +164,10 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": u"Foo", u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": "Foo", "og:description": "Some text."})
|
||||
|
||||
def test_comment2(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<head><title>Foo</title></head>
|
||||
<body>
|
||||
|
|
@ -185,13 +185,13 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
self.assertEquals(
|
||||
og,
|
||||
{
|
||||
u"og:title": u"Foo",
|
||||
u"og:description": u"Some text.\n\nSome more text.\n\nText\n\nMore text",
|
||||
"og:title": "Foo",
|
||||
"og:description": "Some text.\n\nSome more text.\n\nText\n\nMore text",
|
||||
},
|
||||
)
|
||||
|
||||
def test_script(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<head><title>Foo</title></head>
|
||||
<body>
|
||||
|
|
@ -203,10 +203,10 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": u"Foo", u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": "Foo", "og:description": "Some text."})
|
||||
|
||||
def test_missing_title(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<body>
|
||||
Some text.
|
||||
|
|
@ -216,10 +216,10 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": None, u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": None, "og:description": "Some text."})
|
||||
|
||||
def test_h1_as_title(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<meta property="og:description" content="Some text."/>
|
||||
<body>
|
||||
|
|
@ -230,10 +230,10 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": u"Title", u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": "Title", "og:description": "Some text."})
|
||||
|
||||
def test_missing_title_and_broken_h1(self):
|
||||
html = u"""
|
||||
html = """
|
||||
<html>
|
||||
<body>
|
||||
<h1><a href="foo"/></h1>
|
||||
|
|
@ -244,4 +244,4 @@ class PreviewUrlTestCase(unittest.TestCase):
|
|||
|
||||
og = decode_and_calc_og(html, "http://example.com/test.html")
|
||||
|
||||
self.assertEquals(og, {u"og:title": None, u"og:description": u"Some text."})
|
||||
self.assertEquals(og, {"og:title": None, "og:description": "Some text."})
|
||||
|
|
|
|||
|
|
@ -69,8 +69,8 @@ class JsonResourceTests(unittest.TestCase):
|
|||
)
|
||||
render(request, res, self.reactor)
|
||||
|
||||
self.assertEqual(request.args, {b'a': [u"\N{SNOWMAN}".encode('utf8')]})
|
||||
self.assertEqual(got_kwargs, {u"room_id": u"\N{SNOWMAN}"})
|
||||
self.assertEqual(request.args, {b"a": ["\N{SNOWMAN}".encode("utf8")]})
|
||||
self.assertEqual(got_kwargs, {"room_id": "\N{SNOWMAN}"})
|
||||
|
||||
def test_callback_direct_exception(self):
|
||||
"""
|
||||
|
|
@ -87,7 +87,7 @@ class JsonResourceTests(unittest.TestCase):
|
|||
request, channel = make_request(self.reactor, b"GET", b"/_matrix/foo")
|
||||
render(request, res, self.reactor)
|
||||
|
||||
self.assertEqual(channel.result["code"], b'500')
|
||||
self.assertEqual(channel.result["code"], b"500")
|
||||
|
||||
def test_callback_indirect_exception(self):
|
||||
"""
|
||||
|
|
@ -110,7 +110,7 @@ class JsonResourceTests(unittest.TestCase):
|
|||
request, channel = make_request(self.reactor, b"GET", b"/_matrix/foo")
|
||||
render(request, res, self.reactor)
|
||||
|
||||
self.assertEqual(channel.result["code"], b'500')
|
||||
self.assertEqual(channel.result["code"], b"500")
|
||||
|
||||
def test_callback_synapseerror(self):
|
||||
"""
|
||||
|
|
@ -127,7 +127,7 @@ class JsonResourceTests(unittest.TestCase):
|
|||
request, channel = make_request(self.reactor, b"GET", b"/_matrix/foo")
|
||||
render(request, res, self.reactor)
|
||||
|
||||
self.assertEqual(channel.result["code"], b'403')
|
||||
self.assertEqual(channel.result["code"], b"403")
|
||||
self.assertEqual(channel.json_body["error"], "Forbidden!!one!")
|
||||
self.assertEqual(channel.json_body["errcode"], "M_FORBIDDEN")
|
||||
|
||||
|
|
@ -148,7 +148,7 @@ class JsonResourceTests(unittest.TestCase):
|
|||
request, channel = make_request(self.reactor, b"GET", b"/_matrix/foobar")
|
||||
render(request, res, self.reactor)
|
||||
|
||||
self.assertEqual(channel.result["code"], b'400')
|
||||
self.assertEqual(channel.result["code"], b"400")
|
||||
self.assertEqual(channel.json_body["error"], "Unrecognized request")
|
||||
self.assertEqual(channel.json_body["errcode"], "M_UNRECOGNIZED")
|
||||
|
||||
|
|
@ -180,7 +180,7 @@ class SiteTestCase(unittest.HomeserverTestCase):
|
|||
# Make a resource and a Site, the resource will hang and allow us to
|
||||
# time out the request while it's 'processing'
|
||||
base_resource = Resource()
|
||||
base_resource.putChild(b'', HangingResource())
|
||||
base_resource.putChild(b"", HangingResource())
|
||||
site = SynapseSite("test", "site_tag", {}, base_resource, "1.0")
|
||||
|
||||
server = site.buildProtocol(None)
|
||||
|
|
|
|||
|
|
@ -366,11 +366,11 @@ class StateTestCase(unittest.TestCase):
|
|||
def _add_depths(self, nodes, edges):
|
||||
def _get_depth(ev):
|
||||
node = nodes[ev]
|
||||
if 'depth' not in node:
|
||||
if "depth" not in node:
|
||||
prevs = edges[ev]
|
||||
depth = max(_get_depth(prev) for prev in prevs) + 1
|
||||
node['depth'] = depth
|
||||
return node['depth']
|
||||
node["depth"] = depth
|
||||
return node["depth"]
|
||||
|
||||
for n in nodes:
|
||||
_get_depth(n)
|
||||
|
|
|
|||
|
|
@ -102,7 +102,7 @@ class MapUsernameTestCase(unittest.TestCase):
|
|||
|
||||
def testNonAscii(self):
|
||||
# this should work with either a unicode or a bytes
|
||||
self.assertEqual(map_username_to_mxid_localpart(u'têst'), "t=c3=aast")
|
||||
self.assertEqual(map_username_to_mxid_localpart("têst"), "t=c3=aast")
|
||||
self.assertEqual(
|
||||
map_username_to_mxid_localpart(u'têst'.encode('utf-8')), "t=c3=aast"
|
||||
map_username_to_mxid_localpart("têst".encode("utf-8")), "t=c3=aast"
|
||||
)
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ class ToTwistedHandler(logging.Handler):
|
|||
|
||||
def emit(self, record):
|
||||
log_entry = self.format(record)
|
||||
log_level = record.levelname.lower().replace('warning', 'warn')
|
||||
log_level = record.levelname.lower().replace("warning", "warn")
|
||||
self.tx_log.emit(
|
||||
twisted.logger.LogLevel.levelWithName(log_level),
|
||||
log_entry.replace("{", r"(").replace("}", r")"),
|
||||
|
|
|
|||
|
|
@ -265,7 +265,7 @@ class FilterEventsForServerTestCase(tests.unittest.TestCase):
|
|||
|
||||
pr.disable()
|
||||
with open("filter_events_for_server.profile", "w+") as f:
|
||||
ps = pstats.Stats(pr, stream=f).sort_stats('cumulative')
|
||||
ps = pstats.Stats(pr, stream=f).sort_stats("cumulative")
|
||||
ps.print_stats()
|
||||
|
||||
# the result should be 5 redacted events, and 5 unredacted events.
|
||||
|
|
|
|||
|
|
@ -298,7 +298,7 @@ class HomeserverTestCase(TestCase):
|
|||
Tuple[synapse.http.site.SynapseRequest, channel]
|
||||
"""
|
||||
if isinstance(content, dict):
|
||||
content = json.dumps(content).encode('utf8')
|
||||
content = json.dumps(content).encode("utf8")
|
||||
|
||||
return make_request(
|
||||
self.reactor,
|
||||
|
|
@ -389,7 +389,7 @@ class HomeserverTestCase(TestCase):
|
|||
Returns:
|
||||
The MXID of the new user (unicode).
|
||||
"""
|
||||
self.hs.config.registration_shared_secret = u"shared"
|
||||
self.hs.config.registration_shared_secret = "shared"
|
||||
|
||||
# Create the user
|
||||
request, channel = self.make_request("GET", "/_matrix/client/r0/admin/register")
|
||||
|
|
@ -397,13 +397,13 @@ class HomeserverTestCase(TestCase):
|
|||
nonce = channel.json_body["nonce"]
|
||||
|
||||
want_mac = hmac.new(key=b"shared", digestmod=hashlib.sha1)
|
||||
nonce_str = b"\x00".join([username.encode('utf8'), password.encode('utf8')])
|
||||
nonce_str = b"\x00".join([username.encode("utf8"), password.encode("utf8")])
|
||||
if admin:
|
||||
nonce_str += b"\x00admin"
|
||||
else:
|
||||
nonce_str += b"\x00notadmin"
|
||||
|
||||
want_mac.update(nonce.encode('ascii') + b"\x00" + nonce_str)
|
||||
want_mac.update(nonce.encode("ascii") + b"\x00" + nonce_str)
|
||||
want_mac = want_mac.hexdigest()
|
||||
|
||||
body = json.dumps(
|
||||
|
|
@ -416,7 +416,7 @@ class HomeserverTestCase(TestCase):
|
|||
}
|
||||
)
|
||||
request, channel = self.make_request(
|
||||
"POST", "/_matrix/client/r0/admin/register", body.encode('utf8')
|
||||
"POST", "/_matrix/client/r0/admin/register", body.encode("utf8")
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(channel.code, 200)
|
||||
|
|
@ -435,7 +435,7 @@ class HomeserverTestCase(TestCase):
|
|||
body["device_id"] = device_id
|
||||
|
||||
request, channel = self.make_request(
|
||||
"POST", "/_matrix/client/r0/login", json.dumps(body).encode('utf8')
|
||||
"POST", "/_matrix/client/r0/login", json.dumps(body).encode("utf8")
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(channel.code, 200, channel.result)
|
||||
|
|
@ -481,9 +481,7 @@ class HomeserverTestCase(TestCase):
|
|||
if soft_failed:
|
||||
event.internal_metadata.soft_failed = True
|
||||
|
||||
self.get_success(
|
||||
event_creator.send_nonmember_event(requester, event, context)
|
||||
)
|
||||
self.get_success(event_creator.send_nonmember_event(requester, event, context))
|
||||
|
||||
return event.event_id
|
||||
|
||||
|
|
@ -508,7 +506,7 @@ class HomeserverTestCase(TestCase):
|
|||
body = {"type": "m.login.password", "user": username, "password": password}
|
||||
|
||||
request, channel = self.make_request(
|
||||
"POST", "/_matrix/client/r0/login", json.dumps(body).encode('utf8')
|
||||
"POST", "/_matrix/client/r0/login", json.dumps(body).encode("utf8")
|
||||
)
|
||||
self.render(request)
|
||||
self.assertEqual(channel.code, 403, channel.result)
|
||||
|
|
|
|||
|
|
@ -88,24 +88,24 @@ class DescriptorTestCase(unittest.TestCase):
|
|||
|
||||
obj = Cls()
|
||||
|
||||
obj.mock.return_value = 'fish'
|
||||
obj.mock.return_value = "fish"
|
||||
r = yield obj.fn(1, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
obj.mock.assert_called_once_with(1, 2)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# a call with different params should call the mock again
|
||||
obj.mock.return_value = 'chips'
|
||||
obj.mock.return_value = "chips"
|
||||
r = yield obj.fn(1, 3)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_called_once_with(1, 3)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# the two values should now be cached
|
||||
r = yield obj.fn(1, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
r = yield obj.fn(1, 3)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_not_called()
|
||||
|
||||
@defer.inlineCallbacks
|
||||
|
|
@ -121,25 +121,25 @@ class DescriptorTestCase(unittest.TestCase):
|
|||
return self.mock(arg1, arg2)
|
||||
|
||||
obj = Cls()
|
||||
obj.mock.return_value = 'fish'
|
||||
obj.mock.return_value = "fish"
|
||||
r = yield obj.fn(1, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
obj.mock.assert_called_once_with(1, 2)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# a call with different params should call the mock again
|
||||
obj.mock.return_value = 'chips'
|
||||
obj.mock.return_value = "chips"
|
||||
r = yield obj.fn(2, 3)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_called_once_with(2, 3)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# the two values should now be cached; we should be able to vary
|
||||
# the second argument and still get the cached result.
|
||||
r = yield obj.fn(1, 4)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
r = yield obj.fn(2, 5)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_not_called()
|
||||
|
||||
def test_cache_logcontexts(self):
|
||||
|
|
@ -248,30 +248,30 @@ class DescriptorTestCase(unittest.TestCase):
|
|||
|
||||
obj = Cls()
|
||||
|
||||
obj.mock.return_value = 'fish'
|
||||
obj.mock.return_value = "fish"
|
||||
r = yield obj.fn(1, 2, 3)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
obj.mock.assert_called_once_with(1, 2, 3)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# a call with same params shouldn't call the mock again
|
||||
r = yield obj.fn(1, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
obj.mock.assert_not_called()
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# a call with different params should call the mock again
|
||||
obj.mock.return_value = 'chips'
|
||||
obj.mock.return_value = "chips"
|
||||
r = yield obj.fn(2, 3)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_called_once_with(2, 3, 3)
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# the two values should now be cached
|
||||
r = yield obj.fn(1, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
r = yield obj.fn(2, 3)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
obj.mock.assert_not_called()
|
||||
|
||||
|
||||
|
|
@ -297,7 +297,7 @@ class CachedListDescriptorTestCase(unittest.TestCase):
|
|||
with logcontext.LoggingContext() as c1:
|
||||
c1.request = "c1"
|
||||
obj = Cls()
|
||||
obj.mock.return_value = {10: 'fish', 20: 'chips'}
|
||||
obj.mock.return_value = {10: "fish", 20: "chips"}
|
||||
d1 = obj.list_fn([10, 20], 2)
|
||||
self.assertEqual(
|
||||
logcontext.LoggingContext.current_context(),
|
||||
|
|
@ -306,26 +306,26 @@ class CachedListDescriptorTestCase(unittest.TestCase):
|
|||
r = yield d1
|
||||
self.assertEqual(logcontext.LoggingContext.current_context(), c1)
|
||||
obj.mock.assert_called_once_with([10, 20], 2)
|
||||
self.assertEqual(r, {10: 'fish', 20: 'chips'})
|
||||
self.assertEqual(r, {10: "fish", 20: "chips"})
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# a call with different params should call the mock again
|
||||
obj.mock.return_value = {30: 'peas'}
|
||||
obj.mock.return_value = {30: "peas"}
|
||||
r = yield obj.list_fn([20, 30], 2)
|
||||
obj.mock.assert_called_once_with([30], 2)
|
||||
self.assertEqual(r, {20: 'chips', 30: 'peas'})
|
||||
self.assertEqual(r, {20: "chips", 30: "peas"})
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# all the values should now be cached
|
||||
r = yield obj.fn(10, 2)
|
||||
self.assertEqual(r, 'fish')
|
||||
self.assertEqual(r, "fish")
|
||||
r = yield obj.fn(20, 2)
|
||||
self.assertEqual(r, 'chips')
|
||||
self.assertEqual(r, "chips")
|
||||
r = yield obj.fn(30, 2)
|
||||
self.assertEqual(r, 'peas')
|
||||
self.assertEqual(r, "peas")
|
||||
r = yield obj.list_fn([10, 20, 30], 2)
|
||||
obj.mock.assert_not_called()
|
||||
self.assertEqual(r, {10: 'fish', 20: 'chips', 30: 'peas'})
|
||||
self.assertEqual(r, {10: "fish", 20: "chips", 30: "peas"})
|
||||
|
||||
@defer.inlineCallbacks
|
||||
def test_invalidate(self):
|
||||
|
|
@ -350,16 +350,16 @@ class CachedListDescriptorTestCase(unittest.TestCase):
|
|||
invalidate1 = mock.Mock()
|
||||
|
||||
# cache miss
|
||||
obj.mock.return_value = {10: 'fish', 20: 'chips'}
|
||||
obj.mock.return_value = {10: "fish", 20: "chips"}
|
||||
r1 = yield obj.list_fn([10, 20], 2, on_invalidate=invalidate0)
|
||||
obj.mock.assert_called_once_with([10, 20], 2)
|
||||
self.assertEqual(r1, {10: 'fish', 20: 'chips'})
|
||||
self.assertEqual(r1, {10: "fish", 20: "chips"})
|
||||
obj.mock.reset_mock()
|
||||
|
||||
# cache hit
|
||||
r2 = yield obj.list_fn([10, 20], 2, on_invalidate=invalidate1)
|
||||
obj.mock.assert_not_called()
|
||||
self.assertEqual(r2, {10: 'fish', 20: 'chips'})
|
||||
self.assertEqual(r2, {10: "fish", 20: "chips"})
|
||||
|
||||
invalidate0.assert_not_called()
|
||||
invalidate1.assert_not_called()
|
||||
|
|
|
|||
|
|
@ -27,57 +27,57 @@ class CacheTestCase(unittest.TestCase):
|
|||
|
||||
def test_get(self):
|
||||
"""simple set/get tests"""
|
||||
self.cache.set('one', '1', 10)
|
||||
self.cache.set('two', '2', 20)
|
||||
self.cache.set('three', '3', 30)
|
||||
self.cache.set("one", "1", 10)
|
||||
self.cache.set("two", "2", 20)
|
||||
self.cache.set("three", "3", 30)
|
||||
|
||||
self.assertEqual(len(self.cache), 3)
|
||||
|
||||
self.assertTrue('one' in self.cache)
|
||||
self.assertEqual(self.cache.get('one'), '1')
|
||||
self.assertEqual(self.cache['one'], '1')
|
||||
self.assertEqual(self.cache.get_with_expiry('one'), ('1', 110))
|
||||
self.assertTrue("one" in self.cache)
|
||||
self.assertEqual(self.cache.get("one"), "1")
|
||||
self.assertEqual(self.cache["one"], "1")
|
||||
self.assertEqual(self.cache.get_with_expiry("one"), ("1", 110))
|
||||
self.assertEqual(self.cache._metrics.hits, 3)
|
||||
self.assertEqual(self.cache._metrics.misses, 0)
|
||||
|
||||
self.cache.set('two', '2.5', 20)
|
||||
self.assertEqual(self.cache['two'], '2.5')
|
||||
self.cache.set("two", "2.5", 20)
|
||||
self.assertEqual(self.cache["two"], "2.5")
|
||||
self.assertEqual(self.cache._metrics.hits, 4)
|
||||
|
||||
# non-existent-item tests
|
||||
self.assertEqual(self.cache.get('four', '4'), '4')
|
||||
self.assertIs(self.cache.get('four', None), None)
|
||||
self.assertEqual(self.cache.get("four", "4"), "4")
|
||||
self.assertIs(self.cache.get("four", None), None)
|
||||
|
||||
with self.assertRaises(KeyError):
|
||||
self.cache['four']
|
||||
self.cache["four"]
|
||||
|
||||
with self.assertRaises(KeyError):
|
||||
self.cache.get('four')
|
||||
self.cache.get("four")
|
||||
|
||||
with self.assertRaises(KeyError):
|
||||
self.cache.get_with_expiry('four')
|
||||
self.cache.get_with_expiry("four")
|
||||
|
||||
self.assertEqual(self.cache._metrics.hits, 4)
|
||||
self.assertEqual(self.cache._metrics.misses, 5)
|
||||
|
||||
def test_expiry(self):
|
||||
self.cache.set('one', '1', 10)
|
||||
self.cache.set('two', '2', 20)
|
||||
self.cache.set('three', '3', 30)
|
||||
self.cache.set("one", "1", 10)
|
||||
self.cache.set("two", "2", 20)
|
||||
self.cache.set("three", "3", 30)
|
||||
|
||||
self.assertEqual(len(self.cache), 3)
|
||||
self.assertEqual(self.cache['one'], '1')
|
||||
self.assertEqual(self.cache['two'], '2')
|
||||
self.assertEqual(self.cache["one"], "1")
|
||||
self.assertEqual(self.cache["two"], "2")
|
||||
|
||||
# enough for the first entry to expire, but not the rest
|
||||
self.mock_timer.side_effect = lambda: 110.0
|
||||
|
||||
self.assertEqual(len(self.cache), 2)
|
||||
self.assertFalse('one' in self.cache)
|
||||
self.assertEqual(self.cache['two'], '2')
|
||||
self.assertEqual(self.cache['three'], '3')
|
||||
self.assertFalse("one" in self.cache)
|
||||
self.assertEqual(self.cache["two"], "2")
|
||||
self.assertEqual(self.cache["three"], "3")
|
||||
|
||||
self.assertEqual(self.cache.get_with_expiry('two'), ('2', 120))
|
||||
self.assertEqual(self.cache.get_with_expiry("two"), ("2", 120))
|
||||
|
||||
self.assertEqual(self.cache._metrics.hits, 5)
|
||||
self.assertEqual(self.cache._metrics.misses, 0)
|
||||
|
|
|
|||
|
|
@ -358,9 +358,9 @@ def setup_test_homeserver(
|
|||
# Need to let the HS build an auth handler and then mess with it
|
||||
# because AuthHandler's constructor requires the HS, so we can't make one
|
||||
# beforehand and pass it in to the HS's constructor (chicken / egg)
|
||||
hs.get_auth_handler().hash = lambda p: hashlib.md5(p.encode('utf8')).hexdigest()
|
||||
hs.get_auth_handler().hash = lambda p: hashlib.md5(p.encode("utf8")).hexdigest()
|
||||
hs.get_auth_handler().validate_hash = (
|
||||
lambda p, h: hashlib.md5(p.encode('utf8')).hexdigest() == h
|
||||
lambda p, h: hashlib.md5(p.encode("utf8")).hexdigest() == h
|
||||
)
|
||||
|
||||
fed = kargs.get("resource_for_federation", None)
|
||||
|
|
@ -407,7 +407,7 @@ class MockHttpResource(HttpServer):
|
|||
def trigger_get(self, path):
|
||||
return self.trigger(b"GET", path, None)
|
||||
|
||||
@patch('twisted.web.http.Request')
|
||||
@patch("twisted.web.http.Request")
|
||||
@defer.inlineCallbacks
|
||||
def trigger(
|
||||
self, http_method, path, content, mock_request, federation_auth_origin=None
|
||||
|
|
@ -431,12 +431,12 @@ class MockHttpResource(HttpServer):
|
|||
# annoyingly we return a twisted http request which has chained calls
|
||||
# to get at the http content, hence mock it here.
|
||||
mock_content = Mock()
|
||||
config = {'read.return_value': content}
|
||||
config = {"read.return_value": content}
|
||||
mock_content.configure_mock(**config)
|
||||
mock_request.content = mock_content
|
||||
|
||||
mock_request.method = http_method.encode('ascii')
|
||||
mock_request.uri = path.encode('ascii')
|
||||
mock_request.method = http_method.encode("ascii")
|
||||
mock_request.uri = path.encode("ascii")
|
||||
|
||||
mock_request.getClientIP.return_value = "-"
|
||||
|
||||
|
|
@ -452,14 +452,14 @@ class MockHttpResource(HttpServer):
|
|||
|
||||
# add in query params to the right place
|
||||
try:
|
||||
mock_request.args = urlparse.parse_qs(path.split('?')[1])
|
||||
mock_request.path = path.split('?')[0]
|
||||
mock_request.args = urlparse.parse_qs(path.split("?")[1])
|
||||
mock_request.path = path.split("?")[0]
|
||||
path = mock_request.path
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
if isinstance(path, bytes):
|
||||
path = path.decode('utf8')
|
||||
path = path.decode("utf8")
|
||||
|
||||
for (method, pattern, func) in self.callbacks:
|
||||
if http_method != method:
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue