mirror of
https://git.anonymousland.org/anonymousland/synapse-product.git
synced 2024-12-11 16:34:20 -05:00
Merge pull request #7157 from matrix-org/rev.outbound_device_pokes_tests
Add tests for outbound device pokes
This commit is contained in:
commit
6486c96b65
1
changelog.d/7157.misc
Normal file
1
changelog.d/7157.misc
Normal file
@ -0,0 +1 @@
|
||||
Add tests for outbound device pokes.
|
@ -27,8 +27,8 @@ class FrontendProxyTests(HomeserverTestCase):
|
||||
|
||||
return hs
|
||||
|
||||
def default_config(self, name="test"):
|
||||
c = super().default_config(name)
|
||||
def default_config(self):
|
||||
c = super().default_config()
|
||||
c["worker_app"] = "synapse.app.frontend_proxy"
|
||||
return c
|
||||
|
||||
|
@ -29,8 +29,8 @@ class FederationReaderOpenIDListenerTests(HomeserverTestCase):
|
||||
)
|
||||
return hs
|
||||
|
||||
def default_config(self, name="test"):
|
||||
conf = super().default_config(name)
|
||||
def default_config(self):
|
||||
conf = super().default_config()
|
||||
# we're using FederationReaderServer, which uses a SlavedStore, so we
|
||||
# have to tell the FederationHandler not to try to access stuff that is only
|
||||
# in the primary store.
|
||||
|
@ -33,8 +33,8 @@ class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
|
||||
login.register_servlets,
|
||||
]
|
||||
|
||||
def default_config(self, name="test"):
|
||||
config = super().default_config(name=name)
|
||||
def default_config(self):
|
||||
config = super().default_config()
|
||||
config["limit_remote_rooms"] = {"enabled": True, "complexity": 0.05}
|
||||
return config
|
||||
|
||||
|
@ -12,19 +12,25 @@
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
from typing import Optional
|
||||
|
||||
from mock import Mock
|
||||
|
||||
from signedjson import key, sign
|
||||
from signedjson.types import BaseKey, SigningKey
|
||||
|
||||
from twisted.internet import defer
|
||||
|
||||
from synapse.types import ReadReceipt
|
||||
from synapse.rest import admin
|
||||
from synapse.rest.client.v1 import login
|
||||
from synapse.types import JsonDict, ReadReceipt
|
||||
|
||||
from tests.unittest import HomeserverTestCase, override_config
|
||||
|
||||
|
||||
class FederationSenderTestCases(HomeserverTestCase):
|
||||
class FederationSenderReceiptsTestCases(HomeserverTestCase):
|
||||
def make_homeserver(self, reactor, clock):
|
||||
return super(FederationSenderTestCases, self).setup_test_homeserver(
|
||||
return self.setup_test_homeserver(
|
||||
state_handler=Mock(spec=["get_current_hosts_in_room"]),
|
||||
federation_transport_client=Mock(spec=["send_transaction"]),
|
||||
)
|
||||
@ -147,3 +153,294 @@ class FederationSenderTestCases(HomeserverTestCase):
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
|
||||
class FederationSenderDevicesTestCases(HomeserverTestCase):
|
||||
servlets = [
|
||||
admin.register_servlets,
|
||||
login.register_servlets,
|
||||
]
|
||||
|
||||
def make_homeserver(self, reactor, clock):
|
||||
return self.setup_test_homeserver(
|
||||
state_handler=Mock(spec=["get_current_hosts_in_room"]),
|
||||
federation_transport_client=Mock(spec=["send_transaction"]),
|
||||
)
|
||||
|
||||
def default_config(self):
|
||||
c = super().default_config()
|
||||
c["send_federation"] = True
|
||||
return c
|
||||
|
||||
def prepare(self, reactor, clock, hs):
|
||||
# stub out get_current_hosts_in_room
|
||||
mock_state_handler = hs.get_state_handler()
|
||||
mock_state_handler.get_current_hosts_in_room.return_value = ["test", "host2"]
|
||||
|
||||
# stub out get_users_who_share_room_with_user so that it claims that
|
||||
# `@user2:host2` is in the room
|
||||
def get_users_who_share_room_with_user(user_id):
|
||||
return defer.succeed({"@user2:host2"})
|
||||
|
||||
hs.get_datastore().get_users_who_share_room_with_user = (
|
||||
get_users_who_share_room_with_user
|
||||
)
|
||||
|
||||
# whenever send_transaction is called, record the edu data
|
||||
self.edus = []
|
||||
self.hs.get_federation_transport_client().send_transaction.side_effect = (
|
||||
self.record_transaction
|
||||
)
|
||||
|
||||
def record_transaction(self, txn, json_cb):
|
||||
data = json_cb()
|
||||
self.edus.extend(data["edus"])
|
||||
return defer.succeed({})
|
||||
|
||||
def test_send_device_updates(self):
|
||||
"""Basic case: each device update should result in an EDU"""
|
||||
# create a device
|
||||
u1 = self.register_user("user", "pass")
|
||||
self.login(u1, "pass", device_id="D1")
|
||||
|
||||
# expect one edu
|
||||
self.assertEqual(len(self.edus), 1)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
|
||||
|
||||
# a second call should produce no new device EDUs
|
||||
self.hs.get_federation_sender().send_device_messages("host2")
|
||||
self.pump()
|
||||
self.assertEqual(self.edus, [])
|
||||
|
||||
# a second device
|
||||
self.login("user", "pass", device_id="D2")
|
||||
|
||||
self.assertEqual(len(self.edus), 1)
|
||||
self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
||||
|
||||
def test_upload_signatures(self):
|
||||
"""Uploading signatures on some devices should produce updates for that user"""
|
||||
|
||||
e2e_handler = self.hs.get_e2e_keys_handler()
|
||||
|
||||
# register two devices
|
||||
u1 = self.register_user("user", "pass")
|
||||
self.login(u1, "pass", device_id="D1")
|
||||
self.login(u1, "pass", device_id="D2")
|
||||
|
||||
# expect two edus
|
||||
self.assertEqual(len(self.edus), 2)
|
||||
stream_id = None
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", stream_id)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
||||
|
||||
# upload signing keys for each device
|
||||
device1_signing_key = self.generate_and_upload_device_signing_key(u1, "D1")
|
||||
device2_signing_key = self.generate_and_upload_device_signing_key(u1, "D2")
|
||||
|
||||
# expect two more edus
|
||||
self.assertEqual(len(self.edus), 2)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", stream_id)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
||||
|
||||
# upload master key and self-signing key
|
||||
master_signing_key = generate_self_id_key()
|
||||
master_key = {
|
||||
"user_id": u1,
|
||||
"usage": ["master"],
|
||||
"keys": {key_id(master_signing_key): encode_pubkey(master_signing_key)},
|
||||
}
|
||||
|
||||
# private key: HvQBbU+hc2Zr+JP1sE0XwBe1pfZZEYtJNPJLZJtS+F8
|
||||
selfsigning_signing_key = generate_self_id_key()
|
||||
selfsigning_key = {
|
||||
"user_id": u1,
|
||||
"usage": ["self_signing"],
|
||||
"keys": {
|
||||
key_id(selfsigning_signing_key): encode_pubkey(selfsigning_signing_key)
|
||||
},
|
||||
}
|
||||
sign.sign_json(selfsigning_key, u1, master_signing_key)
|
||||
|
||||
cross_signing_keys = {
|
||||
"master_key": master_key,
|
||||
"self_signing_key": selfsigning_key,
|
||||
}
|
||||
|
||||
self.get_success(
|
||||
e2e_handler.upload_signing_keys_for_user(u1, cross_signing_keys)
|
||||
)
|
||||
|
||||
# expect signing key update edu
|
||||
self.assertEqual(len(self.edus), 1)
|
||||
self.assertEqual(self.edus.pop(0)["edu_type"], "org.matrix.signing_key_update")
|
||||
|
||||
# sign the devices
|
||||
d1_json = build_device_dict(u1, "D1", device1_signing_key)
|
||||
sign.sign_json(d1_json, u1, selfsigning_signing_key)
|
||||
d2_json = build_device_dict(u1, "D2", device2_signing_key)
|
||||
sign.sign_json(d2_json, u1, selfsigning_signing_key)
|
||||
|
||||
ret = self.get_success(
|
||||
e2e_handler.upload_signatures_for_device_keys(
|
||||
u1, {u1: {"D1": d1_json, "D2": d2_json}},
|
||||
)
|
||||
)
|
||||
self.assertEqual(ret["failures"], {})
|
||||
|
||||
# expect two edus, in one or two transactions. We don't know what order the
|
||||
# devices will be updated.
|
||||
self.assertEqual(len(self.edus), 2)
|
||||
stream_id = None # FIXME: there is a discontinuity in the stream IDs: see #7142
|
||||
for edu in self.edus:
|
||||
self.assertEqual(edu["edu_type"], "m.device_list_update")
|
||||
c = edu["content"]
|
||||
if stream_id is not None:
|
||||
self.assertEqual(c["prev_id"], [stream_id])
|
||||
stream_id = c["stream_id"]
|
||||
devices = {edu["content"]["device_id"] for edu in self.edus}
|
||||
self.assertEqual({"D1", "D2"}, devices)
|
||||
|
||||
def test_delete_devices(self):
|
||||
"""If devices are deleted, that should result in EDUs too"""
|
||||
|
||||
# create devices
|
||||
u1 = self.register_user("user", "pass")
|
||||
self.login("user", "pass", device_id="D1")
|
||||
self.login("user", "pass", device_id="D2")
|
||||
self.login("user", "pass", device_id="D3")
|
||||
|
||||
# expect three edus
|
||||
self.assertEqual(len(self.edus), 3)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D2", stream_id)
|
||||
stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D3", stream_id)
|
||||
|
||||
# delete them again
|
||||
self.get_success(
|
||||
self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
|
||||
)
|
||||
|
||||
# expect three edus, in an unknown order
|
||||
self.assertEqual(len(self.edus), 3)
|
||||
for edu in self.edus:
|
||||
self.assertEqual(edu["edu_type"], "m.device_list_update")
|
||||
c = edu["content"]
|
||||
self.assertGreaterEqual(
|
||||
c.items(),
|
||||
{"user_id": u1, "prev_id": [stream_id], "deleted": True}.items(),
|
||||
)
|
||||
stream_id = c["stream_id"]
|
||||
devices = {edu["content"]["device_id"] for edu in self.edus}
|
||||
self.assertEqual({"D1", "D2", "D3"}, devices)
|
||||
|
||||
def test_unreachable_server(self):
|
||||
"""If the destination server is unreachable, all the updates should get sent on
|
||||
recovery
|
||||
"""
|
||||
mock_send_txn = self.hs.get_federation_transport_client().send_transaction
|
||||
mock_send_txn.side_effect = lambda t, cb: defer.fail("fail")
|
||||
|
||||
# create devices
|
||||
u1 = self.register_user("user", "pass")
|
||||
self.login("user", "pass", device_id="D1")
|
||||
self.login("user", "pass", device_id="D2")
|
||||
self.login("user", "pass", device_id="D3")
|
||||
|
||||
# delete them again
|
||||
self.get_success(
|
||||
self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
|
||||
)
|
||||
|
||||
self.assertGreaterEqual(mock_send_txn.call_count, 4)
|
||||
|
||||
# recover the server
|
||||
mock_send_txn.side_effect = self.record_transaction
|
||||
self.hs.get_federation_sender().send_device_messages("host2")
|
||||
self.pump()
|
||||
|
||||
# for each device, there should be a single update
|
||||
self.assertEqual(len(self.edus), 3)
|
||||
stream_id = None
|
||||
for edu in self.edus:
|
||||
self.assertEqual(edu["edu_type"], "m.device_list_update")
|
||||
c = edu["content"]
|
||||
self.assertEqual(c["prev_id"], [stream_id] if stream_id is not None else [])
|
||||
stream_id = c["stream_id"]
|
||||
devices = {edu["content"]["device_id"] for edu in self.edus}
|
||||
self.assertEqual({"D1", "D2", "D3"}, devices)
|
||||
|
||||
def check_device_update_edu(
|
||||
self,
|
||||
edu: JsonDict,
|
||||
user_id: str,
|
||||
device_id: str,
|
||||
prev_stream_id: Optional[int],
|
||||
) -> int:
|
||||
"""Check that the given EDU is an update for the given device
|
||||
Returns the stream_id.
|
||||
"""
|
||||
self.assertEqual(edu["edu_type"], "m.device_list_update")
|
||||
content = edu["content"]
|
||||
|
||||
expected = {
|
||||
"user_id": user_id,
|
||||
"device_id": device_id,
|
||||
"prev_id": [prev_stream_id] if prev_stream_id is not None else [],
|
||||
}
|
||||
|
||||
self.assertLessEqual(expected.items(), content.items())
|
||||
return content["stream_id"]
|
||||
|
||||
def check_signing_key_update_txn(self, txn: JsonDict,) -> None:
|
||||
"""Check that the txn has an EDU with a signing key update.
|
||||
"""
|
||||
edus = txn["edus"]
|
||||
self.assertEqual(len(edus), 1)
|
||||
|
||||
def generate_and_upload_device_signing_key(
|
||||
self, user_id: str, device_id: str
|
||||
) -> SigningKey:
|
||||
"""Generate a signing keypair for the given device, and upload it"""
|
||||
sk = key.generate_signing_key(device_id)
|
||||
|
||||
device_dict = build_device_dict(user_id, device_id, sk)
|
||||
|
||||
self.get_success(
|
||||
self.hs.get_e2e_keys_handler().upload_keys_for_user(
|
||||
user_id, device_id, {"device_keys": device_dict},
|
||||
)
|
||||
)
|
||||
return sk
|
||||
|
||||
|
||||
def generate_self_id_key() -> SigningKey:
|
||||
"""generate a signing key whose version is its public key
|
||||
|
||||
... as used by the cross-signing-keys.
|
||||
"""
|
||||
k = key.generate_signing_key("x")
|
||||
k.version = encode_pubkey(k)
|
||||
return k
|
||||
|
||||
|
||||
def key_id(k: BaseKey) -> str:
|
||||
return "%s:%s" % (k.alg, k.version)
|
||||
|
||||
|
||||
def encode_pubkey(sk: SigningKey) -> str:
|
||||
"""Encode the public key corresponding to the given signing key as base64"""
|
||||
return key.encode_verify_key_base64(key.get_verify_key(sk))
|
||||
|
||||
|
||||
def build_device_dict(user_id: str, device_id: str, sk: SigningKey):
|
||||
"""Build a dict representing the given device"""
|
||||
return {
|
||||
"user_id": user_id,
|
||||
"device_id": device_id,
|
||||
"algorithms": ["m.olm.curve25519-aes-sha256", "m.megolm.v1.aes-sha"],
|
||||
"keys": {
|
||||
"curve25519:" + device_id: "curve25519+key",
|
||||
key_id(sk): encode_pubkey(sk),
|
||||
},
|
||||
}
|
||||
|
@ -34,7 +34,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
|
||||
""" Tests the RegistrationHandler. """
|
||||
|
||||
def make_homeserver(self, reactor, clock):
|
||||
hs_config = self.default_config("test")
|
||||
hs_config = self.default_config()
|
||||
|
||||
# some of the tests rely on us having a user consent version
|
||||
hs_config["user_consent"] = {
|
||||
|
@ -36,8 +36,8 @@ class RegisterRestServletTestCase(unittest.HomeserverTestCase):
|
||||
servlets = [register.register_servlets]
|
||||
url = b"/_matrix/client/r0/register"
|
||||
|
||||
def default_config(self, name="test"):
|
||||
config = super().default_config(name)
|
||||
def default_config(self):
|
||||
config = super().default_config()
|
||||
config["allow_guest_access"] = True
|
||||
return config
|
||||
|
||||
|
@ -143,8 +143,8 @@ class EndToEndPerspectivesTests(BaseRemoteKeyResourceTestCase):
|
||||
endpoint, to check that the two implementations are compatible.
|
||||
"""
|
||||
|
||||
def default_config(self, *args, **kwargs):
|
||||
config = super().default_config(*args, **kwargs)
|
||||
def default_config(self):
|
||||
config = super().default_config()
|
||||
|
||||
# replace the signing key with our own
|
||||
self.hs_signing_key = signedjson.key.generate_signing_key("kssk")
|
||||
|
@ -28,7 +28,7 @@ from tests import unittest
|
||||
|
||||
class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
|
||||
def make_homeserver(self, reactor, clock):
|
||||
hs_config = self.default_config("test")
|
||||
hs_config = self.default_config()
|
||||
hs_config["server_notices"] = {
|
||||
"system_mxid_localpart": "server",
|
||||
"system_mxid_display_name": "test display name",
|
||||
|
@ -28,8 +28,8 @@ from tests import unittest
|
||||
class TermsTestCase(unittest.HomeserverTestCase):
|
||||
servlets = [register_servlets]
|
||||
|
||||
def default_config(self, name="test"):
|
||||
config = super().default_config(name)
|
||||
def default_config(self):
|
||||
config = super().default_config()
|
||||
config.update(
|
||||
{
|
||||
"public_baseurl": "https://example.org/",
|
||||
|
@ -315,14 +315,11 @@ class HomeserverTestCase(TestCase):
|
||||
|
||||
return resource
|
||||
|
||||
def default_config(self, name="test"):
|
||||
def default_config(self):
|
||||
"""
|
||||
Get a default HomeServer config dict.
|
||||
|
||||
Args:
|
||||
name (str): The homeserver name/domain.
|
||||
"""
|
||||
config = default_config(name)
|
||||
config = default_config("test")
|
||||
|
||||
# apply any additional config which was specified via the override_config
|
||||
# decorator.
|
||||
@ -497,6 +494,7 @@ class HomeserverTestCase(TestCase):
|
||||
"password": password,
|
||||
"admin": admin,
|
||||
"mac": want_mac,
|
||||
"inhibit_login": True,
|
||||
}
|
||||
)
|
||||
request, channel = self.make_request(
|
||||
|
Loading…
Reference in New Issue
Block a user